Académique Documents
Professionnel Documents
Culture Documents
CHAPTERS 15 AND 16
A network technician has received several reports regarding missing and corrupted
information on a company file server. Which course of action can the technician use to
investigate any unauthorized network access?
Audit all user activity by using telnet to access each computer during the day.
Enable event logging on each user computer to check for unauthorized network
access.
Enable event logging on all network devices to audit any suspicious user activity.
Audit the event logs on the server to check for unauthorized network access.
proxy
A technician has been asked to format the drives of several Windows XP computers
with a file system that can use file-level permissions to secure confidential information.
Which file system should be used by the technician?
EXT
FAT
FAT32
NTFS
PGP
WEP
WPA
Which simple wireless configuration technique can make the network invisible to
unauthorized users?
Change the default password on the WAP.
full
historical
incremental
Which two hazards exist when working with fiber optic cabling? (Choose two.)
chemicals
copper strands
electricity
glass splinters
connectors
Which safety precaution should be used when working with any type of cable?
Wear safety glasses when working any type of cable.
Cordon off the area before crimping the cable heads.
Use a magnifying glass to divert light rays when working with fiber-optic cable.
ABC Computer Company is in the process of planning a network for a new client. A
network technician has been asked to perform a physical inspection of the facilities to
determine the flow of data and protocols required by the client. What is this inspection
called?
data inspection
logical survey
plant inspection
site survey
When planning a new network, the administrator is interested in a physical topology that
is used more often than any other. Which topology is the administrator considering?
bus
mesh
ring
star
Which protocol provides secure transport of data from the company web server to
remote users?
HTTP
HTTPS
NetBEUI
DNS
The network technician is researching the best way to connect the branch offices to the
main office. What are three main considerations that the technician should remember
when choosing an Internet connection? (Choose three.)
availability
distance
operating system
protocols
reliability
speed
The network technician has been asked to share a new printer on the network using the
Add Printer wizard for Windows XP. Which path should the technician use to run the
Add Printer wizard?
Start > Run > prntwiz.exe
Start > Control Panel > Add Hardware > Printers and Faxes > Add Printer
Start > Administrative Tools > Services > Printers and Faxes > Add Printer
Start > Control Panel > Printers and Faxes > File > Add Printer
The network administrator has physically installed wireless NICs in three new
computers. Which two additional steps will complete the installation process? (Choose
two.)
Configure the device drivers.
ABC Company requires preventive maintenance for all local network cabling once a
month. Which task should be included in the preventive maintenance program?
Disconnect and reconnect all patch cables.
Start > Control Panel > Internet Options > Security Center
Start > Control Panel > Network and Internet Connections > Security Center
Which two hazards exist when working with copper cabling? (Choose two.)
chemicals
copper strands
glass splinters
light
lightning