Vous êtes sur la page 1sur 12

Which action should a user take to ensure that personal information that is entered into a website form is not

reta
on the computer?
Clear the browser history.
Change the default browser.
Reset the file sharing permissions.
Delete the temporary Internet files.
2 A new employee needs to transfer files to the corporate FTP server. However, the employee is unable to log
the FTP server. What is the most likely cause of the problem?
The employee is using the wrong protocol.
The employee is using an incorrect username or password.
An incorrect IP address is configured in the FTP client.
An incorrect port number is configured in the FTP client.

3 What are two possible causes of e-mail attachments not being received with e-mail messages? (Choose two.)
The e-mail attachments could be too large.
The firewall could be blocking port 21, with the result that attachments cannot get through.
The e-mail server could not be receiving e-mail messages that are using POP.
The attachments could contain a virus.
The FTP server is down.

4 Which protocol provides secure transport of data from the company web server to remote users?
HTTP
HTTPS
NetBEUI
DNS

5 The network administrator has physically installed wireless NICs in three new computers. Which two additio
steps will complete the installation process? (Choose two.)
Configure the device drivers.
Configure the signal strength of the antenna.
Configure the NICs with addressing information.
Update the BIOS to support the new wireless NICs.
Verify that the computers have a valid MAC address.
What would be a disadvantage of configuring a wireless router or access point to operate only in accordance with
802.11n protocol standard?
The 802.11n standard does not support static IP addressing.
Using only 802.11n will cause multiple SSIDs to be broadcast.
The 802.11n standard does not support advanced network security features.
Older, legacy wireless devices may be unable to connect to the wireless network.
7 Which two ipconfig parameters are used within Windows XP to remove and assign the IP address previously
provided by a DHCP server? (Choose two.)
dhcp
flush
reassign
refresh
release
renew

8 Which two methods can be used to connect IP phones to a network? (Choose two.)
Use a wireless network connection.
Replace the data network cabling with PSTN grade cabling.
Connect the IP phone directly to an Analog Telephone Adapter.
Connect the IP phone to the Ethernet LAN using an RJ-45 connector.
Establish an Internet connection then use an Analog Telephone Adapter.

9 The network technician is researching the best way to connect the branch offices to the main office. What are
three main considerations that the technician should remember when choosing an Internet connection? (Choo
three.)
availability
distance
operating system
protocols
reliability
speed

10 Students on the college network need to be able to view folder names and data in files stored on the Window
based file server, but should never be allowed to add or save information on the server. Occasionally, the
students also need to run media programs to watch videos stored on the server. Which permission should the
network technician assign to the students accessing the file server?
change
execute
read
write
A technician is configuring a network device for remote access. Which protocol is commonly used as a secure
alternative to Telnet?
FTP
HTTPS
SSH
TFTP
12 ABC Computer Company is in the process of planning a network for a new client. A network technician has
been asked to perform a physical inspection of the facilities to determine the flow of data and protocols requi
by the client. What is this inspection called?
data inspection
logical survey
plant inspection
site survey

13 The network technician has been asked to share a new printer on the network using the Add Printer wizard fo
Windows XP. Which path should the technician use to run the Add Printer wizard?
Start > Run > prntwiz.exe
Start > Control Panel > Add Hardware > Printers and Faxes > Add Printer
Start > Administrative Tools > Services > Printers and Faxes > Add Printer
Start > Control Panel > Printers and Faxes > File > Add Printer

14 What are two ways to assign an IP address to a wireless NIC? (Choose two.)
Assign a static address.
Use ARP.
Use the net command with the static option.
Use WEP.
Use the net command with the automatic option.
Use DHCP.

15 A technician is working on a host computer that fails to obtain an IP address. Which three actions could the
technician perform to determine the cause of the problem? (Choose three.)
Check the DNS server to ensure that it is operating correctly.
Check the local router to make sure the default gateway is correct.
Check that the DCHP server is operational.
Check that the network cable is connected.
Check that the FTP server is functioning correctly.
Check the PC firewall settings to make sure that DHCP is allowed.
Which three ports are used by SMTP, POP, and IMAP? (Choose three.)
21
25
69
110
127
143
17 A technician is troubleshooting a network and finds hosts with duplicate static IP addresses. Which protocol
could be used to resolve this issue?
DNS
DHCP
NBTSTAT
NSLOOKUP

18 After booting a computer running Windows 2000, the following message displays: "The IP address already
exists on another computer". Which two steps will quickly obtain a new IP address from the DHCP server?
(Choose two.)
run ipconfig /all
run ipconfig /displaydns
run ipconfig /flushdns
run ipconfig /release
run ipconfig /renew

19 A company adds a few refurbished computers to a network. The company finds, however, that the refurbishe
computers perform significantly worse than the original networked computers performed with applications th
require the transfer of data over the network. What should the company technicians do?
Check if the computers are using the integrated network interface.
Replace the Windows 2000 OS with Windows XP or Vista.
Check if the computers are using a VPN.
Check if the network interface cards in the computers are limited to 10 Mb/s.

20 A computer user cannot access a bank using HTTPS. What is one recommended solution?
Use HTTP instead.
Enable SSH on the computer of the user.
Disable tracking on the computer of the user.
Enable SSL through the web browser application.
When planning the network in a new building, the technician notes that the company requires cabling that can
extend up to 295 ft (90 m) with enhanced bandwidth support at an affordable price. Which cable type will the
technician pick if he chooses the most common type of cabling used on networks?
Cat3
Cat5
Cat5e
Cat6A
22 A textbook author needs to upload a chapter from a home computer to the FTP server of the publisher. The
author uses the correct username and password, but the transfer fails. What is the most likely cause of the
problem?
Port 23 should be enabled on the FTP server.
Port 21 should be enabled on the home firewall.
The home computer IP address needs to be renewed.
The chapter document must be compressed before transmitting to an FTP server.

23 While using nslookup, a student sees the following message: "Can’t find server name for address 127.0.0.0:
timed out." What is one possible problem?
The computer cannot ping the default gateway.
The computer does not have an IP address defined.
The computer does not have a default gateway defined.
The computer does not have at least one entry for a DNS server configured.

24

Refer to the exhibit. The tracert command was used on the local computer to verify connectivity with a remo
site. Which type of address is shown in the highlighted line of the tracert command output displayed in the
exhibit?
default gateway for the local computer
default gateway for the ISP
IP address on the local computer
IP address for the desired site

25 In Internet Explorer, after choosing Tools and then Internet Options, which tab would a user select to set the
browser to prompt before downloading potentially unsafe content?
Advanced
Content
Privacy
Security
While troubleshooting a computer, the technician releases and renews the IP address. A message appears: "N
operation can be performed on the adapter while its media is disconnected." What is a probable cause of the
message?
The network cable is unplugged.
The network wiring has reversed pins.
The RJ-45 jack on the NIC is grounding out.
The DHCP server has been disconnected from the network.

27 What is the purpose of an analog telephone adapter in the application of VoIP services?
to convert IP phone digital voice data to analog signals
to connect a standard analog telephone to the IP network
to connect a computer with a microphone and headphones to the IP network
to enable an IP phone to connect to a computer with the use of an RJ-45 Ethernet connector

28 Which safety precaution should be used when working with any type of cable?
Wear safety glasses when working any type of cable.
Cordon off the area before crimping the cable heads.
Wear cloth gloves when working with any type of cable.
Use a magnifying glass to divert light rays when working with fiber-optic cable.

29 A user is receiving e-mail on a regular basis from a particular person. A problem occurs when the e-mail from
this same person contains an attachment. What is one solution?
Ask the IT department to permit port 25 through the firewall.
Request that the person sending the e-mail attach only one picture per e-mail message.
Check DNS settings on the computer used to receive the e-mail.
Request that the person sending the photographs archive all e-mail messages before sending e-mail.

30 Which two hazards exist when working with fiber optic cabling? (Choose two.)
chemicals
copper strands
electricity
glass splinters
connectors

Chapter 16

A computer user cannot access the Internet. A technician, attempting to resolve the problem, can ping the proxy
server, but Internet access is still denied. What is the problem?
The firewall is disabled on the proxy server.
The IP address on the proxy server is wrong.
The computer browser proxy server settings are wrong.
The IP address on the computer is missing or misconfigured.
2 Which simple wireless configuration technique can make the network invisible to unauthorized users?
Change the default password on the WAP.
Disable inactive wireless connections.
Filter all network access using MAC addresses.
Disable SSID broadcasting.

3 A technician has been asked to format the drives of several Windows XP computers with a file system that ca
use file-level permissions to secure confidential information. Which file system should be used by the
technician?
EXT
FAT
FAT32
NTFS

4 A network administrator is trying to allow everyone access to a data folder while limiting access to individua
subfolders to individuals. The administrator is having problems with all users being able to view and edit all
and folders. What should the administrator look at to solve the problem?
Check to make sure the users are in different groups.
Check to see if the subfolders have inherited rights from the main folder.
Check the login script of all users to make sure they have login rights.
Check to make sure that system resources are not being over tasked.

5 A network technician has received several reports regarding missing and corrupted information on a compan
file server. Which course of action can the technician use to investigate any unauthorized network access?
Audit all user activity by using telnet to access each computer during the day.
Enable event logging on each user computer to check for unauthorized network access.
Enable event logging on all network devices to audit any suspicious user activity.
Audit the event logs on the server to check for unauthorized network access.

6 Which two file-level permissions allow a user to delete a file? (Choose two.)
read
modify
read and execute
write
full control
list contents

7 Which three physical security measures are employed to prevent security breaches and loss of data? (Choose
three.)
antivirus program
software firewall
conduit
card key
strong password
security guard

8 Windows XP should be updated on a regular basis. In which situation should automatic updates be disabled?
Computers on a corporate network perform well without automatic updates because they are protected by
firewall.
Home users should avoid automatic updates because they are protected by Windows Internet Connection
Firewall.
Users accessing the network using a dial-up connection need to control when the updates are downloaded
and installed.
Guest user accounts with limited access are unlikely to ever need updates because they are temporary use

9 Which two characteristics of network traffic are being monitored if a network technician configures the comp
firewall to operate as a packet filter? (Choose two.)
applications
physical addresses
packet size
ports
protocols

10 On a computer in the lab, a student can access e-mail. However, from a laptop that is owned by the student, t
wireless connection to the e-mail server fails. What is the problem?
Port 23 is being blocked on the wireless network.
The e-mail server is having intermittent connectivity issues.
Windows Firewall is blocking the port that is used by the e-mail application.
The router that is connected to the e-mail server is blocking the port that is used by the e-mail application

11 Which Windows XP command initiates a backup from the command line?


archive
backup
compress
ntbackup
zip

12 What is the result of changing the default username and password on a wireless access point?
It reduces the chance of the wireless network being detected.
It reduces the chance of interference from a nearby wireless device.
It reduces the chance of someone accessing the device and changing settings.
It requires all devices that access the wireless network to provide the new username and password.

13 What is the default setting for Windows XP operating system updates?


automatic
only download updates
notify me
manual

14 A network administrator has noticed that users without administrative rights are installing unauthorized
applications on the Windows Vista computers. What could the administrator do to prevent the installation of
these applications?
Further restrict the rights of all users.
Enable the UAC function on the computers.
Put all of the computers in a special group with more restrictive rights.
Reinstall the operating system and use the 64-bit version.

15 What are two features of Windows Vista Backup? (Choose two.)


The backup files have the extension .zip.
The source and target drive volumes must be NTFS.
The maximum size of a single backed up file is 450 MB.
The backup files can be saved to another connected computer or server.
The backup files have an extension of .bkf and a maximum uncompressed file size of 200 MB.
Which two advantages are attributed to a hardware firewall when compared to a software firewall? (Choose two.
It costs less because it is more efficient.
It does not impact the processing performance of the equipment it protects.
It always protects both the computer it is installed on as well as the rest of the network.
It is designed to protect more than one computer.
It is a free Windows operating system component.
17 Which encryption technology provides secure tunnels?
asymmetric encryption
hash encoding
symmetric encryption
VPN

18 A network administrator is trying to change the account name of a user but cannot make the changes. What
could be a possible cause?
The user is logged in to the account.
The account has been disabled.
The administrator does not have the correct permissions to make the change.
The user has violated a security policy, and the result is that the account has been deleted.

19

Refer to the exhibit. Which Firewall Settings tab would be used to allow an FTP connection through a Vista-
based computer?
General
Exceptions
Advanced
the hidden tab accessed by pressing F12
20 A business has a policy to automatically update and run the antivirus software on all computers each day. Wh
is the best time to perform this security maintenance?
at computer startup
after each operating system update
when the computers are not being used
when a user logs in to the computer

21 Which data security technology takes the form of an object which must be close to a computer before the use
can successfully submit a username and password?
biometric device
security key fob
smart card
thumb drive

22 After a technician collects information from the computer, which two sources can provide the technician with
possible solutions for various types of network-related problems? (Choose two.)
paperwork that is provided to customers
the manufacturer FAQ for network devices
firewall logs
network device logs
technical websites

23 On a Windows Vista computer, which CLI command is used to repair the master boot record that has been
damaged by a virus?
bootrec.exe/fixboot
bootrec.exe/fixmbr
fdisk /mbr
fixmbr

24 A student has a Windows XP laptop firewall set with the Don't Allow Exceptions option enabled. What is the
consequence of setting this option?
The Windows XP firewall has been disabled.
The laptop cannot be used to access the Internet.
No traffic that originates from an outside network is allowed to be sent to the laptop.
No applications on an outside network are allowed access to the laptop.

25 Which method can a technician use to make sure that only specific computers connect to a wireless router?
WEP security settings
WPA security settings
SSID broadcast disabled
MAC address filtering
LEAP authentication

26 The ABC Company network designers are designing the new corporate WiFi network. Which two precaution
should be implemented because of security concerns with wireless networks? (Choose two.)
Shield the access point with a Faraday cage.
Send only essential passwords in clear text.
Disable broadcast of the SSID.
Configure WPA on access points.
Use the 2.4 GHz frequency band.
Use the 5.0 GHz frequency band.

27 A network administrator has moved encrypted files from one computer to another computer on the network a
now the files are not encrypted. What does the administrator need to do to correct the problem?
Move the files back and try the copy again.
Convert the destination computer partition to NTFS.
Change the file rights properties to Modify on the destination computer.
Change the folder permissions on the destination computer to deny.

28 A user reports that the antivirus software on a computer is always turned off when the computer is restarted,
despite being reactivated each time the computer starts up. Further investigation by the technician shows that
Internet browser also displays an incorrect homepage. What is the probable cause of these problems?
The Internet browser needs updating.
The computer has been infected with spyware.
The automatic software firewall settings have been disabled.
The automatic scan feature of the antivirus software has been disabled.

29 Port triggering has been configured on a wireless router. Port 25 has been defined as the trigger port and port
as an open port. What effect does this have on network traffic?
Any traffic that comes into port 25 allows outgoing port 113 to be used.
All traffic that is sent into port 25 to the internal network will also be allowed to use port 113.
Any traffic that is using port 25 going out of the internal network will also be allowed to transmit out por
113.
All traffic that is sent out port 25 will open port 113 to allow inbound traffic into the internal network
through port 113.

Vous aimerez peut-être aussi