1 Network + Final Study Guide (True/False) Flashcards

(35 cards)

1
Q

T/F

  1. A security policy should clearly state the desired rules, even if they cannot be enforced.
A

FALSE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

T/F

  1. You don’t need to physically secure your servers as long as you use a good strong password for your accounts.
A

FALSE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

T/F

  1. In a file system that uses FAT or FAT32, the only file security option that is available is the sharing permissions.
A

TRUE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

T/F

  1. A Trojan is a self-replicating program that masks itself as a useful program but is actually a type of malware.
A

FALSE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

T/F

  1. A DoS attack ties up network bandwidth or services, rendering resources useless to legitimate uses.
A

TRUE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

T/F

  1. Network switches always must be configured before they can be put into operation in a network.
A

FALSE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

T/F

  1. The major disadvantage to using store-and-forward switching in a large network is that it will slow down the speed of network traffic.
A

TRUE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

T/F

  1. Communications through a router are noticeably faster than communications through a switch
A

FALSE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

T/F

  1. A distance-vector protocol sends updates to its neighbors that include the entire contents of its routing table.
A

TRUE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

T/F

  1. Changing the SSID on the access point and disabling SSID broadcast is sufficient security for most wireless networks.
A

FALSE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

T/F

  1. When a disk is formatted, it is impossible to recover the data that was on the disk.
A

FALSE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

T/F

  1. In Windows, you can start the Task Manage by simply right-clicking the taskbar and choosing Start Task Manager.
A

TRUE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

T/F

  1. One critical difference between a client OS and a server OS is the addition of directory services on some server OSs.
A

TRUE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

T/F

  1. Virtualization is designed for testing and development purposes only.
A

FALSE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

T/F

  1. Windows Server 2008 R2 can be installed only on a 64-bit system.
A

TRUE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

T/F

  1. Group accounts make it easier for an administrator to manage user rights and permissions.
17
Q

T/F

  1. In Linux every user that is created automatically belongs to a default group named Users.
18
Q

T/F

  1. Windows can be installed on an extended partition that has been formatted with the NTFS file system.
19
Q

T/F

  1. An event log entry that is an error is marked with a red circle with a white exclamation point in the center.
20
Q

T/F

  1. A RAID that is configured as a level 0 requires two drives because it copies data to both drives at the same time, making an exact duplicate of the data.
21
Q

T/F

  1. Most small businesses require a high level of security including encryption technologies and complex network connections.
22
Q

T/F

  1. The creator of a HomeGroup has the ability to change the randomly generated password to a more user-friendly password.
23
Q

T/F

  1. When purchasing new equipment for a small business it is a good idea to invest in expandability features that will meet the company’s needs for the next 10 to 15 years.
24
Q

T/F

  1. In a small business network, the router usually takes on the responsibilities of many roles, which include a firewall as well as a DHCP server.
25
# T/F 25. In most cases, you can install a small business network and move on to the next job, leaving the company's IT staff to support the network.
FALSE
26
# T/F 26. If a problem occurs after a successful login, Last Known Good Configuration will fix the issue.
FALSE
27
# T/F 27. A protocol analyze, such as Wireshark gives the ability to listen in on network traffic as it moves through the Application layer to the Data Link layer and vice versa.
TRUE
28
# T/F 28. In the problem-solving process, you should always devise a solution to the problem you are facing prior to determining the scope of the problem.
FALSE
29
# T/F 29. The ping command is used to determine the path between two devices.
FALSE
30
# T/F 30. Most SNMP managers allow the configuration of thresholds for generating alert messages to network administrators when those thresholds are exceeded.
TRUE
31
# T/F 31. A router is considered to be a CSU/DSU.
FALSE
32
# T/F 32. T-Carrier lines only require a CSU/DSC on the customer's side of the connection.
FALSE
33
# T/F 33. Packet switched WANs use virtual circuits to ensure that packets are delivered reliably and at the agreed-on bandwidth level.
TRUE
34
# T/F 34. Multiprotocol Label Switching (MPLS) supports both IPv4 and IPv6, as well as other network layer protocols.
TRUE
35
# T/F 35. Link Control Protocol is responsible for the setup of a PPP connection, as well as the termination of a connection when it has ended.
TRUE