Test Questions Chapters 2/3 Flashcards

(73 cards)

1
Q

What should MDF and IDF documentation take into account? What shouldn’t it?

A
  • -Power sources avaible
  • -environmental equipment needed to control temp and humidty
  • -distances the cable runs must span
  • -shouldn’t take into account costs
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

At what point in the installation process should patch panel ports and wall plates be labelled?

A

When the cables are attached to the connectors (not after they’re installed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

The business is deploying new software under a change request. Apart from the including the installation procedure, would the change request include a list of software and hardware upgrades required to run the new software?

A

Apparently, Yes. although i’ve never seen this in change management experience. You only include the items that are actually changing, not what is required to run it!

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q
  1. Authorizing downtime
  2. designating a maintenance window

Are 2 of the responsibilities of the change management team during the change process? True or FALSE

A

TRUE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Which Microsoft tool built into the OS is used for baselining?

A

Performance Monitor

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

on a Windows server enabling audit policies, it records information about both successful and failed access attempts in which of the below?
A. System B. Application C. Security D. Setup

A

Security log

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

In datacentres, which diagram contains the precise location of devices?

A

Rack Diagram

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Network Maps aren’t draw to scale and don’t indicate the exact location of each device - TRUE or FALSE?

A

TRUE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Which RAIDS provide fault tolerance?

A

RAID1 and RAID5 (RAID10 too if exam asks for it)

*RAID5 needs 3 discs or more!

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Power supplies in combined mode mean both supply the power at the same time. If one goes down the other can still provide power - TRUE or FALSE

A

FALSE. The first part is right, but if one goes down the other will not be able to fully provide the power needs.
Supplies can run in only 1 of two modes, Redundant or Combined

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Which types of back up doesn’t clear the archive bit after archiving?

A

Differential

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

grandfather, father and son refers to what type of back up is done - TRUE or FALSE

A

FALSE. It refers to the backup jobs for daily, weekly and monthly

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Windows server can provide full, differential and incremental backups, TRUE or FALSE?

A

FALSE. Only Full and Incremental

*It also can’t backup to magnetic media

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Multilayer/content switches can provide load balancing, - TRUE or FALSE

A

TRUE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Multilayer switch typically works up to what layer?

A

Layer 4

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

UPS in online mode runs devices using battery power all the time - TRUE or FALSE?

A

TRUE. The mains power is directly wired to the batteries first. It means there’s no sag in power when the power fails.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Which UPS mode switches to battery power during a power failure?

A

Standby

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q
Bonding
Link Aggregation
Port Aggregation
NIC teaming
are all equivalent terms for what?
A

Combining the bandwidth of two or more network adapters

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Disc duplexing involves using multiple discs, each with it’s own disc controller to provide fault tolerance. TRUE or FALSE?

A

TRUE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What are computers known as in a network load-balancing cluster?
What are they known as in a fail-over cluster?

A

Hosts for load-balancing cluster

Nodes for failover cluster

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Which type of backup uses the archive bit but doesn’t reset it after backing up and provides a short RTO?

A

Differential

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Clustering, Load-Balancing, NIC teaming and NAT are concepts that frequently use virtual IP’s to provide high availability - TRUE or FALSE?

A

FALSE. Only Clustering and Load-balancing. NIC teaming doesn’t use virtual IP addresses. NAT isn’t a HA technology.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

RTO is what? What does it depend on?

A

Recovery Time Objective - the amount of time it takes to restore data from the most recent backup. IT depends on the amount of data and the speed of the backup medium

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

What backup backs up all the data since the last backup of any kind?

A

Incremental

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
The types of applications subscribers use while accessing their provider's services are covered by the SLA, true or false?
False
26
What mechanism allows a backup job spanning multiple removable media types to execute more quickly by automatically inserting and removing media.
An autochanger
27
What issue does RAID6 address? What's the minimum number of drives required?
It addresses the issue with RAID5 where if 2 drives fail at the same time there is a high likelihood of permanent data loss. It uses two blocks of parity requiring min of 4 drives.
28
Which RAID levels provide fault tolerance with the down side of having the smallest amount of useable disc space?
RAID1 (50% between 2 discs) and RAID10 (I don't understand how this is 50%.)
29
What is version skew and what can prevent it?
Version skew happens when a file is written/changed during a backup. The file is written to a directory that has already been backed up and thus won't appear on the backup location. Taking a snapshots prevents this.
30
which unix utility displays performance info about the currently running processes?
the TOP command.
31
Which SNMP versions don't include any security?
SNMPv1 | SNMPv2c
32
A driver update is typically applied to hardware or software?
Software
33
When does Microsoft release the latest OS patches for automatic download?
Second Tuesday of every month.
34
Research Testing Backup Are part of what process?
Patch Evaluation. | *Rolling back is not part of it.
35
Device driver updates are least likely to be updated of the kinds of updates usually undertaken. Unless it addresses a specific bug or issue - TRUE or FALSE?
TRUE
36
to effectively monitor a network using SNMP, you must be sure that all of the equipment you purchase when designing and building your network supports the protocol - TRUE or FALSE?
TRUE
37
SNMPv2 does not use a community string for security, TRUE or FALSE?
TRUE
38
Port Scanners examine a system at what layer of the OSI?
Layer 4 - Transport (it looks for port numbers). | Ports can be described as 'system endpoints'
39
web server logs need a traffic analysis application to interpret and the logs are stored as text files - TRUE or FALSE Is a protocol analyizer a traffic analyzer?
TRUE. No according to the test questions. Protocol analysers can't interpret web server logs, they interpret packets on the network
40
Packet/protocol analyzers can look at data insight packets which can contain passwords in clear text - TRUE or FALSE?
TRUE | *packet sniffers can't look at the data inside packets
41
packets that are dropped because they are destined for another interface are known as what?
Discards
42
Security and Cycling are tasks assocaited with what? | What is meant by them?
Log Management. Security is need to keep the logs secure Cycling sets the period to keep the log for before being deleted.
43
Nessus, Nmap and MBSA can all perform what?
Vulnerability scanning
44
Which free tool is an inventory, assessment, and reporting tool that helps you assess your current IT infrastructure and determine the right Microsoft technologies for your IT needs?
MAP Toolkit. | *it does not perform vulnerability scanning
45
Network mapping, Remediation and Penetration testing are NOT functions classified as vulnerability scanning. TRUE or FALSE?
TRUE
46
Data Aggregation, Correlation, Retention and Forensic Analysis are processes in what?
SIEM
47
In SIEM which process involves searching logs on multiple computers for specific information based on set criteria and time periods?
Forensic Analysis
48
Which VPN protocol doesn't provide encryption within the tunnel?
L2TP - it uses IPSec *Technically, PPTP is the same as it relies on the underlying PPP to do that but the test questions didn't use this as an answer.
49
SSH is not used to secure connections between web servers and web browsers, TRUE or FALSE?
TRUE
50
the Authentication Header is a protocol in the TCP/IP suite that provides integrity services in the form of a digital signature - TRUE or FALSE
TRUE
51
Phase 1 of IPsec connection establishment authenticates the endpoints using digitally signed certifcates or a PSK - TRUE or FALSE?
TRUE
52
PHase 2 of IPSec connection is encrypted using the secure keys established in phase one and is responsible for negotiating another set of keys called the Secure Association - TRUE or FALSE
TRUE
53
TFTP doesn't encrypt text sent to authenticate login - TRUE or FALSE
FALSE - it doesn't authenticate full stop.
54
Which variant of FTP is suitable for systems booting with PXE by downloading boot image from the network?
TFTP. | It's because it doesn't need to authenticate.
55
Out of band devices don't require an IP address to manage - TRUE or FALSE?
TRUE
56
What 4 components are required for a computer to establish a remote TCP/IP connection.
1) Common protocols 2) Physical Layer connection 3) TCP/IP configuration 4) Host and remote software
57
Browsing using a VPN is slower because you are using the remote network LAN which has to then pass all the requests down the VPN tunnel - TRUE or FALSE?
TRUE
58
What are the two most common types of SSL VPNs?
SSL Portals - provides users with access to selected remote network resources SSL tunnels - client browser uses java or flash to connect
59
- -plugging into the console port - -establishing a modem connection - -connecting dedicated ports on each device to a separate switch Are all forms of what?
Out-of-band management
60
Which of the below is untrue about VNC 1. it's free 2. runs on many OSs 3. runs faster than competition 4. can run through a web browser
3. runs faster
61
What policy specifies how and when users are permitted to access the company network?
Remote access policy
62
Humidity levels lower than what can cause a build-up of static electricity?
50%
63
Account lock thresholds specifies what?
the number of incorrect logon attempts that are allowed before the account is locked
64
Reset account lockout threshold counter specifies what?
The amount of time that an account remains locked out
65
What data-loss prevention term describes when data is being transmitted across the network?
Data-in-motion
66
data-in-use describes end-point actions - TRUE or FALSE?
TRUE
67
On-boarding and off-boarding are typically associated with Identity Management or Data-loss prevention?
Identity Management - users are added or removed from the IAM (Identity and Access Management system)
68
--The Department of State --Department of Commerce and --Department of the Treasury are all capable of imposing international export controls on software products? TRUE or FALSE?
TRUE
69
What is a fibre channel arbitrated loop (known as FC-AL) used for?
For direct connection to storage that isn't shared to other hosts (so when it's only used by one host)
70
What is an organization's security incident response policy's primary goal? Identifying the cause of an incident or preventing an incident from occurring again?
Preventing an incident from occurring again
71
Electrical fires are not something typically addressed by an IT departments incident response POLICIES. TRUE or FALSE?
TRUE
72
Password history policy is not something design to prevent brute force attacks. TRUE or FALSE
TRUE
73
Data preservation is not likely to be a procedural element of an IT asset disposal policy - TRUE or FALSE
TRUE (only according to the practice test book, this is contradicted in the review guide)