Welcome to Scribd. Sign in or start your free trial to enjoy unlimited e-books, audiobooks & documents.Find out more
Download
Standard view
Full view
of .
Look up keyword
Like this
213Activity
0 of .
Results for:
No results containing your search query
P. 1
13494943-it-Chapters-15-and-16

13494943-it-Chapters-15-and-16

Ratings:

5.0

(1)
|Views: 29,307|Likes:
Published by Wolverine
13494943-it-Chapters-15-and-16
13494943-it-Chapters-15-and-16

More info:

Published by: Wolverine on Jul 01, 2009
Copyright:Attribution Non-commercial

Availability:

Read on Scribd mobile: iPhone, iPad and Android.
download as PDF, TXT or read online from Scribd
See more
See less

05/11/2014

pdf

text

original

 
I.T. CHAPTERS 15 AND 16
A network technician has received several reports regarding missing and corruptedinformation on a company file server. Which course of action can the technician use toinvestigate any unauthorized network access?Audit all user activity by using telnet to access each computer during the day.Enable event logging on each user computer to check for unauthorized networkaccess.Enable event logging on all network devices to audit any suspicious user activity.
Audit the event logs on the server to check for unauthorized network access.
Which two advantages are attributed to a hardware firewall when compared to asoftware firewall? (Choose two.)It costs less because it is more efficient.
It does not impact the processing performance of the equipment it protects.
It always protects both the computer it is installed on as well as the rest of thenetwork.
It is designed to protect more than one computer.
It is a free Windows operating system component.A company wants to configure a firewall to monitor all channels of communication andallow only traffic that is part of a known connection. Which firewall configuration shouldbe deployed?packet filteringproxy
stateful packet inspection
stateless packet inspectionA technician has been asked to format the drives of several Windows XP computerswith a file system that can use file-level permissions to secure confidential information.Which file system should be used by the technician?
 
EXTFATFAT32
NTFS
A technician needs to configure wireless networking on several new laptop computers.Which encryption method should the technician choose to achieve the bestauthentication and payload security?MD5PGPWEP
WPA
Which simple wireless configuration technique can make the network invisible tounauthorized users?Change the default password on the WAP.Disable inactive wireless connections.Filter all network access using MAC addresses.
Disable SSID broadcasting.
Windows XP should be updated on a regular basis. In which situation should automaticupdates be disabled?Computers on a corporate network perform well without automatic updates becausethey are protected by a firewall.Home users should avoid automatic updates because they are protected byWindows Internet Connection Firewall.
Users accessing the network using a dial-up connection need to control whenthe updates are downloaded and installed.
Guest user accounts with limited access are unlikely to ever need updates becausethey are temporary
 
As part of the new security policy, a company decides to protect company data byperforming backups on a regular basis. Which backup type takes the greatest amount of time and is commonly used in conjunction with another backup method?differential
full
historicalincrementalWhich quick solution should be tried first if a user is unable to login?
Verify that the CAPS and NUM lock keys are not on
.Reset the password for the user.Assign the user a new username and password.Add the user to a different group on the network.Which two hazards exist when working with fiber optic cabling? (Choose two.)
chemicals
copper strandselectricity
glass splinters
connectorsWhich safety precaution should be used when working with any type of cable?
Wear safety glasses when working any type of cable.

Activity (213)

You've already reviewed this. Edit your review.
João Pedro Cardoso added this note
Tens disponivel outros ?
1 thousand reads
1 hundred reads
Jalil Ramirez liked this
dorff_10 liked this
dvemic34 liked this
Georgiana Maria liked this
Vlad Liceac liked this
Zuzu Băă liked this

You're Reading a Free Preview

Download
scribd
/*********** DO NOT ALTER ANYTHING BELOW THIS LINE ! ************/ var s_code=s.t();if(s_code)document.write(s_code)//-->