P. 1
Champion! 16

Champion! 16

|Views: 8,458|Likes:
Published by evramorina

More info:

Published by: evramorina on Jan 11, 2010
Copyright:Attribution Non-commercial

Availability:

Read on Scribd mobile: iPhone, iPad and Android.
download as DOCX, PDF, TXT or read online from Scribd
See more
See less

07/31/2013

pdf

text

original

1correctness of
response

Option 2 and Option 5 are correct.
1 point for each correct option.
0 points if more options are selected
than required.

2

19

Formularbeginn

After analyzing and researching the problem by visiting several technical websites, a technician
was unable to help a user to log in. Later, the user rebooted the computer and was able to log in.
Which step did the technician omit during the troubleshooting process?
closing the issue with the customer

gathering data from the computer

gathering information from the user

trying quick solutions

Formularende

Observable

Description

Max Value

1correctness of
response

2 points for Option 4
0 points for any other
option

2

20

Formularbeginn

Which security technique provides secure tunnels?
asymmetric encryption

hash encoding

symmetric encryption

VPN

Formularende

Observable

Description

Max
Value

1correctness of
response

2 points for Option 4
0 points for any other
option

2

1

Formularbeginn

Which encryption technique uses a mathematical function to create a numeric value unique
to the data?

asymmetric encryption

hash encoding

VPN

WTLS

Formularende

Observable

Description

Max
Value

1correctness of
response

2 points for Option 2
0 points for any other
option

2

2

Formularbeginn

Which two methods help protect network cables? (Choose two.)
enclosing the cables in conduits

enclosing the cables in cable locks

routing the cables inside the walls of a building

leave cables exposed to reveal tampering

using RFID tags

Formularende

Observable

Description

Max
Value

1correctness of
response

Option 1 and Option 3 are correct.
1 point for each correct option.
0 points if more options are selected
than required.

2

3

Formularbeginn

Which method of filtering traffic is used to monitor established network connections to allow
only packets from established network connections?
packet filter

proxy firewall

stateful packet inspection

wireless NICs

Formularende

Observable

Description

Max Value

1correctness of
response

2 points for Option 3
0 points for any other
option

2

4

Formularbeginn

Which Windows XP command performs a data backup?
BACKUP

BUP

NTBACKUP

XPBACKUP

Formularende

Observable

Description

Max Value

1correctness of
response

2 points for Option 3
0 points for any other
option

2

5

Formularbeginn

What is a disadvantage of configuring a firewall using permissive settings?
Devices are exposed to attack.
Packet transmission becomes complicated, requiring explicit access permission for all
packets.
The extra ports that are used by various applications are closed.

The settings may cause a user to be locked out of the system.

Formularende

Observable

Description

Max Value

1correctness of

2 points for Option 1

2

response

0 points for any other
option

6

Formularbeginn

Which feature is characteristic of a guest account?
It always remains active.

It can be configured to grant extensive access to resources on a temporary basis.

It disables access to the Internet, e-mail, and any printer.

It must be specifically configured for each guest.

Formularende

Observable

Description

Max Value

1correctness of
response

2 points for Option 2
0 points for any other
option

2

7

Formularbeginn

Which technique may be used to generate a message digest from a hash encoding process?
the use of a combination of identical encryption keys
the use of a mathematical function to generate a corresponding text value that is unique to
the message
the use of the SHA or MD5 algorithms

the use of a key that is agreed to by the sender and receiver

Formularende

Observable

Description

Max Value

1correctness of
response

2 points for Option 3
0 points for any other
option

2

8

Formularbeginn

Which method can turn a laptop into a zombie computer?
improperly configuring the BIOS setting

partially uninstalling the operating system

reformatting the hard drive

remotely controlling the operating system

Formularende

Observable

Description

Max Value

1correctness of
response

2 points for Option 4
0 points for any other
option

2

9

Formularbeginn

After a technician collects information from the computer, which two sources can provide the
technician with possible solutions for various types of network-related problems? (Choose
two.)

paperwork that is provided to customers

the manufacturer FAQ for network devices

firewall logs

network device logs

technical websites

Formularende

Observable

Description

Max
Value

1correctness of
response

Option 2 and Option 5 are correct.
1 point for each correct option.
0 points if more options are selected
than required.

2

10

Formularbeginn

After analyzing and researching the problem by visiting several technical websites, a technician
was unable to help a user to log in. Later, the user rebooted the computer and was able to log in.
Which step did the technician omit during the troubleshooting process?
closing the issue with the customer

gathering data from the computer

gathering information from the user

trying quick solutions

Formularende

Observable

Description

Max Value

1correctness of
response

2 points for Option 4
0 points for any other
option

2

11

Formularbeginn

What is the purpose of using hash encoding?
to ensure complete security of the message digest

to ensure that the data remains the same even if the message digest is tampered with

to ensure that tampering with data is detectable

to regenerate the message digest when the original message digest is changed

Formularende

Observable

Description

Max Value

1correctness of
response

2 points for Option 3
0 points for any other
option

2

12

Formularbeginn

Which characteristic of an application is used by the Windows XP firewall to determine
whether the application is allowed to access the network?
file permission

port number

IRQ

username

Formularende

Observable

Description

Max Value

1correctness of
response

2 points for Option 2
0 points for any other
option

2

13

Formularbeginn

Which right can only be granted by enabling the Full Control file-level permission?
change the permissions of a file

delete a file

overwrite a file

run a file

Formularende

Observable

Description

Max Value

1correctness of
response

2 points for Option 1
0 points for any other
option

2

14

Formularbeginn

Which two advantages are attributed to a hardware firewall when compared to a software
firewall? (Choose two.)
It costs less because it is more efficient.

It does not impact the processing performance of the equipment it protects.

It always protects both the computer it is installed on as well as the rest of the network.

It is designed to protect more than one computer.

It is a free Windows operating system component.

Formularende

Observable

Description

Max
Value

1correctness of

response

Option 2 and Option 4 are correct.
1 point for each correct option.
0 points if more options are selected
than required.

2

15

Formularbeginn

A technician has been asked to format the drives of several Windows XP computers with a file
system that can use file-level permissions to secure confidential information. Which file system
should be used by the technician?
EXT

FAT

FAT32

NTFS

Formularende

Observable

Description

Max Value

1correctness of
response

2 points for Option 4
0 points for any other
option

2

16

Formularbeginn

A technician needs to configure wireless networking on several new laptop computers. Which
encryption method should the technician choose to achieve the best authentication and payload
security?
MD5

PGP

WEP

WPA

Formularende

Observable

Description

Max Value

1correctness of
response

2 points for Option 4
0 points for any other
option

2

17

Formularbeginn

What is the default setting for Windows XP operating system updates?
automatic

only download updates

notify me

manual

Formularende

Observable

Description

Max Value

1correctness of
response

2 points for Option 1
0 points for any other
option

2

18

Formularbeginn

A user can locate the setup for an application on the server but is unable to download it. The
user requests the help of a technician, who looks up the list of common problems and their
recommended solutions. Which solution should the technician try to resolve this problem?
Change the read permission granted to the user on the setup file to read and execute.

Grant system administrator privileges to the user on a temporary basis.

Inform the user that this is due to a phishing attack and then perform an antivirus scan.

Verify that the MAC address of the computer is listed in the MAC address filter table.

Formularende

Observable

Description

Max Value

1correctness of
response

2 points for Option 1
0 points for any other
option

2

19

Formularbeginn

Which physical security technology uses an embedded integrated circuit chip to store data
safely and is commonly used in secure ID badges?
smart card

security key fob

storage area network

biometric device

Formularende

Observable

Description

Max Value

1correctness of
response

2 points for Option 1
0 points for any other
option

2

20

Formularbeginn

Which two NTFS file-level permissions allow a user to delete a file? (Choose two.)

amend

delete

full control

modify

write

Formularende

Observable

Description

Max
Value

1correctness of
response

Option 3 and Option 4 are correct.
1 point for each correct option.
0 points if more options are selected
than required.

2

Formularbeginn

Formularbeginn

12622611514347

Formularende

Formularende

You're Reading a Free Preview

Download
scribd
/*********** DO NOT ALTER ANYTHING BELOW THIS LINE ! ************/ var s_code=s.t();if(s_code)document.write(s_code)//-->