A network technician has received several reports regarding missing and corrupted information on a company file server. Which course of action can the technician use to investigate any unauthorized network access? Audit all user activity by using telnet to access each computer during the day. Enable event logging on each user computer to check for unauthorized network access. Enable event logging on all network devices to audit any suspicious user activity. Audit the event logs on the server to check for unauthorized network access.

Which two advantages are attributed to a hardware firewall when compared to a software firewall? (Choose two.) It costs less because it is more efficient. It does not impact the processing performance of the equipment it protects. It always protects both the computer it is installed on as well as the rest of the network. It is designed to protect more than one computer. It is a free Windows operating system component.

A company wants to configure a firewall to monitor all channels of communication and allow only traffic that is part of a known connection. Which firewall configuration should be deployed? packet filtering proxy stateful packet inspection stateless packet inspection

A technician has been asked to format the drives of several Windows XP computers with a file system that can use file-level permissions to secure confidential information. Which file system should be used by the technician?

EXT FAT FAT32 NTFS A technician needs to configure wireless networking on several new laptop computers. Users accessing the network using a dial-up connection need to control when the updates are downloaded and installed. Windows XP should be updated on a regular basis. Disable SSID broadcasting. Disable inactive wireless connections. Home users should avoid automatic updates because they are protected by Windows Internet Connection Firewall. Guest user accounts with limited access are unlikely to ever need updates because they are temporary . In which situation should automatic updates be disabled? Computers on a corporate network perform well without automatic updates because they are protected by a firewall. Which encryption method should the technician choose to achieve the best authentication and payload security? MD5 PGP WEP WPA Which simple wireless configuration technique can make the network invisible to unauthorized users? Change the default password on the WAP. Filter all network access using MAC addresses.

a company decides to protect company data by performing backups on a regular basis.) chemicals copper strands electricity glass splinters connectors Which safety precaution should be used when working with any type of cable? Wear safety glasses when working any type of cable. . Which two hazards exist when working with fiber optic cabling? (Choose two. Which backup type takes the greatest amount of time and is commonly used in conjunction with another backup method? differential full historical incremental Which quick solution should be tried first if a user is unable to login? Verify that the CAPS and NUM lock keys are not on. Add the user to a different group on the network. Reset the password for the user.As part of the new security policy. Assign the user a new username and password.

the administrator is interested in a physical topology that is used more often than any other.Cordon off the area before crimping the cable heads. Wear cloth gloves when working with any type of cable. What is this inspection called? data inspection logical survey plant inspection site survey When planning a new network. Which topology is the administrator considering? bus mesh ring star Which protocol provides secure transport of data from the company web server to remote users? HTTP HTTPS NetBEUI DNS The network technician is researching the best way to connect the branch offices to the . ABC Computer Company is in the process of planning a network for a new client. Use a magnifying glass to divert light rays when working with fiber-optic cable. A network technician has been asked to perform a physical inspection of the facilities to determine the flow of data and protocols required by the client.

Configure the NICs with addressing information. Which two additional steps will complete the installation process? (Choose two.exe Start > Control Panel > Add Hardware > Printers and Faxes > Add Printer Start > Administrative Tools > Services > Printers and Faxes > Add Printer Start > Control Panel > Printers and Faxes > File > Add Printer The network administrator has physically installed wireless NICs in three new computers.main office. Which path should the technician use to run the Add Printer wizard? Start > Run > prntwiz. What are three main considerations that the technician should remember when choosing an Internet connection? (Choose three. Verify that the computers have a valid MAC address.) availability distance operating system protocols reliability speed The network technician has been asked to share a new printer on the network using the Add Printer wizard for Windows XP. Configure the signal strength of the antenna. . Update the BIOS to support the new wireless NICs.) Configure the device drivers.

Replace all labeling on the cables. the following message displays: "The IP address already exists on another computer".) run ipconfig /all run ipconfig /displaydns run ipconfig /flushdns run ipconfig /release run ipconfig /renew ABC Company requires preventive maintenance for all local network cabling once a month. Which two steps will quickly obtain a new IP address from the DHCP server? (Choose two.After booting a computer running Windows 2000. How is the built-in Windows XP firewall accessed? Start > Control Panel > Performance and Maintenance > Security Center Start > Control Panel > Internet Options > Security Center Start > Control Panel > Security Center Start > Control Panel > Network and Internet Connections > Security Center Which two hazards exist when working with copper cabling? (Choose two.) chemicals copper strands glass splinters . Which task should be included in the preventive maintenance program? Disconnect and reconnect all patch cables. Inspect all patch cables for breaks. Replace all cable supports to prevent loose attachment points.

light lightning .

Sign up to vote on this title
UsefulNot useful