Professional Documents
Culture Documents
18 A- Separation of duties 1
19 D- An incorrect same service set identifier (SSID) 1
20 A- Application 1
21 C- Enable debug logging 1
4. A user can login to his computer but cannot access network resources. The user has all the
appropriate group memberships and permissions, but he still cannot access shared resources.
The cause of this problem
A. User has attempted to access a shared folder without appropriate permissions.
B. User has entered the wrong password.
C. User has logged on to the domain instead of the local computer.
D. User has logged on to the local computer instead of the domain.
5. You organization consists of four physical locations connected by a wide-area network (WAN).
Each site has its own independent Internet connection. If the primary concern about installing
Windows Server Update Services (WSUS), the best way to configure the WSUS servers
without affecting WAN link.
A. All clients download updates from a single WSUS server at the head office.
B. Each location has an independent WSUS server that serves local clients.
C. Each remote location has replica WSUS servers that copy their configuration
from the head office WSUS server.
D. Each remote location has a disconnected WSUS server and updates are
imported on those servers from DVD.
6. Your company has a main office and a branch office. You deploy a read-only domain
controller (RODC) that runs Microsoft Windows Server 2008 to the branch office. You
need to ensure that users at the branch office are able to log on to the domain by
using the RODC. What should you do?
A. Add another RODC to the branch office.
B. Configure a new bridgehead server in the main office.
C. Configure the Password Replication Policy on the RODC.
D. Decrease the replication interval for all connection objects by using the Active
Directory Sites and Services console.
7. A technician receives an urgent call that the switch in Accounting Department is down.
Which of the following should the technician do FIRST to troubleshoot this issue?
A. Identity symptoms and problems
B. Document the process and solutions
C. Establish the most probable cause
D. Escalate if necessary
8. A common method used to prevent the unauthorized network devices from sending
traffic across a network is port.
A. Spanning
B. Address translation
C. Mirroring
D. Authentication
9. The type of license key allows you to host an activation service locally within your own
network.
A. Multiple Activation Key
B. Key Management System
C. Key Activation System
D. Multiple Management System
10. A new project requires that users in your domain and in the domain of a partner
Organization have access to a shared folder on your file server. Which type of group
should you create to manage the access to the shared folder?
A. Domain local security group
B. Universal security group
C. Global security group
D. Domain local distribution group
11. You are giving training about computer and network maintenance for a maintenance
team. As a trainer, the first step in the maintenance process you recommend.
13. The reason that end users need to be aware of the security policy.
A. Some security decisions are usually in their hands
A. They should understand the probability of every risk
B. They need to be aware of every threat
C. They should avoid responsibility for their actions
14. You are a network administrator at XYZ Company, and one of your tasks is designing
the company security policy. The element NOT to be specified in an enterprise
security policy.
A. Risks and how to manage the risks
B. User roles and responsibilities
C. Software versions of the security products
D. Contingency plan in case of compromise
15. The first step in establishing a disaster recovery plan (DRP).
A. Demonstrate adherence to a standard disaster recovery process
B. Agree on the goals and objectives of the plan
C. Identify applications to be run during a disaster
D. Identify the causes of the disaster.
16. Firewall function.
A. Allowing only packets that pass security restriction to be forwarded
B. Rejecting all packets regardless of security restriction
C. Forwarding all packets that is forwarded
D. Allowing all packets that is forwarded
17. A security implementation principle that recommends division of responsibilities so as
to NOT allow one person to commit an undetected fraud.
A. Separation of duties
B. Collusion
C. Least privilege
D. Delegation of power
18. While you are configuring new wireless clients, none of the new clients is able to
connect to the network, but clients already on the same access point do not have any
connectivity problem. Which is NOT the possible reason for this problem?
A. A poor signal due to interference
B. A bad access point
C. An incorrect IP address
D. An incorrect same service set identifier (SSID)
19. You a network administer for ABC Company. You are verifying the configuration of a
newly installed host by establishing an FTP connection to the remote server. The
highest layer of the protocol stack you are using for this operation.