CompTIA Network+ Practice Tests. Craig Zacker

Чтение книги онлайн.

Читать онлайн книгу CompTIA Network+ Practice Tests - Craig Zacker страница 27

CompTIA Network+ Practice Tests - Craig Zacker

Скачать книгу

of the following statements about physical network diagrams and logical network diagrams are true? (Choose all that apply.)A physical network diagram is created automatically, and a logical network diagram is created manually.A physical network diagram depicts hardware devices and the connections between them.A logical network diagram contains all of the information you would need to rebuild your network from scratch.A logical network diagram typically contains the IP addresses of network devices.

      61 In a standard Cisco network diagram, what component does the symbol in the figure represent?A switchA routerA hubA gateway

      62 Which of the following is the term used to describe a wiring nexus—typically housed in a closet—where horizontal networks meet the backbone?MDFMTBFIDFSLAMOU

      63 What is the width of a standard equipment rack in a datacenter?12 inches16 inches19 inches24 inches

      64 In a standard Cisco network diagram, what component does the symbol in the figure represent?A switchA routerA hubA gateway

      65 The precise locations of devices in a datacenter are typically documented in which of the following documents?Rack diagramNetwork mapWiring schematicLogical diagramBusiness continuity planAudit and assessment report

      66 Which of the following statements about network maps is true?Network maps are typically drawn to scale.Network maps typically contain more information than network diagrams.Network maps must be read/write accessible to all personnel working on the network.Network maps diagram only the locations of cable runs and endpoints.

      67 Which of the following types of documentation should contain the chemical composition of all cleaning compounds used in a datacenter?ESDMSDSNDABYODSOP

      68 After being hired for a job as an IT administrator, you have been assigned two user accounts, one of which is intended for general use and the other only for administrative tasks. You are also required to sign an agreement that outlines the restrictions for your account use. Specifically, you are not permitted to use the administrative account for anything other than administrative tasks, including browsing the Internet and accessing data for which you are not authorized. Which of the following is the best name for this type of agreement?Remote access policiesService level agreementAcceptable use policyPrivileged user agreement

      69 You are working for a company with numerous branch offices scattered around the country, and you are required to travel to these offices frequently. Each branch office has some means of accessing the network at the company headquarters. Some use frame relay, some use Virtual Private Networks (VPNs), and a few even use dial-in access. During one trip, you mention to a branch office manager that you intend to connect to the headquarters network that night from your hotel room. The manager warns you that this is against company policy, but you are not so sure. Where in the company documentation should you look to confirm this?Remote access policiesService level agreementAcceptable use policyPrivileged user agreement

      70 Which of the following is a document that a company's new hires might want to consult to determine whether they are permitted to install their own personal software on company computers?SLAAUPNDABYOD

      71 Many employees have been contacting the IT help desk asking how they can connect their personal smartphones and tablets to the company's wireless network. This has raised issues regarding network security and technical support. You have been asked to draft a policy for the in-house use of personal electronics that addresses these issues. Which of the following describes the document that you will be creating?SLAAUPNDABYOD

      72 You are going to work for a new company as a software developer, and Human Resources (HR) has notified you that you must sign a document guaranteeing that you will maintain confidentiality about the company's products and programming code in perpetuity. Which of the following documents contains this agreement?SLAAUPNDAMOUBYOD

      73 Which of the following are typical elements of a corporate password policy? (Choose all that apply.)Minimum password lengthUse of special charactersUnique passwordsFrequent password changes

      74 Alice is implementing a new password policy that requires all users to change their passwords every seven days. What further modification can she make to the password policy to prevent users from thwarting the password change requirement?Specify a minimum password lengthRequire the use of special charactersRequire the creation of unique passwordsSpecify a maximum password change interval

      75 Which of the following are settings typically included in an account lockout policy? (Choose all that apply.)Account lockout durationTime allowed between attemptsAccount lockout thresholdReset account lockout threshold counter

      76 How do account lockouts help to prevent intruders from cracking passwords?By forcing users to select passwords of a minimum lengthBy preventing users from entering incorrect passwords more than a specified number of timesBy preventing users from reusing the same passwordsBy requiring an additional authentication method, such as a fingerprint

      77 Which of the following data loss prevention terms is used to describe dangers pertaining to data that is being transmitted over a network? (Choose all that apply.)Data in useData at restData in motionData in transit

      78 Which of the following data loss prevention terms is used to describe dangers pertaining to data while a user is loading it into an application?Data in useData at restData in processData in motion

      79 Which of the following data loss prevention terms is used to describe potential dangers of data loss or data leakage to unauthorized parties while the data is stored without being used?Data in useData at restData in motionData on disk

      80 Which of the following is not one of the standard terms used in data loss prevention?Data onlineData at restData in motionData in use

      81 The terms on-boarding and off-boarding are typically associated with which of the following policies?Data loss preventionIncident responseInventory managementIdentity managementDisaster recoveryBusiness continuity

      82 The term off-boarding refers to which of the following procedures?Removing a node from a clusterDisconnecting all cables from a switchRevoking a user's network privilegesRetiring old workstations

      83 Which of the following is most likely to be the last step in a change management procedure?DocumentationNotificationApprovalScheduling

      84 Which of the following U.S. organizations are capable of imposing international export controls on software products? (Choose all that apply.)The company that created the softwareDepartment of StateDepartment of CommerceDepartment of the Treasury

      85 Which of the following is the primary result of an organization's security incident response policies?To know how to respond to a particular incidentTo prevent an incident from occurring againTo identify the cause of an incidentTo document the procedures leading up to an incident

      86 You are an IT director, and a fire has broken out in the lower floors of your company's office building. After the personnel are evacuated, the fire department asks you where they can find documentation about all chemicals and equipment used in the company's datacenter, which is threatened by the fire. You direct them to the correct filing cabinet in your office, which contains which of the following document types?ESDNDABYODMSDS

      87 You have been asked to draft an Acceptable Use Policy (AUP) for new hires at your company to sign, which specifies what they can and cannot do when working with the company's computers and network. Which of the following is not one of the provisions typically found in this type of document?PrivacyOwnershipIllegal useUpgrades

      88 You are starting a new job, and the company's Human Resources (HR) department has asked you to sign an Acceptable Use Policy (AUP) regarding computer and network use. The document includes a privacy clause. Which of the

Скачать книгу