CompTIA Network+ Practice Tests. Craig Zacker

Чтение книги онлайн.

Читать онлайн книгу CompTIA Network+ Practice Tests - Craig Zacker страница 28

CompTIA Network+ Practice Tests - Craig Zacker

Скачать книгу

you can expect to find in this clause? (Choose all that apply.)Any emails you send or receive can be monitored by the company at any time.All files and data that you store on company computers must be accessible to the company for scanning and monitoring.All work that you perform for the company becomes the sole property of the company, including copyrights and patents.All hardware, software, and any proprietary data stored on the company's computers remains the property of the company.

      89 Which of the following tasks is not considered to be part of an IT department's incident response plan?Stopping an ongoing incidentContaining the damage caused by an incidentRepairing the damage caused by an incidentRebuilding an infrastructure destroyed by an incident

      90 Which of the following are occurrences that are typically addressed by an IT department's incident response policies? (Choose all that apply.)Denial-of-Service (DoS) attackHard disk failureElectrical fireServer outage

      91 Which of the following terms would apply to the procedure of adding a user's personal smartphone to the network under a Bring Your Own Device (BYOD) policy?Out-of-bandOn-boardingIn-bandOff-boarding

      92 Your company has been acquired by another firm and, as IT director, you will have to comply with the new firm's safety policies in your datacenter and other IT workspaces. One of the new requirements states that there must be a fail closed policy for the datacenter. Which of the following best describes what this policy dictates should occur in the event of an emergency?All computers that are logged on should automatically log off.All computers that are running should automatically shut down.All doors that are normally open should lock themselves.All doors that are normally locked should open themselves.

      93 You are the first responder to an incident of computer crime at your company. The datacenter's security has been penetrated, a server accessed, and sensitive company data stolen. The company's incident response plan lists the specific tasks that you are responsible for performing. Which of the following are likely to be among those tasks? (Choose all that apply.)Turn off the server.Secure the area.Document the scene.Collect evidence.Cooperate with the authorities.

      94 Password policies frequently require users to specify complex passwords. Which of the following are characteristic of a complex password?Passwords that contain mixed upper- and lowercase letters, numbers, and symbolsPasswords that exceed a specific lengthPasswords that do not duplicate a specific number of the user's previous passwordsPasswords that do not duplicate the user's account name, birth date, or other personal information

      95 Password policies that contain a history requirement typically have which of the following limitations?Users cannot reuse recent passwords.Users cannot create passwords containing names of relatives.Users cannot create passwords containing names of historical figures.Users cannot create passwords that duplicate those of any other users on the network.

      96 Account lockout policies are designed to protect against which of the following types of attacks?Social engineeringSpoofingBrute forceMan in the middle

      97 Which of the following types of password policies are designed to prevent brute-force attacks? (Choose all that apply.)Password length policiesAccount lockout policiesPassword history policiesComplex password policies

      98 Which of the following is not likely to be a procedural element of an IT asset disposal policy?Data deletionRecyclingData preservationInventory

      99 While negotiating a new contract with a service provider, you have reached a disagreement over the contracted reliability of the service. The provider is willing to guarantee that the service will be available 99 percent of the time, but you have been told to require 99.9 percent. When you finally reach an agreement, the negotiated language will be included in which of the following documents?SLAAUPNDABYOD

      100 Which of the following elements would you typically not expect to find in a Service Level Agreement (SLA) between an Internet Service Provider (ISP) and a subscriber?A definition of the services to be provided by the ISPA list of specifications for the equipment to be provided by the ISPThe types and schedule for the technical support to be provided by the ISPThe types of applications that the subscriber will use when accessing the ISP's services

      101 You have just completed negotiating an annual contract with a provider to furnish your company with cloud services. As part of the contract, the provider has agreed to guarantee that the services will be available 99.9 percent of the time, around the clock, seven days per week. If the services are unavailable more than 0.1 percent of the time, your company is due a price adjustment. Which of the following terms describes this clause of the contract?SLAMTBFAUPMTTR

      102 The technical support clause of a Service Level Agreement (SLA) will typically include which of the following elements? (Choose all that apply.)Whether the provider will provide on-site, telephone, or online supportThe time service for responses to support calls, which specifies how quickly the provider must respond to requests for support.The percentage of time that the service is guaranteed to be availableThe amount of support that will be provided and the costs for additional support

      103 After switching from a standard public switched telephone network (PSTN) telephone system to a Voice over Internet Protocol (VoIP) system, users are complaining of service interruptions and problems hearing callers at certain times of the day. After examining a network traffic audit and assessment report, you determine that traffic levels on the Internet connection are substantially higher during the first and last hours of the day, the same times when most of the users experienced problems. Which of the following solutions can provide more reliable VoIP service during peak usage times?Implement traffic shapingImplement load balancingUpgrade the Local Area Network (LAN) from Fast Ethernet to Gigabit EthernetReplace the router connecting the LAN to the Internet with a model that supports Simple Network Management Protocol (SNMP).

      104 A server with dual power supplies must be running in which of the following modes for the system to be fault tolerant?Combined modeRedundant modeIndividual modeHot backup mode

      105 Redundant power circuits can enable a server to continue running in spite of which of the following events?A citywide power outageA server power supply failureAn uncorrected building circuit failureA failure of the server's Uninterruptable Power Supply (UPS)

      106 Which of the following media types is Windows Server Backup unable to use to store backed-up data?Local hard disksLocal optical disksMagnetic tape drivesRemote shared folders

      107 Which of the following Redundant Array of Independent Disks (RAID) levels provides fault tolerance by storing parity information on the disks, in addition to the data? (Choose all that apply.)RAID 0RAID 1RAID 5RAID 10

      108 Installing an electrical generator for your datacenter is an example of which of the following fault tolerance concepts?Uninterruptible Power Supply (UPS)Power redundancyDual power suppliesRedundant circuits

      109 Which of the following RAID levels uses disk striping with distributed parity?RAID 0RAID 1RAID 5RAID 10

      110 Which of the following is not a fault tolerance mechanism?Port aggregationClusteringMTBFUPS

      111 Which of the following is not a type of server load balancing mechanism?DNS round-robinNetwork Address TranslationContent switchingMultilayer switching

      112 Which of the following mechanisms for load balancing web servers is able to read the incoming HTTP and HTTPS requests and perform advanced functions based on the information they contain?Content switchesMultilayer switchesFailover clusteringDNS round-robin

      113 Which of the following statements about the differences between online and standby Uninterruptible Power Supplies (UPSs) are correct? (Choose all that apply.)A standby UPS runs devices using battery power all the time.An online UPS provides no gap in the power supplied to the devices during a main power failure.An online UPS switches devices

Скачать книгу