Thursday, May 5, 2011

Network Security Plus Questions and Answers 5

does not use traditional partitioning

Dynamic disk

11.11%

Dynamic disk

two or more disks that are combined like a volume set, but that are striped for RAID level 0 or RAID level 5

Stripe set

11.11%

Stripe set

a server folder that is associated with a user’s account and that is a designated workspace for the user to store files

Home directory

11.11%

Home directory

contains information about each partition created, such as the type of partition on MBR Disks, size, and location

Partition table

11.11%

Partition table

the partition that contains the hardware-specific files needed to load the operating system

System partition

11.11%

System partition

a set of standards for lengthening disk life and preventing data loss

RAID

11.11%

RAID

located in the first sector and track of the hard disk and has startup information about partitions and how to access the disk

MBR

11.11%

MBR

tool that provides a central location for viewing disk information and performing tasks such as creating and deleting partitions and volumes

Disk Management

11.11%

Disk Management

uses traditional disk management techniques and contains primary partitions, extended partitions, and logical drives

Basic disk

11.12%

Basic disk

Score:

5/5

____ is a process that blocks a group of tracks and sectors to be used by a particular file system, such as NTFS.

Student Response

Value

Correct Answer

Feedback

1.

Formatting

2.

Fragmenting

3.

Defragmenting

Student Response4.

Partitioning

100%

Student Response

Score:

2/2

____ volumes are often referred to as RAID-0.

Student Response

Value

Correct Answer

Feedback

1.

Simple

Student Response2.

Striped

100%

Student Response

3.

Mirrored

4.

Spanned

Score:

2/2

The process of ____ locates fragmented folders and files and moves them to a location on the physical disk so they are in contiguous order.

Student Response

Value

Correct Answer

Feedback

1.

partitioning

2.

formatting

3.

fragmenting

Student Response4.

defragmenting

100%

Student Response

Score:

2/2

Disk ____ is a fault-tolerance method that prevents data loss by duplicating data from a main disk to a backup disk.

Student Response

Value

Correct Answer

Feedback

Student Response1.

mirroring

100%

Student Response

2.

duplexing

3.

stripping

4.

spanning

Score:

2/2

Disk mirroring involves creating a shadow copy of data on a backup disk and is RAID ____.

Student Response

Value

Correct Answer

Feedback

1.

Mirror

2.

Shadow

3.

level 0

Student Response4.

level 1

100%

Student Response

Score:

2/2

A RAID-5 volume requires a minimum of ____ disk drives.

Student Response

Value

Correct Answer

Feedback

1.

five

2.

four

3.

two

Student Response4.

three

100%

Student Response

Score:

2/2

____ RAID implements fault tolerance through the server’s operating system.

Student Response

Value

Correct Answer

Feedback

1.

Physical

2.

Virtual

Student Response3.

Software

100%

Student Response

4.

Hardware

Score:

2/2

____ is a process that creates a table containing file and folder information for a specific file system in a partition.

Student Response

Value

Correct Answer

Feedback

1.

Defragmenting

2.

Partitioning

3.

Fragmenting

Student Response4.

Formatting

100%

Student Response

Score:

2/2

A(n) ____ backup only backs up files that are new or that have been updated.

Student Response

Value

Correct Answer

Feedback

1.

custom

2.

full

3.

network

Student Response4.

incremental

100%

Student Response

Score:

2/2

Disk ____ is the ability to spread data over multiple disks or volumes.

Student Response

Value

Correct Answer

Feedback

1.

mirroring

2.

formatting

Student Response3.

striping

100%

Student Response

4.

partitioning

Score:

2/2

The ____ partition is the partition where your computer will look for the hardware-specific files to start the operating system.

Student Response

Value

Correct Answer

Feedback

1.

extended

2.

secondary

3.

primary

Student Response4.

active

100%

Student Response

Score:

2/2

A(n) ____ partition is created from space that is not yet partitioned.

Student Response

Value

Correct Answer

Feedback

1.

active

2.

secondary

Student Response3.

extended

100%

Student Response

4.

primary

Score:

2/2

A ____ volume is a portion of a disk or an entire disk that is set up as a dynamic disk.

Student Response

Value

Correct Answer

Feedback

1.

striped

Student Response2.

simple

100%

Student Response

3.

mirrored

4.

spanned

Score:

2/2

A ____ volume is stored on 2 to 32 dynamic disks that are treated as one volume.

Student Response

Value

Correct Answer

Feedback

Student Response1.

spanned

100%

Student Response

2.

mirrored

3.

simple

4.

striped

Score:

2/2

DNS name resolution is enabled through the use of tables of information that link computer names and IP addresses. The tables are associated with partitions in a DNS server that are called ____ and that contain resource records.

Student Response

Value

Correct Answer

Feedback

1.

regions

Student Response2.

zones

100%

Student Response

3.

segments

4.

blocks

Score:

2/2

In exclusive forwarding, the DNS server that initially forwards the request is called a ____ DNS server.

Student Response

Value

Correct Answer

Feedback

1.

master

2.

secondary

3.

root

Student Response4.

slave

100%

Student Response

Score:

2/2

____ automatically registers network clients that use NetBIOS and builds a database that other network clients can query in order to locate a computer.

Student Response

Value

Correct Answer

Feedback

1.

NetBEUI

2.

DDNS

3.

DNS

Student Response4.

WINS

100%

Student Response

Score:

2/2

The WINS ____ registers the IP addresses and names of its client computers by writing them to the WINS database.

Student Response

Value

Correct Answer

Feedback

1.

cache

Student Response2.

server

100%

Student Response

3.

zone

4.

record

Score:

2/2

A(n) ____ is a DNS resource record that links a computer or network host name to its IP address.

Student Response

Value

Correct Answer

Feedback

1.

load share

2.

canonical name (CNAME)

Student Response3.

host (A)

100%

Student Response

4.

MX

Score:

2/2

____ is a dual-key encryption standard for communication between a server and a client and is also used by Microsoft Internet Explorer.

Student Response

Value

Correct Answer

Feedback

1.

WINS

2.

DDNS

Student Response3.

SSL

100%

Student Response

4.

NetBIOS

Score:

2/2

The ____ is a DNS resource record that associates a particular TCP/IP service to a server along with the domain of the server and its protocol.

Student Response

Value

Correct Answer

Feedback

1.

SOA

Student Response2.

SRV

100%

Student Response

3.

CNAME

4.

NS

Score:

2/2

Microsoft DNS is also called ____.

Student Response

Value

Correct Answer

Feedback

Student Response1.

Dynamic DNS (DDNS)

100%

Student Response

2.

Secure DNS (SDNS)

3.

Active DNS (ADNS)

4.

Modern DNS (MDNS)

Score:

2/2

DNS servers on a network fall into two broad categories: ____ and secondary.

Student Response

Value

Correct Answer

Feedback

1.

home

Student Response2.

primary

100%

Student Response

3.

root

4.

active

Score:

2/2

A(n) ____ DNS server contains a copy of the primary DNS server’s zone database, but is not used for administration (is not authoritative).

Student Response

Value

Correct Answer

Feedback

1.

virtual

2.

extended

3.

logical

Student Response4.

secondary

100%

Student Response

Score:

2/2

A ____ zone has only the bare necessities for DNS functions.

Student Response

Value

Correct Answer

Feedback

1.

forward lookup

Student Response2.

stub

100%

Student Response

3.

replication

4.

reverse lookup

Score:

2/2

____ networking, which has been around since before the Internet, means using a telecommunications line and a modem (or other telephony device) to dial into a network or specific computers on a network.

Student Response

Value

Correct Answer

Feedback

1.

SLIP

Student Response2.

Dial-up

100%

Student Response

3.

VPN

4.

RRAS

Score:

2/2

____ translates IP addresses on an internal network so that the actual IP addresses cannot be determined on the Internet, because each address is seen externally on the Internet as one or more decoy addresses.

Student Response

Value

Correct Answer

Feedback

1.

ISDN

2.

X.25

Student Response3.

NAT

100%

Student Response

4.

DSL

Score:

2/2

The ____ of a remote access policy are a set of attributes that are compared with the attributes of the connection attempt.

Student Response

Value

Correct Answer

Feedback

Student Response1.

conditions

100%

Student Response

2.

constraints

3.

access permissions

4.

settings

Score:

2/2

____ encapsulates the data packet in the Hypertext Transfer Protocol (HTTP) used through Web communications.

Student Response

Value

Correct Answer

Feedback

1.

L2TP

2.

PPTP

3.

SSTP

Student Response

Student Response4.

PPP

0%

Score:

0/2

____ is a commonly used form of security for communications and transactions over the Web and can be used by all Web browsers.

Student Response

Value

Correct Answer

Feedback

Student Response1.

SSL

100%

Student Response

2.

SLIP

3.

PPTP

4.

SSTP

Score:

2/2

A(n) ____ is a modem from which communications occur in discrete units, and in which the start of a unit is signaled by a start bit at the front, and a stop bit at the back signals the end of the unit.

Student Response

Value

Correct Answer

Feedback

1.

cable modem

2.

synchronous modem

3.

DSL modem

Student Response4.

asynchronous modem

100%

Student Response

Score:

2/2

__ is a WAN communications technology that relies on packet switching and virtual connection techniques to transmit at rates from 56 Kbps to 45 Mbps.

Student Response

Value

Correct Answer

Feedback

1.

DSL

2.

T-carrier

Student Response3.

Frame relay

100%

Student Response

4.

ISDN

Score:

2/2

Statement

Response

Value

Correct Match

a set of IP-based secure communications and encryption standards created through the Internet Engineering Task Force (IETF)

IPsec

20.0%

IPsec

the standard deployed by the U.S. federal government and is intended to be more secure than DES

AES

20.0%

AES

an Active Directory object that contains group policy settings (a set of group policies) for a site, domain, OU, or local computer

GPO

20.0%

GPO

a way to bring consistent security and other management to Windows Server 2008 and to clients connecting to a server

Group policy

20.0%

Group policy

prevents an intruder from bypassing ACL file and folder protections

BitLocker Drive Encryption

20.0%

BitLocker Drive Encryption

Score:

3/3

____ is a relatively new security measure for protecting hard drives.

Student Response

Value

Correct Answer

Feedback

1.

SSL

2.

DES

3.

AES

Student Response4.

BitLocker Drive Encryption

100%

Student Response

Score:

2/2

____ policies are security measures set up in a group policy that applies to all accounts or to all accounts in a container, such as a domain, when Active Directory is installed.

Student Response

Value

Correct Answer

Feedback

1.

Audit

2.

Security Options

3.

User Rights

Student Response4.

Account

100%

Student Response

Score:

2/2

____ enable an account or group to perform predefined tasks.

Student Response

Value

Correct Answer

Feedback

1.

Account locks

2.

Account logs

3.

Account audits

Student Response4.

User rights

100%

Student Response

Score:

2/2

____ can provide security for all TCP/IP-based application and communications protocols, including FTP and HTTP, which are used in Internet transmissions.

Student Response

Value

Correct Answer

Feedback

Student Response1.

IPsec

100%

Student Response

2.

UAC

3.

BitLock Encryption

4.

NAP

Score:

2/2

No comments:

Post a Comment