Cisco IT Essential v4.1 Chapter 16

1. A computer user cannot access the Internet. A technician, attempting to resolve the problem, can ping the proxy server, but Internet access is still denied. What is the problem?
*The computer browser proxy server settings are wrong.

2. What are two features of Windows Vista Backup? (Choose two.)
*The backup files have the extension .zip.
*The backup files can be saved to another connected computer or server.

3. On a computer in the lab, a student can access e-mail. However, from a laptop that is owned by the student, the wireless connection to the e-mail server fails. What is the problem?
*Windows Firewall is blocking the port that is used by the e-mail application.

4. A network administrator has noticed that users without administrative rights are installing unauthorized applications on the Windows Vista computers. What could the administrator do to prevent the installation of these applications?
*Enable the UAC function on the computers.

5. Windows XP should be updated on a regular basis. In which situation should automatic updates be disabled?
*Users accessing the network using a dial-up connection need to control when the updates are downloaded and installed.

6. Which encryption technology provides secure tunnels?

7. A network technician has received several reports regarding missing and corrupted information on a company file server. Which course of action can the technician use to investigate any unauthorized network access?
*Audit the event logs on the server to check for unauthorized network access.

8. A business has a policy to automatically update and run the antivirus software on all computers each day. When is the best time to perform this security maintenance?
*awhen the computers are not being used

9. Refer to the exhibit. Which Firewall Settings tab would be used to allow an FTP connection through a Vista-based computer?

10. Which simple wireless configuration technique can make the network invisible to unauthorized users?
*Disable SSID broadcasting.

11. Which two file-level permissions allow a user to delete a file? (Choose two.)
*full control

12. Which two characteristics of network traffic are being monitored if a network technician configures the company firewall to operate as a packet filter? (Choose two.)

13. Port triggering has been configured on a wireless router. Port 25 has been defined as the trigger port and port 113 as an open port. What effect does this have on network traffic?
*All traffic that is sent out port 25 will open port 113 to allow inbound traffic into the internal network through port 113.

14. Which Windows XP command initiates a backup from the command line?

15. Which two advantages are attributed to a hardware firewall when compared to a software firewall? (Choose two.)
*It does not impact the processing performance of the equipment it protects.
*It is designed to protect more than one computer.

16. What is the result of changing the default username and password on a wireless access point?
*It reduces the chance of someone accessing the device and changing settings.

17. A technician has been asked to format the drives of several Windows XP computers with a file system that can use file-level permissions to secure confidential information. Which file system should be used by the technician?

18. After a technician collects information from the computer, which two sources can provide the technician with possible solutions for various types of network-related problems? (Choose two.)
*the manufacturer FAQ for network devices
*technical websites

19. What is the default setting for Windows XP operating system updates?

20. On a Windows Vista computer, which CLI command is used to repair the master boot record that has been damaged by a virus?

21. A user reports that the antivirus software on a computer is always turned off when the computer is restarted, despite being reactivated each time the computer starts up. Further investigation by the technician shows that the Internet browser also displays an incorrect homepage. What is the probable cause of these problems?
*The computer has been infected with spyware.

22. Which three physical security measures are employed to prevent security breaches and loss of data? (Choose three.)
*card key
*security guard

23. The ABC Company network designers are designing the new corporate WiFi network. Which two precautions should be implemented because of security concerns with wireless networks? (Choose two.)
*Disable broadcast of the SSID.
*Configure WPA on access points.

24. A student has a Windows XP laptop firewall set with the Don't Allow Exceptions option enabled. What is the consequence of setting this option?
*No traffic that originates from an outside network is allowed to be sent to the laptop.

25. Which method can a technician use to make sure that only specific computers connect to a wireless router?
*MAC address filtering

26. A network administrator has moved encrypted files from one computer to another computer on the network and now the files are not encrypted. What does the administrator need to do to correct the problem?
*Convert the destination computer partition to NTFS.

27. A network administrator is trying to allow everyone access to a data folder while limiting access to individual subfolders to individuals. The administrator is having problems with all users being able to view and edit all files and folders. What should the administrator look at to solve the problem?
*Check to see if the subfolders have inherited rights from the main folder.

28. Which data security technology takes the form of an object which must be close to a computer before the user can successfully submit a username and password?
*security key fob

29. A network administrator is trying to change the account name of a user but cannot make the changes. What could be a possible cause?
*The administrator does not have the correct permissions to make the change.

0 Response to "Cisco IT Essential v4.1 Chapter 16"

Post a Comment