Professional Documents
Culture Documents
Page 1 of 7
Submitted by Cotto,William on 9/9/2013 8:38:33 PM Points Awarded 30.00 Points Missed Percentage 0.00 100%
1. You are operating a network management station and discover that you cannot find out information about network performance at a NetWare 6.0 server. Which of the following is the best solution? A) Reboot the server. B) Install the NetBUI protocol at the server, which is required for network monitoring. C) Use the START MONITOR command at the console. D) Load the SNMP NLM. Feedback: Good work Points Earned: 1.0/1.0
Correct Answer(s): D
3. You are designing the network in a building and want to use a cable that will provide speed and security for communications between floors in the building. Which of the following would be the best choice? A) thin coax B) shielded twisted-pair C) shielded coax D) multimode fiber-optic Feedback: Good work
http://gwinnetttech.angellearning.com/Section/Assessment/Question/GradeDelivery.aspx?...
PD
Fi
ll P
DF
2. The fire marshal in your city has just inspected the wiring that goes through the ceiling on the second floor of your building and says it is dangerous because the network wiring can cause toxic vapors in a fire. What is the wiring most likely to contain? A) rubber insulation B) PVC coating Feedback: Good work
Ed
ito
rw
ith
Fr ee
rit
er an d
To
ols
12/9/2013
Page 2 of 7
Points Earned:
1.0/1.0
Correct Answer(s): D
4. Which if the following is important when you centralize servers in a computer room? (Choose all that apply.) A) Provide conditioned power to the room B) Place a router between each server and the next. C) Secure the room with a cipher-type lock. D) Install a sprinkler system in the room to suppress fires. Feedback: Correct Feedback: Good work Incorrect Feedback: That's not correct Points Earned: 2.0/2.0 Correct Answer(s): A, C
6. In terms of security, a disadvantage of the star topology is that _________________. A) it requires extra cable ground connectors compared to other topologies B) it has a single point of failure Feedback: Good work C) it uses plastic connectors instead of metal D) it ha no beginning or ending point Points Earned: 1.0/1.0 Correct Answer(s): B
http://gwinnetttech.angellearning.com/Section/Assessment/Question/GradeDelivery.aspx?...
PD
Fi
ll P
DF
Ed
5. Which type of cable is most difficult for an intruder to tap into without causing attention to his action? A) fiber-optic Feedback: Good work
ito
rw
ith
Fr ee
rit
er an d
To
ols
12/9/2013
Page 3 of 7
7. You are consulting about an older thin coax network when the network goes down because of the work of an attacker. Which of the following is a likely cause of the problem? A) The attacker turned off the coax coordinating station B) The attacker connected a segment using twisted-pair wire, which looks similar to coax. C) The attacker removed a terminator. Feedback: Good work D) The attacker broke the beacon, and so the network is in a beaconing state. Points Earned: 1.0/1.0 Correct Answer(s): C
9. On your NetWare server, someone occasionally loads NLMs that you have not authorized. The financial auditors are very concerned about this problem. Which of the following offer(s) a solution? A) use SECURE CONSOLE Feedback: Good work B) Use NLM SECURE C) Remove the CD-ROM drive. D) Load the 3D-Pipes screen saver, which also prohibits access to the server console. Points Earned: 1.0/1.0 Correct Answer(s): A
10. Which of the following fit(s) the definition of a cipher lock that might be used to protect a machine room? (Choose all that apply.)
http://gwinnetttech.angellearning.com/Section/Assessment/Question/GradeDelivery.aspx?...
PD
Fi
ll P
DF
Ed
ito
Correct Answer(s): D
rw
Points Earned:
1.0/1.0
ith
Fr ee
8. The twists in twisted-pair cable are there to _______________ . (Choose all that apply.) A) enable better grounding B) reduce the overall length of the cable C) provide more alternatives for the jacket material used D) help reduce interference Feedback: Good work
rit
er an d
To
ols
12/9/2013
Page 4 of 7
A) a combination lock B) a lock requiring palm scan C) a key lock D) a lock requiring an identification card Feedback: Correct Feedback: Good work Incorrect Feedback: That's not correct Points Earned: 3.0/3.0 Correct Answer(s): A, B, D
12. A department head calls you because she is working on personnel evaluations and she does not want to log off Red Hat Linux 9.x for security each time she leaves her desk for a few moments. What do you recommend? A) She should click Main Menu and then click Lock Screen. Feedback: Good work B) She should set the XScreenSaver so there is no grace period. C) She should open a terminal window, type clear, and press Enter. D) She should save her work and shut down each time she leaves, which is the only safe alternative. Points Earned: 1.0/1.0 Correct Answer(s): A
http://gwinnetttech.angellearning.com/Section/Assessment/Question/GradeDelivery.aspx?...
PD
Fi
ll P
DF
Correct Answer(s): B, D
Ed
Points Earned:
2.0/2.0
ito
rw
Feedback: Correct Feedback: Good work Incorrect Feedback: That's not correct
ith
Fr ee
rit
11. In the design of a network you should plan to use which of the following? (Choose all that apply.) A) thick coax under raised floors B) structured networking C) twisted-pair for long-distance connections between buildings D) structured wiring
er an d
To
ols
12/9/2013
Page 5 of 7
13. Wiring closets should follow the ___________________ standard. A) EIA/TIA-569 Feedback: Good work B) IEEE 804.2 C) URL/UA D) UW Points Earned: 1.0/1.0 Correct Answer(s): A
15. Which cable is most flexible and has the tightest bending radius (providing some protection from a malicious attack)? A) thinnet B) thicknet C) twisted-pair Feedback: Good work D) fibre-optic Points Earned: 1.0/1.0 Correct Answer(s): C
16. Which parameter used with SCRSAVER in NetWare enables you to display the screen saver's current settings?
http://gwinnetttech.angellearning.com/Section/Assessment/Question/GradeDelivery.aspx?...
PD
Fi
ll P
DF
Ed
ito
rw
Feedback: Correct Feedback: Good work Incorrect Feedback: That's not correct
ith
Fr ee
rit
er an d
14. When you replace a legacy cable plant, which of the following should you consider? (Choose all that apply.) A) Security B) Wiring closet locations C) Plenums D) EMI/RFI
To
ols
12/9/2013
Page 6 of 7
A) display B) review C) help D) status Feedback: Good work Points Earned: 1.0/1.0
Correct Answer(s): D
Feedback: Correct Feedback: Good work Incorrect Feedback: That's not correct Points Earned: 2.0/2.0 Correct Answer(s): A, D
19. Your department is almost out of money that is budgeted for this year, and so you are installing twisted-pair cable yourself to connect several new computers to the network. Which of the following is important for you to consider? (Choose all that apply.) A) Read and follow the EIA/TIA-568 standards. B) Use certified cable. C) Pull the cable using 30 pounds of force or more.
http://gwinnetttech.angellearning.com/Section/Assessment/Question/GradeDelivery.aspx?...
PD
Fi
ll P
18. SNMP is used with which of the following? (Choose all that apply.) A) TCP/IP B) UNIX and Linux screen savers C) NetWare screen saver timing D) a network management station
DF
Ed
ito
rw
ith
Fr ee
Correct Answer(s): B
Points Earned:
1.0/1.0
rit
er an d
To
ols
17. An intermediate cross-connect is ______________________. A) a protection system between a LAN and a WAN B) a wiring closet Feedback: Good work
12/9/2013
Page 7 of 7
D) Do not bend the cable excessively. Feedback: Correct Feedback: Good work Incorrect Feedback: That's not correct Points Earned: 3.0/3.0 Correct Answer(s): A, B, D
http://gwinnetttech.angellearning.com/Section/Assessment/Question/GradeDelivery.aspx?...
PD
Fi
ll P
DF
Ed
ito
rw
Continue
ith
Fr ee
rit
er an d
To
20. When you install SNMP, configure a ____________________ at the same time. A) screen saver B) timeout interval C) community name Feedback: Good work
ols
12/9/2013