Senin, 25 April 2011

CISCO

Take Assessment - Chapter 16 Exam - IT Essentials (Version 4.0)
http://assessment.netacad.net/static/ccna3theme/ccna3/images/spacer.gif
http://assessment.netacad.net/static/ccna3theme/ccna3/images/spacer.gif
http://assessment.netacad.net/static/ccna3theme/ccna3/images/corner_ur_5.gif

http://assessment.netacad.net/static/ccna3theme/ccna3/images/spacer.gif
http://assessment.netacad.net/static/ccna3theme/ccna3/images/spacer.gif
http://assessment.netacad.net/static/ccna3theme/ccna3/images/spacer.gif
http://assessment.netacad.net/static/ccna3theme/ccna3/images/spacer.gif
http://assessment.netacad.net/static/ccna3theme/ccna3/images/spacer.gif
Top of Form
Bottom of Form
Time Remaining:
http://assessment.netacad.net/static/ccna3theme/ccna3/images/spacer.gif
http://assessment.netacad.net/static/ccna3theme/ccna3/images/spacer.gif
http://assessment.netacad.net/static/ccna3theme/ccna3/images/spacer.gif
http://assessment.netacad.net/static/ccna3theme/ccna3/images/corner_ll_6.gif
http://assessment.netacad.net/static/ccna3theme/ccna3/images/spacer.gif
http://assessment.netacad.net/static/ccna3theme/ccna3/images/spacer.gif
http://assessment.netacad.net/static/ccna3theme/ccna3/images/spacer.gif





http://assessment.netacad.net/static/ccna3theme/ccna3/images/spacer.gif
http://assessment.netacad.net/static/ccna3theme/ccna3/images/spacer.gif

Top of Form
What is a disadvantage of configuring a firewall using permissive settings?
Devices are exposed to attack.
Packet transmission becomes complicated, requiring explicit access permission for all packets.
The extra ports that are used by various applications are closed.
The settings may cause a user to be locked out of the system.
Bottom of Form


Top of Form
Which two methods help protect network cables? (Choose two.)
enclosing the cables in conduits
enclosing the cables in cable locks
routing the cables inside the walls of a building
leave cables exposed to reveal tampering
using RFID tags
Bottom of Form



Top of Form
Which method of filtering traffic is used to monitor established network connections to allow only packets from established network connections?
packet filter
proxy firewall
stateful packet inspection
wireless NICs
Bottom of Form


Top of Form
Which characteristic of an application is used by the Windows XP firewall to determine whether the application is allowed to access the network?
file permission
port number
IRQ
username
Bottom of Form



Top of Form
Which method can turn a laptop into a zombie computer?
improperly configuring the BIOS setting
partially uninstalling the operating system
reformatting the hard drive
remotely controlling the operating system
Bottom of Form


Top of Form
Which feature is characteristic of a guest account?
It always remains active.
It can be configured to grant extensive access to resources on a temporary basis.
It disables access to the Internet, e-mail, and any printer.
It must be specifically configured for each guest.
Bottom of Form



Top of Form
Which technique may be used to generate a message digest from a hash encoding process?
the use of a combination of identical encryption keys
the use of a mathematical function to generate a corresponding text value that is unique to the message
the use of the SHA or MD5 algorithms
the use of a key that is agreed to by the sender and receiver
Bottom of Form


Top of Form
A user can locate the setup for an application on the server but is unable to download it. The user requests the help of a technician, who looks up the list of common problems and their recommended solutions. Which solution should the technician try to resolve this problem?
Change the read permission granted to the user on the setup file to read and execute.
Grant system administrator privileges to the user on a temporary basis.
Inform the user that this is due to a phishing attack and then perform an antivirus scan.
Verify that the MAC address of the computer is listed in the MAC address filter table.
Bottom of Form



Top of Form
A technician has been asked to format the drives of several Windows XP computers with a file system that can use file-level permissions to secure confidential information. Which file system should be used by the technician?
EXT
FAT
FAT32
NTFS
Bottom of Form


Top of Form
A technician needs to configure wireless networking on several new laptop computers. Which encryption method should the technician choose to achieve the best authentication and payload security?
MD5
PGP
WEP
WPA
Bottom of Form



Top of Form
What is the default setting for Windows XP operating system updates?
automatic
only download updates
notify me
manual
Bottom of Form


Top of Form
Which encryption technique uses a mathematical function to create a numeric value unique to the data?
asymmetric encryption
hash encoding
VPN
WTLS
Bottom of Form



Top of Form
Which right can only be granted by enabling the Full Control file-level permission?
change the permissions of a file
delete a file
overwrite a file
run a file
Bottom of Form


Top of Form
What is the purpose of using hash encoding?
to ensure complete security of the message digest
to ensure that the data remains the same even if the message digest is tampered with
to ensure that tampering with data is detectable
to regenerate the message digest when the original message digest is changed
Bottom of Form



Top of Form
Which two advantages are attributed to a hardware firewall when compared to a software firewall? (Choose two.)
It costs less because it is more efficient.
It does not impact the processing performance of the equipment it protects.
It always protects both the computer it is installed on as well as the rest of the network.
It is designed to protect more than one computer.
It is a free Windows operating system component.
Bottom of Form



Top of Form










http://assessment.netacad.net/static/ccna3theme/ccna3/images/spacer.gif











Top of Form
After a technician collects information from the computer, which two sources can provide the technician with possible solutions for various types of network-related problems? (Choose two.)
paperwork that is provided to customers
the manufacturer FAQ for network devices
firewall logs
network device logs
technical websites
Bottom of Form


Top of Form
After analyzing and researching the problem by visiting several technical websites, a technician was unable to help a user to log in. Later, the user rebooted the computer and was able to log in. Which step did the technician omit during the troubleshooting process?
closing the issue with the customer
gathering data from the computer
gathering information from the user
trying quick solutions
Bottom of Form



Top of Form
Which physical security technology uses an embedded integrated circuit chip to store data safely and is commonly used in secure ID badges?
smart card
security key fob
storage area network
biometric device
Bottom of Form


Top of Form
Which Windows XP command performs a data backup?
BACKUP
BUP
NTBACKUP
XPBACKUP
Bottom of Form



Top of Form
Which two NTFS file-level permissions allow a user to delete a file? (Choose two.)
amend
delete
full control
modify
write
Bottom of Form



Top of Form







Bottom of Form
Bottom of Form