1 Network + Final Study Guide (True/False) Flashcards
1
Q
T/F
- A security policy should clearly state the desired rules, even if they cannot be enforced.
A
FALSE
2
Q
T/F
- You don’t need to physically secure your servers as long as you use a good strong password for your accounts.
A
FALSE
3
Q
T/F
- In a file system that uses FAT or FAT32, the only file security option that is available is the sharing permissions.
A
TRUE
4
Q
T/F
- A Trojan is a self-replicating program that masks itself as a useful program but is actually a type of malware.
A
FALSE
5
Q
T/F
- A DoS attack ties up network bandwidth or services, rendering resources useless to legitimate uses.
A
TRUE
6
Q
T/F
- Network switches always must be configured before they can be put into operation in a network.
A
FALSE
7
Q
T/F
- The major disadvantage to using store-and-forward switching in a large network is that it will slow down the speed of network traffic.
A
TRUE
8
Q
T/F
- Communications through a router are noticeably faster than communications through a switch
A
FALSE
9
Q
T/F
- A distance-vector protocol sends updates to its neighbors that include the entire contents of its routing table.
A
TRUE
10
Q
T/F
- Changing the SSID on the access point and disabling SSID broadcast is sufficient security for most wireless networks.
A
FALSE
11
Q
T/F
- When a disk is formatted, it is impossible to recover the data that was on the disk.
A
FALSE
12
Q
T/F
- In Windows, you can start the Task Manage by simply right-clicking the taskbar and choosing Start Task Manager.
A
TRUE
13
Q
T/F
- One critical difference between a client OS and a server OS is the addition of directory services on some server OSs.
A
TRUE
14
Q
T/F
- Virtualization is designed for testing and development purposes only.
A
FALSE
15
Q
T/F
- Windows Server 2008 R2 can be installed only on a 64-bit system.
A
TRUE
16
Q
T/F
- Group accounts make it easier for an administrator to manage user rights and permissions.
A
TRUE
17
Q
T/F
- In Linux every user that is created automatically belongs to a default group named Users.
A
FALSE
18
Q
T/F
- Windows can be installed on an extended partition that has been formatted with the NTFS file system.
A
FALSE
19
Q
T/F
- An event log entry that is an error is marked with a red circle with a white exclamation point in the center.
A
TRUE
20
Q
T/F
- A RAID that is configured as a level 0 requires two drives because it copies data to both drives at the same time, making an exact duplicate of the data.
A
FALSE
21
Q
T/F
- Most small businesses require a high level of security including encryption technologies and complex network connections.
A
FALSE
22
Q
T/F
- The creator of a HomeGroup has the ability to change the randomly generated password to a more user-friendly password.
A
TRUE
23
Q
T/F
- When purchasing new equipment for a small business it is a good idea to invest in expandability features that will meet the company’s needs for the next 10 to 15 years.
A
FALSE
24
Q
T/F
- In a small business network, the router usually takes on the responsibilities of many roles, which include a firewall as well as a DHCP server.
A
TRUE
25
Q
T/F
- In most cases, you can install a small business network and move on to the next job, leaving the company’s IT staff to support the network.
A
FALSE
26
Q
T/F
- If a problem occurs after a successful login, Last Known Good Configuration will fix the issue.
A
FALSE
27
Q
T/F
- A protocol analyze, such as Wireshark gives the ability to listen in on network traffic as it moves through the Application layer to the Data Link layer and vice versa.
A
TRUE
28
Q
T/F
- In the problem-solving process, you should always devise a solution to the problem you are facing prior to determining the scope of the problem.
A
FALSE
29
Q
T/F
- The ping command is used to determine the path between two devices.
A
FALSE
30
Q
T/F
- Most SNMP managers allow the configuration of thresholds for generating alert messages to network administrators when those thresholds are exceeded.
A
TRUE
31
Q
T/F
- A router is considered to be a CSU/DSU.
A
FALSE
32
Q
T/F
- T-Carrier lines only require a CSU/DSC on the customer’s side of the connection.
A
FALSE
33
Q
T/F
- Packet switched WANs use virtual circuits to ensure that packets are delivered reliably and at the agreed-on bandwidth level.
A
TRUE
34
Q
T/F
- Multiprotocol Label Switching (MPLS) supports both IPv4 and IPv6, as well as other network layer protocols.
A
TRUE
35
Q
T/F
- Link Control Protocol is responsible for the setup of a PPP connection, as well as the termination of a connection when it has ended.
A
TRUE