1 Network + Final Study Guide (True/False) Flashcards

1
Q

T/F

  1. A security policy should clearly state the desired rules, even if they cannot be enforced.
A

FALSE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

T/F

  1. You don’t need to physically secure your servers as long as you use a good strong password for your accounts.
A

FALSE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

T/F

  1. In a file system that uses FAT or FAT32, the only file security option that is available is the sharing permissions.
A

TRUE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

T/F

  1. A Trojan is a self-replicating program that masks itself as a useful program but is actually a type of malware.
A

FALSE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

T/F

  1. A DoS attack ties up network bandwidth or services, rendering resources useless to legitimate uses.
A

TRUE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

T/F

  1. Network switches always must be configured before they can be put into operation in a network.
A

FALSE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

T/F

  1. The major disadvantage to using store-and-forward switching in a large network is that it will slow down the speed of network traffic.
A

TRUE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

T/F

  1. Communications through a router are noticeably faster than communications through a switch
A

FALSE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

T/F

  1. A distance-vector protocol sends updates to its neighbors that include the entire contents of its routing table.
A

TRUE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

T/F

  1. Changing the SSID on the access point and disabling SSID broadcast is sufficient security for most wireless networks.
A

FALSE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

T/F

  1. When a disk is formatted, it is impossible to recover the data that was on the disk.
A

FALSE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

T/F

  1. In Windows, you can start the Task Manage by simply right-clicking the taskbar and choosing Start Task Manager.
A

TRUE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

T/F

  1. One critical difference between a client OS and a server OS is the addition of directory services on some server OSs.
A

TRUE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

T/F

  1. Virtualization is designed for testing and development purposes only.
A

FALSE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

T/F

  1. Windows Server 2008 R2 can be installed only on a 64-bit system.
A

TRUE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

T/F

  1. Group accounts make it easier for an administrator to manage user rights and permissions.
A

TRUE

17
Q

T/F

  1. In Linux every user that is created automatically belongs to a default group named Users.
A

FALSE

18
Q

T/F

  1. Windows can be installed on an extended partition that has been formatted with the NTFS file system.
A

FALSE

19
Q

T/F

  1. An event log entry that is an error is marked with a red circle with a white exclamation point in the center.
A

TRUE

20
Q

T/F

  1. A RAID that is configured as a level 0 requires two drives because it copies data to both drives at the same time, making an exact duplicate of the data.
A

FALSE

21
Q

T/F

  1. Most small businesses require a high level of security including encryption technologies and complex network connections.
A

FALSE

22
Q

T/F

  1. The creator of a HomeGroup has the ability to change the randomly generated password to a more user-friendly password.
A

TRUE

23
Q

T/F

  1. When purchasing new equipment for a small business it is a good idea to invest in expandability features that will meet the company’s needs for the next 10 to 15 years.
A

FALSE

24
Q

T/F

  1. In a small business network, the router usually takes on the responsibilities of many roles, which include a firewall as well as a DHCP server.
A

TRUE

25
Q

T/F

  1. In most cases, you can install a small business network and move on to the next job, leaving the company’s IT staff to support the network.
A

FALSE

26
Q

T/F

  1. If a problem occurs after a successful login, Last Known Good Configuration will fix the issue.
A

FALSE

27
Q

T/F

  1. A protocol analyze, such as Wireshark gives the ability to listen in on network traffic as it moves through the Application layer to the Data Link layer and vice versa.
A

TRUE

28
Q

T/F

  1. In the problem-solving process, you should always devise a solution to the problem you are facing prior to determining the scope of the problem.
A

FALSE

29
Q

T/F

  1. The ping command is used to determine the path between two devices.
A

FALSE

30
Q

T/F

  1. Most SNMP managers allow the configuration of thresholds for generating alert messages to network administrators when those thresholds are exceeded.
A

TRUE

31
Q

T/F

  1. A router is considered to be a CSU/DSU.
A

FALSE

32
Q

T/F

  1. T-Carrier lines only require a CSU/DSC on the customer’s side of the connection.
A

FALSE

33
Q

T/F

  1. Packet switched WANs use virtual circuits to ensure that packets are delivered reliably and at the agreed-on bandwidth level.
A

TRUE

34
Q

T/F

  1. Multiprotocol Label Switching (MPLS) supports both IPv4 and IPv6, as well as other network layer protocols.
A

TRUE

35
Q

T/F

  1. Link Control Protocol is responsible for the setup of a PPP connection, as well as the termination of a connection when it has ended.
A

TRUE