3 Network + Final Study Guide (Multiple Response) Flashcards
1
Q
- Which of the following can be used to secure data on disk drives? (Choose all that apply)
- a. EFS
b. VPN
c. IPSec - d. BitLocker
- e. TrueCrypt
A
A,D,E
2
Q
- Firewall rules can be based on which of the following properties? (Choose all that apply)
- a. source IP address
b. destination MAC address - c. protocol
- d. context
e. operating system
A
A,C,D
3
Q
- On a router configured to use RIP, the number of routers a packet must travel between before it reaches its destination is called what? (Choose all char apply)
- a. metric
- b. hop count
c. timestamp
d. aging time
A
A,B
4
Q
- Which of the following would be found in a routing table on a router?
- a. timestamp
- b. destination network
- c. next hop
d. MAC address - e. metric
A
A,B,C,E
5
Q
- Access control lists can be configured based on which of the following? (Choose all that apply)
- a. protocol
b. source MAC address - c. destination network
d. destination MAC address - e. source IP address
A
A,C,E
6
Q
- Which of the following types of file systems support file and folder permissions? (Choose all that apply )
- a. EXT2
b. FAT16
c. FAT32 - d. NTFS
A
A,D
7
Q
- A DHCP server can supply the client with more than just its IP address and subnet mask. What other necessary configurations can it supply? (Choose all that apply)
- a. default gateway
b. destination network
c. file sever name - d. DNS server
A
A,D
8
Q
- What are the two most common ways of accessing a network resource? (Choose two)
a. entering an ARP path * b. mapping a drive c. entering a SMB path * d. entering a UNC path
A
B,D
9
Q
- Which of the following is a fault tolerant feature provided by a serve OS? (Choose alI that apply)
- a. RAID
b. active directory
c. DHCP - d. server cluster
- e. hot-swappable devices
A
A,D,E
10
Q
- Which of the following virtualization products are used for bare-metal virtualization?
a. VirtualBox * b. Citrix XenServer c. Microsoft Virtual PC * d. VMware vSphere e. VMware Workstation * f. Microsoft Hyper-V
A
B,D,F
11
Q
- Which of the following are case sensitive? (Choose all that apply)
a. Windows logon name * b. Windows password * c. Linux logon name * d. Linux password
A
B,C,D
12
Q
- Which of the following groups are special identity groups? (Choose all that apply)
a. print operators * b. authenticated users c. guest * d. system * e. self
A
B,D,E
13
Q
- Which of the following are standard NTFS permissions?
- a. List Folder Contents
- b. Read
c. Change - d. Write
e. Execute
A
A,B,D
14
Q
- When dealing with permissions in Linux, what are the three user types that can be assigned permissions? (Choose three)
a. Creator * b. Group * c. Other * d. Owner e. Class f. Object
A
B,C,D
15
Q
- After a HomeGroup is created, how can other computers join it? (Choose all that apply)
a. Right-click My Computer, access the properties dialog box, and choose Change settings. * b. From the Start menu, choose the Control Panel and then choose HomeGroup. * c. From the taskbar, right-click the network icon to open Network and Sharing center and then change your location type. d. From the Control Panel, open the Device Manage and edit the properties of the network adapter
A
B,C