Test Questions Chapters 2/3 Flashcards
What should MDF and IDF documentation take into account? What shouldn’t it?
- -Power sources avaible
- -environmental equipment needed to control temp and humidty
- -distances the cable runs must span
- -shouldn’t take into account costs
At what point in the installation process should patch panel ports and wall plates be labelled?
When the cables are attached to the connectors (not after they’re installed
The business is deploying new software under a change request. Apart from the including the installation procedure, would the change request include a list of software and hardware upgrades required to run the new software?
Apparently, Yes. although i’ve never seen this in change management experience. You only include the items that are actually changing, not what is required to run it!
- Authorizing downtime
- designating a maintenance window
Are 2 of the responsibilities of the change management team during the change process? True or FALSE
TRUE
Which Microsoft tool built into the OS is used for baselining?
Performance Monitor
on a Windows server enabling audit policies, it records information about both successful and failed access attempts in which of the below?
A. System B. Application C. Security D. Setup
Security log
In datacentres, which diagram contains the precise location of devices?
Rack Diagram
Network Maps aren’t draw to scale and don’t indicate the exact location of each device - TRUE or FALSE?
TRUE
Which RAIDS provide fault tolerance?
RAID1 and RAID5 (RAID10 too if exam asks for it)
*RAID5 needs 3 discs or more!
Power supplies in combined mode mean both supply the power at the same time. If one goes down the other can still provide power - TRUE or FALSE
FALSE. The first part is right, but if one goes down the other will not be able to fully provide the power needs.
Supplies can run in only 1 of two modes, Redundant or Combined
Which types of back up doesn’t clear the archive bit after archiving?
Differential
grandfather, father and son refers to what type of back up is done - TRUE or FALSE
FALSE. It refers to the backup jobs for daily, weekly and monthly
Windows server can provide full, differential and incremental backups, TRUE or FALSE?
FALSE. Only Full and Incremental
*It also can’t backup to magnetic media
Multilayer/content switches can provide load balancing, - TRUE or FALSE
TRUE
Multilayer switch typically works up to what layer?
Layer 4
UPS in online mode runs devices using battery power all the time - TRUE or FALSE?
TRUE. The mains power is directly wired to the batteries first. It means there’s no sag in power when the power fails.
Which UPS mode switches to battery power during a power failure?
Standby
Bonding Link Aggregation Port Aggregation NIC teaming are all equivalent terms for what?
Combining the bandwidth of two or more network adapters
Disc duplexing involves using multiple discs, each with it’s own disc controller to provide fault tolerance. TRUE or FALSE?
TRUE
What are computers known as in a network load-balancing cluster?
What are they known as in a fail-over cluster?
Hosts for load-balancing cluster
Nodes for failover cluster
Which type of backup uses the archive bit but doesn’t reset it after backing up and provides a short RTO?
Differential
Clustering, Load-Balancing, NIC teaming and NAT are concepts that frequently use virtual IP’s to provide high availability - TRUE or FALSE?
FALSE. Only Clustering and Load-balancing. NIC teaming doesn’t use virtual IP addresses. NAT isn’t a HA technology.
RTO is what? What does it depend on?
Recovery Time Objective - the amount of time it takes to restore data from the most recent backup. IT depends on the amount of data and the speed of the backup medium
What backup backs up all the data since the last backup of any kind?
Incremental
The types of applications subscribers use while accessing their provider’s services are covered by the SLA, true or false?
False
What mechanism allows a backup job spanning multiple removable media types to execute more quickly by automatically inserting and removing media.
An autochanger
What issue does RAID6 address? What’s the minimum number of drives required?
It addresses the issue with RAID5 where if 2 drives fail at the same time there is a high likelihood of permanent data loss. It uses two blocks of parity requiring min of 4 drives.
Which RAID levels provide fault tolerance with the down side of having the smallest amount of useable disc space?
RAID1 (50% between 2 discs) and RAID10 (I don’t understand how this is 50%.)
What is version skew and what can prevent it?
Version skew happens when a file is written/changed during a backup. The file is written to a directory that has already been backed up and thus won’t appear on the backup location.
Taking a snapshots prevents this.
which unix utility displays performance info about the currently running processes?
the TOP command.
Which SNMP versions don’t include any security?
SNMPv1
SNMPv2c
A driver update is typically applied to hardware or software?
Software
When does Microsoft release the latest OS patches for automatic download?
Second Tuesday of every month.
Research
Testing
Backup
Are part of what process?
Patch Evaluation.
*Rolling back is not part of it.
Device driver updates are least likely to be updated of the kinds of updates usually undertaken. Unless it addresses a specific bug or issue - TRUE or FALSE?
TRUE
to effectively monitor a network using SNMP, you must be sure that all of the equipment you purchase when designing and building your network supports the protocol - TRUE or FALSE?
TRUE
SNMPv2 does not use a community string for security, TRUE or FALSE?
TRUE
Port Scanners examine a system at what layer of the OSI?
Layer 4 - Transport (it looks for port numbers).
Ports can be described as ‘system endpoints’
web server logs need a traffic analysis application to interpret and the logs are stored as text files - TRUE or FALSE
Is a protocol analyizer a traffic analyzer?
TRUE.
No according to the test questions. Protocol analysers can’t interpret web server logs, they interpret packets on the network
Packet/protocol analyzers can look at data insight packets which can contain passwords in clear text - TRUE or FALSE?
TRUE
*packet sniffers can’t look at the data inside packets
packets that are dropped because they are destined for another interface are known as what?
Discards
Security and Cycling are tasks assocaited with what?
What is meant by them?
Log Management.
Security is need to keep the logs secure
Cycling sets the period to keep the log for before being deleted.
Nessus, Nmap and MBSA can all perform what?
Vulnerability scanning
Which free tool is an inventory, assessment, and reporting tool that helps you assess your current IT infrastructure and determine the right Microsoft technologies for your IT needs?
MAP Toolkit.
*it does not perform vulnerability scanning
Network mapping, Remediation and Penetration testing are NOT functions classified as vulnerability scanning. TRUE or FALSE?
TRUE
Data Aggregation, Correlation, Retention and Forensic Analysis are processes in what?
SIEM
In SIEM which process involves searching logs on multiple computers for specific information based on set criteria and time periods?
Forensic Analysis
Which VPN protocol doesn’t provide encryption within the tunnel?
L2TP - it uses IPSec
*Technically, PPTP is the same as it relies on the underlying PPP to do that but the test questions didn’t use this as an answer.
SSH is not used to secure connections between web servers and web browsers, TRUE or FALSE?
TRUE
the Authentication Header is a protocol in the TCP/IP suite that provides integrity services in the form of a digital signature - TRUE or FALSE
TRUE
Phase 1 of IPsec connection establishment authenticates the endpoints using digitally signed certifcates or a PSK - TRUE or FALSE?
TRUE
PHase 2 of IPSec connection is encrypted using the secure keys established in phase one and is responsible for negotiating another set of keys called the Secure Association - TRUE or FALSE
TRUE
TFTP doesn’t encrypt text sent to authenticate login - TRUE or FALSE
FALSE - it doesn’t authenticate full stop.
Which variant of FTP is suitable for systems booting with PXE by downloading boot image from the network?
TFTP.
It’s because it doesn’t need to authenticate.
Out of band devices don’t require an IP address to manage - TRUE or FALSE?
TRUE
What 4 components are required for a computer to establish a remote TCP/IP connection.
1) Common protocols
2) Physical Layer connection
3) TCP/IP configuration
4) Host and remote software
Browsing using a VPN is slower because you are using the remote network LAN which has to then pass all the requests down the VPN tunnel - TRUE or FALSE?
TRUE
What are the two most common types of SSL VPNs?
SSL Portals - provides users with access to selected remote network resources
SSL tunnels - client browser uses java or flash to connect
- -plugging into the console port
- -establishing a modem connection
- -connecting dedicated ports on each device to a separate switch
Are all forms of what?
Out-of-band management
Which of the below is untrue about VNC
- it’s free
- runs on many OSs
- runs faster than competition
- can run through a web browser
- runs faster
What policy specifies how and when users are permitted to access the company network?
Remote access policy
Humidity levels lower than what can cause a build-up of static electricity?
50%
Account lock thresholds specifies what?
the number of incorrect logon attempts that are allowed before the account is locked
Reset account lockout threshold counter specifies what?
The amount of time that an account remains locked out
What data-loss prevention term describes when data is being transmitted across the network?
Data-in-motion
data-in-use describes end-point actions - TRUE or FALSE?
TRUE
On-boarding and off-boarding are typically associated with Identity Management or Data-loss prevention?
Identity Management - users are added or removed from the IAM (Identity and Access Management system)
–The Department of State
–Department of Commerce
and
–Department of the Treasury
are all capable of imposing international export controls on software products? TRUE or FALSE?
TRUE
What is a fibre channel arbitrated loop (known as FC-AL) used for?
For direct connection to storage that isn’t shared to other hosts (so when it’s only used by one host)
What is an organization’s security incident response policy’s primary goal? Identifying the cause of an incident or preventing an incident from occurring again?
Preventing an incident from occurring again
Electrical fires are not something typically addressed by an IT departments incident response POLICIES. TRUE or FALSE?
TRUE
Password history policy is not something design to prevent brute force attacks. TRUE or FALSE
TRUE
Data preservation is not likely to be a procedural element of an IT asset disposal policy - TRUE or FALSE
TRUE (only according to the practice test book, this is contradicted in the review guide)