Cint

Only available on StudyMode
  • Topic: Network switch, Computer networking device, Networking hardware
  • Pages : 27 (4461 words )
  • Download(s) : 78
  • Published : January 22, 2013
Open Document
Text Preview
* Question 1
3 out of 3 points
| |
| ____ scanning detects malware by comparing a file’s content with known malware signatures in a signature database.Answer| | | | | Selected Answer:|  b.  Signature|
Correct Answer:|  b.  Signature|
| | | |
* Question 2
3 out of 3 points
| |
| Which of the following is a mechanism for granting and validating certificates?Answer| | | | | Selected Answer:|  d.  PKI|
Correct Answer:|  d.  PKI|
| | | |
* Question 3
3 out of 3 points
| |
| What is the main difference between a worm and a virus?Answer| | | | | Selected Answer:|  d.  A worm can replicate itself and does not need a host for distribution.| Correct Answer:|  d.  A worm can replicate itself and does not need a host for distribution.|

| | | |
* Question 4
3 out of 3 points
| |
| A ____ system is a process or program that provides support personnel with a centralized means of documenting changes to the network.Answer| | | | | Selected Answer:|  b.  change management|

Correct Answer:|  b.  change management|
| | | |
* Question 5
3 out of 3 points
| |
| ____ is the local storage of frequently needed files that would otherwise be obtained from an external source.Answer| | | | | Selected Answer:|  c.  Caching|
Correct Answer:|  c.  Caching|
| | | |
* Question 6
0 out of 3 points
| |
| A ____ is a tool that can assess the quality of the wireless signal.Answer| | | | | Selected Answer:|  c.  signal analyzer|
Correct Answer:|  b.  spectrum analyzer|
| | | |
* Question 7
3 out of 3 points
| |
| A program that disguises itself as something useful but actually harms your system is called a ____.Answer| | | | | Selected Answer:|  b.  Trojan horse|
Correct Answer:|  b.  Trojan horse|
| | | |
* Question 8
3 out of 3 points
| |
| Before using a network monitor or protocol analyzer on a network, it is important to know what ____ on your network normally looks like.Answer| | | | | Selected Answer:|  d.  traffic|

Correct Answer:|  d.  traffic|
| | | |
* Question 9
3 out of 3 points
| |
| You are troubleshooting a workstation connection to the network.  During your troubleshooting, you replace the drop cable connecting the computer to the network.  Which type of document should you update?Answer| | | | | Selected Answer:|  d.  Change documentation|

Correct Answer:|  d.  Change documentation|
| | | |
* Question 10
3 out of 3 points
| |
| Your network conducts training sessions for high-profile clients.  As part of the training, clients connect to get a video feed of the instructor and other class activities.  You want to make sure video traffic related to the training is not delayed on the network.  Which solution should you implement?Answer| | | | | Selected Answer:|  d.  QoS|

Correct Answer:|  d.  QoS|
| | | |
* Question 11
3 out of 3 points
| |
| Which of the following information are you likely to find in a policy document?Answer| | | | | Selected Answer:|  b.  A requirement for using encrypted communications for Web transactions.| Correct Answer:|  b.  A requirement for using encrypted communications for Web transactions.|

| | | |
* Question 12
3 out of 3 points
| |
| When used on a copper-based cable, a continuity tester applies a small amount of ____ to each conductor at one end of the cable.Answer| | | | | Selected Answer:|  d.  voltage|
Correct Answer:|  d.  voltage|
| | | |
* Question 13
3 out of 3 points
| |
| Which of the following applications typically use 802.1x authentication? (Select two.)Answer| | | | | Selected Answers:|  a.  Controlling access through a wireless access point   b.  Controlling access through a switch 

 |
Correct Answers:|   a.  Controlling access...
tracking img