Добро пожаловать на мой блог

The world is yours

ITE

автор: admin | Октябрь 14, 2010 | Раздел: Жизнь

1
Which two of the following standards are necessary for proper virus protection? (Choose two.)
Virus protection software should be installed on all workstations and servers.
One person should be responsible for communicating virus alerts to all users.

2
Which three of the following statements correctly describe topologies? (Choose three.)
The logical topology of a network refers to the path signals travel from a source to a destination.
A ring topology can refer to either a physical or logical topology.
A physical topology describes the actual layout of network devices.

3
What is the name of the standard X Window terminal program?
xterm

4
How can an administrator assist a Windows 2000 user with a forgotten password?
set a new password for the user in the Computer Management tool

5
Which are three reasons a company may choose Linux over Windows as an operating system? (Choose three.)
Running a Linux server without a GUI will increase efficiency and reliability. This option is not available in server versions of Windows.
After a user has purchased a copy of Linux, it can be installed on any number of computers for no additional charge.
By default, users must provide a username and password to log into a Linux system, which improves system security.

6
Which of the following commands can be used to specify the user and group ownership of a file?
chown

7
A technician is troubleshooting a Windows machine that is not communicating with the network server. The technician verifies that the server is not reachable and ipconfig shows that the workstation is configured properly. What should the technician do next?
ping 127.0.0.1

8
Which of the following is the most popular type of package manager available for Linux?

RPM

9
A technician is setting up a Windows workstation that has an IP address of 192.168.64.23 to work on a network that contains a Linux file server with the IP address 192.168.64.2. What should the technician do to view the IP configuration on the workstation?
run ipconfig /all on the workstation

10
In Windows 2000, which two categories within Computer Management under System Tools store logged information? (Choose two.)
Performance Logs and Alerts
Event Viewer

11
Which two of the following are common Linux super-servers? (Choose two.)
inetd.d
xinetd.d

12
In Windows 2000 Professional, which of the following functions can a user perform without administrator rights?
add a mapping to a network printer

13
Which tool, native to Windows XP, is used to monitor system resources?
Performance Tool

14
Which two of the following standards describe proper security for usernames and passwords? (Choose two.)
The level of password control for assigning passwords should match the level of protection required.
Password expiration and lockout rules should be clearly defined and communicated to network users.

15
Which mode of the vi text editor will be accessed by typing a colon (:)?
last-line
16
Which file system type is recommended for a Linux hard disk partition to be used for applications and data?
ext3

17
Which three of the following file systems can be used to format a Windows NOS partition? (Choose three.)
FAT
FAT32
NTFS

18
A user wants to give other network users access to a folder on a Windows 2000 system. After right-clicking on the folder, which item should the user select?
Sharing

19
Which of the following Linux commands is used to create a directory?
mkdir

20
If the kill command is used on a computer running Linux without specifying a signal, which signal is used by default?
SIGTERM

21
When developing a network security plan, what are three factors that should be considered? (Choose three.)
the type of business conducted by the company and any laws pertaining to confidentiality of data
the type of data stored on the company network
the management philosophy and how it is presented to employees

22
Which three of the following network configuration parameters can be set during installation? (Choose three.)
IP address
DNS server address
subnet mask

23
What are two steps in the creation of a Windows 2000 or Windows XP script? (Choose two.)
write the script code and save as ASCII text
save the script with the appropriate filename extension for the scripting language used

24
What allows Linux applications to print to non-PostScript printers?
Ghostscript

25

The table shows the users and groups that have permission to access a file and the permissions they have in a Windows XP system. If User1 is a member of the User group but not a member of the Administrator group, which users can delete the file?
any member of the Administrator and User groups
User1 and any member of the Administrator group

26
How can a technician change the IP address of a Windows 2000 system?
right-click on My Network Places > Properties and then Local Area Network > Properties > TCP/IP > Properties

27
Which of the following is considered good practice when partitioning a hard disk for a new OS? (Choose two.)
A third party partitioning tool that supports the operating systems to be installed should be used.
The partitioning tool that comes with the OS should be used to create the partitions for that OS, if no other options are available.
28
Which two of the following devices are most likely to have drivers that are already compiled into a modern Linux kernel? (Choose two.)
sound card
USB device

29
Which statement accurately describes the Slackware Linux distribution?
It is designed for advanced users and uses text-based configuration tools.

30
Which of the following directories contains most of the Linux system log files?
/var/log

31
Which two of the following commands can be used to configure security for a Linux system that is acting as a dedicated firewall? (Choose two.)
ipchains
iptables

32
A technician is given a Windows 2000 computer that apparently has an inoperable modem card. What should the technician do first?
check in Device Manager to see if there are any icons next to the modem device

33
Why might the administrator of a small company choose Windows 2000 Server instead of Windows 2000 Professional?
The system is to act as a DNS server.

34
The administrator of a Windows 2000 system believes that the reason for the reduced performance of the network is due to the condition of the server’s disks. What Windows 2000 tool can the administrator use to get the most complete information regarding the status of the disks on the server?
Click on Start > Control Panel > Administrative Tools > Computer Management.

35
An instructor in a small college is putting together systems on which students will practice installing Windows 2000 Advanced Server. The instructor has been given 133 MHz Pentium computers with 128 MB of RAM, 2 GB hard drive, and a 12X CD-ROM drive. Which component needs to be upgraded to bring the machines up to the recommended standard for Windows 2000 Advanced Server?
RAM

36
Which two of the following statements are true about Linux scripts? (Choose two.)
Scripts are executed in a top down fashion.
Scripts can be created using the vi text editor.

37
What is the name of a free software program that is useful for monitoring security breaches on Linux servers without enhancing security?
LSAT

38
A new administrator has discovered that kernel messages are not saved to a log file when the system is booted. The LILO boot loader is used. What can the administrator do to correct this?
put the line messages = /etc/log/boot.messages in lilo.conf

39
When using Linux, which of the following commands is used to perform a low-level format?
fdformat

40
What is the function of the netstat utility?
It displays information about a network such as connections, routing tables, and interfaces.

41
Which of the following statements is true of NIS?
Slave servers provide load sharing for the NIS server.

42
Which Microsoft option will use the Internet to contact a vendor’s website in search of patches, fixes, and updates?
Windows Update

43
A technician has determined that the reason a Linux system refuses to boot is that the /etc/fstab file is corrupt. What should the technician do to try to repair the system?
boot the system using an emergency boot disk floppy and then edit the /etc/fstab file on the hard drive

44
The Apache web server has been installed on a Linux server and is being configured. The administrator wishes to change the location of the web pages that will be served to /home/www and knows that the main configuration file contains this directive. What is the name of the file that needs to be edited?
httpd.conf

45
What are two ways a Windows client can connect to a shared network printer? (Choose two.)
Add Printer Wizard
net use command
46
Which command is used to change groups after a user has logged into a system?
newgrp

47
Which extension is found on the end of files that have been compressed using the compress program?
.Z

48
Which Linux partition generally contains the kernel?
/boot

49
A technician in a small company has been asked to install Windows 2000 onto a laptop that belongs to a manager. Which installation option should the technician choose?
portable

50
Which three of the following statements about memory are true? (Choose three.)
RAM is faster than the hard disk of a computer.
Virtual memory must be managed manually.
A lack of available RAM will impact the performance of a computer.

51
After configuring Web services with Windows XP, what two methods can be used to view the default web page? (Choose two.)
Users can view the default web page by submitting the address http://127.0.0.1 via a web browser on the Windows XP server.
Users can view the default web page by submitting the IP address of the Windows XP server via a web browser on the Windows XP server.

52
What are three important considerations when designing a server? (Choose three.)
memory requirements
CPU speed
hard disk type

53
While using a non-administrator Windows 2000 account, an administrator is asked to add a new user to the system. What is the easiest way for the administrator to create a new user?
The administrator enters Administrator Tools and then clicks on Computer Management. The administrator will then be able to create a new user.

54
If network users cannot access an FTP server, what are two ways to stop and restart the FTP service on a Windows 2000 server? (Choose two.)
select Control Panel > Administrative Tools > Services

55
Which of the following, when used with the telinit command, will cause a system to read the /etc/inittab file and implement new changes?
q

56
Which of the following commands will show a listing of all the Linux commands and a brief description?
man intro

57
Which four parts of a Linux file system are often located in dedicated partitions? (Choose four.)
/
/boot
/home
swap file

58
A technician wishes to load Linux onto a new computer system that currently has no operating system loaded on the single hard drive. The technician wishes to boot from the installation CD but the message ‘Media error’ keeps appearing. What should the technician do next?
check the BIOS to make sure the CD-ROM is the first boot device

59
What are three network operating systems? (Choose three.)
Windows XP
Windows NT
Windows 2000

60
Which of the following situations can be addressed by using the fsck command?
A user must repair the file structure after an unexpected power failure causes a system to abruptly shut down.

61
What is the System Monitor tool?
It is a Windows 2000 and XP tool that shows graphically the utilization of a number of system resources over a period of time.

62
Which distribution is one of the oldest and viewed as being one of the most significant?
Red Hat

63
Which of the following commands would allow a user to switch from a user account to the root account to execute a program that requires root permissions?
su

14 модуль
1 Several computers on a network are running slow and many user tasks are timing out. The administrator checks the network and finds duplicate copies of program code in the active memory of each computer. Which of the following options best describes this self-replicating code?
virus
Trojan horse
Worm***
bug

2 Which DoS attack uses fragments with overlapping reassembly information to take advantage of the way IP handles fragmentation?
SYN attack
Teardrop ***
ping of death
land
3 Which statement accurately describes a Smurf attack?
The IP headers of ping requests are spoofed so that replies will overwhelm the target host. ***
The IP headers of SYN requests are spoofed so that a target will attempt to reply to itself.
This DoS attack overflows buffers by sending illegally large ping requests to the target.
This attack exploits the three-way handshake used with TCP.
4 Which three of the following vulnerabilities have been overcome in newer versions of operating system software? (Choose three.)
ping of death attack ***
land attack ***
Teardrop ***
buffer overflow
5 According to SANS, which three of the following services are among the top ten security vulnerabilities of Linux? (Choose three.)
Remote Procedure Calls ***
Dynamic Host Configuration Protocol
MySQL
Secure Shell ***
Apache Web Server ***
RMON
6 Which of the following options best describes Network Address Translation?
Network Address Translation usually replaces proxy services and packet filters.
Network Address Translation uses private addressing to hide inside hosts from outsiders. ***
Network Address Translation is used to alter the destination address of packets leaving a secure network.
Network Address Translation allows packets to be filtered as they enter or leave the network.
7 Which two of the following options provide a basic firewall solution by using rules to control network traffic? (Choose two.)
proxy services
ip masquerade
packet filters ***
Network Address Translation
access control lists ***
8 Which three OSI model layers are used for packet filtering? (Choose three.)
Layer 2
Layer 3 ***
Layer 4 ***
Layer 5
Layer 6
Layer 7 ***
9 Which three of the following terms refer to the public network that acts as a buffer area between a firewall and a boundary router? (Choose three.)
Internet
DMZ ***
extranet
sacrificial LAN ***
dirty LAN ***
demarcation zone
10 Which three of the following options are necessary to protect against the threat of viruses? (Choose three.)
Outgoing traffic should be filtered at all gateways.
Incoming traffic should be filtered at all gateways. ***
Current virus protection software should only be installed on incoming gateways.
One administrator should issue all virus warnings. ***
Policies should be created to control outgoing e-mail.
Virus protection software should be current on all computers.***
11 To create a security policy, which of the following actions should occur first?
All servers should be placed in a secure, central location.
All users should be surveyed to identify potential security threats.
All users should receive written guidelines of what is acceptable and allowed on the network. **
All users should receive instructions outlining how to install and upgrade virus software.

12 How can developing an e-mail policy protect a network from viruses?
An e-mail policy will state what can be sent and received so that users will no longer need to be made aware of security issues.
An e-mail policy will make it safe for users to open all attachments.
An e-mail policy will define what can be sent and received to make users more aware of security issues on the network. ***
An e-mail policy will require users to notify the other users on the network as soon as a threat is suspected.
13 Which three of the following items should be included in a security policy to increase the level of password control? (Choose three.)
Passwords should expire after random periods of time.
Passwords should be familiar names or words, so that users will not have to keep written reminders near computers.
Passwords should be a combination of letters and numbers. ***
Written rules should be distributed to advise users of password expiration and lockout
policies. ***
All passwords should be changed by the user after a specified period of time. ***

14 Which statement is true about username and password standards?
Complex usernames are less important than complex passwords. ***
Standards should only be applied to passwords. Users should select their own usernames.
Usernames should expire every three months.
Passwords should be simple and easy to remember.
15 Which of the following options refers to a software-based, real-time network IDS that is designed for smaller networks?
PIX
Snort ***
Smurf
proxy server
16 Which of the following options best describes the characteristics of an IDS?
hardware, inspects all network activity, denies or permits access using filters, signals an alarm
hardware or software, limits access to prevent intrusion, inspects all network traffic
software, designed to identify intrusion using a set of patterns, signals an alert
inspects all network activity, identifies suspicious patterns, signals an alert ***
17 Which two of the following protocols are used by IPSec? (Choose two.)
Encrypted Secure Header
Encapsulating Security Payload ***
Authentication Header ***
Authenticated Secure Header
18 Which two options accurately describe network security? (Choose two.)
As security increases, the level of accessibility increases.
As security increases, the level of accessibility decreases. ***
Users want more accessibility and administrators want more security.***
The level of security required is the same for all organizations.
19 Which two of the following statements correctly describe audit trails? (Choose two.)
Audit trails secure a network.
Audit trails help maintain security on a network. ***
Audit trails back up data on a network.
Audit trails are used to recover lost data. ***
Audit trails are used to allocate network resources.
20 Which directory should be used for decompressing LSAT?
/usr/bin
/etc/bin
/usr/local/bin ***
/usr/sbin
/etc/local/bin

What are three network operating systems? (Choose three.)
Windows XP
Windows 98
Windows ME
Windows NT
Windows 2000

2        Which of the following, when used with the telinit command, will cause a system to read the /etc/inittab file and implement new changes?
s
o
q
z

3        Which two of the following statements are true about Linux scripts? (Choose two.)
Scripts cannot contain loops.
Scripts are executed in a top down fashion.
Scripts can be created using the vi text editor.
Scripts cannot contain commands.
A script is part of the OS.

4        Which Microsoft option will use the Internet to contact a vendor’s website in search of patches, fixes, and updates?
Secure Update
Flash Update
Windows Update
Update Manager
Patch Manager

5        Which of the following is considered good practice when partitioning a hard disk for a new OS? (Choose two.)
A third party partitioning tool that supports the operating systems to be installed should be used.
MS-DOS fdisk should be used, as it creates partitions that are compatible with all major operating systems.
The partitioning tool that comes with the OS should be used to create the partitions for that OS, if no other options are available.
Partitions should be as large as the disk will allow to provide room for future expansion.
Partitions should be made as small as possible and FIPS used to adjust them later as necessary.

6        When using Linux, which of the following commands is used to perform a low-level format?
mkfs
format
df
fdformat
du

7        Which of the following is the most popular type of package manager available for Linux?
DBM
RPM
WINZIP
PKZIP

8        Which two of the following commands can be used to configure security for a Linux system that is acting as a dedicated firewall? (Choose two.)
ipconfig
ipchains
iptrans
iptables
ifconfig

9        What are two ways a Windows client can connect to a shared network printer? (Choose two.)
Add Printer Wizard
Net Connection Wizard
net connect command
net use command

10        A technician is troubleshooting a Windows machine that is not communicating with the network server. The technician verifies that the server is not reachable and ipconfig shows that the workstation is configured properly. What should the technician do next?
ping the default gateway
ping 127.0.0.1
check the configuration of the server
tracert to the server

11        A technician has determined that the reason a Linux system refuses to boot is that the /etc/fstab file is corrupt. What should the technician do to try to repair the system?
use an MS-DOS boot disk to boot the system and then use the MS-DOS edit utility to repair the /etc/fstab file
boot the system using an emergency boot disk floppy and then edit the /etc/fstab file on the hard drive
boot the system using the emergency repair disk and then run fdisk /mbr
run the Linux installation program from the installation CD and select Repair fstab when it reaches the disk partitioning step

12        Which are three reasons a company may choose Linux over Windows as an operating system? (Choose three.)
It is difficult to buy a new computer with a server version of Windows pre-installed.
There is more application software available for Linux.
Running a Linux server without a GUI will increase efficiency and reliability. This option is not available in server versions of Windows.
After a user has purchased a copy of Linux, it can be installed on any number of computers for no additional charge.
After a user has purchased a copy of Windows, it can be installed on any number of computers for no additional charge.
By default, users must provide a username and password to log into a Linux system, which improves system security.

13        Which of the following directories contains most of the Linux system log files?
/etc/log
/etc/sys/log
/var/log
/var/sys/log

14        A technician wishes to load Linux onto a new computer system that currently has no operating system loaded on the single hard drive. The technician wishes to boot from the installation CD but the message ‘Media error’ keeps appearing. What should the technician do next?
check the BIOS to make sure the CD-ROM is the first boot device
make sure the cable to the CD-ROM is inserted correctly
partition the disk using fdisk
boot from a boot floppy
try booting from a different Linux distribution

15        Which two of the following standards are necessary for proper virus protection? (Choose two.)
Virus protection software should only be installed on client workstations that have Internet access.
Virus protection software should only be installed on servers that can be accessed by remote clients.
Virus protection software should be installed on all workstations and servers.
All virus warnings should come from at least two network support technicians.
One person should be responsible for communicating virus alerts to all users.

16        Which of the following Linux commands is used to create a directory?
diradd
mkdir
dir
touch
makedr

17        If network users cannot access an FTP server, what are two ways to stop and restart the FTP service on a Windows 2000 server? (Choose two.)
use the IIS Wizard
click on the Services and Applications > Services tab in the MMC
enter netstat -halt at the command line
select Control Panel > Administrative Tools > Services
select IIS Maintenance Console > Services

18        After configuring Web services with Windows XP, what two methods can be used to view the default web page? (Choose two.)
Users can view the default web page by using the View Web Page tool found under Administrative Tools in the IIS Manager.
Users can view the default web page by submitting the address http://127.0.0.1 via a web browser on the Windows XP server.
Users can view the default web page by submitting http://www.localstart.asp in the web browser on the Windows XP server.
Users can view the default web page by submitting the IP address of the Windows XP server via a web browser on the Windows XP server.

19        Which two of the following standards describe proper security for usernames and passwords? (Choose two.)
A complex password convention is less important than having a complex standard regarding usernames.
All passwords should be a short combination of easily remembered letters and numbers so that users will not need to write their passwords down.
The level of password control for assigning passwords should match the level of protection required.
Both usernames and passwords should periodically expire to ensure maximum security.
Password expiration and lockout rules should be clearly defined and communicated to network users.

20        How can a technician change the IP address of a Windows 2000 system?
run cmd and then enter the command ipconfig
right-click on My Computer and then Properties > Network Connections > TCP Settings
right-click on My Network Places > Properties and then Local Area Network > Properties > TCP/IP > Properties
left-click on Start > Programs > Accessories > Administrative Tools > Network Settings

21        Which extension is found on the end of files that have been compressed using the compress program?
.gz
.Z
.c
.XZ

22        A new administrator has discovered that kernel messages are not saved to a log file when the system is booted. The LILO boot loader is used. What can the administrator do to correct this?
put the line dmesg > /var/log/boot.messsages in the /etc/rc.d/rc.local file
put the line dmesg in the init.conf file
press the F8 button when the system is booted
hold the F6 key down when the system is powered up
put the line messages = /etc/log/boot.messages in lilo.conf

23        In Windows 2000, which two categories within Computer Management under System Tools store logged information? (Choose two.)
System Log
Warnings, Errors, and Alerts
Service Log
Performance Logs and Alerts
Event Viewer
Network Log

24        A user wants to give other network users access to a folder on a Windows 2000 system. After right-clicking on the folder, which item should the user select?
Sharing
Rights
Permissions
Properties
Security

25        Which mode of the vi text editor will be accessed by typing a colon (:)?
edit
entry
command
last-line

26

The table shows the users and groups that have permission to access a file and the permissions they have in a Windows XP system. If User1 is a member of the User group but not a member of the Administrator group, which users can delete the file?
administrators only
any member of the Administrator and User groups
User1 and any member of the Administrator group
any member of the User group only
User1 only

27        Which distribution is one of the oldest and viewed as being one of the most significant?
Caldera
Debian
SuSE
Red Hat
Slackware

28        What is the name of the standard X Window terminal program?
xterm
xshell
cli-win
cli-shell

29        While using a non-administrator Windows 2000 account, an administrator is asked to add a new user to the system. What is the easiest way for the administrator to create a new user?
The administrator enters Administrator Tools and then clicks on Computer Management. The administrator will then be able to create a new user.
The administrator enters Administrator Tools without changing to the Administrator account then right-clicks on Computer Management and selects Run as. After entering the Administrator account password the administrator can create a new user.
The administrator clicks on Start > Switch User. The administrator then chooses the Administrator account to create the new user.
The administrator logs out from the the non-administrator account and then logs in as the administrator. The administrator will then be able to create a new user.

30        How can an administrator assist a Windows 2000 user with a forgotten password?
set a new password for the user in the Computer Management tool
enter the Computer Management tool, click on the user, and then select Properties > Password to display the password
switch to the user account from the administrator account and select Set Password from the Control Panel
log in as the user using the administrator password, enter Ctrl-Alt-Del, and click on Change Password
delete the user account from the Computer Management tool and create a new user account
e-mail Microsoft to request a new password for the account, which will then be e-mailed directly to the user

31        Which statement accurately describes the Slackware Linux distribution?
It is designed for Linux novices.
It has a range of user interfaces and uses RPM.
It is designed for advanced users and uses text-based configuration tools.
It is intended solely for non-profit organizations and uses the Debian package manager.

32        If the kill command is used on a computer running Linux without specifying a signal, which signal is used by default?
SIGEND
SIGCTRLC
SIGKILL
SIGTERM
SIGNAL

33        In Windows 2000 Professional, which of the following functions can a user perform without administrator rights?
add a mapping to a network printer
manage the domain configuration
assign permissions to a user account
manage security policies

34        Which Linux partition generally contains the kernel?
/boot
/
root
swap

35        Which four parts of a Linux file system are often located in dedicated partitions? (Choose four.)
/
/boot
/etc/httpd
/home
/mnt
swap file

36        Which three of the following statements about memory are true? (Choose three.)
RAM is faster than the hard disk of a computer.
Hard disks normally have smaller storage capacity than RAM.
Virtual memory can be used to compensate for a lack of physical memory.
Virtual memory must be managed manually.
A lack of available RAM will impact the performance of a computer.

37        Which of the following commands can be used to specify the user and group ownership of a file?
chown
chgrp
usermod
groupmod
filemod
more

38        Which of the following commands would allow a user to switch from a user account to the root account to execute a program that requires root permissions?
switch
flip
logon
su
jump

39        Which file system type is recommended for a Linux hard disk partition to be used for applications and data?
ext2
ext3
reiser
boot
swap

40        Which two of the following are common Linux super-servers? (Choose two.)
inetd.d
initd.d
inet.d
xinetd.d
xinit.d
xinitd.d

41        Which of the following situations can be addressed by using the fsck command?
A user has been given the job of creating two new partitions on an existing hard drive.
A user must change the permissions on three existing files without changing any existing permissions on the directory where the files are stored.
A user must repair the file structure after an unexpected power failure causes a system to abruptly shut down.
A user must batch create home directories for seven new users.

42        What allows Linux applications to print to non-PostScript printers?
/etc/lpn
Ghostscript
LPRng
/etc/printcap
printtool

43        A technician in a small company has been asked to install Windows 2000 onto a laptop that belongs to a manager. Which installation option should the technician choose?
typical
mobile
custom
portable
compact

44        Which of the following statements is true of NIS?
The NIS domain name must be the same as the Internet DNS domain name.
Changes to the NIS database can be made on any NIS server and will be replicated throughout the system.
Slave servers provide load sharing for the NIS server.
All NIS configuration changes to an NIS client must be performed in an ASCII text editor.
For security purposes, it is recommended that the yppasswd command be used to set a different NIS user password than the one on the local machine.

45        Which two of the following devices are most likely to have drivers that are already compiled into a modern Linux kernel? (Choose two.)
printer
scanner
sound card
software modem
USB device
video card

46        What are two steps in the creation of a Windows 2000 or Windows XP script? (Choose two.)
write the script code and save as ASCII text
make sure the first line of the script defines the scripting language used
compile the script into a bytecode file
compile the script into a binary executable file
save the script with the appropriate filename extension for the scripting language used

47        A technician is setting up a Windows workstation that has an IP address of 192.168.64.23 to work on a network that contains a Linux file server with the IP address 192.168.64.2. What should the technician do to view the IP configuration on the workstation?
run ipconfig /all on the workstation
run ipconfig 192.168.64.23 on the workstation
run ping 192.168.64.2 on the workstation
run ifconfig addr 192.168.64.23 on the server
run ping 192.168.64.23 on the server

48        Which three of the following statements correctly describe topologies? (Choose three.)
The physical topology of a network refers to the path data travels from a source to a destination.
The logical topology of a network refers to the path signals travel from a source to a destination.
A ring topology can refer to either a physical or logical topology.
A logical topology refers to the actual map and layout of a network.
A physical topology describes the actual layout of network devices.

49        What is the name of a free software program that is useful for monitoring security breaches on Linux servers without enhancing security?
3DES
LSAT
PC Guardian
Winzap
PortSentry

50        Which three of the following network configuration parameters can be set during installation? (Choose three.)
IP address
MAC address
file server address
DNS server address
subnet mask
network type

51        Which three of the following file systems can be used to format a Windows NOS partition? (Choose three.)
ext2
FAT
FAT32
HFS
NTFS
vfat

52        What are three important considerations when designing a server? (Choose three.)
monitor screen size
memory requirements
CPU speed
speaker quality
hard disk type
sound card capabilities

53        Why might the administrator of a small company choose Windows 2000 Server instead of Windows 2000 Professional?
The operating system is to run on a dual-processor system.
The system is to act as a DNS server.
The company needs an intranet based on a small web server.
The server will be accessed by up to ten simultaneous users.

54        A technician is given a Windows 2000 computer that apparently has an inoperable modem card. What should the technician do first?
take the case off the computer and make sure the modem card is properly seated in the expansion slot
remove the suspect card and replace it with another one to see if the fault goes away
check in Device Manager to see if there are any icons next to the modem device
left-click on My Computer and then click on Explore to detect any faults within the system
double-click on My Computer and then Dialup Network Connections to determine if Windows recognizes the modem device

55        An instructor in a small college is putting together systems on which students will practice installing Windows 2000 Advanced Server. The instructor has been given 133 MHz Pentium computers with 128 MB of RAM, 2 GB hard drive, and a 12X CD-ROM drive. Which component needs to be upgraded to bring the machines up to the recommended standard for Windows 2000 Advanced Server?
CPU
RAM
hard drive
CD-ROM drive

56        Which command is used to change groups after a user has logged into a system?
newgrp
changegrp
switchgrp
sgrp
chgrp
chgroup

57        The Apache web server has been installed on a Linux server and is being configured. The administrator wishes to change the location of the web pages that will be served to /home/www and knows that the main configuration file contains this directive. What is the name of the file that needs to be edited?
access.conf
apache.conf
httpd.conf
inetd.conf
initd.conf
www.conf

58        Which of the following commands will show a listing of all the Linux commands and a brief description?
man man
man intro
man list
man more
man command

59        Which tool, native to Windows XP, is used to monitor system resources?
SysScan
Performance Tool
XPMON
XP Benchmark Tool
System Safeguard

60        What is the function of the netstat utility?
It displays the manufacturer and version of network devices.
It is the part of the SNMP suite, which collects network usage information.
It is a Linux utility for collecting information about other devices that are connected to a network.
It converts an IP address to a MAC address.
It displays information about a network such as connections, routing tables, and interfaces.

61        When developing a network security plan, what are three factors that should be considered? (Choose three.)
the type of business conducted by the company and any laws pertaining to confidentiality of data
the type of hardware being used by the company
the geographic location and industry ranking of the company
the type of data stored on the company network
the management philosophy and how it is presented to employees

62        What is the System Monitor tool?
It is an MS-DOS utility that displays current CPU usage only.
It is an MS-DOS tool that displays information about the usage of a variety of resources.
It is a tool available in Windows 2000 and XP that will display the current state of a number of system resources in a textual format.
It is a Windows 2000 and XP tool that shows graphically the utilization of a number of system resources over a period of time.

63        The administrator of a Windows 2000 system believes that the reason for the reduced performance of the network is due to the condition of the server’s disks. What Windows 2000 tool can the administrator use to get the most complete information regarding the status of the disks on the server?
Right-click on My Computer and select Properties.
Click on Start > Control Panel > Administrative Tools > Computer Management.
Click on Run and enter msconfig in the text box.
Click Start > Accessories > System Tools > Disk Management.

1 Which area of an application window can have items added or removed by using the View menu item?
menu bar
toolbar*
scroll bar
modify bar

2 Which MS-DOS command shows the hidden files located in the current working directory?
show /hf
show /ah
dir /ah
dir /hidden
show /hidden
dir /h*

3 Which of the following file system types is the most efficient and secure?
FAT
FAT32
FAT64
NTFS*

4 What level of RAID will result in two sets of disks that contain the same information?
RAID 0
RAID 1*
RAID 4
RAID 5

5 In order for a PC to look for a bootable CD-ROM disk first, which boot sequence must be selected in the CMOS?
floppy disk, CD-ROM, hard disk
hard disk, CD-ROM, floppy disk
CD-ROM, floppy disk, hard disk*
floppy disk, hard disk, CD-ROM

6

Examine the list of folders on the left and right sides of this diagram. What has been done to the view on the left to produce the view on the right?
The Accounts folder was expanded.
New folders were created in the Accounts folder.
Data was copied into the Accounts folder.
The Plus key (+) on the keyboard was pressed.

7 Which MS-DOS command removes a directory that contains files and subdirectories?
deldir
rmdr*
del
deltree
ren
erase

8 Which term refers to an auxiliary program that works with a software package to enhance its capabilities?
plug-in*
add-in
snap-on
shell
attachment

9 Which of the following terms refers to the ability of an operating system to automatically switch between running programs?
realtime operation
virtual memory management
multiuser environment
preemptive multitasking*

10 Which of the following are common attributes that can be set for DOS files? (Choose three.)
read-only*
compressed
archive
link
read-write*
system file*

11 After new hardware has been installed in a Windows XP Professional computer, what is the first step performed by the Add Hardware tool found in the Control Panel?
The user is prompted to provide the device model, manufacturer, and appropriate IRQ for the new hardware.
The tool searches for new hardware and provides a list of items that may be installed.*
The user is prompted to provide the location for device drivers and I/O address.
The user is prompted to provide the type of hardware that will be installed, including input, output, storage, and media class.

12 Which of the following is considered to be a type of memory?
BIOS
RAM*
CD-ROM
CPU

13 What does the Alt-Tab key combination allow a user to do?
open a new window for the current application
switch between open applications*
close applications
minimize the current window

14 Which of the following can be used to describe rings on the surface of hard drive disks for data storage?
sectors*
tracks
cylinders
read/write heads

15 Which of the following are examples of word processors? (Choose two.)
Corel WordPerfect
Microsoft Word*
Microsoft Access
Microsoft Excel
PICO
QuickBooks*
16 Which of the following are examples of spreadsheet software applications? (Choose two.)
Microsoft Word
Microsoft Access*
Microsoft Excel*
WordPad
Corel WordPerfect
Lotus 1-2-3

17 Which command adds a permanent IP-to-MAC address map?
mac -s
arp -s*
ipconfig -s
ping -s
rarp -s

18 Which of the following CLI commands can be used to modify the partitions on a hard drive?
format
partition
fdisk*
lboot

19 In Windows 2000, which item in the Control Panel can be selected to determine the processor type and the amount of RAM present?
Administrative Tools
Hardware
Performance
System*

20 Which of the following is primarily an output device?
monitor*
keyboard
processor
mouse
RAM

21 Which of the following command line utilities will test сonnectivity with another host by sending ICMP echo requests and waiting for a reply?
winipcfg
telnet
netstat
ping*
ipconfig
arp

22 Which utility displays TCP/IP configuration information on a Windows 9x computer?
ifconfig
netconfig
winipcfg*
config
ixconfig
23 What will happen if F8 is pressed during the Windows 9x system startup?
The system will shut down and the power will be turned off.
The CMOS login menu will be activated.
A menu of boot options will be displayed.*
Nothing will happen.

24 How many physical partitions can be created on a Windows 9x hard drive?
2*
4
8
23

25 Which type of application software stores numerical data in cells that are arranged in a grid and performs calculations with this data?
text editor
publisher
CAD program
spreadsheet*

26 What happens to a file when it is deleted from a floppy disk by a Windows 9x computer?
A shortcut to the file will be created on the desktop.
The file will be copied to the Recycle Bin.*
The file will be deleted by removing the reference to the file from the file allocation table.
The file will be flagged for deletion, and will be permanently deleted once the floppy disk is removed from the computer.

27 Which utility tests application layer сonnectivity between two devices?
ping*
telnet
netconfig
arp
tracert
netstat

28 Which of the following actions will remove an application window from the desktop and leave an icon on the taskbar?
resize
close
maximize
minimize
hide*
suspend

29 Which of the following is the most common unit of measure for RAM memory?
MB*
MHz
KB
GHz

30 What is the standard size of a sector on a hard drive?
128 bits
512 bytes*
4 KB
2 GB
31 What is one way to change the resolution of a screen?
Right-click the desktop and choose Properties.*
Go to the Control Panel and choose Screen Properties.
Right-click the desktop and choose Graphics Setup.
Go to Start > Programs > Accessories > System Tools > Display Settings.

32

Which button can be clicked once to maximize a window?
A
B
C
D

33 What key should a user press in conjunction with the mouse to select multiple items that are adjacent?
Tab
Alt
Shift*
Windows

34

Which Windows Explorer icon is used to depict a hard disk drive in Windows XP?
A
B
C
D
E

35 Which of the following will open a command prompt in Windows 9x?
Right click on the desktop and select Command Prompt from the drop down list.
Start > Run > type command*
Ctrl + C
Alt + C
Windows Key + C
Ctrl + Alt + C

36 Which of the following MS-DOS commands can be used to delete an empty directory? (Choose three.)
rmdir
rd*
del*
deltree*
ren
erase

37 Which command provides a list of currently active TCP/IP сonnections on a Windows NT/XP/2000 computer?
ping
netstat*
nslookup
tracert
telnet
ipconfig

38 What is one of the ways to start Windows Explorer?
Windows Key-E*
Alt-E
Ctrl-E
Alt-Tab

39 Which of the following are popular Web browsers? (Choose three.)
Mozilla*
Google
Microsoft Internet Explorer*
Netscape Navigator*
Yahoo!
AltaVista

40

Which button will close the window in the diagram with one mouse click?
A
B
C
D

41 When using Windows XP, where should the mouse pointer be placed to change the size of a window?
in the top left corner of the title bar
on any boundary of the window*
in the center of the window
on the scaling button
42 Which file system extension is used by default when saving a new document in Microsoft Word?
txt
wrd
dot
doc*

43 Which type of cable is used to сonnect an internal hard drive to a hard drive controller?
USB
Cat-5
ribbon*
PS/2

44 Which sequence of actions can be used to move a file from its present location to any new location?
right-click file > Cut > select destination > Paste*
right-click file > Move > select destination > Paste
right-click file > Move > select destination
right-click file > Send To > select destination

Мой блог находят по следующим фразам

30 отзыва(-ов) »

  1. [...] Which statement accurately describes a Smurf attack [...]

  2. [...] Which term refers to an auxiliary program that works with a software package to enhance its capabili… [...]

  3. [...] Which three of the following items should be included in a security policy to increase the level of … [...]

  4. [...] Which MS-DOS command removes a directory that contains files and subdirectories? deldir rmdr del del… [...]

  5. [...] "What will happen if F8 is pressed during the Windows 9x system startup?" [...]

  6. [...] Which term refers to an auxiliary program that works with a software package to enhance its capabili… [...]

  7. [...] Which two of the following statements correctly describe audit trails? (Choose two.) [...]

  8. [...] Which of the following is considered good practice when partitioning a hard disk for a new OS? (Choo… [...]

  9. [...] A technician wishes to load Linux onto a new computer system that currently has no operating system … [...]

  10. вы додики ебучие сука я из-за вас скил проебал уебище сууууууууууккаккакаккак!!!!!!!!!!!!!!!!!!!!!!!!!!!!

  11. [...] After new hardware has been installed in a Windows XP Professional computer, what is the first step … [...]

  12. [...] When using Windows XP, where should the mouse pointer be placed to change the size of a window? in t… [...]

  13. [...] What are three important considerations when selecting a Linux distribution? (Choose three.) [...]

  14. [...] Which of the following options best describes the characteristics of an IDS? [...]

  15. [...] Which of the following is the most common unit of measure for RAM memory? MB MHz KB GHz [...]

  16. [...] Which are three reasons a company may choose Linux over Windows as an operating system? [...]

  17. [...] Which three of the following items should be included in a security policy to increase the level of … [...]

  18. [...] Which of the following commands can be used to specify the user and group ownership of a file? [...]

  19. [...] Which two of the following standards describe proper security for usernames and passwords? (Choose t… [...]

  20. [...] Which three of the following options are necessary to protect against the threat of viruses? (Choose… [...]

  21. [...] "Which of the following can be used to describe rings on the surface of hard drive disks for da… [...]

  22. [...] Which directory should be used for decompressing LSAT? [...]

  23. [...] How can a technician change the IP address of a Windows 2000 system? [...]

  24. [...] "According to SANS, which three of the following services are among the top ten security vulner… [...]

  25. [...] A technician is troubleshooting a Windows machine that is not communicating with the network server…. [...]

  26. [...] '' Which two of the following statements are true about Linux scripts? (Choose two.)'&#3… [...]

  27. [...] which of the following statements is true of nis [...]

  28. Емкость в обрешетке (евро-кубы 600л, 800л, 1000л) Закупаем Дорого! после однократного использования, без повреждений, с краном, верхней крышкой, готовы обсудить возможность на постоянной основе, предлагаем вам любую форму оплаты (нал,б/нал) самовывоз, если при необходимости заключаем договор, посредникам проценты, подробнее по т +7 964 787 47 40 !МОСКВА или МО!

  29. [...] standards for proper security for usernames and passwords [...]

  30. [...] which two of the following statements correctly describe audit trails (choose two.) [...]

Оставить отзыв