Название: CompTIA Network+ Practice Tests
Автор: Craig Zacker
Издательство: John Wiley & Sons Limited
Жанр: Зарубежная компьютерная литература
isbn: 9781119807315
isbn:
61 In a standard Cisco network diagram, what component does the symbol in the figure represent?A switchA routerA hubA gateway
62 Which of the following is the term used to describe a wiring nexus—typically housed in a closet—where horizontal networks meet the backbone?MDFMTBFIDFSLAMOU
63 What is the width of a standard equipment rack in a datacenter?12 inches16 inches19 inches24 inches
64 In a standard Cisco network diagram, what component does the symbol in the figure represent?A switchA routerA hubA gateway
65 The precise locations of devices in a datacenter are typically documented in which of the following documents?Rack diagramNetwork mapWiring schematicLogical diagramBusiness continuity planAudit and assessment report
66 Which of the following statements about network maps is true?Network maps are typically drawn to scale.Network maps typically contain more information than network diagrams.Network maps must be read/write accessible to all personnel working on the network.Network maps diagram only the locations of cable runs and endpoints.
67 Which of the following types of documentation should contain the chemical composition of all cleaning compounds used in a datacenter?ESDMSDSNDABYODSOP
68 After being hired for a job as an IT administrator, you have been assigned two user accounts, one of which is intended for general use and the other only for administrative tasks. You are also required to sign an agreement that outlines the restrictions for your account use. Specifically, you are not permitted to use the administrative account for anything other than administrative tasks, including browsing the Internet and accessing data for which you are not authorized. Which of the following is the best name for this type of agreement?Remote access policiesService level agreementAcceptable use policyPrivileged user agreement
69 You are working for a company with numerous branch offices scattered around the country, and you are required to travel to these offices frequently. Each branch office has some means of accessing the network at the company headquarters. Some use frame relay, some use Virtual Private Networks (VPNs), and a few even use dial-in access. During one trip, you mention to a branch office manager that you intend to connect to the headquarters network that night from your hotel room. The manager warns you that this is against company policy, but you are not so sure. Where in the company documentation should you look to confirm this?Remote access policiesService level agreementAcceptable use policyPrivileged user agreement
70 Which of the following is a document that a company's new hires might want to consult to determine whether they are permitted to install their own personal software on company computers?SLAAUPNDABYOD
71 Many employees have been contacting the IT help desk asking how they can connect their personal smartphones and tablets to the company's wireless network. This has raised issues regarding network security and technical support. You have been asked to draft a policy for the in-house use of personal electronics that addresses these issues. Which of the following describes the document that you will be creating?SLAAUPNDABYOD
72 You are going to work for a new company as a software developer, and Human Resources (HR) has notified you that you must sign a document guaranteeing that you will maintain confidentiality about the company's products and programming code in perpetuity. Which of the following documents contains this agreement?SLAAUPNDAMOUBYOD
73 Which of the following are typical elements of a corporate password policy? (Choose all that apply.)Minimum password lengthUse of special charactersUnique passwordsFrequent password changes
74 Alice is implementing a new password policy that requires all users to change their passwords every seven days. What further modification can she make to the password policy to prevent users from thwarting the password change requirement?Specify a minimum password lengthRequire the use of special charactersRequire the creation of unique passwordsSpecify a maximum password change interval
75 Which of the following are settings typically included in an account lockout policy? (Choose all that apply.)Account lockout durationTime allowed between attemptsAccount lockout thresholdReset account lockout threshold counter
76 How do account lockouts help to prevent intruders from cracking passwords?By forcing users to select passwords of a minimum lengthBy preventing users from entering incorrect passwords more than a specified number of timesBy preventing users from reusing the same passwordsBy requiring an additional authentication method, such as a fingerprint
77 Which of the following data loss prevention terms is used to describe dangers pertaining to data that is being transmitted over a network? (Choose all that apply.)Data in useData at restData in motionData in transit
78 Which of the following data loss prevention terms is used to describe dangers pertaining to data while a user is loading it into an application?Data in useData at restData in processData in motion
79 Which of the following data loss prevention terms is used to describe potential dangers of data loss or data leakage to unauthorized parties while the data is stored without being used?Data in useData at restData in motionData on disk
80 Which of the following is not one of the standard terms used in data loss prevention?Data onlineData at restData in motionData in use
81 The terms on-boarding and off-boarding are typically associated with which of the following policies?Data loss preventionIncident responseInventory managementIdentity managementDisaster recoveryBusiness continuity
82 The term off-boarding refers to which of the following procedures?Removing a node from a clusterDisconnecting all cables from a switchRevoking a user's network privilegesRetiring old workstations
83 Which of the following is most likely to be the last step in a change management procedure?DocumentationNotificationApprovalScheduling
84 Which of the following U.S. organizations are capable of imposing international export controls on software products? (Choose all that apply.)The company that created the softwareDepartment of StateDepartment of CommerceDepartment of the Treasury
85 Which of the following is the primary result of an organization's security incident response policies?To know how to respond to a particular incidentTo prevent an incident from occurring againTo identify the cause of an incidentTo document the procedures leading up to an incident
86 You are an IT director, and a fire has broken out in the lower floors of your company's office building. After the personnel are evacuated, the fire department asks you where they can find documentation about all chemicals and equipment used in the company's datacenter, which is threatened by the fire. You direct them to the correct filing cabinet in your office, which contains which of the following document types?ESDNDABYODMSDS
87 You have been asked to draft an Acceptable Use Policy (AUP) for new hires at your company to sign, which specifies what they can and cannot do when working with the company's computers and network. Which of the following is not one of the provisions typically found in this type of document?PrivacyOwnershipIllegal useUpgrades
88 You are starting a new job, and the company's Human Resources (HR) department has asked you to sign an Acceptable Use Policy (AUP) regarding computer and network use. The document includes a privacy clause. Which of the СКАЧАТЬ