MCQQ
MCQQ
MCQQ
You have a machine with two hard disk and you add an extra 100 GB hard disk for a specific
Client-Server application to run on, because the application gets very slow returning query
data. You want to have the fastest possible access for the Client-Server App to the HDD's.
Which Raid should you apply?
• (A) RAID0
• (B) RAID1
• (C) RAID5
• (D) RAID2
You have a machine with two hard disk and you add an extra 100 GB hard disk for a specific
Client-Server application to run on, because the application gets very slow returning query
data. You want to have the fastest possible access for the Client-Server App to the HDD's.
Which Raid should you apply?
• (A) RAID0
• (B) RAID1
• (C) RAID5
• (D) RAID2
You are configuring a Windows 2000 Server computer as a Routing and Remote Access server
for a Branch office. You discover that an incorrect driver was installed during the installation
of the modem. You attempt to remove the modem by using Phone and Modem Options in
Control Panel. After each attempt to remove the modem by using this method, the computer
stops responding. You restart the computer again. You must install the correct driver for the
modem as quickly as possible. What should you do?
• (A) Use the Add/Remove Hardware wizard to uninstall the modem. Restart the server
• (B) Shut down the server, remove the modem card, and restart the server. Shut down the
server again, insert the modem card, and restart the server
• (C) Delete all references to modems in the registry
• (D) Run the Modem troubleshooter and remove the modem when prompted. Restart the
server
You are configuring a Windows 2000 Server computer as a Routing and Remote Access server
for a Branch office. You discover that an incorrect driver was installed during the installation
of the modem. You attempt to remove the modem by using Phone and Modem Options in
Control Panel. After each attempt to remove the modem by using this method, the computer
stops responding. You restart the computer again. You must install the correct driver for the
modem as quickly as possible. What should you do?
• (A) Use the Add/Remove Hardware wizard to uninstall the modem. Restart the server
• (B) Shut down the server, remove the modem card, and restart the server. Shut down the
server again, insert the modem card, and restart the server
• (C) Delete all references to modems in the registry
• (D) Run the Modem troubleshooter and remove the modem when prompted. Restart the
server
Which of the following is not an advantage of
NAS?
• A NAS has lower latency and higher reliability than a SAN.
• A NAS typically supports multiple RAID methods.
• A NAS supports high throughput.
• Implementing a NAS is inexpensive
Which of the following is not an advantage of
NAS?
• A NAS has lower latency and higher reliability than a SAN.
• A NAS typically supports multiple RAID methods.
• A NAS supports high throughput.
• Implementing a NAS is inexpensive
Ans( HBAs have World Wide Names (WWNs) that identify them, much
like MAC addresses.)
Which of the following is not a part of
hardening the system?
RAID 0 is also known as disk striping. This is RAID that doesn't provide fault tolerance. Data
is written across multiple drives, so one drive can be reading or writing while the next
drive's read/write head is moving. This makes for faster data access. However, if any one
of the drives fails, all content is lost.
Which RAID type is also called mirroring?
• RAID 0
• RAID 1
• RAID 3
• RAID 5
Which RAID type is also called mirroring?
• RAID 0
• RAID 1
• RAID 3
• RAID 5
Which server role automates the process of providing an IP configuration to devices
in the
network?
• DNS
• Routing and Remote Access
• DHCP
• NTP
Which server role automates the process of providing an IP configuration to devices
in the
network?
• DNS
• Routing and Remote Access
• DHCP
• NTP
Which of the following protocols is used
when mail servers send email?
• POP3
SMTP
SNMP
IMAP4
Which of the following protocols is used
when mail servers send email?
• POP3
SMTP
SNMP
IMAP4
Which of the following describes a drive that needs to be disconnected from the
software in the server before begin changed out and then reconnected after the
swap is done?
• Hot pluggable
• Warm pluggable
• Cold pluggable
• Hot swappable
Which of the following describes a drive that needs to be disconnected from the
software in the server before begin changed out and then reconnected after the
swap is done?
• Hot pluggable
• Warm pluggable
• Cold pluggable
• Hot swappable
Which type of fault tolerance is recommended for servers running applications that do not
have long-running in-memory state or frequently updated data?
• Load balancing
• Hot site
• Clustering
• Cold site
Which type of fault tolerance is recommended for servers running applications that do not
have long-running in-memory state or frequently updated data?
• Load balancing
• Hot site
• Clustering
• Cold site
Which server role uses HTTP as its transfer
mechanism?
• Web
• Application
• Directory
• Database
Which server role uses HTTP as its transfer
mechanism?
• Web
• Application
• Directory
• Database
Which of the following are the software stubs that allow devices to communicate
with the operating system?
• A. Drivers
• B. Patches
• C. Shims
• D. Manifests
Which of the following are the software stubs that allow devices to communicate
with the operating system?
• A. Drivers
• B. Patches
• C. Shims
• D. Manifests
Which authentication mechanism is an
example of something you have?
• A. Password
• B. Username
• C. Smart card
• D. Retina scan
Which authentication mechanism is an
example of something you have?
• A. Password
• B. Username
• C. Smart card
• D. Retina scan
• Ans(The tags can be of two types: passive and active. Active tags have batteries whereas
passive tags receive their energy from the reader when the reader interrogates the
device. As you would expect, the passive tags are cheaper but have a range of only a few
meters and the active tags are more expensive but can transmit up to a hundred meters.)
Which of the following offers the most flexibility in reacting to security
events?
• A. Cameras
• B. Security guards
• C. Motion sensors
• D. Intrusion prevention systems
Which of the following offers the most flexibility in reacting to security
events?
• A. Cameras
• B. Security guards
• C. Motion sensors
• D. Intrusion prevention systems
• A. Network
• B. Data link
• C. Session
• D. Transport
You have two devices that are connected to the same switch with IP addresses in the
same network. After placing the two devices in separate VLANs, they can no longer
ping one another. At what layer of the OSI model are the VLANs providing
separation?
• A. Network
• B. Data link
• C. Session
• D. Transport
• Ans (When discussing network security, an endpoint is any point of entry into the network.
A typical example of an endpoint is a laptop connected to the network with a remote access
connection. Therefore, the process of providing endpoint security is the process of ensuring
that every endpoint (including servers) has been secured in the same way in which you
would secure the network gateway.)
Which of the following can read the individual commands of the protocols that are
being served?
• A. Stateful firewall
• B. Packet filtering firewall
• C. Application-level proxy
• D. Host-based firewall
Which of the following can read the individual commands of the protocols that are
being served?
• A. Stateful firewall
• B. Packet filtering firewall
• C. Application-level proxy
• D. Host-based firewall
• Ans(The proxy function can occur at either the application level or the
circuit level. Application-level proxy functions read the individual
commands of the protocols that are being served. This type of server
is advanced and must know the rules and capabilities of the protocol
used.)
In which of the following devices are records kept using a table that tracks every
communications
channel?
• A. Stateful firewall
• B. Packet filtering firewall
• C. Application-level proxy
• D. Host-based firewall
In which of the following devices are records kept using a table that tracks every
communications
channel?
• A. Stateful firewall
• B. Packet filtering firewall
• C. Application-level proxy
• D. Host-based firewall
• Ans(If traffic matches a rule, the action specified by the rule will be
applied, and no other rules will be read.)
Which of the following is true of the
requirements to use SSL on a website?
• A. The web server must have a certificate.
• B. The client must have a certificate.
• C. The web server and the client must have a certificate.
• D. Neither the web server nor the client must have a certificate.
Which of the following is true of the
requirements to use SSL on a website?
• A. The web server must have a certificate.
• B. The client must have a certificate.
• C. The web server and the client must have a certificate.
• D. Neither the web server nor the client must have a certificate.
• A. Set the minimum number of MAC addresses that can be seen on a port.
• B. Take a specific action when a port violation occurs.
• C. Define exactly which MAC addresses are allowed on the port.
• D. Set the maximum number of MAC addresses that can be seen on a port.
• A. Network
• B. Data link
• C. Session
• D. Transport
You have two devices that are connected to the same switch with IP addresses in the
same network. After placing the two devices in separate VLANs, they can no longer
ping one another. At what layer of the OSI model are the VLANs providing
separation?
• A. Network
• B. Data link
• C. Session
• D. Transport
• A. POP3
• B. Telnet
• C. RDP
• D. IMAP
Which of the following has lost favor to SSH because it sends data—
including passwords— in plain-text format?
• A. POP3
• B. Telnet
• C. RDP
• D. IMAP