You have a small network that uses a hub to connect multiple devices. What physical topology is used
Which of the following topologies connects all devices to a trunk cable?
Which of the following cable types often includes a solid plastic core?
Which of the following topologies connects each network device to a central hub?
You have implemented and ad-hoc wireless network that doesn’t employ a wireless access point. Every wireless network card can communicate directly with any other wireless network card on the network.
You want to implement a fault tolerant topology as you interconnect routers on your wide area network. Which of the following would meet your needs?
Which of the following connectors is used with Ethernet 10BaseT networks?
Which of the following topologies connects each device to a neighboring device?
You want to implement a fault tolerant topology as you interconnect routers on your wide area network. Which of these would meet your needs?
You have a small network that uses a hub to connect multiple devices. What physical topology is used?
You are an application developer and are writing a program to exchange video files through a TCP/IP network. You need to select a transport protocol that will guarantee delivery. Which TCP/IP protocol would you implemt that provides this capability?
Transmission Control Protocol-guarantees delivery through error checking and acknowledgements.
Your company has just acquired another company in the same city. You are given the task of integrating the two email systems so that the messages can be exchanged between the email servers. However, each network uses a different vendor
Simple Mail Transfer Protocol-specifies how messages are exchanged between email servers.
which of the following topologies connects all devices to a trunk cable
You have implemented a network where each device provides shared files with all other devices on the network. What type of network do you have?
Which of the following protocols stores email on the mail server and gives users a choice to download mail or keep it on the server?
IMAP4 allows a mail server to hold messages for a client.
You have implemented an ad-hoc wireless network that doesn’t employ a wireless access point. Every wireless network card can communicate directly with any other wireless network card on the network. What type of physical network topology has been implemented in this type of network?
Key characteristicsof mesh- no central connecting point, any host can communicate directly with any other host on the network.
You have been to asked to implement a network infrastructure that will acccommodate failed connections. Which of the following network topologies provides redundancy for a failed link?
What protocol sends email to a mail server
Which of the following is NOT part of security awareness training?
Employee agreement documents
what should you do to increase security of someones account
train users not to use passwords that are easy to guess
require stronger initial password when creating user account
which business document is a contract that defines a set of terms that will govern future agreements between two parties?
Master Service Agreement
Steps in the Change and Configuration Management process
1. Identify the need for change
2. Conduct a feasibility analysis
3. Notify affected parties of the pending change.
4. Implement the change.
5. Test the implementation
6. document the change.
A network utilizes a Network Access Control (NAC) solution to protect against malware. When a wired or wireless host tries to connect to the network, a NAC agent on the host checks it to make sure it has all of the latest operating system updates installed and that the latest antivirus definitions have been applied
Purchasing insurance is what type of response to risk?
Service level agreement
Specifies exactly which services will be preformed by each party
Defines how disputes will be managed
Business process outsourcing
Creates an agreement with a vendor to provide services on an ongoing basis
Specifies a preset discounted pricing structure
Memorandum of understanding
Provides a summary of which party is responsible for performing specific tasks
Documents how the networks will be connected
When analyzing assets, which analysis method assigns financial values to assets?
A security admin needs to run a vulnerability scan that will analyze a system from the perspective of a hacker attacking the organization from the outside.
what type of scan would you use?
In business continuity planning, what is the primary focus of the scope?
what is the most common failure of a security policy in an environment?
Lack of user awareness
what is the best action to take to make remembering passwords easier so that the person doesn’t have to write it dowm?
Implement end-user training
which of the following is defined as a contract which prescribes the technical support or business parameters that a provider will bestow to its client?
Service level agreement
which of the following is an example of privilege escalation?
Which of the following network strategies connects multiple servers together such that if one server fails the other immediately take over its tasks preventing a disruption in service
Communicate vulnerability assessment findings with other party
conduct regular security audits
identify how privacy will be protects
draft an isa
Compare your organizations security policies against the partners poolicies.
disable VPN configurations that allow partner access to your network
Disable the domain trust reationship between networks
Need essay sample on "Failed Test Questions 1,2,3,4,5,12"? We will write a custom essay sample specifically for you for only $ 13.90/page