logo image

Failed Test Questions 1,2,3,4,5,12

You have a small network that uses a hub to connect multiple devices. What physical topology is used
Star
Which of the following topologies connects all devices to a trunk cable?
Bus
Which of the following cable types often includes a solid plastic core?
Cat 6
Which of the following topologies connects each network device to a central hub?
Star
You have implemented and ad-hoc wireless network that doesn’t employ a wireless access point. Every wireless network card can communicate directly with any other wireless network card on the network.
Mesh
You want to implement a fault tolerant topology as you interconnect routers on your wide area network. Which of the following would meet your needs?
Mesh
Which of the following connectors is used with Ethernet 10BaseT networks?
RJ-45
Which of the following topologies connects each device to a neighboring device?
ring
You want to implement a fault tolerant topology as you interconnect routers on your wide area network. Which of these would meet your needs?
Mesh
You have a small network that uses a hub to connect multiple devices. What physical topology is used?
Star
You are an application developer and are writing a program to exchange video files through a TCP/IP network. You need to select a transport protocol that will guarantee delivery. Which TCP/IP protocol would you implemt that provides this capability?
T.C.P
Transmission Control Protocol-guarantees delivery through error checking and acknowledgements.
Your company has just acquired another company in the same city. You are given the task of integrating the two email systems so that the messages can be exchanged between the email servers. However, each network uses a different vendor
SMTP
Simple Mail Transfer Protocol-specifies how messages are exchanged between email servers.
which of the following topologies connects all devices to a trunk cable
Bus
You have implemented a network where each device provides shared files with all other devices on the network. What type of network do you have?
Peer-to-peer
Which of the following protocols stores email on the mail server and gives users a choice to download mail or keep it on the server?
IMAP4
IMAP4 allows a mail server to hold messages for a client.
You have implemented an ad-hoc wireless network that doesn’t employ a wireless access point. Every wireless network card can communicate directly with any other wireless network card on the network. What type of physical network topology has been implemented in this type of network?
Mesh
Key characteristicsof mesh- no central connecting point, any host can communicate directly with any other host on the network.
You have been to asked to implement a network infrastructure that will acccommodate failed connections. Which of the following network topologies provides redundancy for a failed link?
Mesh
What protocol sends email to a mail server
SMTP
Which of the following is NOT part of security awareness training?
Employee agreement documents
what should you do to increase security of someones account
train users not to use passwords that are easy to guess
require stronger initial password when creating user account
which business document is a contract that defines a set of terms that will govern future agreements between two parties?
Master Service Agreement
Steps in the Change and Configuration Management process
1. Identify the need for change
2. Conduct a feasibility analysis
3. Notify affected parties of the pending change.
4. Implement the change.
5. Test the implementation
6. document the change.
A network utilizes a Network Access Control (NAC) solution to protect against malware. When a wired or wireless host tries to connect to the network, a NAC agent on the host checks it to make sure it has all of the latest operating system updates installed and that the latest antivirus definitions have been applied
Posture assesment
Purchasing insurance is what type of response to risk?
transference
SLA
Service level agreement
Specifies exactly which services will be preformed by each party
Defines how disputes will be managed
BPO
Business process outsourcing
Creates an agreement with a vendor to provide services on an ongoing basis
Specifies a preset discounted pricing structure
MOU
Memorandum of understanding
Provides a summary of which party is responsible for performing specific tasks
ISA
Documents how the networks will be connected
When analyzing assets, which analysis method assigns financial values to assets?
Quantitative
A security admin needs to run a vulnerability scan that will analyze a system from the perspective of a hacker attacking the organization from the outside.
what type of scan would you use?
Non-credentialed scan
In business continuity planning, what is the primary focus of the scope?
Business process
what is the most common failure of a security policy in an environment?
Lack of user awareness
what is the best action to take to make remembering passwords easier so that the person doesn’t have to write it dowm?
Implement end-user training
which of the following is defined as a contract which prescribes the technical support or business parameters that a provider will bestow to its client?
Service level agreement
which of the following is an example of privilege escalation?
Creeping priviliges
Which of the following network strategies connects multiple servers together such that if one server fails the other immediately take over its tasks preventing a disruption in service
Clustering
Ongoing operations
Communicate vulnerability assessment findings with other party
conduct regular security audits
Onboarding
identify how privacy will be protects
draft an isa
Compare your organizations security policies against the partners poolicies.
Off boarding
disable VPN configurations that allow partner access to your network
Disable the domain trust reationship between networks

Need essay sample on "Failed Test Questions 1,2,3,4,5,12"? We will write a custom essay sample specifically for you for only .90/page

Can’t wait to take that assignment burden offyour shoulders?

Let us know what it is and we will show you how it can be done!
×
Sorry, but copying text is forbidden on this website. If you need this or any other sample, please register
Signup & Access Essays

Already on Businessays? Login here

No, thanks. I prefer suffering on my own
Sorry, but copying text is forbidden on this website. If you need this or any other sample register now and get a free access to all papers, carefully proofread and edited by our experts.
Sign in / Sign up
No, thanks. I prefer suffering on my own
Not quite the topic you need?
We would be happy to write it
Join and witness the magic
Service Open At All Times
|
Complete Buyer Protection
|
Plagiarism-Free Writing

Emily from Businessays

Hi there, would you like to get such a paper? How about receiving a customized one? Check it out https://goo.gl/chNgQy