Craig Zacker - CompTIA Network+ Practice Tests

Здесь есть возможность читать онлайн «Craig Zacker - CompTIA Network+ Practice Tests» — ознакомительный отрывок электронной книги совершенно бесплатно, а после прочтения отрывка купить полную версию. В некоторых случаях можно слушать аудио, скачать через торрент в формате fb2 и присутствует краткое содержание. Жанр: unrecognised, на английском языке. Описание произведения, (предисловие) а так же отзывы посетителей доступны на портале библиотеки ЛибКат.

CompTIA Network+ Practice Tests: краткое содержание, описание и аннотация

Предлагаем к чтению аннотацию, описание, краткое содержание или предисловие (зависит от того, что написал сам автор книги «CompTIA Network+ Practice Tests»). Если вы не нашли необходимую информацию о книге — напишите в комментариях, мы постараемся отыскать её.

Assess and improve your networking skillset with proven Sybex practice tests  In the freshly revised Second Edition of 
, IT expert and author Craig Zacker delivers a set of accessible and useful practice tests for the updated Network+ Exam N10-008. You’ll prepare for the exam, learn the information you need in an industry interview, and get ready to excel in your first networking role. 
These practice tests will gauge your skills in deploying wired and wireless devices; understanding network documentation and the purpose of network services; work with datacenter, cloud, and virtual networking concepts; monitor network activity; and more. 
Further, this book offers: 
Comprehensive coverage of all five domain areas of the updated Network+ exam, including networking fundamentals, implementations, operations, security, and troubleshooting Practical and efficient preparation for the Network+ exam with hundreds of domain-by-domain questions Access to the Sybex interactive learning environment and online test bank Perfect for anyone preparing for the CompTIA Network+ Exam N10-008, the 
 is also an indispensable resource for network administrators seeking to enhance their skillset with new, foundational skills in a certification endorsed by industry leaders around the world.

CompTIA Network+ Practice Tests — читать онлайн ознакомительный отрывок

Ниже представлен текст книги, разбитый по страницам. Система сохранения места последней прочитанной страницы, позволяет с удобством читать онлайн бесплатно книгу «CompTIA Network+ Practice Tests», без необходимости каждый раз заново искать на чём Вы остановились. Поставьте закладку, и сможете в любой момент перейти на страницу, на которой закончили чтение.

Тёмная тема
Сбросить

Интервал:

Закладка:

Сделать

73 Which of the following are typical elements of a corporate password policy? (Choose all that apply.)Minimum password lengthUse of special charactersUnique passwordsFrequent password changes

74 Alice is implementing a new password policy that requires all users to change their passwords every seven days. What further modification can she make to the password policy to prevent users from thwarting the password change requirement?Specify a minimum password lengthRequire the use of special charactersRequire the creation of unique passwordsSpecify a maximum password change interval

75 Which of the following are settings typically included in an account lockout policy? (Choose all that apply.)Account lockout durationTime allowed between attemptsAccount lockout thresholdReset account lockout threshold counter

76 How do account lockouts help to prevent intruders from cracking passwords?By forcing users to select passwords of a minimum lengthBy preventing users from entering incorrect passwords more than a specified number of timesBy preventing users from reusing the same passwordsBy requiring an additional authentication method, such as a fingerprint

77 Which of the following data loss prevention terms is used to describe dangers pertaining to data that is being transmitted over a network? (Choose all that apply.)Data in useData at restData in motionData in transit

78 Which of the following data loss prevention terms is used to describe dangers pertaining to data while a user is loading it into an application?Data in useData at restData in processData in motion

79 Which of the following data loss prevention terms is used to describe potential dangers of data loss or data leakage to unauthorized parties while the data is stored without being used?Data in useData at restData in motionData on disk

80 Which of the following is not one of the standard terms used in data loss prevention?Data onlineData at restData in motionData in use

81 The terms on-boarding and off-boarding are typically associated with which of the following policies?Data loss preventionIncident responseInventory managementIdentity managementDisaster recoveryBusiness continuity

82 The term off-boarding refers to which of the following procedures?Removing a node from a clusterDisconnecting all cables from a switchRevoking a user's network privilegesRetiring old workstations

83 Which of the following is most likely to be the last step in a change management procedure?DocumentationNotificationApprovalScheduling

84 Which of the following U.S. organizations are capable of imposing international export controls on software products? (Choose all that apply.)The company that created the softwareDepartment of StateDepartment of CommerceDepartment of the Treasury

85 Which of the following is the primary result of an organization's security incident response policies?To know how to respond to a particular incidentTo prevent an incident from occurring againTo identify the cause of an incidentTo document the procedures leading up to an incident

86 You are an IT director, and a fire has broken out in the lower floors of your company's office building. After the personnel are evacuated, the fire department asks you where they can find documentation about all chemicals and equipment used in the company's datacenter, which is threatened by the fire. You direct them to the correct filing cabinet in your office, which contains which of the following document types?ESDNDABYODMSDS

87 You have been asked to draft an Acceptable Use Policy (AUP) for new hires at your company to sign, which specifies what they can and cannot do when working with the company's computers and network. Which of the following is not one of the provisions typically found in this type of document?PrivacyOwnershipIllegal useUpgrades

88 You are starting a new job, and the company's Human Resources (HR) department has asked you to sign an Acceptable Use Policy (AUP) regarding computer and network use. The document includes a privacy clause. Which of the following are specifications you can expect to find in this clause? (Choose all that apply.)Any emails you send or receive can be monitored by the company at any time.All files and data that you store on company computers must be accessible to the company for scanning and monitoring.All work that you perform for the company becomes the sole property of the company, including copyrights and patents.All hardware, software, and any proprietary data stored on the company's computers remains the property of the company.

89 Which of the following tasks is not considered to be part of an IT department's incident response plan?Stopping an ongoing incidentContaining the damage caused by an incidentRepairing the damage caused by an incidentRebuilding an infrastructure destroyed by an incident

90 Which of the following are occurrences that are typically addressed by an IT department's incident response policies? (Choose all that apply.)Denial-of-Service (DoS) attackHard disk failureElectrical fireServer outage

91 Which of the following terms would apply to the procedure of adding a user's personal smartphone to the network under a Bring Your Own Device (BYOD) policy?Out-of-bandOn-boardingIn-bandOff-boarding

92 Your company has been acquired by another firm and, as IT director, you will have to comply with the new firm's safety policies in your datacenter and other IT workspaces. One of the new requirements states that there must be a fail closed policy for the datacenter. Which of the following best describes what this policy dictates should occur in the event of an emergency?All computers that are logged on should automatically log off.All computers that are running should automatically shut down.All doors that are normally open should lock themselves.All doors that are normally locked should open themselves.

93 You are the first responder to an incident of computer crime at your company. The datacenter's security has been penetrated, a server accessed, and sensitive company data stolen. The company's incident response plan lists the specific tasks that you are responsible for performing. Which of the following are likely to be among those tasks? (Choose all that apply.)Turn off the server.Secure the area.Document the scene.Collect evidence.Cooperate with the authorities.

94 Password policies frequently require users to specify complex passwords. Which of the following are characteristic of a complex password?Passwords that contain mixed upper- and lowercase letters, numbers, and symbolsPasswords that exceed a specific lengthPasswords that do not duplicate a specific number of the user's previous passwordsPasswords that do not duplicate the user's account name, birth date, or other personal information

95 Password policies that contain a history requirement typically have which of the following limitations?Users cannot reuse recent passwords.Users cannot create passwords containing names of relatives.Users cannot create passwords containing names of historical figures.Users cannot create passwords that duplicate those of any other users on the network.

96 Account lockout policies are designed to protect against which of the following types of attacks?Social engineeringSpoofingBrute forceMan in the middle

97 Which of the following types of password policies are designed to prevent brute-force attacks? (Choose all that apply.)Password length policiesAccount lockout policiesPassword history policiesComplex password policies

98 Which of the following is not likely to be a procedural element of an IT asset disposal policy?Data deletionRecyclingData preservationInventory

99 While negotiating a new contract with a service provider, you have reached a disagreement over the contracted reliability of the service. The provider is willing to guarantee that the service will be available 99 percent of the time, but you have been told to require 99.9 percent. When you finally reach an agreement, the negotiated language will be included in which of the following documents?SLAAUPNDABYOD

Читать дальше
Тёмная тема
Сбросить

Интервал:

Закладка:

Сделать

Похожие книги на «CompTIA Network+ Practice Tests»

Представляем Вашему вниманию похожие книги на «CompTIA Network+ Practice Tests» списком для выбора. Мы отобрали схожую по названию и смыслу литературу в надежде предоставить читателям больше вариантов отыскать новые, интересные, ещё непрочитанные произведения.


Отзывы о книге «CompTIA Network+ Practice Tests»

Обсуждение, отзывы о книге «CompTIA Network+ Practice Tests» и просто собственные мнения читателей. Оставьте ваши комментарии, напишите, что Вы думаете о произведении, его смысле или главных героях. Укажите что конкретно понравилось, а что нет, и почему Вы так считаете.

x