|
Question 1. Part of a fire protection plan for a computer room should include: A. Procedures for an emergency shutdown of equipment. B. A sprinkler system that exceeds local code requirements. C. The exclusive use of non-flammable materials within the room. D. Fireproof doors that can be easily opened if an alarm is sounded. Answer: A Question 2. What network mapping tool uses ICMP (Internet Control Message Protocol)? A. Port scanner B. Map scanner C. Ping scanner D. Share scanner Answer: C Question 3. Which of the following would be most effective in preventing network traffic sniffing? A. Deploy an IDS (Intrusion Detection System). B. Disable promiscuous mode. C. Use hubs instead of routers. D. Use switches instead of hubs. Answer: D Question 4. A user wants to send an e-mail and ensure that the message is not tampered with while in transit. Which feature of modern cryptographic systems will facilitate this? A. Confidentiality B. Authentication C. Integrity D. Non-repudiation Answer: C Question 5. Which of the following type of attack CANNOT be deterred solely through technical means? A. Dictionary B. Man in the middle C. DoS (Denial of Service) D. Social engineering Answer: D Question 6. An organization is implementing Kerberos as its primary authentication protocol. Which of the following must be deployed for Kerberos to function? A. Dynamic IP (Internet Protocol) routing protocols for routers and servers. B. Separate network segments for the realms. C. Token authentication devices. D. Time synchronization services for clients and servers. Answer: D Question 7. Which of the following is likely to be found after enabling anonymous FTP (File Transfer Protocol) read/write access? A. An upload and download directory for each user. B. Detailed logging information for each user. C. Storage and distribution of unlicensed software. D. Fewer server connections and less network bandwidth utilization. Answer: C Question 8. NetBusand Back Orifice are each considered an example of a(n): A. Virus B. Illicit server C. Spoofing tool D. Allowable server Answer: B Question 9. Which of the following access control models introduces user security clearance and data classification? A. RBAC (Role Based Access Control) B. NDAC (Non-Discretionary Access Control) C. MAC (Mandatory Access Control) D. DAC (Discretionary Access Control) Answer: C Question 10. Why are unique user IDs critical in the review of audit trails? A. They CANNOT be easily altered. B. They establish individual accountability. C. They show which files were changed. D. They trigger corrective controls. Answer: B Question 11. Which of the following would NOT be considered a method for managing the administration of accessibility? A. DAC (Discretionary Access Control) list B. SAC (Subjective Access Control) list C. MAC (Mandatory Access Control) list D. RBAC (Role Based Access Control) list Answer: B Question 12. In which risk assessment stage does the security auditor map the system and resources on a network? A. Penetration B. Cancellation C. Activation D. Discovery Answer: D Question 13. In a typical corporate environment, which of the following resources demands the highest level of security on the network? A. Purchasing B. Engineering C. Sales D. Accounting Answer: D Question 14. What is another term for a network security manager who acts as a potential hacker (a person looking for security loopholes)? A. An agent B. An auditor C. An assessor D. An analyzer Answer: B Question 15. What is the essential element in the implementation of any security plan? A. Testing to make sure any server-side scripts are secure. B. Testing patch levels. C. Proper firewall configuration. D. Auditing Answer: D Question 16. A malicious user has connected to your system and learned that specifics of your operating system, including its current patch levels and the operating system name. What is the term for this type of scanning attack? A. SYN detection B. TCP priming C. Cache poisoning D. Stack fingerprinting Answer: D Question 17. What is the most important step in securing a Web server? A. Logging all HTTP activity. B. Enabling system-wide encryption. C. Placing the operating system, Web server program, and server files on the same partition. D. Placing the operating system, Web server program, and server files on separate partitions. Answer: D Question 18. What is the primary security risk in SNMP? A. Login names and passwords are not encrypted. B. Damaging programs can be executed on the client. C. Damaging programs can be executed on the server. D. Passwords and data are transferred in cleartext. Answer: D Question 19. Lucy is a systems administrator who wants to block all NNTP traffic between her network and the Internet. How should she configure her firewall? A. Configure the firewall to block all incoming and outgoing packets except for those with the source and destination port of 119. Then, allow all traffic with destination ports above 1024 to traverse the firewall. B. Configure the firewall to block all incoming packets with the source port of 119, and outgoing packets with a source port lower than 1024. Then, block all packets with the destination port of 119 and with a source port lower than 1024. C. Configure the firewall to block all incoming packets with the destination port of 119, and to block outgoing packets with the destination port of 119. D. Configure the firewall to block all incoming packets with the source port of 119. Answer: C Question 20. Which port or ports are used for SMTP? A. 20 and 21 B. 25 C. 53 D. 161 and 162 Answer: B
|
Question 1. What is important to implement when providing a non-disruptive IP telephony solution (VoIP)? A. Fabric Shortest Path First (FSPF) B. Packet caching (Pcache) C. Quality of Service (QoS) D. VLAN routing (vlanR) Answer: C Question 2. What is the benefit of using server virtualization technology, such as VMware, in the x86 server environment? A. to maximize the utilization of x86 server resources B. to enable clustering without single-point-of-failure C. to enable failover-failback between x86 processors D. to maximize I/O performance by sharing with multiple servers Answer: D Question 3. Which advantage does fiber optic cable offer over copper cabling? A. lower reliance on hubs and switches B. longer distances C. easier implementation D. lower cost Answer: B Question 4. An engineering drawing firm is planning to upgrade their tape backup systems, but they are constrained by their investment in older tapes. They need systems that will preserve their old data by reading backward two generations. Which tape technology provides read compatibility for two prior generations? Select TWO. A. SDLT B. AIT C. LTO D. DLT E. SLR Answer: C, D Question 5. Which application functionality benefits most from a 64-bit architecture over a 32-bit architecture? A. Clustered DNS Server B. Clustered Print Spooling C. High Performance Computing D. Clustered AutoStore Capturing Answer: C Question 6. Which web-based software solution enables a corporate customer to track PC (business desktop, notebooks and workstations) assets, alerts, diagnostics and SoftPaq distribution across an enterprise environment? A. Altiris Deployment Server B. HP OpenView Helpdesk software C. HP Essentials software D. HP Client Manager tool Answer: D Question 7. Which legacy server platforms have high potential to migrate to the Intel Itanium server platform? Select TWO. A. HP 9000 servers B. HP AlphaServers C. HP ProLiant 300 family servers D. HP ProLiant 900 family servers Answer: A, B Question 8. Which backup method provides the lowest TCO? A. shared SCSI backup B. local SCSI backup C. data replication backup D. automated centralized backup Answer: A Question 9. Which HP 9000 server supports a maximum of two hard partitions? A. rp4440-4 B. rp4440-8 C. rp7420-6 D. rp8420-32 Answer: C Question 10. Which networking security option can be used to authenticate wireless LAN (802.11b/g/a) access? A. VLAN B. DMZ C. RADIUS D. BOOTP Answer: C Question 11. Which disk storage method results in reduced latency and increased performance for data writing? A. JBOD B. RAID 0 C. RAID 1 D. RAID 5 Answer: B
Copyright © 2004 CertsBraindumps.com Inc. All rights reserved.