Filters
Question type

Study Flashcards

A host firewall creates a barrier between networks so potentially harmful packets can't enter or leave the networks that are being protected.

A) True
B) False

Correct Answer

verifed

verified

What command-line utility can you use in Linux to monitor paging?


A) pagemon
B) nbtstat
C) vmstat
D) ifstat

E) A) and C)
F) B) and C)

Correct Answer

verifed

verified

You are testing a new client server application and the application doesn't appear to be communicating successfully between the client and server. All network configuration settings have been verified but since the application is new, you are unsure of all the protocols that are used. What is a good first step in troubleshooting the problem?


A) configure the firewall to use a different profile
B) disable the firewall
C) uninstall and reinstall the application
D) reset the switch and router

E) None of the above
F) B) and D)

Correct Answer

verifed

verified

Which of the following is a partial backup that backs up files that have changed since the last full or incremental backup?


A) differential
B) sequential
C) incremental
D) binary

E) A) and B)
F) C) and D)

Correct Answer

verifed

verified

You have shared a folder on a Windows server and set permissions. What do you need to do next to ensure users can access the share.


A) Nothing, the share can be accessed.
B) Configure the host firewall rules to allow SMB.
C) Configure the host firewall rules to allow ping packets.
D) Configure the host firewall rules to allow file and printer sharing.

E) B) and D)
F) A) and B)

Correct Answer

verifed

verified

You have installed an application on a Linux computer that receives connection-oriented Transport layer segments on port 444 and sends datagrams on port 555. Which two commands should you use to configure the firewall?


A) iptables -A INPUT -p udp -dport 444 -j ACCEPT and iptables -A OUTPUT -p icmp -dport 555 -j ACCEPT
B) iptables -A INPUT -p tcp -dport 444 -j ACCEPT and iptables -A OUTPUT -p udp -dport 555 -j ACCEPT
C) iptables -A OUTPUT -p udp -dport 444 -j ACCEPT and iptables -A INPUT -p tcp -dport 555 -j ACCEPT
D) iptables -A OUTPUT -p tcp -dport 444 -j ACCEPT and iptables -A INPUT -p tcp -dport 555 -j ACCEPT

E) A) and B)
F) A) and C)

Correct Answer

verifed

verified

Under what circumstance should you always let Windows manage the paging file size when running Windows Server 2012 and newer?


A) you are using a dual core processor
B) the paging file is on the boot disk
C) your RAM is less than 4 GB
D) storing the paging file on an SSD

E) A) and B)
F) A) and C)

Correct Answer

verifed

verified

Which command should you use on a Linux system to find and print a list of files that begin with acctg that have been modified in the last 10 days?


A) find -name acctg* -mtime -10 -print
B) search -name acctg* -mod 10 -print
C) find -name *acctg -mod 10 -print
D) search -name *acctg -mtime 10 -print

E) A) and D)
F) A) and C)

Correct Answer

verifed

verified

Which of the following is true about a host firewall?


A) Its primary use is against threats from outside the network.
B) For incoming packets, the destination is usually a network service like file sharing or DNS.
C) It should never be configured to allow packets transmitted by ping.
D) You need to download and install a host firewall on most modern OSs.

E) None of the above
F) A) and B)

Correct Answer

verifed

verified

What firewall rule in Windows Defender with Advanced Security should you configure to block the connection if you don't want the computer to receive ping packets initiated by another computer?


A) Echo Reply - ICMPv4-Out
B) Echo Request - ICMPv4-Out
C) Echo Reply - ICMPv4-In
D) Echo Request - ICMPv4-In

E) A) and D)
F) A) and B)

Correct Answer

verifed

verified

Which of the following is true about Windows Defender Firewall?


A) If a computer detects that it is on a domain, the domain profile is automatically applied.
B) The protocols that Microsoft deems necessary for Windows functionality cannot be disallowed.
C) When the computer boots and detects a new network, Windows selects the public or private profile based on the types of packets it detects.
D) Windows Defender must be enabled after installing Windows and each rule configured manually.

E) A) and D)
F) C) and D)

Correct Answer

verifed

verified

Which of the following is a true statement about rotating backup media?


A) it can protect against media failure
B) you should never have more than one full set of media
C) media rotation is only necessary with tape drives
D) media rotation only happens with hard drives since the platters rotate

E) A) and B)
F) B) and D)

Correct Answer

verifed

verified

You need to configure two servers to use IPsec for secure communication. You will use an authentication method that involves a public entity. What type of authentication will you use?


A) Kerberos
B) digital certificates
C) preshared key
D) multifactor

E) A) and D)
F) All of the above

Correct Answer

verifed

verified

Which backup type backs up the disk sector by sector?


A) file-by-file backup
B) mirror backup
C) image backup
D) differential backup

E) B) and D)
F) A) and B)

Correct Answer

verifed

verified

Which of the following is NOT a credential category for multifactor authentication?


A) Knowledge
B) Possession
C) Disposition
D) Inherence

E) A) and C)
F) B) and C)

Correct Answer

verifed

verified

Which of the following is NOT a facet of securing data on a computer?


A) authentication and authorization
B) data compression
C) encryption
D) malware protection

E) A) and B)
F) A) and C)

Correct Answer

verifed

verified

Which of the following is NOT a network category for determining the Windows Defender Firewall profile applied?


A) domain
B) private
C) public
D) host only

E) A) and B)
F) B) and D)

Correct Answer

verifed

verified

You are configuring a network in which remote access clients will access the network using different entry points such as through Wifi and VPN. You need a convenient authentication system to handle this. Which of the following is a good choice?


A) MS-CHAP
B) Kerberos
C) PAP
D) RADIUS

E) A) and B)
F) A) and C)

Correct Answer

verifed

verified

Which of the following is NOT a guideline of a security policy?


A) easy for users to understand
B) should be enforceable
C) uses legal terminology to protect the organization
D) clearly states the policy objectives

E) None of the above
F) All of the above

Correct Answer

verifed

verified

You have been experiencing disk space shortages on your Windows 10 computer periodically and you have had to manually find and delete old temporary and downloaded files. You want this task to occur automatically. What is the fastest approach to meet this requirement?


A) Write a batch file.
B) Enable Storage Sense.
C) Configure Storage Spaces.
D) Buy a program.

E) B) and D)
F) B) and C)

Correct Answer

verifed

verified

Showing 21 - 40 of 46

Related Exams

Show Answer