This practice test, titled '3C051 Set 2, Volume 3 CDC Practice Test,' evaluates knowledge on network management architectures and activities. It assesses skills in identifying efficient software solutions and troubleshooting network issues, crucial for productivity in IT environments.
Token
Smart card
Private key
Session key
Rate this question:
Degaussing
Overwriting
Formatting
Deleting
Rate this question:
Centralized
Distributed
Hierarchial
Hybrid
Rate this question:
Monitoring and analyzing
Monitoring and replacing
Monitoring and tuning
Analyzing and tuning
Rate this question:
Configuration management
Performance management
Accounting management
Security management
Rate this question:
To ensure users don't create vulnerability by leaving the default password in place
To ensure users understand how to create a password
To ensure the integrity of each user's unique password
To ensure users remember their unique password
Rate this question:
Full control
Change
Write
Read
Rate this question:
Get
Set
Trap
GetNext
Rate this question:
Minimum of nine characters consisting of at least two upper and lower case letters and numbers
Minimum of nine characters consisting of at least two upper and lowercase letterrs, numbers, and special characters
Minimum of fifteen characters consisting of at least two upper and lowercase letters and two special characters
Minimum of fifteen characters consisting of at least two upper and lowercase letters, two numbers, and two special characters
Rate this question:
Rank
Duty hours
Job position
Time on station
Rate this question:
Jabbers
Dribbles
Collisions
Network storm
Rate this question:
Something you know
Something you have
Something you need
Something you read
Rate this question:
Tunneling
Identification spoofing
Application-based attacks
Second message encryption
Rate this question:
TCP/IP
SMTP
X.400
X.500
Rate this question:
Centralized, hierarchial, and distributed
Centralized, hierarchial, and hybrid
Hybrid, hierarchial, and distributed
Centralized, hybrid, and distributed
Rate this question:
Tuning
Analyzing
Gathering
Monitoring
Rate this question:
Network management controller
Domain controller
Stand-alone server
Member server
Rate this question:
Full control
No access
Change
Write
Rate this question:
NTBOOTDD.SYS and BOOTSECT.DOS
BOOTSECT.DOS and NTDETECT.COM
BOOT.INI and NTDETECT.COM
BOOT.INI and NTBOOTDD.SYS
Rate this question:
What is the size of the network?
Where is the network map?
Who are critical users?
What services are down?
Rate this question:
Automatically and proactively
Manually and automatically
Reactively and proactively
Reactively and manually
Rate this question:
Loopback
CTS/RTS
Transmission trace
Self-test diagnostic
Rate this question:
TCPCONFIG
WINIPCFG
IPCONFIG
TRACERT
Rate this question:
Fault management server
Security management server
Network management server
Performance management server
Rate this question:
Local group
Global group
Built-in group
Everyone group
Rate this question:
Poll
Push
Alarm
Notification
Rate this question:
Jabbers only
Inability to transmit
High utilization only
High utilization or jabbers
Rate this question:
20 percent
25 percent
30 percent
40 percent
Rate this question:
Send and Echo
PING and Echo
Tracert
PING and Tracert
Rate this question:
126.0.0.1
127.0.0.1
128.0.0.1
129.0.0.1
Rate this question:
Authentication
Accreditation
Risk analysis
Certification
Rate this question:
Configuration management
Performace management
Accounting management
Security management
Rate this question:
42,293
48,800
56,498
65.535
Rate this question:
Authentication
Recertification
Accredidation
Identification
Rate this question:
Step 1: Know thyself
Step 2: Determine requirements
Step 3: Policy formation
Step 5: Network Monitoring
Rate this question:
Centralized
Distributed
Hierarchial
Hybrid
Rate this question:
For bettter documentation development
To effectively eliminate ideas not the problem
To ensure all personnel are informed of the results
Isolate a definite cause if the action fixes the problem
Rate this question:
Network management software
Intrusion detection devices
Vulnerability scanners
Proxy firewalls
Rate this question:
Global group permissions
Everyone group permissions
No permissions are automatically assigned
Inherited permissions of the folder it is contained in
Rate this question:
Reducing the file space per user
Reducing the available hours of use
Limiting the access time of typical users
Routinely running defragmentation software
Rate this question:
Failure to accurately observe and thoroughly document the results of their individual efforts
Lack of communication during the troubleshooting process
Troubleshooting mulitple possibilities at one time
Failure to interview the users
Rate this question:
Ack
Cor
Source
Severity
Rate this question:
Token
Public key
Private key
Session key
Rate this question:
DOD CERT
AFCERT
HQ AIA
DISA
Rate this question:
Primary domain controller
Backup domain controller
Manager
Agent
Rate this question:
BOOT.IOS
ROOT.SYS
Boot kernel
System kernel
Rate this question:
Blue
Purple
Orange
Yellow
Rate this question:
Local
Global
Universal
Domain Local
Rate this question:
Quiz Review Timeline (Updated): Mar 21, 2023 +
Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.
Wait!
Here's an interesting quiz for you.