3C051 Set 2, Volume 3 CDC Practice Test

Reviewed by Editorial Team
The ProProfs editorial team is comprised of experienced subject matter experts. They've collectively created over 10,000 quizzes and lessons, serving over 100 million users. Our team includes in-house content moderators and subject matter experts, as well as a global network of rigorously trained contributors. All adhere to our comprehensive editorial guidelines, ensuring the delivery of high-quality content.
Learn about Our Editorial Process
| By A1cbecker
A
A1cbecker
Community Contributor
Quizzes Created: 3 | Total Attempts: 1,176
| Attempts: 357
SettingsSettings
Please wait...
  • 1/88 Questions

    An administrator would normally allocate more file space to users maintaining what type of files?

    • Databases
    • Spreadsheets
    • Word processing templates
    • PowerPoint slideshow files
Please wait...
Network Management Quizzes & Trivia
About This Quiz

This practice test, titled '3C051 Set 2, Volume 3 CDC Practice Test,' evaluates knowledge on network management architectures and activities. It assesses skills in identifying efficient software solutions and troubleshooting network issues, crucial for productivity in IT environments.


Quiz Preview

  • 2. 

    What is a plastic/magnetic device that contains a microprocessor used to authenticate users over the internet?

    • Token

    • Smart card

    • Private key

    • Session key

    Correct Answer
    A. Smart card
    Explanation
    A smart card is a plastic/magnetic device that contains a microprocessor used to authenticate users over the internet. It is a portable device that can securely store and process information, including private keys and authentication credentials. Smart cards are commonly used in various applications, such as banking, identification, and access control systems, to provide secure and convenient authentication for users.

    Rate this question:

  • 3. 

    What is the preferred method of clearing magnetic tapes?

    • Degaussing

    • Overwriting

    • Formatting

    • Deleting

    Correct Answer
    A. Degaussing
    Explanation
    Degaussing is the preferred method of clearing magnetic tapes because it effectively erases all data by demagnetizing the tape. This process ensures that the previous data cannot be recovered or accessed. Overwriting, formatting, and deleting do not completely remove the data from the tape and there is a possibility of data recovery. Degaussing provides a more secure and permanent solution for clearing magnetic tapes.

    Rate this question:

  • 4. 

    What network management architecture has an NM platform on one computer system at a location that is responsible for all NM duties?

    • Centralized

    • Distributed

    • Hierarchial

    • Hybrid

    Correct Answer
    A. Centralized
    Explanation
    A centralized network management architecture has an NM platform on one computer system at a location that is responsible for all NM duties. This means that all network management tasks, such as monitoring, configuration, and troubleshooting, are performed on a single system. This architecture allows for a more efficient and streamlined management process as all tasks can be controlled and coordinated from a central location, reducing the need for multiple systems and simplifying the management process.

    Rate this question:

  • 5. 

    What are the two functional categories of performance management?

    • Monitoring and analyzing

    • Monitoring and replacing

    • Monitoring and tuning

    • Analyzing and tuning

    Correct Answer
    A. Monitoring and tuning
    Explanation
    The two functional categories of performance management are monitoring and tuning. Monitoring involves regularly observing and measuring the performance of a system or process to identify any issues or areas of improvement. Tuning, on the other hand, refers to making adjustments and optimizations based on the monitoring results to enhance the performance and efficiency of the system or process. By combining monitoring and tuning, organizations can effectively track performance and make necessary adjustments to ensure optimal performance levels are achieved.

    Rate this question:

  • 6. 

    What network management area is concerned with controlling access points to information?

    • Configuration management

    • Performance management

    • Accounting management

    • Security management

    Correct Answer
    A. Security management
    Explanation
    Security management is concerned with controlling access points to information. It involves implementing measures to protect the confidentiality, integrity, and availability of data. By managing access points, security management ensures that only authorized individuals can access sensitive information, preventing unauthorized access and potential security breaches. This includes implementing authentication mechanisms, access controls, encryption, and other security measures to safeguard the network and its resources.

    Rate this question:

  • 7. 

    Why are users required to change their passwords upon logging onto the network for the first time?

    • To ensure users don't create vulnerability by leaving the default password in place

    • To ensure users understand how to create a password

    • To ensure the integrity of each user's unique password

    • To ensure users remember their unique password

    Correct Answer
    A. To ensure users don't create vulnerability by leaving the default password in place
    Explanation
    Users are required to change their passwords upon logging onto the network for the first time to ensure they don't create vulnerability by leaving the default password in place. Default passwords are often well-known and can be easily exploited by attackers. By requiring users to change their passwords, it reduces the risk of unauthorized access to the network and protects the security and integrity of the system.

    Rate this question:

  • 8. 

    What file permission provides a user with the ability to change file permissions and take ownership of files on new technology file system volumes?

    • Full control

    • Change

    • Write

    • Read

    Correct Answer
    A. Full control
    Explanation
    Full control file permission provides a user with the ability to change file permissions and take ownership of files on new technology file system volumes. This means that the user has complete control over the file, including the ability to modify permissions, delete or modify the file, and assign ownership to other users.

    Rate this question:

  • 9. 

    What simple network management protocol operational message retrieves the value of one instance of management information?

    • Get

    • Set

    • Trap

    • GetNext

    Correct Answer
    A. Get
    Explanation
    The simple network management protocol operational message "Get" is used to retrieve the value of one instance of management information. This message is sent from a management station to a managed device, requesting specific information about a particular object or variable. The "Get" message allows administrators to gather data from network devices for monitoring, troubleshooting, and performance analysis purposes.

    Rate this question:

  • 10. 

    For user accounts with elevated privileges, such as a client support administrator, what are the correct number and type of characters needed for the account password?

    • Minimum of nine characters consisting of at least two upper and lower case letters and numbers

    • Minimum of nine characters consisting of at least two upper and lowercase letterrs, numbers, and special characters

    • Minimum of fifteen characters consisting of at least two upper and lowercase letters and two special characters

    • Minimum of fifteen characters consisting of at least two upper and lowercase letters, two numbers, and two special characters

    Correct Answer
    A. Minimum of fifteen characters consisting of at least two upper and lowercase letters, two numbers, and two special characters
    Explanation
    The correct answer is to have a minimum of fifteen characters consisting of at least two upper and lowercase letters, two numbers, and two special characters. This requirement ensures a strong and secure password for user accounts with elevated privileges. By having a longer password with a combination of different character types, it becomes more difficult for unauthorized individuals to guess or crack the password, enhancing the overall security of the account.

    Rate this question:

  • 11. 

    What usually has the most significance when determining the amount of space and access time users are given on a file server?

    • Rank

    • Duty hours

    • Job position

    • Time on station

    Correct Answer
    A. Job position
    Explanation
    The job position usually has the most significance when determining the amount of space and access time users are given on a file server. This is because different job positions may require different levels of access and storage space based on their responsibilities and requirements within the organization. For example, higher-ranking positions may require more access and storage space compared to lower-ranking positions.

    Rate this question:

  • 12. 

    What are frames called that consist of garbled bits of data that are transmitted continuously on the network?

    • Jabbers

    • Dribbles

    • Collisions

    • Network storm

    Correct Answer
    A. Jabbers
    Explanation
    Jabbers are frames that consist of garbled bits of data transmitted continuously on the network. These frames are typically caused by malfunctioning network devices or faulty network connections. When jabbers occur, they can disrupt the normal flow of data on the network and cause performance issues. It is important to identify and resolve jabber issues to maintain a stable and efficient network communication.

    Rate this question:

  • 13. 

    How is a personal identification number categorized?

    • Something you know

    • Something you have

    • Something you need

    • Something you read

    Correct Answer
    A. Something you know
    Explanation
    A personal identification number (PIN) is categorized as "something you know" because it is a secret code or password that only the individual should know. It is used as a form of authentication to verify the identity of the person accessing a system or account. Unlike "something you have" (such as a physical token or card) or "something you need" (such as a fingerprint or iris scan), a PIN relies solely on the knowledge of the individual.

    Rate this question:

  • 14. 

    What is the intrustion practice of encapsulating a message (that would be rejected by the firewall) inside a second message that will pass through the firewall?

    • Tunneling

    • Identification spoofing

    • Application-based attacks

    • Second message encryption

    Correct Answer
    A. Tunneling
    Explanation
    Tunneling is the practice of encapsulating a message that would be rejected by a firewall inside a second message that will pass through the firewall. This allows the rejected message to bypass the firewall undetected.

    Rate this question:

  • 15. 

    What standard is utilized by the defense messaging system for direcory services?

    • TCP/IP

    • SMTP

    • X.400

    • X.500

    Correct Answer
    A. X.500
    Explanation
    The defense messaging system for directory services utilizes the x.500 standard. The x.500 standard is a protocol for directory services that provides a global directory for storing and retrieving information about users, systems, and other resources in a network. It is commonly used in large organizations and government entities, including defense systems, to manage and access directory information securely and efficiently.

    Rate this question:

  • 16. 

    What are the three most common network management architectures?

    • Centralized, hierarchial, and distributed

    • Centralized, hierarchial, and hybrid

    • Hybrid, hierarchial, and distributed

    • Centralized, hybrid, and distributed

    Correct Answer
    A. Centralized, hierarchial, and distributed
    Explanation
    The three most common network management architectures are centralized, hierarchical, and distributed. In a centralized architecture, all management functions are performed by a central entity or system. In a hierarchical architecture, management functions are divided into different levels or layers, with each level responsible for a specific set of tasks. In a distributed architecture, management functions are distributed across multiple entities or systems, allowing for greater scalability and fault tolerance.

    Rate this question:

  • 17. 

    Which functional category of performance management tracks historical data by tracking activities on the network?

    • Tuning

    • Analyzing

    • Gathering

    • Monitoring

    Correct Answer
    A. Monitoring
    Explanation
    Monitoring is the correct answer because it involves tracking activities on the network and collecting historical data. Monitoring allows organizations to keep a close eye on network performance, identify any issues or anomalies, and make necessary adjustments to ensure optimal performance. By continuously monitoring the network, organizations can track historical data and analyze trends over time, which helps in identifying patterns, making informed decisions, and improving overall network performance.

    Rate this question:

  • 18. 

    What type of simple network management protocol node is responsible to authenticate logons for clients by validating the supplied user name and password against the account in the database?

    • Network management controller

    • Domain controller

    • Stand-alone server

    • Member server

    Correct Answer
    A. Domain controller
    Explanation
    A domain controller is responsible for authenticating logons for clients by validating the supplied user name and password against the account in the database. It is a server that is part of a Windows domain and stores the security policy and user account information for the domain. It manages user authentication, access control, and other network management tasks within the domain.

    Rate this question:

  • 19. 

    What permission always overrides all other permissions assigned to a user or group to which the user belongs?

    • Full control

    • No access

    • Change

    • Write

    Correct Answer
    A. No access
    Explanation
    No access is the correct answer because it completely denies any permission to the user or group, regardless of any other permissions assigned to them. This means that even if other permissions are granted, the user or group will still not be able to access or perform any actions on the resource.

    Rate this question:

  • 20. 

    What two files are required for Windows operating systems to run on most client systems?

    • NTBOOTDD.SYS and BOOTSECT.DOS

    • BOOTSECT.DOS and NTDETECT.COM

    • BOOT.INI and NTDETECT.COM

    • BOOT.INI and NTBOOTDD.SYS

    Correct Answer
    A. BOOT.INI and NTDETECT.COM
    Explanation
    The two files required for Windows operating systems to run on most client systems are BOOT.INI and NTDETECT.COM. BOOT.INI is a configuration file that contains information about the operating system installations on the computer, including the location of the operating system files. NTDETECT.COM is a system component that detects hardware and gathers information during the boot process. These two files are essential for the operating system to properly boot and function on the client system.

    Rate this question:

  • 21. 

    What is the first question "network experts" ask when beginning to troubleshoot a serious network problem?

    • What is the size of the network?

    • Where is the network map?

    • Who are critical users?

    • What services are down?

    Correct Answer
    A. Where is the network map?
    Explanation
    When troubleshooting a serious network problem, network experts typically start by asking for the network map. This is because the network map provides a visual representation of the network infrastructure, including all the devices, connections, and configurations. By having access to the network map, experts can quickly identify potential areas of concern or points of failure. It helps them understand the overall network topology and aids in diagnosing and resolving the network issue efficiently.

    Rate this question:

  • 22. 

    What are two basic ways network faults can be detected?

    • Automatically and proactively

    • Manually and automatically

    • Reactively and proactively

    • Reactively and manually

    Correct Answer
    A. Reactively and proactively
    Explanation
    Network faults can be detected in two basic ways: reactively and proactively. Reactively means that faults are identified and addressed after they occur, such as through troubleshooting and resolving issues as they arise. Proactively, on the other hand, involves actively monitoring the network and taking preventive measures to detect and address potential faults before they cause any major disruptions. By combining both reactive and proactive approaches, network administrators can ensure a more reliable and stable network environment.

    Rate this question:

  • 23. 

    What diagnostics test is usually run on a NIC to ensure it is functional?

    • Loopback

    • CTS/RTS

    • Transmission trace

    • Self-test diagnostic

    Correct Answer
    A. Loopback
    Explanation
    Loopback is a diagnostics test that is usually run on a NIC (Network Interface Card) to ensure its functionality. This test involves sending data from the NIC and receiving it back without it being transmitted over the network. By doing this, any issues with the NIC's transmission and reception capabilities can be identified, allowing for troubleshooting and necessary repairs or replacements.

    Rate this question:

  • 24. 

    What diagnostics test is run exclusively on Windows based machines?

    • TCPCONFIG

    • WINIPCFG

    • IPCONFIG

    • TRACERT

    Correct Answer
    A. IPCONFIG
    Explanation
    IPCONFIG is a diagnostic test that is run exclusively on Windows based machines. It is used to display the current IP configuration settings of a network interface, including the IP address, subnet mask, and default gateway. This command is commonly used to troubleshoot network connectivity issues and gather information about the network configuration of a Windows machine. WINIPCFG is a similar command, but it is specifically used on older versions of Windows, such as Windows 95 and Windows 98. TCPCONFIG and TRACERT are not exclusive to Windows and can be used on other operating systems as well.

    Rate this question:

  • 25. 

    What is defined as a bundle of application software designed to significantly improve network efficiency and productivity?

    • Fault management server

    • Security management server

    • Network management server

    • Performance management server

    Correct Answer
    A. Network management server
    Explanation
    A network management server is a bundle of application software designed to significantly improve network efficiency and productivity. It helps in monitoring and managing various aspects of a network, such as performance, availability, and security. It provides tools and features to identify and resolve network issues, optimize network performance, and streamline network operations. By centralizing network management tasks, it enables administrators to have better control over the network, leading to improved efficiency and productivity.

    Rate this question:

  • 26. 

    When a volume is formatted with new technology file system, what group is automatically assigned full control permissions to the volume?

    • Local group

    • Global group

    • Built-in group

    • Everyone group

    Correct Answer
    A. Everyone group
    Explanation
    When a volume is formatted with the new technology file system, the "Everyone group" is automatically assigned full control permissions to the volume. This means that all users, including local and network users, have full control over the files and folders on the volume. The Everyone group is a built-in group that includes all user accounts on the system, making it convenient for granting broad access permissions to resources.

    Rate this question:

  • 27. 

    What is an indication that a noteworthy event has occured on the network?

    • Poll

    • Push

    • Alarm

    • Notification

    Correct Answer
    A. Alarm
    Explanation
    An alarm is an indication that a noteworthy event has occurred on the network. Alarms are typically triggered when there is a critical or abnormal condition that requires attention or action. They can be configured to notify network administrators or operators about events such as security breaches, system failures, or performance issues. Alarms provide an immediate and visible alert, allowing for prompt response and resolution of the event.

    Rate this question:

  • 28. 

    What type of network problem(s) is caused by collisions on the domain?

    • Jabbers only

    • Inability to transmit

    • High utilization only

    • High utilization or jabbers

    Correct Answer
    A. High utilization or jabbers
    Explanation
    Collisions on the domain can cause two types of network problems: high utilization and jabbers. High utilization occurs when the network becomes congested due to the collisions, resulting in slower data transmission and decreased overall network performance. Jabbers, on the other hand, refer to devices that transmit data for an unusually long time, causing excessive network traffic and potentially disrupting communication for other devices on the network. Therefore, collisions can lead to both high utilization and jabbering issues in a network.

    Rate this question:

  • 29. 

    Ideally the average network utilization value should be less tha?

    • 20 percent

    • 25 percent

    • 30 percent

    • 40 percent

    Correct Answer
    A. 30 percent
    Explanation
    Ideally, the average network utilization value should be less than 30 percent. This is because network utilization refers to the percentage of the total available network capacity that is being used at a given time. Keeping the utilization below 30 percent ensures that there is enough bandwidth available for smooth and efficient network operations. Higher utilization levels can lead to congestion, slower data transfer speeds, and potential network failures. Therefore, maintaining a utilization value below 30 percent helps to optimize network performance and avoid performance issues.

    Rate this question:

  • 30. 

    What utilities are used to find the round-trip delay between a source and target node?

    • Send and Echo

    • PING and Echo

    • Tracert

    • PING and Tracert

    Correct Answer
    A. PING and Tracert
    Explanation
    PING and Tracert are the utilities used to find the round-trip delay between a source and target node. PING (Packet Internet Groper) sends a small packet of data to the target node and measures the time it takes for the packet to travel back, thus providing the round-trip delay. Tracert (Trace Route) identifies the route that packets take to reach the target node and displays the time taken for each hop, allowing the calculation of round-trip delay.

    Rate this question:

  • 31. 

    What Internet protocol address is used to packet internetwork groper a computer's own network interface card?

    • 126.0.0.1

    • 127.0.0.1

    • 128.0.0.1

    • 129.0.0.1

    Correct Answer
    A. 127.0.0.1
    Explanation
    The Internet protocol address used to packet internetwork groper a computer's own network interface card is 127.0.0.1. This address is known as the loopback address and is used to test the network interface card of a computer. It allows a computer to send packets to itself without them being transmitted over a network.

    Rate this question:

  • 32. 

    What is the process of analyzing threats against and the vulnerabilities of an information system?

    • Authentication

    • Accreditation

    • Risk analysis

    • Certification

    Correct Answer
    A. Risk analysis
    Explanation
    The process of analyzing threats against and the vulnerabilities of an information system is known as risk analysis. In this process, potential risks and their likelihood of occurrence are identified and evaluated, along with the vulnerabilities that can be exploited by these threats. By conducting a risk analysis, organizations can assess the potential impact of these risks on their information systems and make informed decisions regarding the implementation of security measures to mitigate them.

    Rate this question:

  • 33. 

    Gathering information about current network device settings is a step of what functional network management area?

    • Configuration management

    • Performace management

    • Accounting management

    • Security management

    Correct Answer
    A. Configuration management
    Explanation
    Configuration management involves gathering information about the current network device settings. This step is essential in order to effectively manage and maintain the configuration of network devices. By collecting data on the current settings, network administrators can ensure that devices are properly configured, troubleshoot any issues, and make necessary changes to optimize network performance. Therefore, the correct answer is Configuration management.

    Rate this question:

  • 34. 

    What is the maximum size (in bytes) for the Internet protocol?

    • 42,293

    • 48,800

    • 56,498

    • 65.535

    Correct Answer
    A. 65.535
    Explanation
    The maximum size for the Internet protocol is 65.535 bytes. This is because the Internet Protocol (IP) uses a 16-bit field to specify the size of the payload in each packet. Since 2^16 is equal to 65,536, subtracting one gives us a maximum size of 65,535 bytes.

    Rate this question:

  • 35. 

    What is a measure used to verify the eligibility of a subject and the ability of the subject to access certain information?

    • Authentication

    • Recertification

    • Accredidation

    • Identification

    Correct Answer
    A. Authentication
    Explanation
    Authentication is the process of verifying the identity of a subject and ensuring that they have the necessary credentials to access certain information or resources. It involves confirming the authenticity of the subject's credentials, such as username and password, biometric data, or security tokens. By successfully authenticating, the subject proves their eligibility and ability to access the desired information or resources.

    Rate this question:

  • 36. 

    In what step of the Barrier Reef process do you map both the physical and logical topology of your network?

    • Step 1: Know thyself

    • Step 2: Determine requirements

    • Step 3: Policy formation

    • Step 5: Network Monitoring

    Correct Answer
    A. Step 1: Know thyself
    Explanation
    In Step 1 of the Barrier Reef process, you map both the physical and logical topology of your network. This involves understanding and documenting the layout of your network infrastructure, including the physical components such as routers, switches, and cables, as well as the logical components such as IP addresses, subnets, and network protocols. By mapping the topology, you gain a comprehensive understanding of how your network is structured, which is crucial for effective network management and troubleshooting.

    Rate this question:

  • 37. 

    What network management architecture uses multiple systems, with one system acting as a central server and others working as clients?

    • Centralized

    • Distributed

    • Hierarchial

    • Hybrid

    Correct Answer
    A. Hierarchial
    Explanation
    A hierarchical network management architecture uses multiple systems, with one system acting as a central server and others working as clients. In this architecture, the central server is responsible for managing and controlling the entire network, while the client systems perform specific tasks assigned by the central server. This architecture provides a clear hierarchy and centralized control, allowing for efficient management and coordination of network resources.

    Rate this question:

  • 38. 

    Why should only one possibility of a network problem be troubleshot at a time?

    • For bettter documentation development

    • To effectively eliminate ideas not the problem

    • To ensure all personnel are informed of the results

    • Isolate a definite cause if the action fixes the problem

    Correct Answer
    A. Isolate a definite cause if the action fixes the problem
    Explanation
    Troubleshooting one possibility at a time allows for the isolation of a definite cause if the action taken resolves the problem. By systematically addressing one potential issue at a time, it becomes easier to identify the specific cause of the network problem. This approach helps in narrowing down the possible causes and prevents confusion that may arise from attempting multiple solutions simultaneously. Additionally, isolating a definite cause improves the accuracy of documentation and ensures that all personnel are informed of the results.

    Rate this question:

  • 39. 

    What network device performs rigorous examinations of systems to identify weaknesses that might allow security violations?

    • Network management software

    • Intrusion detection devices

    • Vulnerability scanners

    • Proxy firewalls

    Correct Answer
    A. Vulnerability scanners
    Explanation
    Vulnerability scanners are network devices that perform rigorous examinations of systems to identify weaknesses that might allow security violations. These scanners are designed to scan and analyze networks, systems, and applications to detect vulnerabilities and potential security risks. By conducting comprehensive assessments, vulnerability scanners help organizations identify and address weaknesses in their infrastructure, allowing them to take proactive measures to strengthen their security and prevent potential security breaches.

    Rate this question:

  • 40. 

    When a new folder or file is created on a new technology file system partition, what permissions are automatically assigned?

    • Global group permissions

    • Everyone group permissions

    • No permissions are automatically assigned

    • Inherited permissions of the folder it is contained in

    Correct Answer
    A. Inherited permissions of the folder it is contained in
    Explanation
    When a new folder or file is created on a new technology file system partition, the permissions that are automatically assigned are the inherited permissions of the folder it is contained in. This means that the new folder or file will inherit the same permissions as the parent folder, allowing the same level of access to the users or groups that have been granted access to the parent folder.

    Rate this question:

  • 41. 

    What is one way to increase filer server efficiency

    • Reducing the file space per user

    • Reducing the available hours of use

    • Limiting the access time of typical users

    • Routinely running defragmentation software

    Correct Answer
    A. Limiting the access time of typical users
    Explanation
    Limiting the access time of typical users can increase file server efficiency by reducing the number of simultaneous users accessing the server at any given time. By implementing restrictions on when users can access the server, it helps to distribute the workload more evenly and prevent overcrowding. This can lead to faster response times, improved performance, and better overall efficiency for the file server.

    Rate this question:

  • 42. 

    What is one of the greatest downfalls of personnel who must work together to troubleshoot a network problem?

    • Failure to accurately observe and thoroughly document the results of their individual efforts

    • Lack of communication during the troubleshooting process

    • Troubleshooting mulitple possibilities at one time

    • Failure to interview the users

    Correct Answer
    A. Failure to accurately observe and thoroughly document the results of their individual efforts
    Explanation
    One of the greatest downfalls of personnel who must work together to troubleshoot a network problem is their failure to accurately observe and thoroughly document the results of their individual efforts. This can lead to a lack of clarity and understanding among team members, making it difficult to identify the root cause of the problem and find an effective solution. Without proper documentation, it becomes challenging to track progress, share information, and collaborate effectively, ultimately hindering the troubleshooting process.

    Rate this question:

  • 43. 

    What network management system alarm browser information item indicates if an alarm is related to other alarms?

    • Ack

    • Cor

    • Source

    • Severity

    Correct Answer
    A. Cor
    Explanation
    The network management system alarm browser information item "Cor" indicates if an alarm is related to other alarms. This suggests that the "Cor" field is used to establish a correlation between different alarms, allowing the system to identify and display related alarms together.

    Rate this question:

  • 44. 

    What is a physical device that users carry to authenticate themselves over the internet?

    • Token

    • Public key

    • Private key

    • Session key

    Correct Answer
    A. Token
    Explanation
    A token is a physical device that users carry to authenticate themselves over the internet. It is a form of two-factor authentication, where the user not only enters their username and password but also uses the token to generate a unique code. This code is then entered as an additional layer of security to verify the user's identity. Tokens can come in various forms such as key fobs, smart cards, or mobile apps, and they provide an extra level of protection against unauthorized access to online accounts.

    Rate this question:

  • 45. 

    Who is the IAVA process manager?

    • DOD CERT

    • AFCERT

    • HQ AIA

    • DISA

    Correct Answer
    A. DISA
    Explanation
    The correct answer for the IAVA process manager is DISA. DISA stands for Defense Information Systems Agency, which is responsible for managing the IAVA (Information Assurance Vulnerability Alert) process. DISA is a combat support agency of the Department of Defense (DOD) and is tasked with providing secure and reliable communications and information systems for the DOD and other government agencies. As the IAVA process manager, DISA is responsible for identifying and addressing vulnerabilities in information systems and ensuring that appropriate actions are taken to mitigate these vulnerabilities.

    Rate this question:

  • 46. 

    Which category of simple network management protocol node is responsible for monitoring, collecting and reporting management data to the management system?

    • Primary domain controller

    • Backup domain controller

    • Manager

    • Agent

    Correct Answer
    A. Agent
    Explanation
    An agent is a category of simple network management protocol node that is responsible for monitoring, collecting, and reporting management data to the management system. Agents are typically installed on network devices or servers and are responsible for gathering information about the device's performance, status, and configuration. They then send this data to the management system, which can analyze and use it for various purposes such as troubleshooting, performance optimization, and security monitoring.

    Rate this question:

  • 47. 

    What is the name for the core set of software instructions contained in operating systems (OS) on which the higher-level functions are based?

    • BOOT.IOS

    • ROOT.SYS

    • Boot kernel

    • System kernel

    Correct Answer
    A. System kernel
    Explanation
    The core set of software instructions contained in operating systems is known as the system kernel. It is responsible for managing the system's resources, such as memory and processes, and provides a bridge between the hardware and the higher-level functions of the operating system. The system kernel is essential for the proper functioning of the operating system and allows for the execution of various tasks and programs.

    Rate this question:

  • 48. 

    What color on the system management automated report tracking system alarm log indicates one or more events?

    • Blue

    • Purple

    • Orange

    • Yellow

    Correct Answer
    A. Purple
    Explanation
    Purple on the system management automated report tracking system alarm log indicates one or more events.

    Rate this question:

  • 49. 

    Which group scope allows member permissions to be assigned in any domain or forest?

    • Local

    • Global

    • Universal

    • Domain Local

    Correct Answer
    A. Universal
    Explanation
    The group scope that allows member permissions to be assigned in any domain or forest is Universal. Universal groups are used to grant access to resources across multiple domains and forests. They can contain user accounts, global groups, and other universal groups from any domain in the forest. This group scope is typically used for granting permissions that need to span multiple domains or forests.

    Rate this question:

Quiz Review Timeline (Updated): Mar 21, 2023 +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Mar 21, 2023
    Quiz Edited by
    ProProfs Editorial Team
  • Apr 07, 2010
    Quiz Created by
    A1cbecker
Back to Top Back to top
Advertisement
×

Wait!
Here's an interesting quiz for you.

We have other quizzes matching your interest.