3C051 Set 2, Volume 3 CDC Practice Test

88 Questions | Total Attempts: 329

SettingsSettingsSettings
CDC Quizzes & Trivia

3C051 Set 2, Volume 3 CDC URE Questions


Questions and Answers
  • 1. 
    What is defined as a bundle of application software designed to significantly improve network efficiency and productivity?
    • A. 

      Fault management server

    • B. 

      Security management server

    • C. 

      Network management server

    • D. 

      Performance management server

  • 2. 
    What are the three most common network management architectures?
    • A. 

      Centralized, hierarchial, and distributed

    • B. 

      Centralized, hierarchial, and hybrid

    • C. 

      Hybrid, hierarchial, and distributed

    • D. 

      Centralized, hybrid, and distributed

  • 3. 
    What network management architecture has an NM platform on one computer system at a location that is responsible for all NM duties?
    • A. 

      Centralized

    • B. 

      Distributed

    • C. 

      Hierarchial

    • D. 

      Hybrid

  • 4. 
    What network management architecture uses multiple systems, with one system acting as a central server and others working as clients?
    • A. 

      Centralized

    • B. 

      Distributed

    • C. 

      Hierarchial

    • D. 

      Hybrid

  • 5. 
    At what level of network management activity are you working when you, as the network manager, are monitoring and troubleshooting components to eliminate the side-effect alarms and isolate problems to a root cause?
    • A. 

      Inactive

    • B. 

      Reactive

    • C. 

      Proactive

    • D. 

      Interactive

  • 6. 
    At what level of network management activity are you working when the automated monitoring of components provides problem analysis, giving a root cause alarm for the problem at hand?
    • A. 

      Inactive

    • B. 

      Reactive

    • C. 

      Proactive

    • D. 

      Interactive

  • 7. 
    Gathering information about current network device settings is a step of what functional network management area?
    • A. 

      Configuration management

    • B. 

      Performace management

    • C. 

      Accounting management

    • D. 

      Security management

  • 8. 
    What are the two functional categories of performance management?
    • A. 

      Monitoring and analyzing

    • B. 

      Monitoring and replacing

    • C. 

      Monitoring and tuning

    • D. 

      Analyzing and tuning

  • 9. 
    Which functional category of performance management tracks historical data by tracking activities on the network?
    • A. 

      Tuning

    • B. 

      Analyzing

    • C. 

      Gathering

    • D. 

      Monitoring

  • 10. 
    What network management area is concerned with controlling access points to information?
    • A. 

      Configuration management

    • B. 

      Performance management

    • C. 

      Accounting management

    • D. 

      Security management

  • 11. 
    What is established to distinguish between errors that fall within a normal range and excessive errors because of a fault?
    • A. 

      Fault parameters

    • B. 

      Tolerance parameters

    • C. 

      Low-level software alarms

    • D. 

      Low-level hardware alarms

  • 12. 
    Network management protocols are designed (in most cases) to reside above what layer of the OSI model?
    • A. 

      Session

    • B. 

      Transport

    • C. 

      Presentation

    • D. 

      Application

  • 13. 
    What is a hierarchial, structured format that defines the network management information available from network devices?
    • A. 

      Network device map

    • B. 

      Network protocol list

    • C. 

      Object identifier

    • D. 

      Management information base

  • 14. 
    Which category of simple network management protocol node is responsible for monitoring, collecting and reporting management data to the management system?
    • A. 

      Primary domain controller

    • B. 

      Backup domain controller

    • C. 

      Manager

    • D. 

      Agent

  • 15. 
    What simple network management protocol operational message retrieves the value of one instance of management information?
    • A. 

      Get

    • B. 

      Set

    • C. 

      Trap

    • D. 

      GetNext

  • 16. 
    What type of simple network management protocol node is responsible to authenticate logons for clients by validating the supplied user name and password against the account in the database?
    • A. 

      Network management controller

    • B. 

      Domain controller

    • C. 

      Stand-alone server

    • D. 

      Member server

  • 17. 
    What protocol is used primarily to obtain connectivity to the large base of Novell NetWare clients?
    • A. 

      Data link control protocol

    • B. 

      Network basic input/output system extended user interface (NetBEUI)

    • C. 

      Transfer control protocol/Internet protocol (TCP/IP)

    • D. 

      Internetwork packet exchange/sequenced packet exchange (IPX/SPX)

  • 18. 
    What network protocol is used for network connection to Hewlett Packard network printers?
    • A. 

      Data link control protocol

    • B. 

      NetBEUI

    • C. 

      TCP/IP

    • D. 

      IPX/SPX

  • 19. 
    Why are users required to change their passwords upon logging onto the network for the first time?
    • A. 

      To ensure users don't create vulnerability by leaving the default password in place

    • B. 

      To ensure users understand how to create a password

    • C. 

      To ensure the integrity of each user's unique password

    • D. 

      To ensure users remember their unique password

  • 20. 
    For user accounts with elevated privileges, such as a client support administrator, what are the correct number and type of characters needed for the account password?
    • A. 

      Minimum of nine characters consisting of at least two upper and lower case letters and numbers

    • B. 

      Minimum of nine characters consisting of at least two upper and lowercase letterrs, numbers, and special characters

    • C. 

      Minimum of fifteen characters consisting of at least two upper and lowercase letters and two special characters

    • D. 

      Minimum of fifteen characters consisting of at least two upper and lowercase letters, two numbers, and two special characters

  • 21. 
    Which group scope allows member permissions to be assigned in any domain or forest?
    • A. 

      Local

    • B. 

      Global

    • C. 

      Universal

    • D. 

      Domain Local

  • 22. 
    What defines the rules by which operations can be performed on a particular resource?
    • A. 

      Rights

    • B. 

      Permissions

    • C. 

      Access control lists

    • D. 

      Hardware configuration

  • 23. 
    What file permission provides a user with the ability to change file permissions and take ownership of files on new technology file system volumes?
    • A. 

      Full control

    • B. 

      Change

    • C. 

      Write

    • D. 

      Read

  • 24. 
    What permission always overrides all other permissions assigned to a user or group to which the user belongs?
    • A. 

      Full control

    • B. 

      No access

    • C. 

      Change

    • D. 

      Write

  • 25. 
    When a volume is formatted with new technology file system, what group is automatically assigned full control permissions to the volume?
    • A. 

      Local group

    • B. 

      Global group

    • C. 

      Built-in group

    • D. 

      Everyone group

Back to Top Back to top