This quiz covers the URE's of volume three of 3C051
Fault management server
Security management server
Network management server
Performance management server
Centralized, hierarchial, and distributed
Centralized, hierarchial, and hybrid
Hybrid, hierarchial and distributed
Centralized, hybrid and distributed
Centralized
Distributed
Hierarchial
Hybrid
Centralized
Distributed
Hierarchial
Hybrid
Inactive
Reactive
Proactive
Interactive
Inactive
Reactive
Proactive
Interactive
Configuration management
Performance management
Accounting management
Security management
Monitoring and analyzing
Monitoring and replacing
Monitoring and tuning
Analyzing and tuning
Tuning
Analyzing
Gathering
Monitoring
Configuration Management
Performance management
Accounting management
Security management
Fault parameters
Tolerence parameters
Low-level software alarms
Low-level hardware alarms
Session
Transport
Presentation
Application
Network devive map
Network protocol list
Object identifier
Management information base
Primary domain controller
Backup domain controlller
Manager
Agent
Get
Set
Trap
GetNext
Network management controllers
Stand-alone servers
Domain controllers
Member servers
No action is required
The spare is promoted to the DC position
The logical name of the backup DC is changed to the logical name of the primary DC.
The Internet protocol address of the backup DC is changed to the IP address of the primary DC
Network management controller
Domain controller
Stand-alone server
Member server
Data link control protocol
Network basic input/output system extended user interface
TCP/IP
Internetwork packet exchange/sequenced packet exchange
Data link control protocol
Network basic input/output system extended user interface
TCP/IP
Internetwork packet exchange/sequenced packet exchange
To ensure users don't create vulnerability by leaving the default password in place
To ensure users understand how to create passwords
To ensure the integrity of each user's unique password
To ensure users remember their unique password
Minimum of nine characters consisting of at least two upper and lowercase letters and numbers
Minimum of nine characters consisting of at least two upper and lower case letters, numbers, and special characters
Minimum of fifteen characters consisting of at least two upper and lowercase letters and two special characters
Minimum of fifteen characters consisting of at least two upper and lowercase letters, tow numbers, and two special characters
Local
Global
Universal
Domain Local
Rights
Permissions
Access control lists
Hardware configuration
Rights
Permissions
Access control lists
Hardware configuration
Full control
Change
Write
Read
Full control
No Access
Change
Write
Local group
Global group
Built-In group
Everyone group
Global group permissions
Everyone group permissions
No permissions are automatically assigned
Inherited permissions of the folder it is contained in
Databases
Spreadsheet
Word processing templates
PowerPoint slideshow files
Reducing file space to user
Reducing the available hours of use
Limiting the access times of typical users
Routinely running defrag software
Rank
Duty hours
Job position
Time on station
NTBOOTDD.SYS and BOOTSECT.DOS
BOOTSECT.DOS and NTDETECT.COM
BOOT.INI and NTDETECT.COM
BOOT.INI and NTBOOTDD.SYS
BOOT.IOS
ROOT.SYS
Boot Kernel
System Kernel
What is the size of the network?
Where is the network map?
Who are the critical users?
What services are down?
Consider all possible causes
Define the main problems
Create a plan of action
Gather facts
Create a plan of action
Define the main problems
Consider all possible causes
Implement the plan of action
For better documentation
To effectively eliminate ideas not the problem
To ensure all personnel are informed of the results
Isolate a definite cause if teh action fixes the problem
Failure to accurately observe and thoroughly document the results of their individual efforts.
Lack of communication during the troubleshooting process
Troubleshooting multiple possibilities at one time
Failure to interview the users
Automatically and proactively
Manually and automatically
Reactively and proactively
Reactively and manually
Devices that have broken network connections and used up bandwidth
Devices that have lost power and have broken network connections
Devices with failed services and have broken network connections
Devices that have lost power and used up bandwidth
Fault diagnosis
Fault correction
Documentation
Fault detection
Poll
Push
Alarm
Notification
Ack
Cor
Source
Severity
Frame check sequence
Retransmission
Collisions
Alignment
Network Interface Card
MAC Frame
OSI
Transport layer of OSI
24
48
64
128
Jabbers
Dribbles
Collisions
Network storm
42,293
48,800
56,498
65,535
28
64
128
256
Quiz Review Timeline +
Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.
Wait!
Here's an interesting quiz for you.