Volume 3 CDC 3C051

93 Questions | Attempts: 131
Share
SettingsSettings
Please wait...
  • 1/93 Questions

    26. What file permission provides a user with the ability to change file permissions and take ownership of files on new technology file system volumes?

    • Full control
    • Change
    • Write
    • Read
Please wait...
About This Quiz

This quiz covers the URE's of volume three of 3C051

CDC Quizzes & Trivia

Quiz Preview

  • 2. 

    74. What is a plastic/magnetic device that contains a microprocessor used to authenticate users over the internet?

    • Token

    • Smart Card

    • Private Key

    • Session

    Correct Answer
    A. Smart Card
  • 3. 

    30. An administrator would normally allocate more file space to users maintaining what type of files?

    • Databases

    • Spreadsheet

    • Word processing templates

    • PowerPoint slideshow files

    Correct Answer
    A. Databases
  • 4. 

    86. What is the preferred method of clearing magnetic tapes?

    • Degaussing

    • Overwriting

    • Formating

    • Deleting

    Correct Answer
    A. Degaussing
  • 5. 

    8. What are the two functional categories of performance management?

    • Monitoring and analyzing

    • Monitoring and replacing

    • Monitoring and tuning

    • Analyzing and tuning

    Correct Answer
    A. Monitoring and tuning
  • 6. 

    10. What network management area is concerned with controlling access points to information?

    • Configuration Management

    • Performance management

    • Accounting management

    • Security management

    Correct Answer
    A. Security management
  • 7. 

    21. Why are users required to change their passwords upon logging onto the network for the first time?

    • To ensure users don't create vulnerability by leaving the default password in place

    • To ensure users understand how to create passwords

    • To ensure the integrity of each user's unique password

    • To ensure users remember their unique password

    Correct Answer
    A. To ensure users don't create vulnerability by leaving the default password in place
  • 8. 

    15. What SNMP operational message retrieves the value of one instance of management information?

    • Get

    • Set

    • Trap

    • GetNext

    Correct Answer
    A. Get
  • 9. 

    28. When a volume is formatted with NTFS what group is automatically assigned full control permission to a volume?

    • Local group

    • Global group

    • Built-In group

    • Everyone group

    Correct Answer
    A. Everyone group
  • 10. 

    48. What are frames called that consist of garbled bits of data that are transmitted continuously on the network?

    • Jabbers

    • Dribbles

    • Collisions

    • Network storm

    Correct Answer
    A. Jabbers
  • 11. 

    22. For user accounts with elevated privileges, such as a client support administrator, what are the correct number and type of characters needed for the account password?

    • Minimum of nine characters consisting of at least two upper and lowercase letters and numbers

    • Minimum of nine characters consisting of at least two upper and lower case letters, numbers, and special characters

    • Minimum of fifteen characters consisting of at least two upper and lowercase letters and two special characters

    • Minimum of fifteen characters consisting of at least two upper and lowercase letters, tow numbers, and two special characters

    Correct Answer
    A. Minimum of fifteen characters consisting of at least two upper and lowercase letters, tow numbers, and two special characters
  • 12. 

    55. What utilities are used to find the round-trip delay between a source and target node?

    • Send and echo

    • Ping and echo

    • Tracert

    • Ping and tracert

    Correct Answer
    A. Ping and tracert
  • 13. 

    2. What are the three most common network management architectures?

    • Centralized, hierarchial, and distributed

    • Centralized, hierarchial, and hybrid

    • Hybrid, hierarchial and distributed

    • Centralized, hybrid and distributed

    Correct Answer
    A. Centralized, hierarchial, and distributed
  • 14. 

    27. What permission always overrides all other permissions assigned to a user or group to which the user belongs?

    • Full control

    • No Access

    • Change

    • Write

    Correct Answer
    A. No Access
  • 15. 

    72. How is a personal identification number categorized?

    • Something you know

    • Something you have

    • Something you need

    • Something you read

    Correct Answer
    A. Something you know
  • 16. 

    92. What standard is utilized by the Defense messaging system for directory services?

    • TCP/IP

    • SMTP

    • X.400

    • X.500

    Correct Answer
    A. X.500
  • 17. 

    9. Which functional category of performance management tracks historical data by tracking activities on the network?

    • Tuning

    • Analyzing

    • Gathering

    • Monitoring

    Correct Answer
    A. Monitoring
  • 18. 

    17. In the event that a domain conroller is no longer functioning, what action is taken to make another DC take over the responsibility?

    • No action is required

    • The spare is promoted to the DC position

    • The logical name of the backup DC is changed to the logical name of the primary DC.

    • The Internet protocol address of the backup DC is changed to the IP address of the primary DC

    Correct Answer
    A. No action is required
  • 19. 

    40. What are the two basic ways network faults can be detected?

    • Automatically and proactively

    • Manually and automatically

    • Reactively and proactively

    • Reactively and manually

    Correct Answer
    A. Reactively and proactively
  • 20. 

    4. What network management architecture uses multiple systems, with one system acting as a central server and the others working as clients?

    • Centralized

    • Distributed

    • Hierarchial

    • Hybrid

    Correct Answer
    A. Hierarchial
  • 21. 

    56. What diagnostics test is usually run on a NIC to ensure its functional?

    • Loopback

    • CTS/RTS

    • Transmission trace

    • Self-test diagnostic

    Correct Answer
    A. Loopback
  • 22. 

    3. What network management architecture has an NM platform on one computer system at a location that is responsible for NM duties?

    • Centralized

    • Distributed

    • Hierarchial

    • Hybrid

    Correct Answer
    A. Centralized
  • 23. 

    33. What two files are required for Windows operating systems to run on most client systems?

    • NTBOOTDD.SYS and BOOTSECT.DOS

    • BOOTSECT.DOS and NTDETECT.COM

    • BOOT.INI and NTDETECT.COM

    • BOOT.INI and NTBOOTDD.SYS

    Correct Answer
    A. BOOT.INI and NTDETECT.COM
  • 24. 

    35. What is the first question "network experts" ask when beginning to troubleshoot a serious netowrk problem?

    • What is the size of the network?

    • Where is the network map?

    • Who are the critical users?

    • What services are down?

    Correct Answer
    A. Where is the network map?
  • 25. 

    37. What should you do after gathering all the facts about a network problem?

    • Create a plan of action

    • Define the main problems

    • Consider all possible causes

    • Implement the plan of action

    Correct Answer
    A. Consider all possible causes
  • 26. 

    39. What is one of the greatest downfalls of personnel who must work together to troubleshoot a network problem?

    • Failure to accurately observe and thoroughly document the results of their individual efforts.

    • Lack of communication during the troubleshooting process

    • Troubleshooting multiple possibilities at one time

    • Failure to interview the users

    Correct Answer
    A. Failure to accurately observe and thoroughly document the results of their individual efforts.
  • 27. 

    44. What network management system alarm browser information item indicates if an alarm is related to other alarms?

    • Ack

    • Cor

    • Source

    • Severity

    Correct Answer
    A. Cor
  • 28. 

    49. What is the maximum packet size (in bytes) for the internet protocol?

    • 42,293

    • 48,800

    • 56,498

    • 65,535

    Correct Answer
    A. 65,535
  • 29. 

    57. What diagnostics command is run exclusively on Windows based machines?

    • TCPCONFIG

    • WINIPCFG

    • IPCONFIG

    • TRACERT

    Correct Answer
    A. IPCONFIG
  • 30. 

    58. What Internet protocol address is used to packet internetwork groper a computer's own NIC?

    • 126.0.0.1

    • 127.0.0.1

    • 128.0.0.1

    • 129.0.0.1

    Correct Answer
    A. 127.0.0.1
  • 31. 

    1. What is defined as a bundle of application software designed to significantly improve network efficiency and productivity?

    • Fault management server

    • Security management server

    • Network management server

    • Performance management server

    Correct Answer
    A. Network management server
  • 32. 

    32. What usually has the most significance when determining the amount of space and access time users are given on a file server?

    • Rank

    • Duty hours

    • Job position

    • Time on station

    Correct Answer
    A. Job position
  • 33. 

    38. Why should only one possibility of a network problem be troubleshot at a time?

    • For better documentation

    • To effectively eliminate ideas not the problem

    • To ensure all personnel are informed of the results

    • Isolate a definite cause if teh action fixes the problem

    Correct Answer
    A. Isolate a definite cause if teh action fixes the problem
  • 34. 

    53. Ideally the average network utilization value should be less than

    • 20%

    • 25%

    • 30%

    • 40%

    Correct Answer
    A. 30%
  • 35. 

    91. What standard is utilized by the defense messaging system for messaging services?

    • TCP/IP

    • SMNP

    • X.400

    • X.500

    Correct Answer
    A. X.400
  • 36. 

    24. What defines the rules by which operations can be performed on a particular resource?

    • Rights

    • Permissions

    • Access control lists

    • Hardware configuration

    Correct Answer
    A. Permissions
  • 37. 

    34. What is the name for the core set of software instructions contained in operating systems on which the higher-level functions are based?

    • BOOT.IOS

    • ROOT.SYS

    • Boot Kernel

    • System Kernel

    Correct Answer
    A. System Kernel
  • 38. 

    43. What is an indication that a noteworthy event occured on the network?

    • Poll

    • Push

    • Alarm

    • Notification

    Correct Answer
    A. Alarm
  • 39. 

    77. In what step of the Barrier Reef process do you map both the physical and logical topology of your network?

    • Know thyself

    • Determine requirements

    • Policy information

    • Network monitoring

    Correct Answer
    A. Know thyself
  • 40. 

    68. What is the process of analyzing threats against and the vulnerabilities of an information system?

    • Authentication

    • Accreditation

    • Risk analysis

    • Certification

    Correct Answer
    A. Risk analysis
  • 41. 

    80. What is the intrusion practice of encapsulationg a message inside a second message that will pass through the firewall?

    • Tunneling

    • Identification spoofing

    • Application-based attacks

    • Second message encryption

    Correct Answer
    A. Tunneling
  • 42. 

    16. What type of SNMP protocol node is responsible to authenticate logons for clients by validating the supplied user name and password against the account in the database?

    • Network management controllers

    • Stand-alone servers

    • Domain controllers

    • Member servers

    Correct Answer
    A. Domain controllers
  • 43. 

    63. What color on the system management automated reprot tracking system alarm log indicates one or more events?

    • Blue

    • Purple

    • Orange

    • Yellow

    Correct Answer
    A. Purple
  • 44. 

    71. What is a measure used to verify the eligibility  of a subject and the ability of the subject to access certain information?

    • Authentication

    • Recertification

    • Accreditaiton

    • Identification

    Correct Answer
    A. Authentication
  • 45. 

    14. Which category of SMNP node is responsible for monitoring, collecting and reporting management data to the management system?

    • Primary domain controller

    • Backup domain controlller

    • Manager

    • Agent

    Correct Answer
    A. Agent
  • 46. 

    29. When a new folder or file is created on a NTFS partition, what permissions are automatically assigned?

    • Global group permissions

    • Everyone group permissions

    • No permissions are automatically assigned

    • Inherited permissions of the folder it is contained in

    Correct Answer
    A. Inherited permissions of the folder it is contained in
  • 47. 

    62. What componet of the system management automated report tracking system application contains knowledge of available domain managers?

    • Broker

    • Client

    • Probe

    • Console

    Correct Answer
    A. Broker
  • 48. 

    25. What is used to verify the level of availability an individual has to the resource

    • Rights

    • Permissions

    • Access control lists

    • Hardware configuration

    Correct Answer
    A. Access control lists
  • 49. 

    31. What is one way to increase file server efficiency?

    • Reducing file space to user

    • Reducing the available hours of use

    • Limiting the access times of typical users

    • Routinely running defrag software

    Correct Answer
    A. Limiting the access times of typical users

Quiz Review Timeline (Updated): Mar 19, 2022 +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Mar 19, 2022
    Quiz Edited by
    ProProfs Editorial Team
  • Jun 29, 2010
    Quiz Created by
    Societycat
Back to Top Back to top
Advertisement
×

Wait!
Here's an interesting quiz for you.

We have other quizzes matching your interest.