Эротические рассказы

CompTIA Network+ Practice Tests. Craig ZackerЧитать онлайн книгу.

CompTIA Network+ Practice Tests - Craig Zacker


Скачать книгу
(MDFs) and Intermediate Distribution Frames (IDFs) should incorporate details on which of the following elements? (Choose all that apply.)PowerEnvironmentDistancesCosts

      52 At what point in the installation process should patch panel ports and wall plates be labeled?When the patch panels and wall plates are installedWhen a length of cable is cut from the spoolWhen the cables are attached to the connectorsWhen the cable runs are tested, immediately after their installation

      53 Which of the following is the term used to describe a wiring nexus that is typically the termination point for incoming telephone and Wide Area Network (WAN) services?MDFMTBFIDFRDPMOU

      54 Your department is experiencing frequent delays as users wait for images to render using their outdated graphics software package. As a result, you are planning to submit a change request for a new software product at the monthly meeting of the company's change management team. Which of the following types of information are likely to be included in your request? (Choose all that apply.)The possibility of rolling back to the previous software, if necessaryThe procedure for installing and configuring the new softwareAn estimate of the productivity increase realizable with the new softwareA list of software and hardware upgrades or modifications needed to run the new software

      55 A rack diagram is typically ruled into vertical rack units, which are standard-sized divisions that hardware manufacturers use when manufacturing rack-mountable components. Which of the following is the standard vertical height of a single rack unit?1.721 inches1.75 inches40 mm3.5 inches

      56 The change request for new graphics software that you submitted to your company's change management team has been approved. Now it is time to implement the change. Which of the following administrative tasks will most likely be the change management team's responsibility during the implementation process? (Choose all that apply.)Authorizing downtimeNotifying usersDesignating a maintenance windowDocumenting all modifications made

      57 Which of the following IT asset management documents published by the International Organization for Standardization (ISO) provides an overview of the ITAM concepts discussed in the ISO 19770 family of standards?ISO 19770-1ISO 19770-2ISO 19770-3ISO 19770-4ISO 19770-5

      58 A rack-mounted device that is four units tall will be approximately what height in inches?1.753.547

      59 Which of the following types of documentation should indicate the complete route of every internal cable run from wall plate to patch panel?Physical network diagramAsset managementLogical network diagramWiring schematic

      60 Which of the following statements about physical network diagrams and logical network diagrams are true? (Choose all that apply.)A physical network diagram is created automatically, and a logical network diagram is created manually.A physical network diagram depicts hardware devices and the connections between them.A logical network diagram contains all of the information you would need to rebuild your network from scratch.A logical network diagram typically contains the IP addresses of network devices.

      61 In a standard Cisco network diagram, what component does the symbol in the figure represent?A switchA routerA hubA gateway

      62 Which of the following is the term used to describe a wiring nexus—typically housed in a closet—where horizontal networks meet the backbone?MDFMTBFIDFSLAMOU

      63 What is the width of a standard equipment rack in a datacenter?12 inches16 inches19 inches24 inches

      64 In a standard Cisco network diagram, what component does the symbol in the figure represent?A switchA routerA hubA gateway

      65 The precise locations of devices in a datacenter are typically documented in which of the following documents?Rack diagramNetwork mapWiring schematicLogical diagramBusiness continuity planAudit and assessment report

      66 Which of the following statements about network maps is true?Network maps are typically drawn to scale.Network maps typically contain more information than network diagrams.Network maps must be read/write accessible to all personnel working on the network.Network maps diagram only the locations of cable runs and endpoints.

      67 Which of the following types of documentation should contain the chemical composition of all cleaning compounds used in a datacenter?ESDMSDSNDABYODSOP

      68 After being hired for a job as an IT administrator, you have been assigned two user accounts, one of which is intended for general use and the other only for administrative tasks. You are also required to sign an agreement that outlines the restrictions for your account use. Specifically, you are not permitted to use the administrative account for anything other than administrative tasks, including browsing the Internet and accessing data for which you are not authorized. Which of the following is the best name for this type of agreement?Remote access policiesService level agreementAcceptable use policyPrivileged user agreement

      69 You are working for a company with numerous branch offices scattered around the country, and you are required to travel to these offices frequently. Each branch office has some means of accessing the network at the company headquarters. Some use frame relay, some use Virtual Private Networks (VPNs), and a few even use dial-in access. During one trip, you mention to a branch office manager that you intend to connect to the headquarters network that night from your hotel room. The manager warns you that this is against company policy, but you are not so sure. Where in the company documentation should you look to confirm this?Remote access policiesService level agreementAcceptable use policyPrivileged user agreement

      70 Which of the following is a document that a company's new hires might want to consult to determine whether they are permitted to install their own personal software on company computers?SLAAUPNDABYOD

      71 Many employees have been contacting the IT help desk asking how they can connect their personal smartphones and tablets to the company's wireless network. This has raised issues regarding network security and technical support. You have been asked to draft a policy for the in-house use of personal electronics that addresses these issues. Which of the following describes the document that you will be creating?SLAAUPNDABYOD

      72 You are going to work for a new company as a software developer, and Human Resources (HR) has notified you that you must sign a document guaranteeing that you will maintain confidentiality about the company's products and programming code in perpetuity. Which of the following documents contains this agreement?SLAAUPNDAMOUBYOD

      73 Which of the following are typical elements of a corporate password policy? (Choose all that apply.)Minimum password lengthUse of special charactersUnique passwordsFrequent password changes

      74 Alice is implementing a new password policy that requires all users to change their passwords every seven days. What further modification can she make to the password policy to prevent users from thwarting the password change requirement?Specify a minimum password lengthRequire the use of special charactersRequire the creation of unique passwordsSpecify a maximum password change interval

      75 Which of the following are settings typically included in an account lockout policy? (Choose all that apply.)Account lockout durationTime allowed between attemptsAccount lockout thresholdReset account lockout threshold counter

      76 How do account lockouts help to prevent intruders from cracking passwords?By forcing users to select passwords of a minimum lengthBy preventing users from entering incorrect passwords more than a specified number of timesBy preventing users from reusing the same passwordsBy requiring an additional authentication method, such as a fingerprint

      77 Which of the following data loss prevention terms is used to describe dangers pertaining to data that is being transmitted over a network? (Choose all that apply.)Data in useData at restData in motionData in transit

      78 Which of the following data loss prevention terms is used to describe dangers pertaining to data while a user is loading it into an application?Data in useData at restData in processData in motion

      79 Which of the following data loss prevention terms is used to describe potential dangers of data loss or data leakage to unauthorized parties while the data is stored without being used?Data in useData at restData in motionData on disk

      80 Which of the following is not one of the standard terms used in data loss prevention?Data onlineData at restData in motionData in use

      81 The


Скачать книгу
Яндекс.Метрика