8
Which security protocol is a virtual private network most likely to use? Point to point tunneling protocol SSL secure socket layer Frame relay One way encryption When is NetBIOS routable? Never Only on an IP network Only on an IPX network When combined with NetBEUI or TCP/IP Which body regulates and assigns network addresses. InterNIC NIC User None of the above Why is the wc command used? It is used for sorting. It reads the file. It counts lines and char from file. It gives the line index. ___________________ are collections of user and computer configuration settings that can be linked to computers, sites, domains, and OUs to modify computer settings and specify the behavior of users’ desktops. Groups Group Policies OU Profiles Ans=b

Which Security Protocol is a Virtual Private Network Most Likely to Use

Embed Size (px)

Citation preview

Page 1: Which Security Protocol is a Virtual Private Network Most Likely to Use

Which security protocol is a virtual private network most likely to use?

Point to point tunneling protocol

SSL secure socket layer

Frame relay

One way encryption

When is NetBIOS routable?

Never

Only on an IP network

Only on an IPX network

When combined with NetBEUI or TCP/IP

Which body regulates and assigns network addresses.

InterNIC

NIC

User

None of the above

Why is the wc command used?

It is used for sorting.

It reads the file.

It counts lines and char from file.

It gives the line index.

___________________ are collections of user and computer configuration settings that can be linked to computers, sites, domains, and OUs to modify computer settings and specify the behavior of users’ desktops.

Groups

Group Policies

OU

Profiles

Ans=b

You are preparing a package for deployment. Which of the following actions should you perform if you receive the message Cannot Prepare Package For Deployment?

Check your permissions for the GPO

Page 2: Which Security Protocol is a Virtual Private Network Most Likely to Use

Check connectivity with the SDP

Check your permissions for the SDP

Set the appropriate category for the package

Ans=b

Which mode starts the system in debugging mode that is useful only for troubleshooting operating system bugs?

Debugging mode

Enable boot logging

Safe mode

None of the Above

Ans=cWhich tracks events related to user rights,auditing and trust relationships?

Audit Policy Change

Audit Account Logon Events

Audit Object Access

None of the Above

Ans=bYou need to find out the total size of users mailbox.What should yo do?

Run Get-MailboxStatistics cmdlet

Run Get-MailboxDatabase cmdlet

Run Get-MailboxData cmdlet

None of the above

A mailbox has 60 KB of mailbox rules.You need to move the mailbox from your Exchange Server 2007 computer to an Exchange Server 2003 computer at a remote site.How should yo do?

Run the Move-Mailbox cmdlet with the IgnoreRuleLimitErrors parameters.

Run the Move-Mailbox cmdlet with the IgnorePolicyMatch parameters.

Run the Make-Mailbox cmdlet with the IgnorePolicyMatch parameters.

None of the above

Your Exchange Server 2007 organistaion contains a Client Access Server and Hub Transport server.The Client Access Server fails.You need to add the Client Access Server role to the existing Hub Transport server.What will you do?

Page 3: Which Security Protocol is a Virtual Private Network Most Likely to Use

Use the Add or Remove Programs applet in control panel

Run the exsetup /mode:install/roles:ClientAccess command.

Both

None of the above

What parameter is handy in situations where the mailbox already exists on the target system?

AllowMerge

RetryTimeout

ExcludeFolders

None of the above

Ans=aWhich group has complete access to all exchange properties and object organisation wide?

Exchange organisation administrators

Exchange recipient administrators

Exchange server administrators

Exchange view-only administrators

Ans=a

What is responsible for updating recipient information in the Edge Transport servers ADAM

ADAMUpdate

EdgeSync

RecipientUpdate

EdgeUpdate

Which role service allows users to access terminal servers hosted behind firewalls in a private network from any internet based client?

TS Gateway

TS RemoteApp

TS Web access

All the above

Ans=a

Which of the following best describes the registered port numbers?

Port Numbers ranging from 1024-49151 that any process can use.

Page 4: Which Security Protocol is a Virtual Private Network Most Likely to Use

Port numbers that ranging from 1 to 1023 used by TCP and UDP to identify well known services that a host can provide.

Port numbers reserved exclusively for World Wide Web services.

Port numbers reserved exclusively for DNS services.

Answer = B

Which of the following best describes the registered port numbers?

Port Numbers ranging from 1024-49151 that any process can use.

Port numbers that ranging from 1 to 1023 used by TCP and UDP to identify well known services that a host can provide.

Port numbers reserved exclusively for World Wide Web services.

Port numbers reserved exclusively for DNS services.

Ans=bWhich security protocol is a virtual private network most likely to use?

Point to point tunneling protocol

SSL secure socket layer

Frame relay

One way encryption

Ans=bWhen is NetBIOS routable?

Never

Only on an IP network

Only on an IPX network

When combined with NetBEUI or TCP/IP

Ans=dWhich body regulates and assigns network addresses.

InterNIC

NIC

User

None of the above

Ans=a

Page 5: Which Security Protocol is a Virtual Private Network Most Likely to Use

Which command changes the existing route?

route change

route delete

route print

None of the above

Ans=a

Which command lists the contents of the NetBIOS name cache by IP adddress?

nbtstat -c

nbtstat -p

nbtstat -a

None of the above

Ans=aA Linux system crashes everyday at the same time and need to be re-booted. Which of the following would provide evidence of what was happening on the system at that time?

Run dmesg

Run uptime

Look in /etc/shutdown

Look in /var/log/messages

Ans=dYou know that the info utility provides easier to understand documentation but you have never used it. How can you access a tutorial on using info?

man info

info

info info

info help

Answer=a

Which body regulates and assigns network addresses.

InterNIC

NIC

User

None of the above

Answer=a

Page 6: Which Security Protocol is a Virtual Private Network Most Likely to Use

Which command changes the existing route?

route change

route delete

route print

None of the above

Answer=a

A Linux system crashes everyday at the same time and need to be re-booted. Which of the following would provide evidence of what was happening on the system at that time?

Run dmesg

Run uptime

Look in /etc/shutdown

Look in /var/log/messages

Answer=dYou know that the info utility provides easier to understand documentation but you have never used it. How can you access a tutorial on using info?

man info

info

info info

info help

Answer=cWhat does the command "rpm -Uvh package-update-3.5.i386.rpm" do?

Uninstalls the package and releated hidden files.

Upgrades the package and provides installation status.

Allows the user to view hidden files installed with the package.

Verifies that the package is installed correctly and report errors.

Answer=bAfter installing Linux onto a dual-processor machine, the administrator suspects that only 1 processor initialized successfully during the boot process.How could this be verified?

Run cpuinfo.

Check /var/log/messages for errors.

Run dmesg to review the log file.

Run ps to see if both CPUs appear.

Page 7: Which Security Protocol is a Virtual Private Network Most Likely to Use

Answer=aFirewall rules can be configured in linux through_______.

IPTables

SMB

IPP

All of the above

Answer=a

From where can the passwd file be accessed?

/usr/bin

/etc/passwd

/sbin/passwd

/root/Desktop

Answer=bWhy is the wc command used?

It is used for sorting.

It reads the file.

It counts lines and char from file.

It gives the line index.

Answer=c