![]() |
INT249 System Administration Mid Term Exam Question (MTE) Paper. |
A) RAID0
B) RAID1
C) RAID5
D) RAID2
Show Answer
Q2) You are configuring a Windows 2000 Server computer as a Routing and Remote Access server for a Branch office. You discover that an incorrect driver was installed during the installation of the modem. You attempt to remove the modem by using Phone and Modem Options in Control Panel. After each attempt to remove the modem by using this method, the computer stops responding. You restart the computer again. You must install the correct driver for the modem as quickly as possible. What should you do?
A) Use the Add/Remove Hardware wizard to uninstall the modem. Restart the server
B) Shut down the server, remove the modem card, and restart the server. Shut down the server again, insert the modem card, and restart the server
C) Delete all references to modems in the registry
D) Run the Modem troubleshooter and remove the modem when prompted. Restart the server
Show Answer
Q3) Which of the following is not an advantage of NAS?
A) A NAS has lower latency and higher reliability than a SAN
B) A NAS typically supports multiple RAID methods
C) A NAS supports high throughput
D) Implementing a NAS is inexpensive
Show Answer
Q4) Which of the following is used as identifiers for host bus adapters?
A) MAC addresses
B) World Wide Names
C) IP addresses
D) LUNs
Show Answer
Q5) Which of the following is not a part of hardening the system?
A) Disabling all unused services
B) Uninstalling unneeded applications
C) Ensuring all patches are installed
D) Ensuring sufficient processing power
Show Answer
Q6) Which statement is true with respect to hypervisors?
A) Type II is called native
B) Type II runs directly on the host’s hardware
C) A Type II hypervisor runs within a conventional operating system environment
D) VMware Workstation and VirtualBox exemplify Type I hypervisors
Show Answer
Q7) Which technique is used to allocate relative access to the CPU among VMs?
A) Reservations
B) Limits
C) Shares
D) Time slots
Show Answer
Q8) Which RAID type provides no fault tolerance?
A) RAID 0
B) RAID 1
C) RAID 3
D) RAID 5
Show Answer
Q9) Which RAID type is also called mirroring?
A) RAID 0
B) RAID 1
C) RAID 3
D) RAID 5
Show Answer
Q10) Which server role automates the process of providing an IP configuration to devices in the network?
A) DNS
B) Routing and Remote Access
C) DHCP
D) NTP5
Show Answer
Q11) Which of the following protocols is used when mail servers send email?
A) POP3
B) SMTP
C) SNMP
D) IMAP4
Show Answer
Q12) Which of the following describes a drive that needs to be disconnected from the software in the server before begin changed out and then reconnected after the swap is done?
A) Hot pluggable
B) Warm pluggable
C) Warm pluggable
D) Hot swappable
Show Answer
Q13) Which type of fault tolerance is recommended for servers running applications that do not have long-running in-memory state or frequently updated data?
A) Load balancing
B) Hot site
C) Clustering
D) Cold site
Show Answer
Q14) Which server role uses HTTP as its transfer mechanism?
A) Web
B) Application
C) Directory
D) Database
Show Answer
Q15) Which of the following are the software stubs that allow devices to communicate with the operating system?
A) Drivers
B) Patches
C) Shims
D) Manifests
Show Answer
Q16) Which authentication mechanism is an example of something you have?
A) Password
B) Username
C) Smart card
D) Retina scan
Show Answer
Q17) Which authentication mechanism is an example of something you have?
A) Password
B) Username
C) Smart card
D) Retina scan
Show Answer
Q18) Which of the following is not a drawback of using active RFID chips?
A) The tag signal can be read by any reader in range
B) The tag signal can only go a few feet
C) Multiple readers in an area can interfere with one another.
D) Multiple devices can interfere with one another when responding
Show Answer
Q19) Which of the following offers the most flexibility in reacting to security events?
A) Cameras
B) Security guards
C) Motion sensors
D) Intrusion prevention systems
Show Answer
Q20) Which of the following statements is false with respect to safes?
A) All safes are fireproof.
B) United Laboratories (UL) assigns ratings to safes that you can use to assess the suitability of the safe
C) Those that are fire resistant will protect a document from being destroyed
D) When considering a safe, you should focus on two items: the ease with which the safe can be compromised and the ability of the safe to withstand a fire
Show Answer
Q21) Which of the following is true of the requirements to use SSL on a website?
A) The web server must have a certificate
B) The client must have a certificate
C) The web server and the client must have a certificate
D) Neither the web server nor the client must have a certificate
Show Answer
Q22) You have two devices that are connected to the same switch with IP addresses in the same network. After placing the two devices in separate VLANs, they can no longer ping one another. At what layer of the OSI model are the VLANs providing separation?
A) Network
B) Data link
C) Session
D) Transport
Show Answer
Q23) Which of the following is not true of an HIDS?
A) A high number of false positives can cause a lax attitude on the part of the security team
B) An HIDS cannot address authentication issues
C) Encrypted packets cannot be analyzed
D) An HIDS monitors all traffic that goes through it looking for signs of attack on any machine in the network
Show Answer
Q24) Which of the following can read the individual commands of the protocols that are being served?
A) Stateful firewall
B) Packet filtering firewall
C) Application-level proxy
D) Host-based firewall
Show Answer
Q25) In which of the following devices are records kept using a table that tracks every communications channel?
A) Stateful firewall
B) Packet filtering firewall
C) Application-level proxy
D) Host-based firewall
Show Answer
Q26) Which statement is false with respect to router ACLs?
A) The order of the rules is important
B) An implied deny all rule is located at the end of all ACLs
C) It is possible to log all traffic that meets any of the rules
D) All rules in the list are considered before the traffic is allowed
Show Answer
Q27) Which of the following is true of the requirements to use SSL on a website?
A) The web server must have a certificate
B) The client must have a certificate
C) The web server and the client must have a certificate
D) Neither the web server nor the client must have a certificate
Show Answer
Q28) Which of the following cannot be accomplished using port security?
A) Set the minimum number of MAC addresses that can be seen on a port
B) Take a specific action when a port violation occurs
C) Define exactly which MAC addresses are allowed on the port
D) Set the maximum number of MAC addresses that can be seen on a port
Show Answer
Q29) Which of the following would Joe use to encrypt a message that only Sally could decrypt?
A) Joe’s private key
B) Sally’s private key
C) Joe’s public key
D) Sally’s public key
Show Answer
Q30) You have two devices that are connected to the same switch with IP addresses in the same network. After placing the two devices in separate VLANs, they can no longer ping one another. At what layer of the OSI model are the VLANs providing separation?
A) Network
B) Data link
C) Session
D) Transport
Show Answer
Q31) Which of the following has lost favor to SSH because it sends data—including passwords— in plain-text format?
A) POP3
B) Telnet
C) RDP
D) IMAP
Show Answer
Q32) If a process fails, most operating system write the error information to a ______
A) New file
B) Another running process
C) Log file
D) None of the mentioned
Please Post End Term Question Of INT249 ... Please We Need it
ReplyDeleteThank you for your patience! I appreciate your eagerness to access the end-term question for INT249. As promised, I am uploading the end-term question Soon.
DeleteThank you for your comment.