IT212.Mod5Quiz.NP6

pdf

School

Butler Community College *

*We aren’t endorsed by this school

Course

212

Subject

Information Systems

Date

Apr 3, 2024

Type

pdf

Pages

25

Uploaded by ChefFogDinosaur5

Report
IT 212 Module 5 Quiz - NP6.0 Candidate: Marques Townsend (mtownz11) Date: 2/11/2024, 10:56:49 AM • Time Spent: 32:23 Score: 97% Passing Score: 65% Question 1. Correct Dan wants to implement reconnaissance countermeasures to help protect his DNS service. Which of the following actions should he take? Review company websites to see which type of sensitive information is being shared. Install patches against known vulnerabilities and clean up out-of-date zones, files, users, and groups. Implement policies that restrict the sharing of sensitive company information on employees' personal social media pages. Limit the sharing of critical information in press releases, annual reports, product catalogs, or marketing materials. Explanation Installing patches against known vulnerabilities and cleaning up out-of-date zones, files, users, and groups are good DNS reconnaissance countermeasures. Reviewing company websites to see which type of information is being shared about sensitive information is conforming to an Internet Information Sharing Policy. Implementing policies that restrict the sharing of sensitive company information on employees' personal social media pages is conforming to an Employee Social Media Information Sharing Policy.
Limiting the sharing of critical information in press releases, annual reports, product catalogs, and marketing materials is conforming to a Printed Materials Information Sharing Policy. References 13.1.1 Network Hardening Techniques 13.1.2 Network Hardening Techniques Facts 13.4.1 Update Deployment and Management 13.4.2 Configure an Update Server 13.4.3 Update Firmware 13.4.5 Update Deployment and Management Facts q_updated_management_patches_np6.question.fex Question 2. Correct While deploying Windows updates, when would you use the critical update ring? When deploying updates to users that want to stay on top of changes. When deploying updates to important systems (only after the update has been vetted). When deploying updates for any general user within the organization. When deploying updates to most of the organization in order to monitor for feedback. Explanation The critical deployment ring is for critical machines that you don't want to update until the update has been vetted. These are machines that are critical to the running of your organization or that are running essential projects. You can defer feature updates for up six months and quality improvement updates for up to 30 days. The preview ring is for those users who want to stay on top of changes and are on the cutting edge. They want to see the latest and greatest. This is called the Windows Insider Program. It allows you to get the most recent updates for your system. The broad ring includes the Semi-Annual Channel and is broadly deployed to most of the organization to monitor for feedback. References
13.1.1 Network Hardening Techniques 13.1.2 Network Hardening Techniques Facts 13.4.1 Update Deployment and Management 13.4.2 Configure an Update Server 13.4.3 Update Firmware 13.4.5 Update Deployment and Management Facts q_updated_management_critical_01_np6.question.fex Question 3. Correct When deploying Windows updates, when would you use the preview update ring? When deploying updates to most of the organization in order to monitor for feedback. When deploying updates to important machines (only after the update has been vetted). When deploying updates to users that want to stay on top of changes. When deploying updates for any general user within the organization. Explanation The preview ring is for those users who want to stay on top of changes and are on the cutting edge. They want to see the latest and greatest. This is called the Windows Insider Program. It allows you to get the most recent updates for your system. The critical deployment ring is for critical machines that you don't want to update until the update has been vetted. These are machines that are critical to the running of your organization or that are running important projects. You can defer feature updates for up six months and quality improvement updates for up to 30 days. The broad ring includes the Semi-Annual Channel and is broadly deployed to most of the organization to monitor for feedback. References 13.1.1 Network Hardening Techniques 13.1.2 Network Hardening Techniques Facts 13.4.1 Update Deployment and Management 13.4.2 Configure an Update Server 13.4.3 Update Firmware
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
13.4.3 Update Firmware 13.4.5 Update Deployment and Management Facts q_updated_management_critical_02_np6.question.fex Question 4. Correct Which backup strategy backs up all files from a computer's file system (regardless of whether the file's archive bit is set or not) and then marks them as backed up? Incremental Full Differential Copy Explanation A full backup backs up all files from a computer's file system regardless of whether a file's archive bit is turned on or off. It also marks them as backed up. Incremental and differential backups only back up files that have their archive bit set. The copy backup strategy is used by the NTBACKUP.EXE backup utility on Windows servers. It backs up all files regardless of whether the archive bit is set. However, it does not mark them as backed up. References 11.7.3 Data Backup and Storage Facts q_backup_restore_full_01_np6.question.fex Question 5. Correct You just deployed a new Cisco router that connects several network segments in your organization. The router is physically located in a server room that requires an ID card for access. You backed up the router configuration to a remote location with an encrypted file. You access the router configuration interface from your notebook computer using a Telnet client with the username admin and the password admin. You used the MD5 hashing algorithm to protect the password. What else should you do to increase the security of this device? (Select two.) Use a web browser to access the router
Use a web browser to access the router configuration using an HTTP connection. Use TFTP to back up the router configuration to a remote location. Use encrypted Type 7 passwords. Change the default administrative username and password. Use an SSH client to access the router configuration. Explanation In this scenario, you need to address the following two key security issues: You should use an SSH (Secure Shell) client to access the router configuration. Telnet transfers data over the network connection in cleartext, exposing sensitive data to sniffing. You should change the default administrative username and password. Default usernames and passwords are readily available from websites on the internet. Encrypted Type 7 passwords on a Cisco device are less secure than those protected with MD5. Using HTTP and TFTP (Trivial File Transfer Protocol) to manage the router configuration could expose sensitive information to sniffers, as they transmit data in cleartext. References 11.8.1 Remote Management 11.8.2 Use Remote Desktop 11.8.4 Remote Management Facts q_remote_manage_ssh_01_np6.question.fex Question 6. Correct Which of the following is a protocol used for terminal emulation? SSH ICA RDP VNC Explanation
Explanation Most administrators use Secure Shell (SSH) for terminal emulation. VNC, ICA, and RDP are remote access protocols. References 11.8.1 Remote Management 11.8.2 Use Remote Desktop 11.8.4 Remote Management Facts q_remote_manage_ssh_02_np6.question.fex Question 7. Incorrect Which of the following are backed up during an incremental backup? Only files that have changed since the last full or differential backup. Only files that have changed since the last full backup. Only files that have changed since the last full or incremental backup. Only files that are new since the last full or incremental backup. Explanation An incremental backup only captures files that have changed since the last full or incremental backup. The primary attraction to this backup plan is that it requires less storage space and processing time to complete. Restoration starts from the last full backup and then requires the loading of each subsequent incremental backup for a full restoration. References 11.7.3 Data Backup and Storage Facts q_backup_restore_incremental_01_np6.question.fex
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
Question 8. Correct You manage a server at work that has just been configured with a new application. Consequently, the server has crashed several times during the last week. You think that you've resolved the problem, but you'd like to be able to manage the server remotely just in case more issues occur. Which of the following protocols should you use for remote management? (Select two.) L2TP VNC ICA PPP PPTP Explanation Use a remote access protocol to remotely manage devices. A remote access protocol allows you to interact with a computer's desktop without being present at the console. There are multiple protocols you can use for remote desktop connections. Virtual Network Computing (VNC) was originally designed for UNIX. Applications that use VNC include RealVNC, TightVNC, UltraVNC, and Vine Server. Independent Computing Architecture (ICA) is the protocol used by Citrix products (WinFrame and MetaFrame/XenApp). Remote Desktop Protocol (RDP) is the protocol developed by Microsoft and used in Microsoft's Terminal, Remote Desktop, and Remote Assistance solutions. Aqua Connect has now licensed RDP and created a version for Mac OS X. PPP (Point-to-Point Protocol) is a protocol that's used to control remote access. PPP allows the authentication, authorization, and accounting of remote access connections. PPTP (Point-to-Point Tunneling Protocol) and L2TP (Layer 2 Tunneling Protocol) are VPN protocols that provide a secure connection to a destination host or network through the internet . References 11.8.1 Remote Management
11.8.2 Use Remote Desktop 11.8.4 Remote Management Facts q_remote_manage_protocols_np6.question.fex Question 9. Correct Which of the following are backed up during a differential backup? Only files that have changed since the last full backup. Only files that have changed since the last full or differential backup. Only files that have changed since the last full or incremental backup. Only files that have been added since the last full or incremental backup. Explanation A differential backup only captures files that have changed since the last full backup. This backup strategy can create a shorter restoration time than an incremental backup, but this may consume more disk space, depending on the frequency of file changes. Restoration is a two-step process. You first load the last full backup and then finish the restoration by loading the last differential backup. References 11.7.3 Data Backup and Storage Facts q_backup_restore_differential_01_np6.question.fex Question 10. Correct Which of the following are true about Windows Update for Business? (Select three.) Windows Update for Business is a Group Policy management tool. Windows Update for Business works with all versions of Windows 10 except Windows 10 Home.
Windows Update for Business provides the latest features for your Windows 10 devices, but it does not include security upgrades. Windows Update for Business can be configured with Group Policy, Mobile Device Management, or Systems Center Configuration Manager. Windows Update for Business provides the latest features for your Windows 10 devices, including security upgrades. Windows Update for Business works with all versions of Windows 10. Windows Update for Business can only be configured with Group Policy. Explanation Windows Update for Business provides the latest features for your Windows 10 devices, including security upgrades. Windows Update for Business can be used with all versions of Windows 10 except Windows 10 Home. Windows Update for Business can be configured with Group Policy, Mobile Device Management, or Systems Center Configuration Manager. Microsoft Intune is a mobile device management (MDM) tool. References 13.1.1 Network Hardening Techniques 13.1.2 Network Hardening Techniques Facts 13.4.1 Update Deployment and Management 13.4.2 Configure an Update Server 13.4.3 Update Firmware 13.4.5 Update Deployment and Management Facts q_updated_management_business_01_np6.question.fex Question 11. Correct Your disaster recovery plan (DRP) calls for backup media to be stored at a different location. The location is a safe deposit box at the local bank. Because of this, the disaster
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
location. The location is a safe deposit box at the local bank. Because of this, the disaster recovery plan specifies that you must choose a method that uses the least amount of backup media but also allows you to quickly back up and restore files. Which backup strategy would BEST meet the DRP's specifications? Perform a full backup each day of the week. Perform a full backup once per week and an incremental backup the other days of the week. Perform a full backup once per month and an incremental backup the other days of the month. Perform a full backup once per week and a differential backup the other days of the week. Explanation Performing a full backup once per week and a differential backup the other days of the week would best meet this disaster recovery plan's specifications. The full backup backs up all files, usually to one tape, but the process can be time-consuming. The differential backup backs up all files since the last full backup. Performing a full backup each day would meet the requirement of using as few tapes as possible, but that backup process would be very time-consuming each day. Performing a full backup once per week and an incremental backup the other days of the week would be one of the fastest methods for backing up files, but it would require many tapes to complete the restore. The incremental backup only backs up files added or changed since the last backup. Because of this, in order to do a complete restore of the file system, you'd need a tape for each day of the week that the incremental backup ran. Performing a full backup once per month and an incremental backup the other days of the month would be the fastest method to back up files, but it would require many tapes to complete. This process only backs up files added or changed since the last backup. Because of this, in order to do a complete restore of the file system, you'd need a tape for each day of the month that the incremental backup ran. References 11.7.3 Data Backup and Storage Facts q_backup_restore_full_differential_02_np6.question.fex Question 12. Correct Your Windows system is a member of a domain. Windows Update settings are being
Your Windows system is a member of a domain. Windows Update settings are being controlled through Group Policy. How can you determine whether a specific security update from Windows Update is installed on the computer? Run the wuauclt.exe /listupdates command. Go to Programs and Features in Control Panel. Run the netsh winhttp import proxy source command. Check the Local Security Policy. Explanation To check a computer for a specific update, you click the View update history link in Windows Update. You can also click View installed updates in Programs and Features (both available through the Control Panel). The Wuauclt.exe command is the client component for Windows Update. One of this program's functions is to check for updates using settings configured locally or through Group Policy. You can run the wuauclt /detectnow command to force the computer to check for updates immediately. However, there is no option for seeing which updates have been installed. The netsh winhttp import proxy source command imports Internet Explorer's Internet Options settings directly. The Local Security Policy shows you the update settings you can control locally. In this scenario, because Group Policy is being used, these settings wouldn't tell you anything about the computer's configuration. References 13.1.1 Network Hardening Techniques 13.1.2 Network Hardening Techniques Facts 13.4.1 Update Deployment and Management 13.4.2 Configure an Update Server 13.4.3 Update Firmware 13.4.5 Update Deployment and Management Facts q_updated_management_control_panel_np6.question.fex Question 13. Correct Which of the following tools can you use to troubleshoot and validate Windows updates? (Select three.)
Windows Server Troubleshooter Windows Transfer Service PowerShell Windows Defender Windows Update Troubleshooter Device Manager Windows Server Update Service (WSUS) Explanation You can use PowerShell to look at and compile Windows Update logs. Doing so creates a file that's deposited on to your desktop. Windows Server Update Service (WSUS) is a role you can add to a server to manage updates. Rather than have all your organization's PCs go to Microsoft to get their updates, you can have the updates deposited in to the WSUS server. Windows Update Troubleshooter analyzes Windows Update Service, Background Intelligent Transfer Service (BITS), and Windows Network Diagnostics Service. The other answers are not tools you can use to troubleshoot and validate Windows updates. References 13.1.1 Network Hardening Techniques 13.1.2 Network Hardening Techniques Facts 13.4.1 Update Deployment and Management 13.4.2 Configure an Update Server 13.4.3 Update Firmware 13.4.5 Update Deployment and Management Facts q_updated_management_tools_np6.question.fex
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
Question 14. Correct You are the desktop administrator for your company. You would like to manage the computers remotely using a tool with a graphical user interface (GUI). Which of the following actions can you take to accomplish this? Establish a Remote Desktop connection to each computer. Use Telnet to connect to each computer. Send an assistance invitation. Run Remote Shell to manage each computer. Explanation To remotely manage computers using a graphical user interface, you can use Remote Desktop to establish a connection to each computer. Use Remote Shell and Telnet to execute commands on a remote computer. You initiate a Remote Assistance session by sending an assistance invitation. References 11.8.1 Remote Management 11.8.2 Use Remote Desktop 11.8.4 Remote Management Facts q_remote_manage_gui_np6.question.fex Question 15. Correct Your network performs a full backup every night. Each Sunday, the previous night's backup tape is archived. On a Wednesday morning, the storage system fails. How many restore operations would you need to perform to recover all of the data? One Two Three Four
Explanation You would need to perform a single restore procedure. You would simply restore the last full backup from Wednesday to restore all of the data. The fact that you archived one backup each week is irrelevant to restoring the latest data. The archived copy is only used to restore something to a specific point in time. If you had used full and differential backups, you would restore the last full and last differential backups. If you had used full and incremental backups, you would restore the last full and each subsequent incremental backup. References 11.7.3 Data Backup and Storage Facts q_backup_restore_full_02_np6.question.fex Question 16. Correct Some users report that frequent system crashes have started happening on their workstations. Upon further investigation, you notice that these users all have received a recent update to the same application. Where would you go to conduct a root cause analysis? Firewall log Security log Network log Application log Explanation You would choose the application log. Most applications produce some type of event logging. These logs show application access, crashes, updates, and any other relevant information that could be valuable in conducting a root cause analysis. The application may
information that could be valuable in conducting a root cause analysis. The application may be crashing or not performing correctly, and this could be tied to suspicious activity that may indicate malicious intent. Network logs tell you what is coming into and leaving your network. A firewall log identifies traffic that has been allowed or denied through a firewall. A security log records information related to logons, such as incorrect password attempts and user right application. References 11.3.1 Log File Management 11.3.2 Configure a Syslog Server on a Router 11.3.3 Configuring Remote Logging on Linux 11.3.4 Logging Events on pfSense 11.3.5 Log File Management Facts 11.4.3 View Event Logs 13.2.1 Authentication q_log_management_applogs_np6.question.fex Question 17. Correct You suspect that cache poisoning or spoofing has occurred on your network. Users are complaining of strange web results and being redirected to undesirable sites. Which log would help you determine what's going on? Application logs Network logs DNS logs Security logs Explanation In this scenario, you should take a look at the DNS logs for DNS cache poisoning. After this, you can begin monitoring DNS query traffic. Network logs do not help you with spoofed host name resolution. Application logs do not help you determine DNS poisoning. Security logs do little to help you identify spoofing.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
References 11.3.1 Log File Management 11.3.2 Configure a Syslog Server on a Router 11.3.3 Configuring Remote Logging on Linux 11.3.4 Logging Events on pfSense 11.3.5 Log File Management Facts 11.4.3 View Event Logs 13.2.1 Authentication q_log_management_dnslogs_np6.question.fex Question 18. Correct Which of the following is a tool that allows access to the graphical desktop environment of another Windows client system over a network connection? SSH Remote Desktop Gateway Remote Desktop VPN Explanation Remote Desktop is a software tool that allows access to the graphical desktop environment of another Windows client system over a network connection. While SSH and VPNs help to provide remote access, they are not specific to Windows client systems. The Remote Desktop Gateway is not the software tool used to directly provide the graphical desktop environment to the user. References 11.8.1 Remote Management 11.8.2 Use Remote Desktop 11.8.4 Remote Management Facts q_remote_manage_desktop_np6.question.fex Question 19. Correct
You are the network administrator for a growing business. When you were hired, the organization was small, and only a single switch and router were required to support your users. During this time, you monitored log messages from your router and switch directly from each device's console. The organization has grown considerably in recent months. Now you manage eight individual switches and three routers. It's becoming more and more difficult to monitor these devices and stay on top of issues in a timely manner. What should you do? Consolidate network resources down to one or two switches. Hire additional resources to help monitor and manage your network infrastructure. Use Syslog to implement centralized logging. Use a remote access utility, such as SSH, to access router and switch consoles remotely. Explanation In this scenario, a cost-effective option would be to implement centralized logging with Syslog. By default, routers and switches send all log messages regardless of severity level directly to the console. If a network contains a small number of devices, this default configuration is usually manageable. However, on a growing network, it quickly becomes impractical to visit each device to view log messages. Instead, you can configure your network devices to redirect logging to a Syslog server somewhere on the network. By doing this, you can view all the log messages from all the devices from a single location. Reducing the number of switches on a growing network is generally not advisable. Using a remote access utility can help alleviate the issue to an extent. However, you still have to manually connect to and monitor each individual system. If the network continues to grow, this option will quickly become unviable. It's not necessary to hire additional administrators in this scenario. References 11.3.1 Log File Management 11.3.2 Configure a Syslog Server on a Router 11.3.3 Configuring Remote Logging on Linux 11.3.4 Logging Events on pfSense 11.3.5 Log File Management Facts 11.4.3 View Event Logs
11.4.3 View Event Logs q_log_management_syslogs_03_np6.question.fex Question 20. Correct Which of the following remote protocols was originally designed for UNIX? VPN RDP ICA VNC Explanation Virtual Network Computing (VNC) was originally designed for UNIX. ICA, VPN, and RDP are remote desktop protocols. However, they were not originally designed for UNIX. You can use a virtual private network (VPN) for remote access, but it is not a protocol that was originally designed for UNIX. References 11.8.1 Remote Management 11.8.2 Use Remote Desktop 11.8.4 Remote Management Facts q_remote_manage_vnc_np6.question.fex Question 21. Correct Which Syslog level indicates an emergency that could severely impact the system and cause it to become unusable? Level 2 Level 0 Level 6 Level 4 Explanation
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
Level 0 indicates an emergency that could severely impact the system and cause it to become unusable. Level 2 indicates a serious errors in secondary subsystem that should be addressed immediately. Level 4 indicates a warning that could eventually become a problem if not addressed. Level 6 indicates an informational message. References 11.3.5 Log File Management Facts q_log_management_level_02_np6.question.fex Question 22. Correct Which of the following is a role service that allows users with the Remote Desktop Connection client and an internet connection to connect on an internal network. RD CAP Remote Desktop RD Gateway RD RAP Explanation Remote Desktop Gateway (RD Gateway) is a role service that allows users with the Remote Desktop Connection client and an internet connection to connect on an internal network. A Remote Desktop Resource Authorization Policy (RD RAP) identifies the internal resources that users can access. A Remote Desktop Connection Authorization Policy (RD CAP) identifies the users who can
establish a connection through the RD Gateway server. Remote Desktop is a software tool. References 11.8.1 Remote Management 11.8.2 Use Remote Desktop 11.8.4 Remote Management Facts q_remote_manage_gateway_np6.question.fex Question 23. Correct What is one of the benefits of Windows Update Delivery Optimization? Delivery Optimization lets you set active hours to indicate normal use for your device. The device will not reboot to install updates during this time. Delivery Optimization lets you view the updates you have installed. It also lets you uninstall an update if needed. Delivery Optimization allows updates to be downloaded and distributed much more quickly than with previous versions of Windows. Delivery Optimization lets you know when and if there are any urgent updates for your system and provides you with an option to download and install them. Explanation Delivery Optimization allows updates to be downloaded and distributed much more quickly than with previous versions of Windows. Clicking Advanced Options from here lets you throttle the bandwidth for downloading and uploading updates, including the monthly limit. From Windows Update, you would use View update history to view all the updates that have been applied to your system. You can also install updates from here. From Windows Update, you would use Change active hours to set active hours to indicate normal use for your device. The device will not reboot to install an update during this time.
normal use for your device. The device will not reboot to install an update during this time. From Windows Update, you would use Check for updates to access Microsoft's site and see if any new updates are available for you system. References 13.1.1 Network Hardening Techniques 13.1.2 Network Hardening Techniques Facts 13.4.1 Update Deployment and Management 13.4.2 Configure an Update Server 13.4.3 Update Firmware 13.4.5 Update Deployment and Management Facts q_updated_management_delivery_np6.question.fex Question 24. Correct In a large organization, a group of servers are running critical applications that are essential for the company's operations. The IT manager wants to ensure these servers are updated only after thorough vetting of the updates to minimize potential downtime. Which update ring should the IT manager use for these servers? Critical Broad Preview Windows Insider Program Explanation Critical is the correct answer. This ring is for critical machines that the organization wants to update only after the update is first vetted. Feature updates can be deferred for up to 6 months and quality improvement updates for up to 30 days. This is the most suitable ring for servers running critical applications as it provides the highest level of vetting before updates are applied. The Preview ring is for users who want to stay on top of changes and are on the cutting edge. They want to see the latest updates, even if they may not be fully vetted and could potentially cause downtime. This is not suitable for critical servers as it may introduce instability. The Broad ring is for most users within an organization. Feature updates can be deferred for up to 120 days and quality updates for seven - 14 days. While this ring provides some level of vetting, it may not be sufficient for critical servers.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
Windows Insider Program is for users who want to receive the most recent updates. These updates may not be fully vetted and could potentially cause downtime. This is not suitable for critical servers as it may introduce instability. References 13.1.1 Network Hardening Techniques 13.1.2 Network Hardening Techniques Facts 13.4.1 Update Deployment and Management 13.4.2 Configure an Update Server 13.4.3 Update Firmware 13.4.5 Update Deployment and Management Facts q_updated_management_7days_np6.question.fex Question 25. Correct Which of the following is a standard for sending log messages to a central logging server? OVAL Syslog LC4 Nmap Explanation Syslog is a protocol that defines how log messages are sent from one device to a logging server on an IP network. The sending device sends a small text message to the Syslog receiver (the logging server). The Open Vulnerability and Assessment Language (OVAL) is an international standard for testing, analyzing, and reporting a system's security vulnerabilities. LC4 (previously called LOphtcrack) is a password cracking tool. Nmap is a network mapping tool that performs ping and port scans. References 11.3.1 Log File Management 11.3.2 Configure a Syslog Server on a Router 11.3.3 Configuring Remote Logging on Linux 11.3.4 Logging Events on pfSense
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
11.3.5 Log File Management Facts 11.4.3 View Event Logs q_log_management_syslogs_01_np6.question.fex Question 26. Correct Which backup strategy backs up only files that have the archive bit set and does not mark them? Full Incremental Differential Normal Explanation A differential backup backs up only files that have the archive bit set, and it does not mark them as having been backed up. A full backup backs up all files regardless of whether the archive bit is set or not. An incremental backup backs up only files that have the archive bit set, but it marks them as having been backed up. A normal backup is a type of backup that is unique to the NTBACKUP.EXE utility on the Windows server. This type also flags the files as having been backed up. References 11.7.3 Data Backup and Storage Facts q_backup_restore_differential_02_np6.question.fex Question 27. Correct Of the following restoration processes, which would result in the fastest restoration of all data if a system failure occurred on Friday? Restore the full backup from Sunday and all incremental backups. Restore the full backup from Sunday and the last incremental backup. Restore the full backup from Sunday and all differential backups.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
differential backups. Restore the full backup from Sunday and the last differential backup. Explanation The fastest method for restoring data to its most current state is to restore the full backup and then the last differential backup. Differential backups include all changes since the last full backup (or any other backup method that reset the archive bit). Restoring the full backup and the last incremental backup is an incomplete restore because all of the incremental backups must be used. However, restoring several backup sets rather than a single set is slower. You only need to use the last differential backup. References 11.7.3 Data Backup and Storage Facts q_backup_restore_full_differential_01_np6.question.fex Question 28. Correct Your network uses the following backup strategy. You create: Full backups every Sunday night. Differential backups Monday night through Saturday night. On Thursday morning, the storage system fails. How many restore operations would you need to perform to recover all of the data? One Two Three Four Explanation You would need to perform two restore procedures. You would do the following: 1. Restore the full backup from Sunday. 2. Restore the differential backup from Wednesday. If you did a full backup every night, you would restore only a single backup (Wednesday's backup). If you did full backups with incremental backups, you would restore the last full backup along with each incremental backup. References
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
11.6.1 High Availability 11.6.3 Redundancy and High Availability Facts 11.7.1 Data Backups 11.7.2 Backup Storage Options 11.7.3 Data Backup and Storage Facts 11.7.4 Configure a NAS for Data Backups 11.7.5 Implementing File Backups 11.7.7 Recover Files 13.4.1 Update Deployment and Management 13.4.2 Configure an Update Server 13.4.3 Update Firmware 13.4.5 Update Deployment and Management Facts q_backup_restore_full_differential_03_np6.question.fex Question 29. Correct Which Syslog severity level indicates a debugging message? Level 5 Level 1 Level 3 Level 7 Explanation Level 7 indicates a debugging message. Level 5 indicates a notification of a normal but significant condition. Level 3 indicates a non-urgent error that should be addressed when possible. Level 1 is an alert that indicates the system has encountered serious errors and that you should take action immediately. References 11.3.5 Log File Management Facts q_log_management_level_01_np6.question.fex Copyright © The Computing Technology Industry Association, Inc. All rights reserved.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help