IT212.Mod5Quiz.NP6
pdf
keyboard_arrow_up
School
Butler Community College *
*We aren’t endorsed by this school
Course
212
Subject
Information Systems
Date
Apr 3, 2024
Type
Pages
25
Uploaded by ChefFogDinosaur5
IT 212 Module 5 Quiz - NP6.0
Candidate: Marques Townsend (mtownz11)
Date: 2/11/2024, 10:56:49 AM • Time Spent: 32:23
Score: 97%
Passing Score: 65%
Question 1.
Correct
Dan wants to implement reconnaissance countermeasures to help protect his DNS service.
Which of the following actions should he take?
Review company websites to see which type of
sensitive information is being shared.
Install patches against known vulnerabilities
and clean up out-of-date zones, files, users,
and groups.
Implement policies that restrict the sharing of
sensitive company information on employees'
personal social media pages.
Limit the sharing of critical information in
press releases, annual reports, product
catalogs, or marketing materials.
Explanation
Installing patches against known vulnerabilities and cleaning up out-of-date zones, files,
users, and groups are good DNS reconnaissance countermeasures.
Reviewing company websites to see which type of information is being shared about
sensitive information is conforming to an Internet Information Sharing Policy.
Implementing policies that restrict the sharing of sensitive company information on
employees' personal social media pages is conforming to an Employee Social Media
Information Sharing Policy.
Limiting the sharing of critical information in press releases, annual reports, product
catalogs, and marketing materials is conforming to a Printed Materials Information
Sharing Policy.
References
13.1.1 Network Hardening Techniques
13.1.2 Network Hardening Techniques Facts
13.4.1 Update Deployment and Management
13.4.2 Configure an Update Server
13.4.3 Update Firmware
13.4.5 Update Deployment and Management Facts
q_updated_management_patches_np6.question.fex
Question 2.
Correct
While deploying Windows updates, when would you use the critical update ring?
When deploying updates to users that want to
stay on top of changes.
When deploying updates to important systems
(only after the update has been vetted).
When deploying updates for any general user
within the organization.
When deploying updates to most of the
organization in order to monitor for feedback.
Explanation
The critical deployment ring is for critical machines that you don't want to update until the
update has been vetted. These are machines that are critical to the running of your
organization or that are running essential projects. You can defer feature updates for up
six months and quality improvement updates for up to 30 days.
The preview ring is for those users who want to stay on top of changes and are on the
cutting edge. They want to see the latest and greatest. This is called the Windows Insider
Program. It allows you to get the most recent updates for your system.
The broad ring includes the Semi-Annual Channel and is broadly deployed to most of the
organization to monitor for feedback.
References
13.1.1 Network Hardening Techniques
13.1.2 Network Hardening Techniques Facts
13.4.1 Update Deployment and Management
13.4.2 Configure an Update Server
13.4.3 Update Firmware
13.4.5 Update Deployment and Management Facts
q_updated_management_critical_01_np6.question.fex
Question 3.
Correct
When deploying Windows updates, when would you use the preview update ring?
When deploying updates to most of the
organization in order to monitor for feedback.
When deploying updates to important
machines (only after the update has been
vetted).
When deploying updates to users that want to
stay on top of changes.
When deploying updates for any general user
within the organization.
Explanation
The preview ring is for those users who want to stay on top of changes and are on the
cutting edge. They want to see the latest and greatest. This is called the Windows Insider
Program. It allows you to get the most recent updates for your system.
The critical deployment ring is for critical machines that you don't want to update until the
update has been vetted. These are machines that are critical to the running of your
organization or that are running important projects. You can defer feature updates for up
six months and quality improvement updates for up to 30 days.
The broad ring includes the Semi-Annual Channel and is broadly deployed to most of the
organization to monitor for feedback.
References
13.1.1 Network Hardening Techniques
13.1.2 Network Hardening Techniques Facts
13.4.1 Update Deployment and Management
13.4.2 Configure an Update Server
13.4.3 Update Firmware
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
13.4.3 Update Firmware
13.4.5 Update Deployment and Management Facts
q_updated_management_critical_02_np6.question.fex
Question 4.
Correct
Which backup strategy backs up all files from a computer's file system (regardless of
whether the file's archive bit is set or not) and then marks them as backed up?
Incremental
Full
Differential
Copy
Explanation
A full backup backs up all files from a computer's file system regardless of whether a file's
archive bit is turned on or off. It also marks them as backed up.
Incremental and differential backups only back up files that have their archive bit set. The
copy backup strategy is used by the NTBACKUP.EXE backup utility on Windows servers. It
backs up all files regardless of whether the archive bit is set. However, it does not mark
them as backed up.
References
11.7.3 Data Backup and Storage Facts
q_backup_restore_full_01_np6.question.fex
Question 5.
Correct
You just deployed a new Cisco router that connects several network segments in your
organization.
The router is physically located in a server room that requires an ID card for access. You
backed up the router configuration to a remote location with an encrypted file. You access
the router configuration interface from your notebook computer using a Telnet client with
the username admin and the password admin. You used the MD5 hashing algorithm to
protect the password.
What else should you do to increase the security of this device? (Select two.)
Use a web browser to access the router
Use a web browser to access the router
configuration using an HTTP connection.
Use TFTP to back up the router configuration
to a remote location.
Use encrypted Type 7 passwords.
Change the default administrative username
and password.
Use an SSH client to access the router
configuration.
Explanation
In this scenario, you need to address the following two key security issues:
You should use an SSH (Secure Shell) client to access the router configuration. Telnet
transfers data over the network connection in cleartext, exposing sensitive data to
sniffing.
You should change the default administrative username and password. Default
usernames and passwords are readily available from websites on the internet.
Encrypted Type 7 passwords on a Cisco device are less secure than those protected with
MD5.
Using HTTP and TFTP (Trivial File Transfer Protocol) to manage the router configuration
could expose sensitive information to sniffers, as they transmit data in cleartext.
References
11.8.1 Remote Management
11.8.2 Use Remote Desktop
11.8.4 Remote Management Facts
q_remote_manage_ssh_01_np6.question.fex
Question 6.
Correct
Which of the following is a protocol used for terminal emulation?
SSH
ICA
RDP
VNC
Explanation
Explanation
Most administrators use Secure Shell (SSH) for terminal emulation.
VNC, ICA, and RDP are remote access protocols.
References
11.8.1 Remote Management
11.8.2 Use Remote Desktop
11.8.4 Remote Management Facts
q_remote_manage_ssh_02_np6.question.fex
Question 7.
Incorrect
Which of the following are backed up during an incremental backup?
Only files that have changed since the last full
or differential backup.
Only files that have changed since the last full
backup.
Only files that have changed since the last full
or incremental backup.
Only files that are new since the last full or
incremental backup.
Explanation
An incremental backup only captures files that have changed since the last full or
incremental backup. The primary attraction to this backup plan is that it requires less
storage space and processing time to complete. Restoration starts from the last full backup
and then requires the loading of each subsequent incremental backup for a full
restoration.
References
11.7.3 Data Backup and Storage Facts
q_backup_restore_incremental_01_np6.question.fex
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
Question 8.
Correct
You manage a server at work that has just been configured with a new application.
Consequently, the server has crashed several times during the last week. You think that
you've resolved the problem, but you'd like to be able to manage the server remotely just
in case more issues occur.
Which of the following protocols should you use for remote management? (Select two.)
L2TP
VNC
ICA
PPP
PPTP
Explanation
Use a remote access protocol to remotely manage devices. A remote access protocol allows
you to interact with a computer's desktop without being present at the console. There are
multiple protocols you can use for remote desktop connections.
Virtual Network Computing (VNC) was originally designed for UNIX. Applications that
use VNC include RealVNC, TightVNC, UltraVNC, and Vine Server.
Independent Computing Architecture (ICA) is the protocol used by Citrix products
(WinFrame and MetaFrame/XenApp).
Remote Desktop Protocol (RDP) is the protocol developed by Microsoft and used in
Microsoft's Terminal, Remote Desktop, and Remote Assistance solutions. Aqua
Connect has now licensed RDP and created a version for Mac OS X.
PPP (Point-to-Point Protocol) is a protocol that's used to control remote access. PPP allows
the authentication, authorization, and accounting of remote access connections.
PPTP (Point-to-Point Tunneling Protocol) and L2TP (Layer 2 Tunneling Protocol) are VPN
protocols that provide a secure connection to a destination host or network through the
internet .
References
11.8.1 Remote Management
11.8.2 Use Remote Desktop
11.8.4 Remote Management Facts
q_remote_manage_protocols_np6.question.fex
Question 9.
Correct
Which of the following are backed up during a differential backup?
Only files that have changed since the last full
backup.
Only files that have changed since the last full
or differential backup.
Only files that have changed since the last full
or incremental backup.
Only files that have been added since the last
full or incremental backup.
Explanation
A differential backup only captures files that have changed since the last full backup. This
backup strategy can create a shorter restoration time than an incremental backup, but this
may consume more disk space, depending on the frequency of file changes. Restoration is
a two-step process. You first load the last full backup and then finish the restoration by
loading the last differential backup.
References
11.7.3 Data Backup and Storage Facts
q_backup_restore_differential_01_np6.question.fex
Question 10.
Correct
Which of the following are true about Windows Update for Business? (Select three.)
Windows Update for Business is a Group Policy
management tool.
Windows Update for Business works with all
versions of Windows 10 except Windows 10
Home.
Windows Update for Business provides the
latest features for your Windows 10 devices,
but it does not include security upgrades.
Windows Update for Business can be
configured with Group Policy, Mobile Device
Management, or Systems Center
Configuration Manager.
Windows Update for Business provides the
latest features for your Windows 10 devices,
including security upgrades.
Windows Update for Business works with all
versions of Windows 10.
Windows Update for Business can only be
configured with Group Policy.
Explanation
Windows Update for Business provides the latest features for your Windows 10 devices,
including security upgrades.
Windows Update for Business can be used with all versions of Windows 10 except Windows
10 Home.
Windows Update for Business can be configured with Group Policy, Mobile Device
Management, or Systems Center Configuration Manager.
Microsoft Intune is a mobile device management (MDM) tool.
References
13.1.1 Network Hardening Techniques
13.1.2 Network Hardening Techniques Facts
13.4.1 Update Deployment and Management
13.4.2 Configure an Update Server
13.4.3 Update Firmware
13.4.5 Update Deployment and Management Facts
q_updated_management_business_01_np6.question.fex
Question 11.
Correct
Your disaster recovery plan (DRP) calls for backup media to be stored at a different
location. The location is a safe deposit box at the local bank. Because of this, the disaster
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
location. The location is a safe deposit box at the local bank. Because of this, the disaster
recovery plan specifies that you must choose a method that uses the least amount of
backup media but also allows you to quickly back up and restore files.
Which backup strategy would BEST meet the DRP's specifications?
Perform a full backup each day of the week.
Perform a full backup once per week and an
incremental backup the other days of the
week.
Perform a full backup once per month and an
incremental backup the other days of the
month.
Perform a full backup once per week and a
differential backup the other days of the week.
Explanation
Performing a full backup once per week and a differential backup the other days of the
week would best meet this disaster recovery plan's specifications. The full backup backs up
all files, usually to one tape, but the process can be time-consuming. The differential
backup backs up all files since the last full backup.
Performing a full backup each day would meet the requirement of using as few tapes as
possible, but that backup process would be very time-consuming each day.
Performing a full backup once per week and an incremental backup the other days of the
week would be one of the fastest methods for backing up files, but it would require many
tapes to complete the restore. The incremental backup only backs up files added or
changed since the last backup. Because of this, in order to do a complete restore of the file
system, you'd need a tape for each day of the week that the incremental backup ran.
Performing a full backup once per month and an incremental backup the other days of the
month would be the fastest method to back up files, but it would require many tapes to
complete. This process only backs up files added or changed since the last backup.
Because of this, in order to do a complete restore of the file system, you'd need a tape for
each day of the month that the incremental backup ran.
References
11.7.3 Data Backup and Storage Facts
q_backup_restore_full_differential_02_np6.question.fex
Question 12.
Correct
Your Windows system is a member of a domain. Windows Update settings are being
Your Windows system is a member of a domain. Windows Update settings are being
controlled through Group Policy.
How can you determine whether a specific security update from Windows Update is
installed on the computer?
Run the wuauclt.exe /listupdates command.
Go to Programs and Features in Control Panel.
Run the netsh winhttp import proxy source
command.
Check the Local Security Policy.
Explanation
To check a computer for a specific update, you click the View update history link in
Windows Update. You can also click View installed updates in Programs and Features (both
available through the Control Panel).
The Wuauclt.exe command is the client component for Windows Update. One of this
program's functions is to check for updates using settings configured locally or through
Group Policy. You can run the wuauclt /detectnow command to force the computer to
check for updates immediately. However, there is no option for seeing which updates have
been installed.
The netsh winhttp import proxy source
command imports Internet Explorer's Internet
Options settings directly.
The Local Security Policy shows you the update settings you can control locally. In this
scenario, because Group Policy is being used, these settings wouldn't tell you anything
about the computer's configuration.
References
13.1.1 Network Hardening Techniques
13.1.2 Network Hardening Techniques Facts
13.4.1 Update Deployment and Management
13.4.2 Configure an Update Server
13.4.3 Update Firmware
13.4.5 Update Deployment and Management Facts
q_updated_management_control_panel_np6.question.fex
Question 13.
Correct
Which of the following tools can you use to troubleshoot and validate Windows updates?
(Select three.)
Windows Server Troubleshooter
Windows Transfer Service
PowerShell
Windows Defender
Windows Update Troubleshooter
Device Manager
Windows Server Update Service (WSUS)
Explanation
You can use PowerShell to look at and compile Windows Update logs. Doing so creates a
file that's deposited on to your desktop.
Windows Server Update Service (WSUS) is a role you can add to a server to manage
updates. Rather than have all your organization's PCs go to Microsoft to get their updates,
you can have the updates deposited in to the WSUS server.
Windows Update Troubleshooter analyzes Windows Update Service, Background Intelligent
Transfer Service (BITS), and Windows Network Diagnostics Service.
The other answers are not tools you can use to troubleshoot and validate Windows
updates.
References
13.1.1 Network Hardening Techniques
13.1.2 Network Hardening Techniques Facts
13.4.1 Update Deployment and Management
13.4.2 Configure an Update Server
13.4.3 Update Firmware
13.4.5 Update Deployment and Management Facts
q_updated_management_tools_np6.question.fex
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
Question 14.
Correct
You are the desktop administrator for your company. You would like to manage the
computers remotely using a tool with a graphical user interface (GUI).
Which of the following actions can you take to accomplish this?
Establish a Remote Desktop connection to each
computer.
Use Telnet to connect to each computer.
Send an assistance invitation.
Run Remote Shell to manage each computer.
Explanation
To remotely manage computers using a graphical user interface, you can use Remote
Desktop to establish a connection to each computer.
Use Remote Shell and Telnet to execute commands on a remote computer.
You initiate a Remote Assistance session by sending an assistance invitation.
References
11.8.1 Remote Management
11.8.2 Use Remote Desktop
11.8.4 Remote Management Facts
q_remote_manage_gui_np6.question.fex
Question 15.
Correct
Your network performs a full backup every night. Each Sunday, the previous night's backup
tape is archived.
On a Wednesday morning, the storage system fails. How many restore operations would
you need to perform to recover all of the data?
One
Two
Three
Four
Explanation
You would need to perform a single restore procedure. You would simply restore the last
full backup from Wednesday to restore all of the data.
The fact that you archived one backup each week is irrelevant to restoring the latest data.
The archived copy is only used to restore something to a specific point in time. If you had
used full and differential backups, you would restore the last full and last differential
backups. If you had used full and incremental backups, you would restore the last full and
each subsequent incremental backup.
References
11.7.3 Data Backup and Storage Facts
q_backup_restore_full_02_np6.question.fex
Question 16.
Correct
Some users report that frequent system crashes have started happening on their
workstations. Upon further investigation, you notice that these users all have received a
recent update to the same application. Where would you go to conduct a root cause
analysis?
Firewall log
Security log
Network log
Application log
Explanation
You would choose the application log. Most applications produce some type of event
logging. These logs show application access, crashes, updates, and any other relevant
information that could be valuable in conducting a root cause analysis. The application may
information that could be valuable in conducting a root cause analysis. The application may
be crashing or not performing correctly, and this could be tied to suspicious activity that
may indicate malicious intent.
Network logs tell you what is coming into and leaving your network.
A firewall log identifies traffic that has been allowed or denied through a firewall.
A security log records information related to logons, such as incorrect password attempts
and user right application.
References
11.3.1 Log File Management
11.3.2 Configure a Syslog Server on a Router
11.3.3 Configuring Remote Logging on Linux
11.3.4 Logging Events on pfSense
11.3.5 Log File Management Facts
11.4.3 View Event Logs
13.2.1 Authentication
q_log_management_applogs_np6.question.fex
Question 17.
Correct
You suspect that cache poisoning or spoofing has occurred on your network. Users are
complaining of strange web results and being redirected to undesirable sites. Which log
would help you determine what's going on?
Application logs
Network logs
DNS logs
Security logs
Explanation
In this scenario, you should take a look at the DNS logs for DNS cache poisoning. After this,
you can begin monitoring DNS query traffic.
Network logs do not help you with spoofed host name resolution.
Application logs do not help you determine DNS poisoning.
Security logs do little to help you identify spoofing.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
References
11.3.1 Log File Management
11.3.2 Configure a Syslog Server on a Router
11.3.3 Configuring Remote Logging on Linux
11.3.4 Logging Events on pfSense
11.3.5 Log File Management Facts
11.4.3 View Event Logs
13.2.1 Authentication
q_log_management_dnslogs_np6.question.fex
Question 18.
Correct
Which of the following is a tool that allows access to the graphical desktop environment of
another Windows client system over a network connection?
SSH
Remote Desktop Gateway
Remote Desktop
VPN
Explanation
Remote Desktop is a software tool that allows access to the graphical desktop environment
of another Windows client system over a network connection.
While SSH and VPNs help to provide remote access, they are not specific to Windows client
systems.
The Remote Desktop Gateway is not the software tool used to directly provide the graphical
desktop environment to the user.
References
11.8.1 Remote Management
11.8.2 Use Remote Desktop
11.8.4 Remote Management Facts
q_remote_manage_desktop_np6.question.fex
Question 19.
Correct
You are the network administrator for a growing business. When you were hired, the
organization was small, and only a single switch and router were required to support your
users. During this time, you monitored log messages from your router and switch directly
from each device's console.
The organization has grown considerably in recent months. Now you manage eight
individual switches and three routers. It's becoming more and more difficult to monitor
these devices and stay on top of issues in a timely manner.
What should you do?
Consolidate network resources down to one or
two switches.
Hire additional resources to help monitor and
manage your network infrastructure.
Use Syslog to implement centralized logging.
Use a remote access utility, such as SSH, to
access router and switch consoles remotely.
Explanation
In this scenario, a cost-effective option would be to implement centralized logging with
Syslog. By default, routers and switches send all log messages regardless of severity level
directly to the console. If a network contains a small number of devices, this default
configuration is usually manageable. However, on a growing network, it quickly becomes
impractical to visit each device to view log messages. Instead, you can configure your
network devices to redirect logging to a Syslog server somewhere on the network. By
doing this, you can view all the log messages from all the devices from a single location.
Reducing the number of switches on a growing network is generally not advisable.
Using a remote access utility can help alleviate the issue to an extent. However, you still
have to manually connect to and monitor each individual system.
If the network continues to grow, this option will quickly become unviable. It's not
necessary to hire additional administrators in this scenario.
References
11.3.1 Log File Management
11.3.2 Configure a Syslog Server on a Router
11.3.3 Configuring Remote Logging on Linux
11.3.4 Logging Events on pfSense
11.3.5 Log File Management Facts
11.4.3 View Event Logs
11.4.3 View Event Logs
q_log_management_syslogs_03_np6.question.fex
Question 20.
Correct
Which of the following remote protocols was originally designed for UNIX?
VPN
RDP
ICA
VNC
Explanation
Virtual Network Computing (VNC) was originally designed for UNIX.
ICA, VPN, and RDP are remote desktop protocols. However, they were not originally
designed for UNIX.
You can use a virtual private network (VPN) for remote access, but it is not a protocol that
was originally designed for UNIX.
References
11.8.1 Remote Management
11.8.2 Use Remote Desktop
11.8.4 Remote Management Facts
q_remote_manage_vnc_np6.question.fex
Question 21.
Correct
Which Syslog level indicates an emergency that could severely impact the system and
cause it to become unusable?
Level 2
Level 0
Level 6
Level 4
Explanation
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
Level 0 indicates an emergency that could severely impact the system and cause it to
become unusable.
Level 2 indicates a serious errors in secondary subsystem that should be addressed
immediately.
Level 4 indicates a warning that could eventually become a problem if not addressed.
Level 6 indicates an informational message.
References
11.3.5 Log File Management Facts
q_log_management_level_02_np6.question.fex
Question 22.
Correct
Which of the following is a role service that allows users with the Remote Desktop
Connection client and an internet connection to connect on an internal network.
RD CAP
Remote Desktop
RD Gateway
RD RAP
Explanation
Remote Desktop Gateway (RD Gateway) is a role service that allows users with the Remote
Desktop Connection client and an internet connection to connect on an internal network.
A Remote Desktop Resource Authorization Policy (RD RAP) identifies the internal resources
that users can access.
A Remote Desktop Connection Authorization Policy (RD CAP) identifies the users who can
establish a connection through the RD Gateway server.
Remote Desktop is a software tool.
References
11.8.1 Remote Management
11.8.2 Use Remote Desktop
11.8.4 Remote Management Facts
q_remote_manage_gateway_np6.question.fex
Question 23.
Correct
What is one of the benefits of Windows Update Delivery Optimization?
Delivery Optimization lets you set active hours
to indicate normal use for your device. The
device will not reboot to install updates during
this time.
Delivery Optimization lets you view the
updates you have installed. It also lets you
uninstall an update if needed.
Delivery Optimization allows updates to be
downloaded and distributed much more
quickly than with previous versions of
Windows.
Delivery Optimization lets you know when and
if there are any urgent updates for your system
and provides you with an option to download
and install them.
Explanation
Delivery Optimization allows updates to be downloaded and distributed much more quickly
than with previous versions of Windows. Clicking Advanced Options from here lets you
throttle the bandwidth for downloading and uploading updates, including the monthly
limit.
From Windows Update, you would use View update history to view all the updates that
have been applied to your system. You can also install updates from here.
From Windows Update, you would use Change active hours to set active hours to indicate
normal use for your device. The device will not reboot to install an update during this time.
normal use for your device. The device will not reboot to install an update during this time.
From Windows Update, you would use Check for updates to access Microsoft's site and see
if any new updates are available for you system.
References
13.1.1 Network Hardening Techniques
13.1.2 Network Hardening Techniques Facts
13.4.1 Update Deployment and Management
13.4.2 Configure an Update Server
13.4.3 Update Firmware
13.4.5 Update Deployment and Management Facts
q_updated_management_delivery_np6.question.fex
Question 24.
Correct
In a large organization, a group of servers are running critical applications that are
essential for the company's operations. The IT manager wants to ensure these servers are
updated only after thorough vetting of the updates to minimize potential downtime.
Which update ring should the IT manager use for these servers?
Critical
Broad
Preview
Windows Insider Program
Explanation
Critical is the correct answer. This ring is for critical machines that the organization wants
to update only after the update is first vetted. Feature updates can be deferred for up to 6
months and quality improvement updates for up to 30 days. This is the most suitable ring
for servers running critical applications as it provides the highest level of vetting before
updates are applied.
The Preview ring is for users who want to stay on top of changes and are on the cutting
edge. They want to see the latest updates, even if they may not be fully vetted and could
potentially cause downtime. This is not suitable for critical servers as it may introduce
instability.
The Broad ring is for most users within an organization. Feature updates can be deferred
for up to 120 days and quality updates for seven - 14 days. While this ring provides some
level of vetting, it may not be sufficient for critical servers.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
Windows Insider Program is for users who want to receive the most recent updates. These
updates may not be fully vetted and could potentially cause downtime. This is not suitable
for critical servers as it may introduce instability.
References
13.1.1 Network Hardening Techniques
13.1.2 Network Hardening Techniques Facts
13.4.1 Update Deployment and Management
13.4.2 Configure an Update Server
13.4.3 Update Firmware
13.4.5 Update Deployment and Management Facts
q_updated_management_7days_np6.question.fex
Question 25.
Correct
Which of the following is a standard for sending log messages to a central logging server?
OVAL
Syslog
LC4
Nmap
Explanation
Syslog is a protocol that defines how log messages are sent from one device to a logging
server on an IP network. The sending device sends a small text message to the Syslog
receiver (the logging server).
The Open Vulnerability and Assessment Language (OVAL) is an international standard for
testing, analyzing, and reporting a system's security vulnerabilities.
LC4 (previously called LOphtcrack) is a password cracking tool.
Nmap is a network mapping tool that performs ping and port scans.
References
11.3.1 Log File Management
11.3.2 Configure a Syslog Server on a Router
11.3.3 Configuring Remote Logging on Linux
11.3.4 Logging Events on pfSense
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
11.3.5 Log File Management Facts
11.4.3 View Event Logs
q_log_management_syslogs_01_np6.question.fex
Question 26.
Correct
Which backup strategy backs up only files that have the archive bit set and does not mark
them?
Full
Incremental
Differential
Normal
Explanation
A differential backup backs up only files that have the archive bit set, and it does not mark
them as having been backed up.
A full backup backs up all files regardless of whether the archive bit is set or not. An
incremental backup backs up only files that have the archive bit set, but it marks them as
having been backed up. A normal backup is a type of backup that is unique to the
NTBACKUP.EXE utility on the Windows server. This type also flags the files as having been
backed up.
References
11.7.3 Data Backup and Storage Facts
q_backup_restore_differential_02_np6.question.fex
Question 27.
Correct
Of the following restoration processes, which would result in the fastest restoration of all
data if a system failure occurred on Friday?
Restore the full backup from Sunday and all
incremental backups.
Restore the full backup from Sunday and the
last incremental backup.
Restore the full backup from Sunday and all
differential backups.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
differential backups.
Restore the full backup from Sunday and the
last differential backup.
Explanation
The fastest method for restoring data to its most current state is to restore the full backup
and then the last differential backup. Differential backups include all changes since the last
full backup (or any other backup method that reset the archive bit).
Restoring the full backup and the last incremental backup is an incomplete restore because
all of the incremental backups must be used. However, restoring several backup sets rather
than a single set is slower. You only need to use the last differential backup.
References
11.7.3 Data Backup and Storage Facts
q_backup_restore_full_differential_01_np6.question.fex
Question 28.
Correct
Your network uses the following backup strategy. You create:
Full backups every Sunday night.
Differential backups Monday night through Saturday night.
On Thursday morning, the storage system fails. How many restore operations would you
need to perform to recover all of the data?
One
Two
Three
Four
Explanation
You would need to perform two restore procedures. You would do the following:
1. Restore the full backup from Sunday.
2. Restore the differential backup from Wednesday.
If you did a full backup every night, you would restore only a single backup (Wednesday's
backup). If you did full backups with incremental backups, you would restore the last full
backup along with each incremental backup.
References
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
11.6.1 High Availability
11.6.3 Redundancy and High Availability Facts
11.7.1 Data Backups
11.7.2 Backup Storage Options
11.7.3 Data Backup and Storage Facts
11.7.4 Configure a NAS for Data Backups
11.7.5 Implementing File Backups
11.7.7 Recover Files
13.4.1 Update Deployment and Management
13.4.2 Configure an Update Server
13.4.3 Update Firmware
13.4.5 Update Deployment and Management Facts
q_backup_restore_full_differential_03_np6.question.fex
Question 29.
Correct
Which Syslog severity level indicates a debugging message?
Level 5
Level 1
Level 3
Level 7
Explanation
Level 7 indicates a debugging message.
Level 5 indicates a notification of a normal but significant condition.
Level 3 indicates a non-urgent error that should be addressed when possible.
Level 1 is an alert that indicates the system has encountered serious errors and that you
should take action immediately.
References
11.3.5 Log File Management Facts
q_log_management_level_01_np6.question.fex
Copyright © The Computing Technology Industry Association, Inc. All rights reserved.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help