ITEss2Mod Answers Moklet Angkatan 15

59
IT Essentials 2: Module questions and answers Module 1: Study questions 1 From which Windows configuration tool can a user perform hardware and network configurations? Window Manager My Computer Control Panel Task Manager 2 When compared to a command line interface, what is a major disadvantage of a GUI? It requires an understanding of commands. It requires more memory and storage space. It is more difficult to use. Most server operating systems do not support a GUI. 3 What is a beneficial feature of preemptive multitasking? Applications share the use of the processor by time slicing. The processor dynamically adjusts the amount of memory needed by the application programs. Application programs share memory addresses and exchange information. The operating system controls the allocation of processor time. 4 Though obsolete in current desktop environments, what are three valid reasons for the continued use of MS-DOS? (Choose three.) MS-DOS supports legacy applications. MS-DOS is an intuitive, high-overhead operating system. MS-DOS rarely crashes because it is a multitasking operating system. MS-DOS is relatively easy to use. MS-DOS can run on inexpensive hardware. 5 Which acronyms describe the two general categories of OS user interfaces? DOS and UNIX DOS and GUI UNIX and GUI CLI and GUI

description

Buat Ujian ITE 2 Moklet Angkatan 15 lengkap dari capter 1-14...Hikksss :D

Transcript of ITEss2Mod Answers Moklet Angkatan 15

Page 1: ITEss2Mod Answers Moklet Angkatan 15

IT Essentials 2: Module questions and answers Module 1: Study questions 1 From which Windows configuration tool can a user perform hardware and network

configurations?

Window Manager

My Computer

Control Panel

Task Manager

2 When compared to a command line interface, what is a major disadvantage of a GUI?

It requires an understanding of commands.

It requires more memory and storage space.

It is more difficult to use.

Most server operating systems do not support a GUI.

3 What is a beneficial feature of preemptive multitasking?

Applications share the use of the processor by time slicing.

The processor dynamically adjusts the amount of memory needed by the application programs. Application programs share memory addresses and exchange information.

The operating system controls the allocation of processor time.

4 Though obsolete in current desktop environments, what are three valid reasons for the

continued use of MS-DOS? (Choose three.)

MS-DOS supports legacy applications.

MS-DOS is an intuitive, high-overhead operating system.

MS-DOS rarely crashes because it is a multitasking operating system.

MS-DOS is relatively easy to use.

MS-DOS can run on inexpensive hardware.

5 Which acronyms describe the two general categories of OS user interfaces?

DOS and UNIX

DOS and GUI

UNIX and GUI

CLI and GUI

Page 2: ITEss2Mod Answers Moklet Angkatan 15

6 Which of the following is a valid concern for a company considering a move from Windows to Linux?

Linux generally allows companies to recycle old hardware and software.

Users may need special training to become productive with Linux.

Special third party software may be necessary to secure and configure Linux.

Linux generally requires more disk space than Windows.

7 What is meant by the statement, "We have to support our legacy system"? Support must be provided for the newest Linux system.

Support must be provided for the system called legacy.

Support must be provided for the newest Microsoft system.

Support must be provided for outdated software.

8 Which three of the following file systems does Windows 2000 use? (Choose three.)

EXT2

FAT16

FAT32

NTFS

HPFS

9 Windows and Linux both use a file system that resembles an upside-down tree. What is

the name of this type of file structure? binary

hierarchical

empirical

subsystem

10 Which part of the OS, loaded into memory at boot time, controls memory allocation?

user interface

application software

kernel

file system

11 What is the main reason FAT32 was created?

New operating systems required the use of filenames greater than eight characters.

Earlier versions of FAT used disk space inefficiently.

FAT32 was needed to support drives up to 4 GB.

The maximum length of file extensions needed to be increased to three characters.

Page 3: ITEss2Mod Answers Moklet Angkatan 15

12 Which of the following is generally regarded as the standard GUI for Linux?

Red Hat Desktop

CDE

GNOME

Star Office

13 Which two of the following statements are true? (Choose two.)

Linux is a true 16-bit operating system that uses preemptive multitasking.

Linux supports all Windows applications through the use of cooperative multitasking. Linux operating system code is available for anyone to modify and use.

Linux is a true 48-bit operating system that uses minimal virtual memory.

Linux is a true 32-bit operating system that uses preemptive multitasking.

14 Which command is entered in the Run dialog box of a Windows XP system to open a

command prompt window? run

start

cmd

dosprompt

15 Which two statements describe the security features of Linux? (Choose two.)

Compared to Windows, Linux is virtually virus-free.

Users must have a valid username and password to log into a Linux system, by default. Linux security is one dimensional.

Most security features for Linux must be purchased from a third party.

16 Which two of the following shells are commonly available for Linux? (Choose two.)

Bore shell

Korn shell

Cash shell

C shell

PC shell

Page 4: ITEss2Mod Answers Moklet Angkatan 15

17 With the FAT file system, what is the basic unit of logical storage on a disk? megabyte

cluster

directory

logical drive

18 Which two statements describe security in the Windows operating system? (Choose

two.) Windows is less susceptible to viruses than Linux.

By default, users must have a username and password to log into Windows.

Windows security is generally one dimensional.

Windows security is improved through the use of third-party applications.

Windows can securely support multiple users with the Terminal service installed by default on personal computers.

19 What are three reasons why a company may choose Linux over Windows as an

operating system? (Choose three.) The entire Linux installation can be completed using either a GUI or CLI.

The entire Windows installation can be completed using either a GUI or CLI.

Windows can be run entirely from a CD.

Compared to Windows, Linux is virtually virus-free.

Linux is a true multi-user system.

Linux has superior one-dimensional security.

20 Network operating systems were designed to provide which of the following tasks?

(Select three.) file security

multitasking

user privileges

resource access for a single user

resource sharing among multiple users

Page 5: ITEss2Mod Answers Moklet Angkatan 15

Module 2: Study questions 1 What does the term media access control describe?

the rules for coordinating the use of the medium

a list of users allowed to use the network

the system administrator's role in controlling access to the network

how to determine which media type is best for a network

2 Which two types of cabling will support 100BASE-X? (Choose two.)

Category 2

Category 5

two-strand fiber-optic

50-ohm coaxial

3 What is one disadvantage of a client/server network?

It can have a single point of failure.

It does not scale well to large networks.

It requires each user to be trained to perform administrative tasks.

It is less secure than a peer-to-peer network.

4 Peer-to-peer and client/server networks share many characteristics. What is unique to

the client/server environment? Passwords may be required to access shared resources.

Local data files and devices can be shared by several users.

Computers typically communicate using request/response protocols.

Security and resource management scales easily as the network grows.

5 Why are open source technologies appealing to many people? A more organized source of funding and development is available.

Proprietary technologies involve cooperation between many companies.

De facto standards allow for more choice.

Users are not bound by copyright laws.

6 Which of the following statements best describes full-duplex transmission?

Data can be sent across bus hubs and switches.

Data can be simultaneously sent and received.

Data can only be sent in one direction.

Data can be sent and then received.

Page 6: ITEss2Mod Answers Moklet Angkatan 15

7 Which access control method is specified in the IEEE 802.3 standard?

CSMA/CA

CSMA/CD

token passing

store and forward

8 What is the physical topology when all the computers in a network connect to a central

point? point-to-point

star

ring

bus

9 Which of the following statements is true of print sharing?

It requires a company to purchase more printers.

It makes it more difficult for an administrator to control printers.

It allows for more efficient use of printers.

It limits the user to a single network printer.

10 Which statement is true of peer-to-peer networks?

They scale easily as the size of the network grows.

Security is easily maintained.

Computers may change roles from client to server as needed.

At least one computer functions as a dedicated server.

11 What is a major advantage of UTP?

It is inexpensive.

It is highly resistant to electromagnetic interference.

It limits the number of hosts on a network.

It is an inexpensive way to interconnect remote locations.

12 Which technology provides the best support for upload-intensive Internet tasks?

ISDN

cable modem service

analog modem service

ADSL

Page 7: ITEss2Mod Answers Moklet Angkatan 15

13 What do transport layer protocols use to identify the application needed to process data?

ports

MAC addresses

IP addresses

DNS

flags

14 Which statement best describes a serial link?

Bits of information are transmitted across the link one after another.

Bits of information are randomly transmitted across the link.

Bits of information are sent across a dedicated link in one direction only.

Bits of information are only sent using dial-up or ISDN lines.

15 What is one advantage of directory and name services?

All directories are kept in a single location.

User names have a standardized format.

Text names are easier to remember than numeric addresses.

Network resources are bound to a physical location.

16 What is an advantage of Linux?

Linux is easy to use.

With copyrights, Linux experiences fast technological growth.

Linux is free for public use.

Linux has an organized source of development.

17 What is the purpose of protocols?

to provide a controlled sequence of messages between systems

to define which users have access to the network

to allow the network administrator to decentralize control

to limit access to network resources

18 Which of the following is the most popular physical LAN topology?

ring

star

bus

fiber

Page 8: ITEss2Mod Answers Moklet Angkatan 15

19 Which DSL technology is most commonly used? SDSL

ADSL

VDSL

IDSL

20 Which network layer protocol enables routers to discover the best path between

networks using hop count? IP

RIP

ARP

OSPF

21 Which of the following works as a "storage and retrieval" application?

Telnet

e-mail

DNS

SNMP

22 Which features are LANs generally designed to accommodate?

many users, high speed, limited geographical area

many users, high speed, broad geographical area

few users, low speed, limited geographical area

few users, low speed, broad geographical area

23 What are two advantages of Windows over Linux? (Choose two.)

Windows can be used publicly for free.

Windows is easier to use than Linux.

Unlike Linux, Windows is standardized through the efforts of many independent sources.

Unlike Linux, Windows has an organized source of funding and development.

Page 9: ITEss2Mod Answers Moklet Angkatan 15

Module 3: Study questions 1 Which list indicates advantages associated with fiber-optic cable?

capable of running long distances, inexpensive to install, not susceptible to electromagnetic interference not susceptible to electromagnetic interference, expensive to install, lower data rates

not susceptible to electromagnetic interference, higher data rates, capable of running long distances lower data rates, inexpensive to install, capable of running long distances

2 Which term refers to the path that signals take from one point on a network to another?

address resolution

logical topology

dynamic host configuration

physical topology

3 Which data link layer device can segment a network into different collision domains?

a router

a switch

a gateway

a transceiver

4 What is the function of a DHCP server?

It stores websites that are used frequently.

It dynamically assigns IP addresses to hosts.

It determines the subnet mask of a network.

It serves as a "first line of defense" firewall.

5 Which of the following statements best describes DNS?

DNS servers are used to map an IP address to a physical address.

DNS servers are used to map a name to an IP address.

DNS servers are used to configure logical address information for host computers.

DNS servers are used to translate from private addresses to public addresses.

Page 10: ITEss2Mod Answers Moklet Angkatan 15

6 Which three of the following items can a DHCP server provide to a host computer? (Choose

three.) subnet mask

MAC address

default gateway

IP address

DHCP server address

7 Which two devices are at the core of wireless communications? (Choose two.)

satellites

light emitting diodes

transmitters

receivers

modulators

8 How many bits are in an IP address?

16

64

32

48

9 What is the main function of the DNS?

to scan the network for viruses

to translate computer names to their corresponding IP addresses

to assign IP addresses to nodes on the network

to provide names to all the nodes on a network

10 What are three important considerations when selecting a NIC? (Choose three.)

network type

operating system

system bus

network media

number of network users

Page 11: ITEss2Mod Answers Moklet Angkatan 15

11 Which list contains important considerations when selecting a NIC to use on a network?

type of network, type of RAM, type of system bus

type of media, type of system bus, type of RAM

type of network, type of media, type of system bus

type of system bus, processor speed, type of media

12 What are the two most common wireless networking technologies? (Choose two.)

radio frequency

microwave

laser

infrared

satellite wavelength

13 What is the purpose of the twists in Category 5/5e UTP cable?

to prevent the cable from breaking

to make the cable easier to install and terminate properly

to make the cable cheaper to produce

to limit signal degradation caused by cross talk

14 Which of the following options correctly describes APIPA?

APIPA allows a privately addressed host to assign itself a public IP address in order to access a remote network. APIPA enables a computer to assign itself an IP address if it cannot contact a DHCP server. APIPA is fault-tolerant feature that allows a server to mirror another server on a local network. APIPA enables a computer to translate domain names into IP addresses if it cannot contact a DNS server.

15 What are three options for assigning logical addresses to hosts? (Choose three.)

static

dynamic

negotiation

automatic

holistic

Page 12: ITEss2Mod Answers Moklet Angkatan 15

16 Which of the following devices is used to segment a network into different broadcast

domains? switch

active hub

bridge

router

17 What is a major disadvantage of the bus topology?

It is expensive.

It requires a lot of cabling.

A break in any one part of the cable brings down the entire network.

All computers must be placed in a straight line.

18 What is the most commonly used architecture in Ethernet LANs?

bus

star

mesh

ring

19 What are two advantages of using dynamic address assignment instead of manual address

assignment? (Choose two.) On a large network, manually assigning addresses can be very time consuming.

Manual address assignment requires network administrators to understand physical addressing. Dynamic address assignment can help segment a large network.

Manual address assignment requires network administrators to understand logical addressing.

20 Which two of the following statements accurately describe a default gateway? (Choose two.)

A default gateway is used when a host transfers data to another host on the same network segment. A default gateway is the IP address assigned to the near-side router interface.

A default gateway is the IP address assigned to the near-side switch interface.

A default gateway is used when a host transfers data to a host on another network segment.

Page 13: ITEss2Mod Answers Moklet Angkatan 15

Module 4: Study questions 1 What must a computer have when connected to a network?

one unique name per function

one unique address per service

one unique address per connection point

one unique network

2 What is the range of numbers in the first octet of a Class C address?

1-127

192-223

128-191

224-255

3 A technician needs to log into a remote Linux PC to perform some maintenance. Which

application layer protocol could be used? Telnet

FTP

HTTP

SNMP

4 Which protocol is used to translate a domain name into an IP address?

ARP

DNS

UDP

NetBIOS

5 Which classes of IP addresses are used by commercial organizations for host

addressing? A,C,D

B,C,D

C,D,E

A,B,C

6 Which of the following rely on ICMP?

sending an Echo Request

logging in to a remote host

mapping an IP address to a MAC address

resolving a host name

Page 14: ITEss2Mod Answers Moklet Angkatan 15

7 What is subnetting?

dividing large networks into smaller ones using the same network number

allowing several small networks to communicate over the common carrier infrastructure combining several networks into a single larger network

allowing separate companies to share an IP address by taking turns using it

8 How would a technician permanently change the IP address of an Ethernet card on a

Red Hat Linux PC to 192.168.34.4?

use the command ifconfig eth0 192.168.34.4

use the command route add default IP 192.168.34.4 dev eth0

use the command ping 192.168.34.4

edit the IPADDRESS line in the file /etc/sysconfig/network-scripts/ifcfg-eth0

9 Which utility is used in Windows and Linux to view network connections and protocol

statistics? arp

netstat

nbstat

ipconfig

10 What is a unique characteristic of the IP addressing scheme?

flat addressing

hierarchical addressing

internetwork addressing

single-octet addressing

11 In which layer of the TCP/IP model does ICMP operate?

Application

Transport

Internet

Network Access

12 Which address class contains the IP address 168.12.0.0?

A

B

C

D

Page 15: ITEss2Mod Answers Moklet Angkatan 15

13 How many octets are contained in an IP address?

1

2

4

8

14 Which Linux command is used to temporarily change the default gateway of a host?

arp

ifconfig

netstat

route

ping

15 What is the primary function of NAT?

convert a MAC address to a domain name

translate between a local IP address and a global IP address

allocate IP addresses to commercial organizations

determine the best route through a network

16 Which service is used to enable individual computers to automatically obtain an IP

address?

WINS

DNS

ARP

DHCP

17 Which service does ARP provide?

It resolves a physical address to a TCP port number.

It resolves a broadcast address to an IP address.

It resolves an IP address to a MAC address.

It resolves a URL to a MAC address.

18 What is the range of numbers that can be used in the first octet of a Class A network?

1-126

128-191

192-223

1-255

Page 16: ITEss2Mod Answers Moklet Angkatan 15

19 Which IP address range, as indicated by the first octet, is reserved for testing, and

includes the loopback address? 127.x.x.x

168.x.x.x

255.x.x.x

192.x.x.x

20 The performance of a network has dropped. Which command should an administrator

use in a Linux system to determine which routers are causing the problem?

ping

traceroute

tracert

route

ifconfig

Page 17: ITEss2Mod Answers Moklet Angkatan 15

Module 5: Study questions 1 Which statement correctly describes an NIS slave?

An NIS slave is another name for an NIS client.

An NIS slave is where the NIS database is maintained.

An NIS slave is where the NIS database is created.

An NIS slave contains a copy of the NIS database.

An NIS slave contains the portions of the NIS database needed by the clients it serves.

2 What are three characteristics of an intranet? (Choose three.)

communication with outside business partners

firewalls

multiple networks across the company

public access

local area network only

web servers

3 Which version of Directory Service does Linux use?

NDS

NIS

NFS

NDAP

4 Which two protocols are used to control the transfer of web resources from a web server

to a client browser? (Choose two.) ASP

FTP

HTML

HTTP

HTTPS

IP

5 Which TCP/IP protocol is responsible for file sharing?

DNS

NFS

UDP

IPX

Page 18: ITEss2Mod Answers Moklet Angkatan 15

6 Which popular web server software is only available for Windows operating systems? Apache

Firefox

Internet Explorer

Internet Information Server

Netscape Server

Opera

7 Which scripting language can be used on a Linux server to notify users that a print job

is complete? batch script

JavaScript

JScript

shell script

VBScript

8 What is the default order in which print jobs are processed when using a FIFO queue?

The last job placed in the queue is the first to be printed.

The oldest job in the queue is printed first.

Smaller jobs are printed before larger jobs.

Larger jobs are printed before smaller jobs.

The network administrator determines which jobs are printed first.

9 Which of the following is a list of common FTP commands?

get, put, cd, bye

download, upload, dir, chdir, exit

send, receive, dir, cd, exit

transfer [from | to], list, dir, exit

10 What are two common uses of scripting languages? (Choose two.) automate administrative tasks, such as cycling log files

provide user interaction with a compiled program

run scheduled tasks at user login

deliver files to remote users on request

download required drivers to printers

11 Which protocol controls web page transmission?

Page 19: ITEss2Mod Answers Moklet Angkatan 15

FTP

HTTP

SMTP

DNS

12 A network administrator is operating in the GNOME desktop environment. Which

application would the administrator start in order to establish a command line session with a remote server?

gFTP

Mozilla

Star Office

xterm

13 Which syntax is invalid for opening an FTP connection?

ftp connect hostname

ftp <hostname | IP_address>

ftp 192.127.34.219

ftp computer.company.com

14 Which protocol was designed for file sharing on the Internet?

HTTP

FTP

SMTP

TCP

15 Where do print jobs wait to be printed?

print list

print queue

wait list

print job roster

16 What is the purpose of a directory service?

It increases the need for redundant logins.

It provides administrators with centralized control of users and resources across the network. It impairs network security and must therefore be used with a firewall.

It keeps track of the home addresses and phone numbers of all users.

17 Which of the following is a list of popular scripting languages?

Page 20: ITEss2Mod Answers Moklet Angkatan 15

X Window script, vi script, Gnome script

XML script, Sequel, Gnomepad

UNIX shell script, pico script, EmacsScript

VBScript, Linux shell script, JavaScript

Page 21: ITEss2Mod Answers Moklet Angkatan 15

Module 6: Practice questions 1 Which Linux distribution was built solely for nonprofit uses?

Debian GNU/Linux

Caldera eDesktop and eServer

SuSE Linux

LinuxPPC

2 Which of the following is open source?

all versions of UNIX

Windows 2000

all versions of NetWare

Linux

3 What are two benefits of having more than one processor in a system?

support for remote locations and automatic job queuing

faster speeds and increased work capacity

reduced need for IP addresses and decreased boot time

reduced need for IP addresses and increased manageability

4 Why might the administrator of a small company choose Windows 2000 Server instead of

Windows 2000 Professional? The operating system is to run on a dual-processor system.

The system is to act as a DNS server.

The company needs an intranet based on a small web server.

The server will be accessed by up to ten simultaneous users.

5 How is redundancy built into a server system?

by including additional hardware components that can take over if other components fail

by including a tape back-up system to preserve data

by adding redundancy software to the system

by keeping duplicates of all data

6 Which of the following is a better choice than Telnet for Remote Login Servers on a Linux

system? SSL

SSH

Kerberos

Remote Access

Page 22: ITEss2Mod Answers Moklet Angkatan 15

7 In a Windows NT environment, what is the meaning of the term domain?

a dedicated server containing the database of all IP and MAC addresses on the network

a group of computers located in a specific physical or geographic region

the OU that contains all user accounts

groups of computers, users, and resources that form an administrative boundary

8 Which program, running on a Linux server, allows Windows-based clients to see the Linux

file system without installing client software? NFS

Apache

Samba

KDE

9 What are two important features provided by security on a NOS? authentication and encryption

reliable performance and account management

virus protection and prevention from spamming

processor balance and sustained work load

10 Which type of authentication security does Windows 2000 Professional support?

Secure Socket Layer

Kerberos

Samba

Apache

11 How many Primary Domain Controllers (PDCs) are allowed in a Windows NT environment? 1

2

4

9

12 Which of the following criteria must software meet in order to display the Open Source

Initiative trademark? It must be easily altered and adapted to all major operating systems and source code must be limited. It must be compatible with third party add-ons and use standard source code.

It must be provided in multiple languages and cost must be minimal.

It must be freely distributed without restriction and the source code must be available.

Page 23: ITEss2Mod Answers Moklet Angkatan 15

13 Which client/server file system is used by most varieties of Linux file servers?

FAT32

NFS

NT

SMB

14 What are two popular Desktop Environments that run on Linux?

GNOME and KDE

Apache and Samba

Xfree86 and GNOME

Apache and KDE

15 What are three important considerations when selecting a Linux distribution? (Choose

three.)

whether the computer will be used as a client or a server

whether or not the computer will be connected to a network

whether or not a GUI interface is required

whether or not a command line user interface is required

the experience level of the user

16 Windows 2000 Professional supports plug-and-play technology. What is one of the major advantages of this technology?

An administrator can add devices from any manufacturer to the system and they will work. Devices no longer need software drivers to interact with the system.

Components will interact with the system if plugged in prior to system boot.

An administrator or user can easily add components to the system without manual configuration.

17 Which one of the following office tools is available for both Linux and Windows?

ClarisWorks

ApplixWare

Lyx

StarOffice

Page 24: ITEss2Mod Answers Moklet Angkatan 15

18 Which statement accurately describes the Slackware Linux distribution? It is designed for Linux novices.

It has a range of user interfaces and uses RPM.

It is designed for advanced users and uses text-based configuration tools.

It is intended solely for non-profit organizations and uses the Debian package manager.

19 A user account on a server enables the server to do which of the following?

automatically download appropriate applications and print queues to that user

authenticate that user and allocate those resources the user is allowed to access

assign a specific IP and MAC address to the user's workstation

assign the user to a specific domain and user group

Page 25: ITEss2Mod Answers Moklet Angkatan 15

Module 7: study questions 1 What must be done when setting up a RAID array in Linux?

All the disks must be partitioned as primary partitions.

All the partitions need an extended partition.

The disks must be mounted using LVM.

The disks must be formatted using NFS.

2 What are two valid file systems for a Linux partition? (Choose two.)

ext1

ext2

ext3

HFS

boot

FAT

3 Which Windows file performs the same function as the Linux LILO files?

HAL

NTLDR

NTDETECT

NTOSKRNL

4

The figure shows a section of the display from Device Manager. What does it show about the laser printer?

The network cable is unplugged.

Windows recognized the device but could not locate a suitable driver.

Windows does not know the proper name of the device.

Windows could not locate the device in the expected location.

Page 26: ITEss2Mod Answers Moklet Angkatan 15

5 When setting up a hard disk, what are the three possible types of partitions? primary, secondary, and logical

primary, logical, and extended

C, D, and E

boot, program, and data

6 How is the root partition identified in Linux?

?

Root

/root

/

7 How many partitions can an MS-DOS-type partition table describe?

one

two

four

eight

8 Most NOSs will only run on certain hardware configurations. For which four

items are minimum requirements specified? (Choose four.) CPU speed

CPU type

RAM

CD-ROM drive

hard disk space

NIC

9 A technician is trying to configure a PC to dual boot with Windows XP and

Linux. XP has already been installed and configured in one partition. Linux has been installed in another partition. The technician wishes to replace the LILO loader with grub but is having problems. What is the most likely cause of the problem?

The technician did not remove the LILO files first.

Grub will not work with XP.

Linux should have been loaded first.

The technician did not run /sbin/grub-install.

Page 27: ITEss2Mod Answers Moklet Angkatan 15

10 The ping command is used to test network connectivity. What is the best IP address to ping for this test?

the DNS address

the loopback address

the local NIC address

the default gateway address

11 Which of the following Windows file systems is the most appropriate for a

network file server? FAT16

FAT32

NTFS

HFS

12 Which four items of information are required for TCP/IP network

configuration? (Choose four.) IP address of host

subnet mask

MAC address

IP address of default gateway

IP address of DNS server

host name

13 Which task should be performed before installing a NOS?

Change the system hardware and peripherals before beginning.

Verify that the NOS supports all application software that will run on the server. Run the evaluator software prior to loading to establish hardware settings. Be familiar with the NOS so configuration questions can be ignored.

14 Linux systems typically dedicate an entire partition to virtual memory. What

is this partition called? the RAM partition

the swap partition

the pagefile partition

the page partition

the memory partition

Page 28: ITEss2Mod Answers Moklet Angkatan 15

15 Which Windows utility can be used to perform a hardware inventory? Administrative Tools

ScanDisk

Windows Explorer

Device Manager

16 ext3 introduced journaling capabilities to Linux file systems. What is an

advantage of a journaling file system? It reduces the time spent recovering a file system after a crash.

It allows administrators to determine the owners of files created on the system.

It keeps file clusters attached to the files to which they are allocated.

It enables Linux systems to interoperate with Windows systems.

17 What is the best source of hardware compatibility information?

the World Wide Web

a hardware manual

a software manual

the CD-ROM readme document

18 What is the first step every computer will perform when it is turned on,

regardless of the operating system?

boot

RAM

POST

SCSI

Page 29: ITEss2Mod Answers Moklet Angkatan 15

Module 8: Study questions 1 Which method should an administrator use to provide for securely sharing

files on a larger network? arrange for each host on the network to share files with the other hosts on the network to distribute the load only allow clients used by trusted users to share files with others on the network require users to map to a network drive on a network file server on the LAN set up an area on a web server that can then be accessed from anywhere through web browsers

2 An administrator has written a script in VBScript and saved the file. What

must the administrator do to ensure that WSH is aware that this is a VBScript file?

The first line of the script file must be VBS.

The WSH configuration file needs to be updated with the name of the new script file. The file must have the extension .vbs.

WSH must be informed that it is a VBScript file when it is loaded.

3 Which command can be used in Windows 2000 to capture the output from a printer

port and redirect it to a network printer? net use

capture

lpt1 > net

netprint

4 An administrator needs an account that can be used to manage all the computers in a

domain. What is the name of the group that Windows 2000 provides to allow the administrator to perform this function?

Root

Admin

Domain Admins

Enterprise Admins

Administrator

5 What are three desirable characteristics of a print server? (Choose three.)

good graphics

fast processor

adequate RAM

adequate disk space

adequate tape backup

Page 30: ITEss2Mod Answers Moklet Angkatan 15

6 In Windows 2000, what is the best way to restore a deleted user account?

Select undelete from the popup menu.

Create a new account with the same user name.

Select undo from the Edit menu.

Delete cannot be undone.

7 Which component of Windows 2000 accommodates many types of scripting

languages? VBScript

JScript

WSH

ShellScript

8 When installing Windows 2000 Professional on a new machine, what must you do

to boot from the CD? Nothing, it will automatically boot from the CD.

Select the correct install device option from the menu.

Enter the CMOS setup and set the boot sequence to boot from the CD-ROM drive first. Insert the Windows 2000 CD in the CD-ROM drive and press Enter.

9 In Windows 2000, which of the following is a required field when creating a new user

account?

the full name

the password

the user name

he description

10 What is the main reason that NTFS is the preferred file system for a Windows 2000

partition?

It is the only file system that is available to a Windows 2000 administrator.

It cannot be accessed by Linux systems.

It supports a bigger file system than any of the alternatives.

It offers better security than any of the alternatives.

Most Windows 2000 administrators are trained to use NTFS.

Page 31: ITEss2Mod Answers Moklet Angkatan 15

11 What is the purpose of the user's full name in the New User account box?

It is informational only.

It authenticates the username.

It allows the user to logon.

It matches the user to permissions.

12 What is the default method of authentication used by Telnet in a Windows 2000

environment?

plain text

NTLM

kerberos

ND5

.net passport

13 Which two of the following statements about passwords are correct? (Choose two.)

No two users should have the same password.

Passwords should be at least five characters long.

Passwords should contain at least one non-alphabetic character.

Passwords should be easy to remember such as a favorite sports team.

14 In Windows 2000, what is the name of the HTTP web service located in the

Administrative Tools menu? Default FTP Site

Default Web Site

Default Web Service

Default Internet Information Service

15 An administrator has just finished setting up a Windows 2000 PC. What should the

administrator do first to ensure that the NIC has been correctly configured? run the ifconfig -a command

run the ipconfig /all command

ping the local host

ping the default gateway

Page 32: ITEss2Mod Answers Moklet Angkatan 15

16 Which two statements about computer names in Windows 2000 are correct? (Choose two.)

A computer name is optional.

The maximum length for a computer name is 15 characters.

The maximum length for a computer name is 255 characters.

There is a default computer name based on the organization name.

Computer names on a network do not need to be unique if they have unique IP addresses.

17 In the Windows 2000 NOS, which tools must be loaded to run FTP services?

FTP Services

Network Services

Internet Information Services

Site Services

18 A network administrator is setting up a web presence for a small company. The

company plans to use the address www.thecompany.com but has not created a DNS entry for the server yet. The administrator has set up a new web server on a networked machine with the IP address 111.111.111.111. What should the administrator initially do to determine if the web server is functioning?

Run a web browser on the server machine and enter the address http://127.0.0.1.

Run a web browser on a host connected to the same network and enter the address http://111.111.111.111. Ask someone outside the organization to try to access the website using the address http://111.111.111.111. Ask someone outside the organization to try to access the website using the address http://www.thecompany.com. Run a web browser on a host connected to the same network and enter the address http://www.thecompany.com.

19 Which Windows tool allows an administrator to easily view or navigate a file system?

Internet Explorer

Windows Explorer

WinNT Explorer

File Explorer

20 Which three of the following groups can be created in Windows 2000? (Choose

three.) local groups

global groups

domain local groups

domain global groups

audit groups

Page 33: ITEss2Mod Answers Moklet Angkatan 15

21 What must a Windows 2000 client do in order to assign a logical drive letter to a

shared folder on a network file server? map to the network drive

link to the file server

share the network folder

create a path to the file server

22 Which two of the following tasks are performed before the Setup wizard stage of a

Windows 2000 installation? (Choose two.)

reconfigure hard disk partitions if necessary

enter the product registration key

format the disk

configure networking

Page 34: ITEss2Mod Answers Moklet Angkatan 15

Module 9: Study questions 1 You would like to install the samba program on your Linux machine. You have located

the file samba-2.0.7.tar.gz. Which command should you use to completely unpack the files in this package?

gunzip samba-2.0.7.tar.gz

tar -xvf samba-2.0.7.tar.gz

tar -xvzf samba-2.0.7.tar.gz

gunzip -xvf samba-2.0.7.tar.gz

2 When is the root account typically created in Linux?

at first login

during NOS installation

when configuring NOS user accounts

after user accounts are created

3 Which term describes the Linux superuser account?

sys

root

power user

wheel

daemon

4 What is the name of the X Window package that is supplied with most distributions of

Linux?

X Window

Xfree86

Xfree386

Xlib86

Xlib386

Page 35: ITEss2Mod Answers Moklet Angkatan 15

5 Which of the following are valid boot loader options for most Linux installations? (Choose

two.) BOOT.INI

AUTOEXEC.BAT

LILO

GRUB

Loadlite

RPM Loader

6 A user wishes to install Linux on a PC with an Intel compatible Pentium class processor

and 64 MB of RAM. What is the recommended minimum amount of free space on the hard drive to complete the installation?

200 MB

500 MB

900 MB

1 GB

2 GB

7 Which of the following commands would assign a default gateway of 172.16.5.3 to the

local host?

ifconfig eth0 def-gate 172.16.5.3

ifconfig eth0 gw 172.16.5.3

ifconfig eth0 default gw 172.16.5.3

route add def-gate 172.16.5.3

route add gw 172.16.5.3

route add default gw 172.16.5.3

8 You have formatted a drive while doing a Linux installation for a production server. The

formatting revealed that there were several bad blocks. You see that the bad blocks make up about four percent of the total disk. Which of the following would be the best course of action?

reformat the drive with a high level format

reformat the drive with a low level format

replace the drive

mark the blocks as "bad" and continue the installation

Page 36: ITEss2Mod Answers Moklet Angkatan 15

9 Which three statements are correct when describing the ifconfig command? (Choose three.)

Settings must be saved following this command or they will be lost when the computer is rebooted. Printers can be shared using this command.

The NIC card can be set up and configured using this command.

The IP address of the local host can be assigned using this command.

The hardware address of the local host can be assigned using this command.

10 You are installing RedHat 7.2 and have decided to use the installation class called

"Workstation". Which of the following packages will not be installed? (Select two.) X Windows

Telnet daemon

HTTP daemon

Vi editor

Sendmail daemon

Browser

11 Which of the following would be standard file system types that Linux would use during

an installation? (Select two.) NTFS

FAT16

FAT32

ext2

ext3

VFAT

12 Which of the following can be set within the LILO configuration file?

an option to ask for a DNS server

an option to clear the /tmp directory at boot

an option to boot to runlevel 5

an option to use DHCP

13 You would like to perform a high-level format on a hard disk. Which of the following Linux commands will accomplish this?

format

fdformat

hformat

mkfs

mkhfs

Page 37: ITEss2Mod Answers Moklet Angkatan 15

14 Which of the following directories stores the package database for the Red Hat Package

Manager?

/etc/var/rpm

/var/lib/rpm

/etc/lib/rpm

/var/rpm/db

15 A technician is setting up a Linux workstation to automatically get all of the correct IP

settings as soon as it boots. Which protocol should be configured on the workstation to accomplish this?

DNS

ARP

DHCP

NetBEUI

default gateway

16 Which of the following is the most widely supported package type available in Linux?

RPMs

DPMs

tarballs

gzip

17 You have decided to install your new Linux distribution by using the bootable CD that

came with it. What must be configured before you can boot from the CD? CMOS

NVRAM

BIOS

Hard drive

18 You have tried to install a particular RedHat package but it keeps telling you that it has

a "failed dependency". What would cause this error? The package depends on certain user input.

The package depends on operating system input.

The package depends on another package being installed.

The package depends on hardware that is not present in the computer.

Page 38: ITEss2Mod Answers Moklet Angkatan 15

19 A file system is written to a partition when a hard drive is formatted. Which three of the following file systems can be used in a typical Linux installation? (Choose three.)

NTFS

ext2

ext3

FAT

FAT32

Reiser

Page 39: ITEss2Mod Answers Moklet Angkatan 15

Module 10: Study questions 1 Which of the following commands will allow only the owner of a file named

programs to execute the file?

chmod 664 programs

chmod 544 programs

chmod 422 programs

chmod 462 programs

2 In Linux, which command allows users to learn more about any command?

cal

man

help

doskey

3 In Linux, which command is used to switch from the X Window GUI to the CLI?

Ctrl+Alt+(F1-F6)

Shift+Ctrl+(F1-F6)

Shift+Alt+(F1-F6)

Ctrl+Delete+(F1-F6)

4 Which of the following is a translator that allows Linux and UNIX systems using

PostScript to print to non-PostScript printers? Printcap

Chatscript

Linuxscript

Ghostscript

Printscript

5 A user wants to disable the Telnet and FTP services in Linux. In the configuration

file, which character would the user place at the beginning of the Telnet or FTP line?

x

?

#

!

Page 40: ITEss2Mod Answers Moklet Angkatan 15

6 Which file must be edited by the Linux administrator to manually disable a user's password?

/etc/passwd

/user/shadow

/etc/shadow

/root/shadow

7 In which file does the activation of the Linux FTP service take place?

/etc/conf/init.d

/etc/conf.d

/etc/rc.d/init.d/xinetd

/etc/activate/inetd

8 Which command character allows users to enter the vi edit mode?

#

i

e

>

9 Which of the following Linux daemons listens for incoming requests and forwards

each request to the appropriate daemon? HTTPD

LPD

crond

syslogd

inetd

10 What is X Window?

It is server software to setup web services in Linux.

It is software that allows users to set the number of open Telnet windows in Linux. It is a GUI interface for Linux.

It is mail client software for Linux.

11 What are Pico and vi?

versions of Linux

Linux CLI commands

text editors

user desktop environments

Page 41: ITEss2Mod Answers Moklet Angkatan 15

12 Which file is used by a Linux computer to determine which printers are online and

available for printing? /etc/printcap

/etc/lpd

/etc/print/lpr

/etc/lprd

13 Which of the following configuration files determines the default runlevel at system

startup?

/etc/rc/init

/etc/inittab

/etc/init/rc.d

/etc/rc.d/inittab

14 Which of the following files can be edited to allow a user other than root to use the

umount command? /etc/lilo.conf

/etc/fstab

/etc/var/mnt

/var/mnt

15 On a computer running Linux, which attribute prevents anyone other than the

owner of a file, the directory owner, or root from renaming or removing files in a directory?"

owner bit

no override

lock

sticky bit

16 In the path /etc/rc.d/rc#.d, what is specified by the #?

the number of columns in the file

the priority associated with the file in the directory

the runlevel associated with the file

the number of users who can concurrently access the file

Page 42: ITEss2Mod Answers Moklet Angkatan 15

17 In Linux, which command is used to rename a directory?

mv

cd

dir

mkdir

18 In Linux, which command is used to create a new directory?

md

mdir

dir

mkdir

19 Which of the following indicates only read and write permissions when used with

the chmod command?

4

5

6

7

20 Which service can be deployed as a more secure alternative to Telnet?

FTP

NFS

SSH

TFTP

21 Which Linux process will automatically run scheduled tasks at a specified time? run

crond

sched

auto

22 Which scripting language is basic to the Linux OS?

VBScript

shell script

JavaScript

Perl Script

Page 43: ITEss2Mod Answers Moklet Angkatan 15

23 On a Linux system, which configuration files contain user account information?

(Choose two.) \etc\shadow

/etc/passwd

/etc/user/passwd

\etc\passwd

/etc/shadow

/etc/user/passwd

Page 44: ITEss2Mod Answers Moklet Angkatan 15

Module 11: Study questions 1 Which Linux command is used to create partitions on a hard disk?

mkdev

fdisk

mkfs

fsck

2 What are two guidelines that an administrator should follow to maintain a healthy hard

drive? (Choose two.) limit the amount of RAM available to individual users

defragment the hard drive regularly

allow users to use all available storage with no limits

continually manage available disk space

do not limit the size of user home directories

3 Which statement is true when the SUID bit is set as the root account for a program?

Root cannot execute the program.

Only root can execute the program.

Any user can execute the program using root account permission.

Users can execute the program only if they belong to the same group as the owner of the program. Only the owner of the program can execute the program.

4 Which setting determines if a program will run with the permissions of its assigned

group or the permissions of the user's groups?

SUID

GUID

SSID

SGID

5 What are three key concepts when analyzing and optimizing network performance?

bottlenecks, baselines, and best practices

baselines, base logs, and best practices

best practices, base logs, and bottlenecks

baseline, bottlenecks, and backups

Page 45: ITEss2Mod Answers Moklet Angkatan 15

6 Which of the following can be used to monitor system resources in Windows XP and

Windows 2000? Event Viewer

Scandisk

Performance Tool

Task Scheduler

Checkdisk

7 What is the function of the /etc/crontab file in Linux?

to schedule system jobs

to schedule user jobs

to validate created processes

to remove cron jobs

8 Linux administrators have several CLI commands available to display information on

system resources. What is the output associated with using the du command? a display of disk usage for a file system

a display of disk usage for a directory

a display of disk usage for file information

a display of the user's remaining disk space

9 Which Linux command can be used to terminate processes that are consuming too

many system resources?

at

stop

kill

term

kip

10 Which output does the df command produce when executed from the Linux CLI?

detailed information about the file system

detailed information about the top-level directory

detailed information about CPU and RAM usage

detailed information about the data stored on the disk

Page 46: ITEss2Mod Answers Moklet Angkatan 15

11 Which file can be studied by programmers to determine the potential cause of a program crash?

Core Dump

Script Debugger

Process Tracker

Trace File

Error Pack

12 Which of the following statements is true about the use of Performance Tool?

Performance Tool is only available for use on Linux computers.

Performance Tool should be used sparingly since it uses valuable system resources.

Performance Tool can only be used to monitor network computers.

Performance Tool can only be used in conjunction with a pre-established baseline.

13 A system unexpectedly shuts down due to power failure. As a result, the file system is

damaged. Which Linux command could be used to repair the file system?

mkfs

fsck

diskcheck

filrep

ps

14 Which of the following can be used to execute a series of Linux commands at a

specified time? which

run

time

at

when

15 When should a baseline reading of network performance be made?

at the busiest time of day

when the network is running normally

at the least busy time of day

when the network is not in use

Page 47: ITEss2Mod Answers Moklet Angkatan 15

16 Which of the following tools can be used to analyze Linux system log files? Logcheck

Regscan

Filecheck

Scanfile

17 Which Linux command can be used to terminate a group of processes that have the

same name instead of terminating them with their PID numbers? term

stop

killall

halt

18 Which Linux command is used to create filesystems on a partition?

mkdev

fdisk

mkfs

fsck

19 Which disk management tool is available to limit the amount of data a user can store

on a network? disk quota

disk ceiling

disk limit

disk wall

disk container

Page 48: ITEss2Mod Answers Moklet Angkatan 15

Module 12: Study questions 1 Which version of the Linux kernel includes ISA PnP support that does not require the isapnp

program?

2.1.x

2.2.x

2.3.x

2.4.x

2 Which insmod option will automatically unload the module when it is no longer being used?

-s

-p

-f

-k

3 Which of the following is an OS-independent component that is responsible for basic

hardware and resource configuration before the OS loads?

USB ports

SCSI

BIOS

CPU

4 What would be the most important feature to consider when selecting a video card for a

workstation based on performance? warranty

amount of on-board RAM

manufacturer

price

5 Which two steps should a technician perform first when troubleshooting a new EIDE hard

drive installation that a computer does not recognize? (Choose two.) check CMOS to ensure that the hard drive settings are correct

ensure that the drive has the correct master or slave jumper settings

ensure that the kernel contains the correct drivers for the drive

make sure the device number and termination are correct

Page 49: ITEss2Mod Answers Moklet Angkatan 15

6 Which option of the insmod program will send output to a log file instead of the console? -s

-p

-f

-k

7 A new EIDE hard drive has been added to a Linux workstation. The hard drive is functioning

but performance is poor. What should the administrator do first to check the installation? ensure that the ribbon cable connector being used is the one closest to the motherboard

ensure that the jumpers on the hard disk are set to configure it as the master drive on EIDE channel 1

repartition the disk to create smaller partitions

use the hdparm utility to test the disk and set options

8 What is the most common cause of core system hardware failure?

static discharge

overheating

incorrect drivers

excessive use and age

physical damage

9 Some PCMCIA driver packages allow drivers to be mounted while a device is installed and

unmounted when the device is removed from a laptop. Which feature makes this possible?

ACPI

Card Services

lsmod

mount

sleep

umount

10 Which insmod option will instruct the program to load the module even if the module was

compiled for a different kernel? -s

-p

-f

-k

Page 50: ITEss2Mod Answers Moklet Angkatan 15

11 What is the main concept to be aware of when installing hardware on a Linux system? price

type of device

compatibility

number of slots available

12 Which Linux file needs to be edited to specify an IRQ for an Ethernet card?

/lilo.conf

/irq.conf

/etc/lilo.conf

etc/loli.conf

/etc/irq.conf

13 A technician is adding an internal PnP modem to a system, but a check of system resources

shows that all available IRQs are reserved or being used by other devices. What could the technician do to get the device to work?

manually assign the IRQ of another device that is not expected to be used at the same time as the modem use trial and error to find an IRQ that will work with the modem

configure the modem to work without an IRQ

change CMOS settings to allow the BIOS to free up an unused IRQ

configure the modem to use a DMA address instead of an IRQ

14 Which two of the following statements about SCSI devices and configuration are true?

(Choose two.) The SCSI controller needs to be terminated if it is at the end of a chain.

A forked chain occurs when two SCSI cables are connected to a single controller.

Throughput can be reduced if all SCSI devices are not the same variant.

All SCSI devices in a chain must have the same device number.

15 Which program is used to insert a single module into the Linux kernel?

imsmod

smod

ismod

insmod

Page 51: ITEss2Mod Answers Moklet Angkatan 15

16 How is PnP handled in a Linux system? (Choose two.) isapnp program

iopnp program

ISA configuration option in control panel

ISA configuration option in the Linux kernel

17 Which of the following factors should be considered when installing a SCSI drive to ensure

system compatibility? (Choose three.) variant

RPM

ID

termination

drive size

average seek time

18 A module needs to be loaded. However, confirmation that the Linux kernel can load the

module is important. Which of the following options of the insmod program will accomplish this task?

-s

-p

-f

-k

19 Which of the following Linux files can be viewed to see resource allocations? (Choose three.)

/proc/interrupt

/proc/dma

/proc/imports

/proc/ioports

/proc/alloc

20 On a Linux system, which of the following files will show the interrupt request number

allocation? /dev/interrupt

/proc/interrupt

/interrupt

/var/interrupt

Page 52: ITEss2Mod Answers Moklet Angkatan 15

Module 13: Study questions 1 An administrator is responsible for a mixed Linux/Windows network. The administrator has

configured a new computer with the Windows XP operating system. The administrator then attempts to ping it from a Linux computer but fails. What should the administrator do next?

try to ping the Windows computer from another Windows computer

run ifconfig on the Linux machine and specify the IP address of the Windows computer

run ipconfig on the Windows machine to ensure it is set up correctly

run ping 127.0.0.1 on the Windows system

2 Which command is used to determine the active TCP connections on a computer?

ping

ICMP

ifconfig

traceroute

netstat

3 In a Linux system, the set of recent kernel messages is known as the kernel ring buffer.

Which command displays these messages? dmesg

imesg

kmsg

rmesg

4 What is the simplest and most recommended method of creating a custom emergency boot

disk for Linux?

Run the btdisk command.

Modify one of the existing boot disks.

Copy individual boot files to a floppy.

Download a custom configuration from a Web site.

5 Which type of files can be helpful in identifying several types of problems in a Linux server?

security files

user data files

log files

text files

Page 53: ITEss2Mod Answers Moklet Angkatan 15

6 What is the easiest way to stop a non-responsive process in a Linux system? issue the stop command

issue the kill command

log out and log back in again

press Ctrl-Alt-Del and click Stop when the Task Manager appears

7 Which two files are commonly used to access the tape backup devices? (Choose two.)

/dev/ht0

/dev/hd0

/dev/nst0

/dev/tp0

8 Why is it necessary to use the appropriate Sys V script to stop some processes?

It is the only way to stop some services.

It is the best way to stop zombie processes.

It will prevent lock files from causing error messages.

It will save the data that has been processed.

9 While booting a Linux server, the booting process has stopped. Upon troubleshooting, an 'L'

error code is discovered. What does this indicate? No part of LILO loaded.

The second stage of LILO did not load.

The first and second stages both loaded, but the second stage will not run.

The disk descriptor table (/boot/map) is corrupt.

10 Which statement best describes the LOADLIN program?

It is a text editor.

It is an MS-DOS utility used to load a Linux kernel.

It is a command line interpreter.

It is a Linux kernel program that loads and executes applications.

11 Which parameter can be used with tar to list the contents of an archive?

-a

-i

-l

-t

Page 54: ITEss2Mod Answers Moklet Angkatan 15

12 In Linux, what is the first program that takes control of the boot process from the BIOS? kernel

LILO

config.sys

linux.sys

13 What is the loopback address that a technician would ping to verify that TCP/IP is correctly

installed? 192.0.0.1

127.0.0.1

168.0.0.1

223.0.0.1

14 What is the best way for an administrator to determine if a server is overloaded?

ask users if the service has declined

keep a record of the frequency of server crashes

monitor the network load and note when it becomes very high

check the server log files

15 Which Linux log file is most likely to contain the word oops?

/var/log/messages

/var/log/error

/var/log/syslog

/var/log/secure

Page 55: ITEss2Mod Answers Moklet Angkatan 15

Module 14: Study questions 1 Which two options accurately describe network security? (Choose two.)

As security increases, the level of accessibility increases.

As security increases, the level of accessibility decreases.

Users want more accessibility and administrators want more security.

The level of security required is the same for all organizations.

2 According to SANS, which three of the following services are among the top ten security

vulnerabilities of Linux? (Choose three.) Remote Procedure Calls

Dynamic Host Configuration Protocol

MySQL

Secure Shell

Apache Web Server

RMON

3 Several computers on a network are running slow and many user tasks are timing out. The

administrator checks the network and finds duplicate copies of program code in the active memory of each computer. Which of the following options best describes this self-replicating code?

virus

Trojan horse

worm

bug

4 Which three of the following terms refer to the public network that acts as a buffer area

between a firewall and a boundary router? (Choose three.) Internet

DMZ

extranet

sacrificial LAN

dirty LAN

demarcation zone

Page 56: ITEss2Mod Answers Moklet Angkatan 15

5 Which directory should be used for decompressing LSAT?

/usr/bin

/etc/bin

/usr/local/bin

/usr/sbin

/etc/local/bin

6 Which three of the following items should be included in a security policy to increase the

level of password control? (Choose three.) Passwords should expire after random periods of time.

Passwords should be familiar names or words, so that users will not have to keep written reminders near computers. Passwords should be a combination of letters and numbers.

Written rules should be distributed to advise users of password expiration and lockout policies. All passwords should be changed by the user after a specified period of time.

7 Which of the following options best describes Network Address Translation?

Network Address Translation usually replaces proxy services and packet filters.

Network Address Translation uses private addressing to hide inside hosts from outsiders. Network Address Translation is used to alter the destination address of packets leaving a secure network. Network Address Translation allows packets to be filtered as they enter or leave the network.

8 Which three OSI model layers are used for packet filtering? (Choose three.)

Layer 2

Layer 3

Layer 4

Layer 5

Layer 6

Layer 7

9 Which statement accurately describes a Smurf attack?

The IP headers of ping requests are spoofed so that replies will overwhelm the target host. The IP headers of SYN requests are spoofed so that a target will attempt to reply to itself. This DoS attack overflows buffers by sending illegally large ping requests to the target.

This attack exploits the three-way handshake used with TCP.

Page 57: ITEss2Mod Answers Moklet Angkatan 15

10 Which of the following options refers to a software-based, real-time network IDS that is designed for smaller networks?

PIX

Snort

Smurf

proxy server

11 Which statement is true about username and password standards?

Complex usernames are less important than complex passwords.

Standards should only be applied to passwords. Users should select their own usernames.

Usernames should expire every three months.

Passwords should be simple and easy to remember.

12 How can developing an e-mail policy protect a network from viruses?

An e-mail policy will state what can be sent and received so that users will no longer need to be made aware of security issues. An e-mail policy will make it safe for users to open all attachments.

An e-mail policy will define what can be sent and received to make users more aware of security issues on the network. An e-mail policy will require users to notify the other users on the network as soon as a threat is suspected.

13 Which two of the following options provide a basic firewall solution by using rules to

control network traffic? (Choose two.) proxy services

ip masquerade

packet filters

Network Address Translation

access control lists

14 Which two of the following protocols are used by IPSec? (Choose two.)

Encrypted Secure Header

Encapsulating Security Payload

Authentication Header

Authenticated Secure Header

Page 58: ITEss2Mod Answers Moklet Angkatan 15

15 Which of the following options best describes the characteristics of an IDS? hardware, inspects all network activity, denies or permits access using filters, signals an alarm hardware or software, limits access to prevent intrusion, inspects all network traffic

software, designed to identify intrusion using a set of patterns, signals an alert

inspects all network activity, identifies suspicious patterns, signals an alert

16 Which three of the following vulnerabilities have been overcome in newer versions of

operating system software? (Choose three.) ping of death attack

land attack

Teardrop

buffer overflow

17 Which three of the following options are necessary to protect against the threat of viruses?

(Choose three.) Outgoing traffic should be filtered at all gateways.

Incoming traffic should be filtered at all gateways.

Current virus protection software should only be installed on incoming gateways.

One administrator should issue all virus warnings.

Policies should be created to control outgoing e-mail.

Virus protection software should be current on all computers.

18 Which two of the following statements correctly describe audit trails? (Choose two.)

Audit trails secure a network.

Audit trails help maintain security on a network.

Audit trails back up data on a network.

Audit trails are used to recover lost data.

Audit trails are used to allocate network resources.

19 To create a security policy, which of the following actions should occur first?

All servers should be placed in a secure, central location.

All users should be surveyed to identify potential security threats.

All users should receive written guidelines of what is acceptable and allowed on the network. All users should receive instructions outlining how to install and upgrade virus software.

Page 59: ITEss2Mod Answers Moklet Angkatan 15

20 Which DoS attack uses fragments with overlapping reassembly information to take advantage of the way IP handles fragmentation?

SYN attack

Teardrop

ping of death

land