1. Which term describes the ability of a web server to keep a log of the users who access the server, as well as the length of time they use it? a. authentication b. authorization c. accounting d. assigning permissions 2. Which two statements describe out-of-band network management? (Choose two.) a. does not require a physical connection b. preferred over in-band management for managing services c. used for initial device configuration d. uses a direct console connection e. provides greater functionality than in-band management 3. Which two are duties of an SNMP management agent? (Choose two.) a. collects information for the management station by polling devices b. permits access to devices by assigning each a community ID c. reports to the management station by responding to polls d. runs the applications that the administrator uses to configure devices on the network e. sends an alert message to the management station if a threshold is exceeded 4. What is the ?principle of least privilege?? a. the use of only a single server to store shared data for a local network b. all local users should have open access to shared data c. give each user access to only those resources needed to do his or her job d. when more than one user needs access to the same data, access should be first come, first served 5. What command can an administrator issue to find the filename of the IOS that is currently running before backing up the IOS to a TFTP server? a. show running-config b. show startup-config c. show sessions d. show flash 6. While downloading an IOS image from a TFTP server, an administrator sees long strings of the letter 'e' output to the console. What does this mean? a. The IOS image is corrupt and is failing error checking. b. There is a communication error between the router and the TFTP server. c. The router is erasing the flash memory. d. The file is being encrypted before being downloaded to the router. 7. Match the AAA term on the top to the definition on the bottom. Note that not all terms will be used a. auditing b. accounting c. authorization d. authentication e. access control f. acknowledgement a. username and password b. who used what network resource c. rights to a specific network resource 8. When MPLS is configured on a router, what is true about the MTU? a. The MTU size on the serial interface is automatically decreased and must manually be increased. b. The MTU size will not be affected for the WAN and LAN interfaces. c. The MTU size on a LAN interface must be manually increased using the mpls mtu command. d. The MTU size stays the same for both the LAN and WAN interfaces. 9. The CEO of Quickclips, Inc. decides that the company's backup process needs to allow for a very quick restoration of lost data. He is willing to accept a lengthier time for the backup process itself. Which type of backup should be implemented? a. partial b. differential c. incremental d. full 10. The IT manager performs a full backup on Monday and differential backups on Tuesday, Wednesday, and Thursday. On Friday morning, the server crashes and all of the data must be restored. In which sequence should the backup tapes be restored? a. the full backup tape from Monday, and then differential tapes from Thursday, Wednesday, and Tuesday b. the differential tape from Thursday, and then the full backup tape from Monday c. the full backup tape from Monday, and then the differential tape from Thursday d. only the full backup tape from Monday e. only the differential tape from Thursday 11. Where is the safest place to store backups? a. portable lock box b. locked telecommunications room c. locked server room d. offsite secure facility 12. Which firewall filtering technology keeps track of the actual communication process occurring between the source and destination devices and stores it in a table? a. access-list filtering b. stateful filtering c. URL filtering d. content filtering 13. Why is risk assessment critical to disaster recovery planning? a. It contains management approval to implement the plan. b. It identifies the high priority applications that must be restored quickly. c. It outlines the roles of each member of the disaster recovery team. d. It identifies the likely disasters that could occur and their effect on the business. 14. Why would a business choose an IPS instead of an IDS? (Choose two.) a. An IPS identifies and blocks malicious activity. b. An IPS is installed out-of-band and does not affect network traffic throughput. c. An IDS cannot stop some malicious traffic from getting through. d. An IDS is an in-band device that can affect network traffic. e. An IDS device must be installed outside the firewall to monitor traffic.