200-125 Cisco Certified Network Associate Practice Exam Set 4

The shared folder named C$ is an example of which of the following?


Options are :

  • Local share
  • Administrative share
  • Permission propagation
  • Inheritance

Answer : Administrative share

300-101 Implementing Cisco IP Routing (ROUTE) Practice Exam Set 4

On a corporate network, which of the following features would be used to redirect network traffic for filtering or monitoring?


Options are :

  • Proxy Settings
  • Network Drive Mapping
  • Local Security Policy
  • Content Advisor

Answer : Proxy Settings

A technician would like to dispose of a hard drive that is no longer needed. According to company policy, all contents on the disk should be deleted before disposal. Which of the following OS command line tools should be used?


Options are :

  • FORMAT
  • SCANDSK
  • DEL
  • CHKDSK

Answer : FORMAT

The folder "Documents" is shared. The user can create and delete documents when on the local PC, but can only read documents when accessing them remotely.Which of the following should be adjusted?


Options are :

  • NTFS Permissions
  • Firewall Settings
  • Read Only Attribute
  • Share Permissions

Answer : Share Permissions

210-260 Implementing Cisco Network Security Practice Exam Set 4

A technician is trying to request a new IP address to a customer's computer through the command prompt. Which of the following commands should the technician use?


Options are :

  • ipconfig /release
  • ipconfig /all
  • ipconfig /flushdns
  • ipconfig /renew

Answer : ipconfig /renew

In which of the following operating systems does Windows XP mode come as a free download to be used for application compatibility?


Options are :

  • Windows Vista Business
  • Windows 7 Starter
  • Windows 7 Home Premium
  • Windows 7 Professional

Answer : Windows 7 Professional

Which of the following commands is used to map a network drive?


Options are :

  • NETMAP
  • NET USE
  • NETSTAT
  • NBTSTAT

Answer : NET USE

642-732 Conducting Cisco Unified Wireless Site Survey Exam Set 2

A user recently installed a new video driver on a PC but now it will not boot. Which of the following is the BEST option to correct the issue?


Options are :

  • FIXBOOT
  • Automated system recovery
  • Emergency repair disks
  • Safe mode

Answer : Safe mode

A user's computer keeps producing a "low virtual memory" alert and the speed of the system degrades afterwards. Which of the following Control Panel locations can provide information to review and correct this issue?


Options are :

  • Syatem > System Restore
  • System > Remote
  • System > Advanced
  • System > Hardware

Answer : System > Advanced

An audio visual company has decided that they want to migrate from Windows XP Professional SP2. The company has a domain network. A technician is tasked with selecting an operating system. Which of the following should the technician select?


Options are :

  • Windows Vista Home Premium
  • Windows 7 Home Premium
  • Windows XP Media Center
  • Windows 7 Professional

Answer : Windows 7 Professional

200-105 Interconnecting Cisco Networking Devices Part Exam Set 5

Which of the following is the BEST tool to verify the cable is plugged into the correct port on the patch panel?


Options are :

  • Cable certifier
  • Punch down
  • Cable tester
  • Toner probe

Answer : Toner probe

Which of the following commands may need to be run after a virus removal if the computer will not boot?


Options are :

  • DXDIAG
  • MSCONFIG
  • FIXMBR
  • SCANDSK

Answer : FIXMBR

A technician believes a machine loaded with Windows XP Professional has issues with file integrity of the core OS components. Which of the following commands could be used to both check and replace damaged files?


Options are :

  • CHKDSK /R /F
  • FORMAT C:
  • SFC /SCANNOW
  • DISKPART

Answer : SFC /SCANNOW

642-732 Conducting Cisco Unified Wireless Site Survey Exam Set 6

Which of the following BEST describes a method for installing an operating system across the network?


Options are :

  • PXE
  • USB 3.0
  • NTFS
  • IEEE 1394

Answer : PXE

A pest exterminator tries to gain access to a company's computer lab, but the receptionist does not see an extermination scheduled on the calendar and denies the exterminator access to the lab. Which of the following security threats almost occurred?


Options are :

  • Social engineering
  • Phishing
  • War driving
  • Shoulder surfing

Answer : Social engineering

300-320 Designing Cisco Network Service Architectures Exam Set 5

Which of the following is solely designed to avoid detection by an antivirus program by using the underlying operating system to its advantage?


Options are :

  • Trojan
  • Virus
  • Worm
  • Rootkit

Answer : Rootkit

A user regularly has to walk away from their computer and is worried someone may access their workstation. Which of the following would BEST prevent this?


Options are :

  • Set the screensaver password
  • Logon using the unprivileged guest account
  • Shutdown the computer
  • Lock the workstation

Answer : Lock the workstation

Which of the following is BEST used to prevent other people from viewing a user's computer screen?


Options are :

  • Key fob
  • Anti-virus software
  • Privacy filter
  • Biometric device

Answer : Privacy filter

642-732 Conducting Cisco Unified Wireless Site Survey Exam Set 3

An unauthorized user observing system security procedures is known as:


Options are :

  • Spyware.
  • Shoulder surfing.
  • A worm.
  • Phishing.

Answer : Shoulder surfing.

Which of the following should a technician implement to prevent external contractors from physically plugging devices into the company's network jacks unless such jacks are designated for guest use?


Options are :

  • Enable MAC address filtering across all network jacks and record the MAC address of guest devices.
  • Disable DHCP and assign a static IP address to each network device physically connected to the network.
  • Disable all switch ports when they are not utilized and enable them on an as needed basis.
  • Place guest network jacks in public areas and all other jacks in secure areas as needed.

Answer : Disable all switch ports when they are not utilized and enable them on an as needed basis.

Which of the following passwords is the MOST secure according to industry best practices?


Options are :

Answer : [email protected]

100-105 Net Cert Interconnecting Cisco Networking Exam Set 4

A company is looking to donate a collection of old PCs that are no longer needed. Which of the following data destruction methods would be MOST secure for highly sensitive information?


Options are :

  • High level format 10 times
  • Low level 7-pass random wipe
  • Simple 1-pass zero overwrite
  • Low level 3-pass random wipe

Answer : Low level 7-pass random wipe

Turnstiles and other mantraps will prevent which of the following security threats?


Options are :

  • Tailgating
  • Shoulder surfing
  • Viruses
  • Rootkits

Answer : Tailgating

A client has a computer that is infected with several viruses and spyware. Which of the following should the technician perform FIRST before spyware removal?


Options are :

  • Disable system restore
  • Run the chkdsk /r command
  • Disable network cards
  • Run Windows Update

Answer : Disable system restore

210-065 Implementing Cisco Video Network Devices Exam Set 3

Which of the following security threats involve shoulder surfing and phone phishing?


Options are :

  • Man-in-the-Middle
  • Spyware
  • Social engineering
  • Trojan virus

Answer : Social engineering

In order to prevent other users from editing files in `C:\ Files', which of the following steps should be taken?


Options are :

  • Set the local administrator as the owner of the folder
  • Set the folder to index files for search
  • Set network share permissions to read only
  • Set NTFS permissions to read only

Answer : Set NTFS permissions to read only

For the last year, a company has gathered statistics on the most common security incidents. The highest percentage deals with opening email attachments that contain malware. Which of the following would mitigate this issue without reducing productivity?


Options are :

  • Annual cyber security education
  • Install an IPS on each workstation
  • Block all email attachments
  • Update antivirus signatures more often

Answer : Annual cyber security education

210-065 Implementing Cisco Video Network Devices Exam Set 2

After several passes with a malware removal program, the program keeps detecting the same malware infection after a reboot. Which of the following should be done to attempt to remove the offending malware?


Options are :

  • Set the malware removal program to run each time the computer is rebooted
  • Reinstall the malware removal program from a trusted source
  • Run the malware removal program while disconnected from the Internet
  • Run the malware removal program in Windows Safe Mode

Answer : Run the malware removal program in Windows Safe Mode

The practice of following an authorized person through an entrance without using a badge to defeat security is called:


Options are :

  • shredding
  • spamming
  • tailgating
  • phishing

Answer : tailgating

The benefit of MAC filtering in wireless networking is that the network:


Options are :

  • is not visible.
  • uses static IP addresses.
  • is encrypted.
  • is more secure.

Answer : is more secure.

200-105 Interconnecting Cisco Networking Devices Part Exam Set 3

Comment / Suggestion Section
Point our Mistakes and Post Your Suggestions