
Mod 17 Securing and Sharing Windows Resources
Authored by willie reynolds
Instructional Technology
Vocational training
Used 2+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
30 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
While researching a network issue, Randy discovered a diagram that he can use to see the design of the network. What type of documentation did Randy discover?
Network topology
Inventory management
Knowledge base
Architectural drawing
Answer explanation
Randy discovered a network topology diagram, which visually represents the design and layout of the network. This type of documentation is essential for understanding how different components are interconnected.
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
One of your clients at work calls and is irate because they had to change their password and now, they can't seem to find one that will match the strength needed for the company server. After they finish venting, you tell them you will send them the document that explains why they need to have a strong password. What document will you send the client?
Acceptable use policy
Regulatory and compliance policy
Knowledge base
Password policy
Answer explanation
The correct document to send is the Password policy, as it specifically outlines the requirements for creating strong passwords, addressing the client's concerns directly.
3.
MULTIPLE SELECT QUESTION
30 sec • 1 pt
Holly has been tasked to design the plan that the IT department will use when making a change to systems. The plan will be used anytime the company needs to change a system and should include which people are to be contacted when changes are made and what the changes will do to other equipment. While Holly writes the change document, what types of things will she need to include in the scope of change?
Key components of the change and how they will be addressed
Skill sets, tasks, and activities required to carry out the change
How the success of the change will be measured
Who will participate in the change
Risk or problems that might arise during the change
Answer explanation
Holly's change document should include key components of the change, required skill sets, success measurement, and participant roles to ensure a comprehensive plan for system modifications.
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Becky has been assigned to help with a major change to her company's accounts database. During the time of the change, Becky notices that her task will need to be modified to complete the change. Instead of telling her supervisor, she determines that one minor detail must have been overlooked and fixes what she believes is the problem. The minor detail that Becky did not tell her supervisor caused the change to fail. What is Becky's mistake called?
Scope of change
Out of scope modification
Change modification
Request for comments
Answer explanation
Becky's mistake is called an 'Out of scope modification' because she made changes without consulting her supervisor, leading to a failure in the change process due to an overlooked detail.
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Roger's company is trying to increase the level of security for its network. Roger is researching ways to increase the security by making passwords more complex. Which option can Roger change in Windows to require more complex passwords?
Group Policy
Organizational unit
Password Policy
Access control List
Answer explanation
Roger can change the Password Policy in Windows to enforce more complex passwords. This policy allows the configuration of password length, complexity requirements, and expiration, enhancing overall network security.
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Jennifer's company currently uses Windows Active Directory to provide centralized authentication, authorization, and accounting to manage users on its network. The company uses a wireless network and an earlier authentication service on the server to authenticate end users accessing resources on the network.
TKIP
WPA2
WEP
RADIUS
Answer explanation
RADIUS is the correct choice as it provides centralized authentication for users accessing the network, which aligns with the company's use of Windows Active Directory for managing user access.
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Currently James's company is using RADIUS for AAA services to connect wireless users to the Windows Active Directory domain. However, the company wants to upgrade to a Cisco-based wireless network and would like to upgrade the older RADIUS. What protocol should the company consider upgrading to?
TACACS+
LDAP
Kerberos
EAP
Answer explanation
TACACS+ is a Cisco protocol that provides enhanced security and control over AAA services compared to RADIUS. It is suitable for managing access to network devices, making it a better choice for upgrading the existing RADIUS setup.
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?