Search Header Logo

Mod 17 Securing and Sharing Windows Resources

Authored by willie reynolds

Instructional Technology

Vocational training

Used 2+ times

Mod 17 Securing and Sharing Windows Resources
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

30 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

While researching a network issue, Randy discovered a diagram that he can use to see the design of the network. What type of documentation did Randy discover?

Network topology

Inventory management

Knowledge base

Architectural drawing

Answer explanation

Randy discovered a network topology diagram, which visually represents the design and layout of the network. This type of documentation is essential for understanding how different components are interconnected.

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

One of your clients at work calls and is irate because they had to change their password and now, they can't seem to find one that will match the strength needed for the company server. After they finish venting, you tell them you will send them the document that explains why they need to have a strong password. What document will you send the client?

Acceptable use policy

Regulatory and compliance policy

Knowledge base

Password policy

Answer explanation

The correct document to send is the Password policy, as it specifically outlines the requirements for creating strong passwords, addressing the client's concerns directly.

3.

MULTIPLE SELECT QUESTION

30 sec • 1 pt

Holly has been tasked to design the plan that the IT department will use when making a change to systems. The plan will be used anytime the company needs to change a system and should include which people are to be contacted when changes are made and what the changes will do to other equipment. While Holly writes the change document, what types of things will she need to include in the scope of change?

Key components of the change and how they will be addressed

Skill sets, tasks, and activities required to carry out the change

How the success of the change will be measured

Who will participate in the change

Risk or problems that might arise during the change

Answer explanation

Holly's change document should include key components of the change, required skill sets, success measurement, and participant roles to ensure a comprehensive plan for system modifications.

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Becky has been assigned to help with a major change to her company's accounts database. During the time of the change, Becky notices that her task will need to be modified to complete the change. Instead of telling her supervisor, she determines that one minor detail must have been overlooked and fixes what she believes is the problem. The minor detail that Becky did not tell her supervisor caused the change to fail. What is Becky's mistake called?

Scope of change

Out of scope modification

Change modification

Request for comments

Answer explanation

Becky's mistake is called an 'Out of scope modification' because she made changes without consulting her supervisor, leading to a failure in the change process due to an overlooked detail.

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Roger's company is trying to increase the level of security for its network. Roger is researching ways to increase the security by making passwords more complex. Which option can Roger change in Windows to require more complex passwords?

Group Policy

Organizational unit

Password Policy

Access control List

Answer explanation

Roger can change the Password Policy in Windows to enforce more complex passwords. This policy allows the configuration of password length, complexity requirements, and expiration, enhancing overall network security.

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Jennifer's company currently uses Windows Active Directory to provide centralized authentication, authorization, and accounting to manage users on its network. The company uses a wireless network and an earlier authentication service on the server to authenticate end users accessing resources on the network.

TKIP

WPA2

WEP

RADIUS

Answer explanation

RADIUS is the correct choice as it provides centralized authentication for users accessing the network, which aligns with the company's use of Windows Active Directory for managing user access.

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Currently James's company is using RADIUS for AAA services to connect wireless users to the Windows Active Directory domain. However, the company wants to upgrade to a Cisco-based wireless network and would like to upgrade the older RADIUS. What protocol should the company consider upgrading to?

TACACS+

LDAP

Kerberos

EAP

Answer explanation

TACACS+ is a Cisco protocol that provides enhanced security and control over AAA services compared to RADIUS. It is suitable for managing access to network devices, making it a better choice for upgrading the existing RADIUS setup.

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?