1. Which of the following ports does a telnet application utilize?
A) 443 B) 23 C) 80 D) 21
2. Which of the following is an example of the principle of least privilege and is the MOST secure when granting access to a shared network drive used by the Accounting department?
A) Grant the Accounting department full control for the share and appropriate NTFS permissions B) Grant appropriate permissions to only users in the Accounting department for both the share and NTFS C) Grant modify permissions to the Accounting department and deny NTFS permissions to all other users D) Grant all users full control permissions for the share only
3. Which of the following RAID levels can withstand the simultaneous loss of two physical drives in an array?
A) RAID 10 B) RAID 3 C) RAID 5 D) RAID 0
4. Which of the following BEST describes RAID 5?
A) High performance and fault tolerance B) Fault tolerance and zero configuration C) Fault tolerance and failure recovery D) Zero configuration and high performance
5. Which of the following is an SLA?
A) A statement of compliance with local laws and regulations. B) A contract that details the correct equipment disposal laws. C) A contract that details the device replacement time frames. D) A document stating the impact analysis of a nonfunctional server.
Leave a comment