Friday, 17 May 2013

380. Server Administrator Quiz No. 23

-->
Server Administrator Quiz

There are 20 questions in this quiz. Good luck!
Passing grade is 70% = C.
Top of Form
Bottom of Form
1) You have IIS running on your Windows 2000 server. Recently the web site is responding slowly. What tool do you use to monitor the performance of IIS?
       a) IISMon
       b) System Monitor
       c) Vmmon
       d) Vmstat
       e) Rmon


2) What interface in Windows 2000 can you use for creating local shares?
       a) Netstat
       b) Domain Manager
       c) User Manager
       d) Windows Explorer
       e) Administrative tool


3) Proxy Server is ideal for creating which of the following network elements/components?
       a) host based IDS
       b) network based IDS
       c) network perimeter
       d) network entrapment point


4) John Doe wants to make IPX/SPX and TCP/IP the two protocols used on his computer but is not sure whether he can do that on one nic card or if he needs a second one. How many protocols can you bind to a single nic card?
       a) Two
       b) Ten
       c) Five
       d) Unlimited
       e) One


5) You are the administrator of a large E-commerce site. Lately there have been a number of complaints about error pages popping up due to pages being deleted but the links not removed. What would be the best way to make the site more user friendly.
       a) Create a custom pop-up window to redirect the user
       b) Reinstall the missing pages
       c) Create a custom error page with a link back to the main site.
       d) Redirect the broken links to another page on the site


6) Which Unix command will give the contents of the root directory?
       a) ls
       b) ls -l
       c) ls -al
       d) ls /


7) Host based IDS works by scanning:
       a) the log files of the local host
       b) the log files of the desktop client only
       c) the log files of the local host and the dump terminal
       d) the log files of the dump terminal only
       e) the log files of the central server only


8) What is a security tradeoff when you utilize an intrusion detection system?
       a) Changes in file permissions
       b) Unexplained or common system shutdown and restarts
       c) Host performance degradation
       d) Failed logins
       e) Changes in user privileges


9) You are trying to contact a host in a different department of your company but can't seem to get through.You have no problem communicating with others on your subnet but cannot even ping any remote hosts. Other hosts on your subnet can reach remote hosts.
       a) Incorrect subnet mask on the remote subnet
       b) Incorrect subnet mask on your computer
       c) Incorrect default gateway on your computer
       d) The WINS server is down


10)  DNS and WINS are often being considered as the:
       a) Netbios services for a network
       b) file services for a network
       c) ARP services for a network
       d) foundation services for a network


11) If you saw the output in the example below, what tool would you be using?
       a) TRACERT
       b) NSLOOKUP
       c) DNSLOOKOUT
       d) TRACEROUTE


12) Which of the following is the graphical interface for managing a Netware 5 server from your windows client?
       a) NWAdmin
       b) Server Manager
       c) Object Tree
       d) Directory Manager
       e) NDS Manager


13) The security log of your Windows 2000 server is best to be used for which of the following purposes?
       a) troubleshooting
       b) planning
       c) auditing
       d) system design


14) Which port is the NetBIOS User Datagram Protocol (UDP) port?
       a) PORT 137
       b) PORT 135
       c) PORT 138
       d) PORT 139


15) SSL can be viewed as its own layer between what two layers of the four layer IP stack?
       a) Network
       b) Transport
       c) Application
       d) Session
       e) B&C


16) Windows NT provides two group types. How would you place these groups in order to provide access to resources?
       a) Local groups into global groups
       b) Global groups into local groups
       c) User groups into global groups
       d) User groups into local groups


17) What is the default NTFS setting for shares on an NT system?
       a) Full control to the administrators group
       b) Full control to the users group
       c) Full control to the everyone group
       d) Full control to the global group
       e) Full control to the local group


18) On a Windows NT system, where would you go to manage shares to work with other computers?
       a) Windows Explorer
       b) User manager
       c) Primary Domain Controller
       d) Server manager


19) What is the first thing to do when implementing a security policy?
       a) Train the users
       b) Install a firewall
       c) Create a written plan
       d) Use a strong password


20) What is the Order of Name resolution on Windows NT4.0 machines?
       a) Lmhosts file, Local Host Name, Hosts File, DNS Server, NetBIOS Name Cache, WINS Server, Broadcast,
       b) Local Host Name, Hosts File, DNS Server, NetBIOS Name Cache, WINS Server, Broadcast, Lmhosts file
       c) DNS Server, Local Host Name, Hosts File, NetBIOS Name Cache, WINS Server, Broadcast, Lmhosts file
       d) Local Host Name, NetBIOS Name Cache, Hosts File, DNS Server, WINS Server, Broadcast, Lmhosts file



379. Project Management Quiz


Project Management Quiz

There are 12 questions in this quiz. Good luck!
Passing grade is 70% = C.
Top of Form
Bottom of Form
1) Which of the following is a tool used to secure expert judgment?
       a) Peer Review
       b) Expected value technique
       c) Delphi Technique
       d) Work Breakdown Structure (WBS)


2) What should be done by the project manager to ensure that all work in the project is included?
       a) Create a contingency plan
       b) Create a risk management plan
       c) Create a WBS
       d) Create a scope statement


3) What kind of a relationship is implied when completion of a successor is dependent on initiation of its predecessor?
       a) FS
       b) FF
       c) SS
       d) SF


4) What should a project manager do or follow to ensure clear boundaries for project completion?
       a) Scope verification
       b) Completing a scope statement
       c) Risk management plan
       d) scope definition


5) Which of the following provides the foundation for team development?
       a) Motivation
       b) Organizational development
       c) Conflict management
       d) Individual development


6) Which of the following is NOT an input to project plan execution?
       a) Work authorization system
       b) Project plan
       c) Corrective action
       d) Preventive action


7) A project manager would find team development the most difficult in which form of organization?
       a) Weak Matrix organization
       b) Balanced Matrix organization
       c) Projectized organization
       d) Tight Matrix organization


8) Once the project is complete, the complete set of project records should be put in which of the following?
       a) Project archives
       b) Database
       c) Storage room
       d) Project report


9) Which of the following is a common format for performance reporting?
       a) Pareto diagrams
       b) Bar charts
       c) Responsibility assignment matrices
       d) Control charts


10) f the cost variance is positive and the schedule variance is also positive, then it indicates that …
       a) Project is under budget and behind schedule
       b) Project is over budget and behind schedule
       c) Project is under budget and ahead of schedule
       d) Project is over budget and ahead of schedule


11) Which one of the following is the last step of project closing?
       a) Client appreciates your product
       b) Client has accepted the product
       c) Lessons learned are documented
       d) Archives are complete


12) Who should be involved in the creation of lessons learned, at closure of project? (choose the BEST answer)
       a) Project office
       b) Management of the performing organization
       c) Project team
       d) Stakeholders



Bottom of Form



647. PRESENTATION SKILLS MBA I - II

PRESENTATION  SKILLS MBA   I - II There are many types of presentations.                    1.       written,        story, manual...