Site MapHelpFeedbackSelf-Assessment Quiz
Self-Assessment Quiz

1
What should be created to establish normal operating conditions on your network?
A)Backups
B)Baselines
C)Remote access
D)Troubleshooting
2
Where could you find a list of problems that occurred on a system?
A)Wiring schematic
B)Event Viewer
C)Performance Monitor
D)RAID
3
Where should backup tapes be kept?
A)In the server room
B)On a shelf in the storeroom
C)In a locked cabinet away from the
D)In the boss’s car trunk
4
Your boss asks you for a diagram showing every server on the network. What do you provide to her?
A)Logical network diagram
B)Physical network diagram
C)Wiring schematic
D)Baseline
5
You are hired as a consultant to troubleshoot a network. Your client reports the network has recently slowed significantly. What should you ask to see first?
A)Baseline
B)Security policy
C)Application logs
D)PerfMon counters
6
When using Performance Monitor, what do you call the actual component you want to monitor?
A)Counter
B)Histogram
C)Object
D)View
7
You are using Performance Monitor to monitor the CPU. You need to define what aspects of the CPU to monitor, such as the percentage in use and the percentage free. What must you configure?
A)Counter
B)Histogram
C)Object
D)View
8
Which types of logs are automatically created?
A)Application
B)Login
C)Security
D)System
E)Choices A, C, D
F)Choices A, B, C
G)Choices B, C, D
9
What technology ensures data is still immediately available in the event of a hard drive crash?
A)Backup generator
B)UPS
C)GFS
D)RAID
10
Where can you find the log files on most Linux installations?
A)/VAR/LOG
B)/CONFIG/LOG
C)/ADMIN/LOGS
D)/LOGFILES
11
How can you connect to another computer named SERVER2 using the Universal Naming Convention?
A)http://SERVER2
B)//SERVER2
C)\\SERVER2
D)SERVER2/
12
Which program can be used to create baselines?
A)Event Viewer
B)Performance Monitor
C)Microsoft Visio
D)Veritas NetBackup
13
Which backup type always requires only two backups to restore a system?
A)Copy backup
B)Differential backup
C)Full backup
D)Incremental backup
14
What is defined in a security policy? (Select two.)
A)What users can and cannot do with their computers
B)How complex user passwords should be
C)How to deal with social engineering hacking attempts
D)How users should install their own software
E)Choices A, B
F)Choices B, C
15
What can help to maintain high availability?
A)QoS
B)RAID
C)VoIP
D)UPS
E)Choices A, B, C
F)Choices B, C, D
G)Choices A, B, D







Mike Meyers' CompTIA Network+ Online Learning Center

Home > Chapter 18 > Self-Assessment Quiz