This document provides a description of and instructions for CIS 329 Week 6 Quiz 2, which consists of 25 multiple choice questions covering lessons 7 and 10-13. The quiz questions cover topics such as removable storage access settings, software restriction policies, IP addresses, wireless networking protocols and security, Windows Firewall configuration, malware, and remote desktop/assistance.
FULL ENJOY Call girls in Paharganj Delhi | 8377087607
CIS 329 Wk 6 Quiz 2 Solutions
1. CIS 329 Wk 6 Quiz 2
Click Link Below To Buy:
http://hwcampus.com/shop/cis-329-strayer/cis-329-week-6-quiz-2/
Or Visit www.hwcampus.com
Product Description
CIS 329 Week 6 Quiz 2
Instructions This quiz consists of 25 multiple choice questions and covers the
material in Lessons 7 and 10 through 13. There are five questions from each lesson.
Question 1
2 out of 2 points
To exclude just MP3 players and digital cameras from being installed on your
organization’s computers, which Removable Storage Access setting should you
configure to deny?
Question 2
2 out of 2 points
2. When none of your configured Software Restriction Policies are matched, what
happens?
Question 3
2 out of 2 points
What disadvantage is encountered when using Software Restriction Policies?
Question 4
2 out of 2 points
In order to use the Custom Classes: Deny read/write access setting of the Removable
Storage Access policy settings, what will you need to know about each device to which
you wish to allow read or write access?
Question 5
2 out of 2 points
When using the Allow/Prevent installation of devices that match any of these device IDs
setting in the Device Installation Restrictions folder of a GPO, what other setting must
you ensure you also configure to provide the intended results?
Question 6
3. 0 out of 2 points
Which of the following is a characteristic of a packet-switching network?
Question 7
2 out of 2 points
Most cabled networks today use what type of cabling?
Question 8
2 out of 2 points
What protocol do most devices currently use at the Network layer?
Question 9
2 out of 2 points
What is the correct binary representation of the IP address 192.168.10.2?
Question 10
2 out of 2 points
4.
What protocol is responsible for the end-to-end transmission of a packet, to its final
destination on a network?
Question 11
2 out of 2 points
What command can you issue from the command line to view all configured wireless
networks on your Windows 8 computer?
Question 12
2 out of 2 points
The 802.11n wireless networking protocol specifies what approximate values for indoor
and outdoor range?
Question 13
2 out of 2 points
Why should you not deploy a wireless network using WEP for security?
Question 14
5. 2 out of 2 points
A 2×2 MIMO device has how many total transceivers?
Question 15
2 out of 2 points
Within the Windows UI, what option will you need to select to delete a wireless network
profile?
Question 16
2 out of 2 points
Which of the following items is not found in the Security section of the Windows 8
Action Center?
Question 17
2 out of 2 points
The Windows Firewall in Windows 8 can have rules configured that allows traffic to flow
in which direction(s)?
6. Question 18
2 out of 2 points
When using the Windows Firewall with Advanced Security console, you will see three
distinct network locations that impact the behavior of the Windows Firewall. Which of
the following is not one of these network locations used by the Windows Firewall?
Question 19
2 out of 2 points
In most cases, how is malware introduced into a computer system?
Question 20
2 out of 2 points
Which of the following is not an item that can be used when building Windows Firewall
rules?
Question 21
2 out of 2 points
What makes connecting to a remote computer by redirecting an existing console an
inefficient method over time?
7.
Question 22
2 out of 2 points
How many inbound Remote Desktop connections will Windows 8 allow?
Question 23
2 out of 2 points
Remote Assistance requires that access to what port be available on the requesting
client?
Question 24
2 out of 2 points
What is the name of the feature that enables an administrator, trainer, or technical
specialist at one location to connect to a distant user’s computer, chat with the user,
and either view all the user’s activities or take complete control of the system?
Question 25
2 out of 2 points
Why do some snap-ins, such as the Active Directory Domain Services consoles, not
provide a means to redirect the console to another computer?