CIST 2601 2026 Comprehensive Practice
Questions and Rationales for Exam
Success
What is the biggest disadvantage of the star topology?
A. Requires more cabling
B. It has a single point of failure
C. Difficult to troubleshoot
D. Limited number of devices
Rationale: A star topology relies on a central hub or switch. If the hub fails, the entire network
goes down. Other options are disadvantages to some extent, but they are less critical than the
single point of failure.
Stateless filtering does not filter on the basis of the context of the communication, and so it has
limited value in a firewall.
A. True
B. False
Rationale: Stateless firewalls examine packets individually without considering the connection
state. Stateful firewalls are more effective because they track connections.
TCP/IP consists of nearly 200 nonproprietary protocols that interconnect computer systems
efficiently and reliably.
A. True
B. False
Rationale: TCP/IP is a suite of protocols, but it does not contain nearly 200 protocols. The claim
exaggerates the size of the TCP/IP protocol suite.
Are network classes A through C intended for unicast addressing methods?
A. True
B. False
Rationale: Classes A, B, and C are primarily used for unicast (one-to-one) communication.
Broadcast or multicast addressing uses other mechanisms.
Which EIA/TIA standard specifies various wiring closet configurations?
A. 568
ProfAmelia - 2026
,ProfAmelia - 2026
B. 569
C. 570
D. 571
Rationale: TIA/EIA-569 standardizes telecommunications pathways and wiring closet layouts.
Other options refer to different wiring standards.
Which useradd command parameter gives an account description?
A. -d
B. -m
C. -c
D. -u
Rationale: The -c parameter allows adding a comment or description to the user account. The
others set home directories or user IDs.
With which version(s) of IP is IPSec compatible?
A. IPv4 only
B. IPv6 only
C. IPv4 and IPv6
D. None
Rationale: IPSec works with both IPv4 and IPv6, providing encryption and authentication.
UDP does not provide the same level of reliability and error checking as TCP, because it relies
only on the checksum to ensure reliability.
A. True
B. False
Rationale: UDP is connectionless and provides minimal error checking with a checksum. TCP is
connection-oriented and ensures reliability through acknowledgments and retransmissions.
Which User Configuration component controls access to Logon/Logoff capabilities, scripts, and
Task Manager functions?
A. System
B. Network
C. Security
D. Preferences
Rationale: The System component in Group Policy controls logon/logoff scripts and Task
Manager access. Other components control network, security, or user preferences.
ProfAmelia - 2026
, ProfAmelia - 2026
Which of the following options is a preconfigured security setting in the Internet Explorer
Enhanced Security Configuration component?
A. Low
B. Medium
C. Medium-high
D. High
Rationale: Medium-high is the default for IE Enhanced Security Configuration to provide a
balance between security and functionality.
WLANA is a consortium of universities researching wireless networking, located at Rutgers
University.
A. True
B. False
Rationale: WLANA does not exist at Rutgers. This statement is false.
How many copies of the ASR set should you have for a server?
A .......................................................................................................................................................1
B .......................................................................................................................................................2
C .......................................................................................................................................................2
D .......................................................................................................................................................4
Rationale: Having two copies ensures redundancy in case one set is lost or damaged. More
copies can be kept, but two is the standard recommendation.
In NetWare, the startup.ncf file contains commands used by the server.exe startup program.
A. True
B. False
Rationale: The startup.ncf file is executed during server startup to configure NetWare services.
Other options are incorrect because this is its primary function.
The Digispid.B.Worm targets systems running the SQL Server database on Windows-based
workstations and servers.
A. True
B. False
Rationale: This worm specifically exploits vulnerabilities in SQL Server environments, making
this statement correct.
Which of the following tabs is available only in Windows Server 2003?
ProfAmelia - 2026