4
Which type of device provides an Internet connection through the use of a phone jack?
DSL modem
What wireless router configuration would stop outsiders from using your home network?
Encryption
Which cloud computing opportunity would provide the use of network hardware such as routers and switches for a particular company?
Infrastructure as a Service (IaaS)
Which three steps must be completed to manually connect an Android or IOS device to a secured wireless network? (Choose three.)
Input the authentication password. Enter the network SSID. Choose the correct security
Request to Send
RTS
SSID
Service Set Identifier
Which type of attack exploits human behavior to gain confidential information?
Social engineering
What are three advantages of wireless over wired LAN technology?
ease of expansion lower on-going costs ease of installation
Why should WEP not be used in wireless networks today
easily crackable
What is a characteristic of a computer worm?
exploits vulnerabilities with the intent of propagating itself across a network
What specialized network device is responsible for permitting or blocking traffic between networks?
firewall
Which wireless RF band do IEEE 802.11b/g devices use?
2.4 GHz
What two IEEE 802.11 wireless standards operate only in the 5 GHz range? (Choose two.)
802.11ac 802.11a
acces point
AP
Carrier Sense Multiple Access with Collision Avoidance
CSMA/CA
What are two types of wired high-speed Internet connections? (Choose two.)
Cable and DSL
Which statement accurately characterizes the evolution of threats to network security?
Internal threats can cause even greater damage than external threats.
What is the purpose of a DMZ?
It allows external hosts to access specific company servers while maintaining the security restrictions for the internal network.
Which feature is characteristic of MAC filtering in wireless networks?
It restricts computer access to a wireless network.
What happens when a wireless access point is configured to stop broadcasting the SSID?
The network is invisible to those who are unaware of the SSID.
A student tells a teacher that many junk emails are appearing on a new personal laptop. What is a possible cause of the problem?
The new laptop does not have antivirus or anti-spam software installed.
What is CSMA/CA on a network
an access method that is used by wireless technology to avoid collisions
What is a common countermeasure for Trojan horses?
antivirus software
Which type of attack involves an attacker using a powerful computer to try a large number of possible passwords in rapid succession to gain access to a system?
brute force
What technology allows users to access data anywhere and at any time?
cloud computing
Which two business and technical challenges does implementing virtualization within a data center help businesses to overcome? (Choose two.)
physical footprint power and air conditioning
An administrator wants to configure a router so that users on the outside network can only establish HTTP connections to the internal web site. Which feature would the administrator configure to accomplish this?
port forwarding
Which three attacks exploit human behavior? (Choose three.)
pretexting phishing vishing Malware