4

¡Supera tus tareas y exámenes ahora con Quizwiz!

Which type of device provides an Internet connection through the use of a phone jack?

DSL modem

What wireless router configuration would stop outsiders from using your home network?

Encryption

Which cloud computing opportunity would provide the use of network hardware such as routers and switches for a particular company?

Infrastructure as a Service (IaaS)

Which three steps must be completed to manually connect an Android or IOS device to a secured wireless network? (Choose three.)

Input the authentication password. Enter the network SSID. Choose the correct security

Request to Send

RTS

SSID

Service Set Identifier

Which type of attack exploits human behavior to gain confidential information?

Social engineering

What are three advantages of wireless over wired LAN technology?

ease of expansion lower on-going costs ease of installation

Why should WEP not be used in wireless networks today

easily crackable

What is a characteristic of a computer worm?

exploits vulnerabilities with the intent of propagating itself across a network

What specialized network device is responsible for permitting or blocking traffic between networks?

firewall

Which wireless RF band do IEEE 802.11b/g devices use?

2.4 GHz

What two IEEE 802.11 wireless standards operate only in the 5 GHz range? (Choose two.)

802.11ac 802.11a

acces point

AP

Carrier Sense Multiple Access with Collision Avoidance

CSMA/CA

What are two types of wired high-speed Internet connections? (Choose two.)

Cable and DSL

Which statement accurately characterizes the evolution of threats to network security?

Internal threats can cause even greater damage than external threats.

What is the purpose of a DMZ?

It allows external hosts to access specific company servers while maintaining the security restrictions for the internal network.

Which feature is characteristic of MAC filtering in wireless networks?

It restricts computer access to a wireless network.

What happens when a wireless access point is configured to stop broadcasting the SSID?

The network is invisible to those who are unaware of the SSID.

A student tells a teacher that many junk emails are appearing on a new personal laptop. What is a possible cause of the problem?

The new laptop does not have antivirus or anti-spam software installed.

What is CSMA/CA on a network

an access method that is used by wireless technology to avoid collisions

What is a common countermeasure for Trojan horses?

antivirus software

Which type of attack involves an attacker using a powerful computer to try a large number of possible passwords in rapid succession to gain access to a system?

brute force

What technology allows users to access data anywhere and at any time?

cloud computing

Which two business and technical challenges does implementing virtualization within a data center help businesses to overcome? (Choose two.)

physical footprint power and air conditioning

An administrator wants to configure a router so that users on the outside network can only establish HTTP connections to the internal web site. Which feature would the administrator configure to accomplish this?

port forwarding

Which three attacks exploit human behavior? (Choose three.)

pretexting phishing vishing Malware


Conjuntos de estudio relacionados

newborn assessment part 1. Part 2 is newborn care

View Set

AP Gov Court Case Flashcards Chris Lovre

View Set

Computer Forensics - Chapter 3 Review Questions

View Set

Module 20: Basic Learning Concepts and Classical Conditioning

View Set

Grado 12: comentarios después de los orales

View Set