CTI 120 Cert Test Prep (Pre Assesment)

¡Supera tus tareas y exámenes ahora con Quizwiz!

A user gains access to the server room by submitting to a retina scan. What type of security control is in use?

Biometrics Biometrics uses unique physical characteristics of an individual, such as the color patterns in his iris or the geometry of his hand.

Last year your company implemented a network management system that used secure communications to transfer data to a central management station. An exploit of the encryption method used to transfer the data has been discovered recently. Which of the following should be done to try to eliminate the threat caused by the exploit?

Install available patches Patches are software updates that are designed to fix bugs and security vulnerabilities.

Which of the following is most important to have in place to maintain business continuity in the event of a fire or flood that disables your entire site? (Choose two.)

Offsite backups Warm site A warm site is a place where the computers, devices, and connectivity necessary to rebuild a network exist, though only some are appropriately configured, updated, or connected to match the network's current state. An offsite backup would be required to bring all the servers in the warm site up to date.

You are troubleshooting network connectivity on a desktop computer. You need to determine if the computer uses a static address or a dynamic address. Which tool should you use?

ipconfig The output from ipconfig will show whether the address is static or assigned by DHCP (dynamic).

You are setting up a VoIP system that involves 40 802.3af class 1 VoIP phones. You need to make sure your PoE switch will provide the necessary power to the phones operating at full power. What is the power requirement of the PoE switch?

160W 802.3af class I VoIP phones use about 4 Watts of power each.

Which of the following best describes the IEEE 802.11g standard?

2.4 GHz, 54 Mbps The 802.11g standard operates in the 2.4 GHz frequency range and has a maximum transfer rate of 54 Mbps.

On which port would an SSL encrypted Web browsing session occur by default?

443 The HTTPS protocol uses SSL for encryption and operates over TCP port 443 by default.

What is the decimal equivalent to the binary number 00111101?

61 The correct answer is 61. There are 1 values in the 32, 16, 8, 4, and 1s place. Adding them together makes 61.

While examining a wireless client's connection properties, you notice that the connection type is listed as 802.11a-ht. Which Wi-Fi technology and frequency is being used?

802.11n, 5.0 GHz 802.11a-ht is a Wi-Fi connection designation that is used by some 802.11n network clients indicating that the connection is a high throughput (ht) 802.11a connection. 802.11a utilizes the 5.0 GHz frequency range.

You need to set up an adhoc network that has good performance, provides strong encryption, and is not easily discovered. What type of network should you configure?

802.11n, WPA2, no SSID broadcast 802.11n is the highest performing WLAN standard in the list. WPA2 is the strongest encryption in the list and if SSID broadcast is disabled, the network is not as easily discovered.

What are the beginning and end frequencies of the wireless spectrum, as defined by the FCC? (Choose two.)?

9 KHz 300 GHz The wireless spectrum is a continuum of electromagnetic waves used for data and voice communication. The wireless spectrum (as defined by the FCC, which controls its use) spans frequencies between 9 KHz and 300 GHz. Each type of wireless service can be associated with one area of the wireless spectrum.

Company policy requires all employees that use the company network to abide by a set of policies describing how they may use the network. What is this policy called?

AUP The acceptable use policy (AUP) is a portion of the security policy that explains to users what they can and cannot do, and penalties for violations. It might also describe how these measures protect the network's security.

You have just finished configuring a router on your corporate network that consists of several subnets. Some users have informed you that they have access to some of the servers, but not others. What is the most likely reason for this problem?

Access control lists Access control lists on routers can block access to particular devices on a subnet or entire subnets. Improper STP configuration would cause problems with switches. Since the router was just configured, that is most likely where the problem is.

A new multimode fiber optic cable was installed between an IDF and an MDF. Most of the cable run followed existing electrical conduit between facilities. The Ethernet standard in use is 1000Base-SX and the total length of the cable is 215 meters. However, after testing the cable, it was found that there was too much signal loss occurring to certify the installation. Which of the following is the most likely issue?

Bend radius limitations Bend radius is the radius of the maximum arc into which a cable can be looped without impairing data transmission. Fiber optic cable has a minimum bend radius of 15 times the cable diameter. The distance of 215 meters is okay. EMI and NEXT do not affect fiber optic cables.

Which device parameter does STP use to select the root bridge?

Bridge ID The Bridge ID is a combination of a 2-byte priority field and a bridge's MAC address, used in STP (Spanning Tree Protocol) to select a root bridge.

Which of the following access methods may use RTS/CTS signaling?

CSMA/CA is used by Wi-Fi devices which can include RTS/CTS.

While interviewing a user that has reported trouble accessing a server, you determine that other users on the LAN have no problem accessing the server. What question should you ask next?

Can you access other devices on the network? If the user can access other devices, then you can narrow down the problem to that user's inability to access the particular server rather than a more general network problem.

An employee was suspected of storing illicit material on his hard drive. The hard drive was removed and placed in an anti-static bag and secured in a locker until authorities could examine it. The procedure and participants of the removal and storage of the drive were all documented. This is an example of which step in the incident handling process?

Chain of custody Chain of custody is Documentation that describes evidence, including when it was collected, who collected it, its condition, and how it was secured and transferred from one responsible party to the next.

A WLAN has three wireless APs to allow users to move around the building while maintaining a Wi-Fi connection. The wireless access points are named WAP-A, WAP-B, and WAP-C. WAP-A is configure using mode Wireless-B on channel 6. WAP-B is configured using mode Wireless-G on channel 6, and WAP-C is configured using mode Wireless-G on channel 11. You want all users to connect at 54 Mbps and you want the APs to interfere with each other as little as possible. What should you change?

Change WAP-A to mode Wireless-G and channel 1 Since WAP-B and WAP-C are both using Wireless-G and channels 6 and 11, you want to configure WAP-A to use Wireless-G for 54 Mbps connections and channel 1 to avoid overlapping channels.

A network has four subnets, 10.0.1.0/24, 10.0.2.0/24, 10.0.3.0/24 and 10.0.4.0/24. Mike's computer has an address of 10.0.3.28/24 but he cannot communicate with any of the computers on the 10.0.3.0/24 subnet. All other configuration is correct. Which of the following can solve the problem?

Change the VLAN assignment If a computer cannot communicate with other devices on the same subnet, the computer is probably connected to the wrong VLAN and the VLAN assignment should be changed.

While performing a network performance analysis, a technician examines the following output from one of his Cisco routers. The router is not performing up to expectations. What can be changed to improve performance? FastEthernet0/0 is up, line protocol is up Hardware is Gt96k FE, address is 000f.34e5.63b0 (bia 000f.34e5.63b0) Internet address is 172.31.1.250/16 MTU 1500 bytes, BW 100000 Kbit/sec, DLY 100 usec, reliability 255/255, txload 1/255, rxload 1/255/n Encapsulation ARPA, loopback not set Keepalive set (10 sec) Half-duplex, 100Mb/s, 100BaseTX/FX ARP type: ARPA, ARP Timeout 04:00:00 Last input 00:00:00, output 00:00:00, output hang never Last clearing of show interface counters never Input queue: 0/75/0/0 (size/max/drops/flushes); Total output drops: 0 Queueing strategy: fifo Output queue: 0/40 (size/max)

Change the duplex mode to full The interface is set to half duplex and should be set to full duplex for optimal performance.

When two or more WAPs are installed in close proximity, what must be different on each WAP to avoid problems?

Channel Wireless access points (WAPs) should use non-overlapping channels if the WAPs are in communication range of one another to avoid interference.

Bill has installed ten new computers and a router in a new office complex. While testing, he discovers can can't communicate with the internet. He verifies that the router is configured correctly. The address on the computer he is using is set to 169.254.149.101. What should Bill do to resolve the problem?

Configure a DHCP server A DHCP server assigns dynamic IP addresses. IP addresses that begin with 169.254 are APIPA addresses which are assigned when no DHCP server can be found.

All wireless devices that are permitted to connect to your wireless network are currently connected. You want to make sure that only those currently connected devices can connect to the WAP in the future. What is the best way to do this while not disrupting service to connected devices?

Configure a MAC address filter A MAC address filter will disallow all MAC addresses from associating with the WAP except those listed in the filter.

What should you configure on a WAP if you want guests to be able to connect to your wireless network without having to provide them with any additional information?

Configure encryption to Open Open encryption will allow guest users to access a wireless network without an encryption key or pass phrase. However, the connection will not be secure.

Which of the following should you configure to allow users on the private network to access a Web server using a private address while allowing external users to access the Web server using its public address?

Configure split horizon DNS Split horizon DNS (or simply, split DNS) is an implementation of DNS where internal and external DNS queries are handled by different DNS servers or by a single DNS server that is specially configured to keep internal and external DNS zones separate.

You are configuring some new network printers and you want to be sure the printers are always dynamically assigned the same IP address. What should you configure?

DHCP reservation A DHCP reservation maps the MAC address of a host device to an IP address from the DHCP scope to ensure the host always receives the same IP address unless its MAC address changes.

A web server must be placed on a segment of the network that easily allows both internal and external users to access it. What type of network segment should be configured on the firewall?

DMZ A demilitarized zone (DMZ) is a network segment that provides access to both internal and external users. It is an area on the perimeter of a network that is surrounded by two firewalls—an external firewall that is more porous to allow more types of access, and an internal firewall that is more hardened to provide greater protection to the internal network.

You are setting up a network in a new office. You have been asked to ensure that users can access all the network servers using the name of the server such as server1.domain.local. What do you need to configure?

DNS server A domain name service (DNS) server resolves domain names to IP addresses.

Which of the following is used by 802.1X for network access control?

EAPoL 802.1X is a vendor-independent IEEE standard for securing transmission between nodes according to the transmission's port, whether physical or logical. 802.1X, also known as EAPoL, is commonly used with RADIUS authentication.

You have just installed some new Cat6 UTP cabling on the manufacturing floor of your company to connect some new PCs to the network. The cables had to be run past some heavy motorized machinery, but you verified that the cables do not exceed the maximum length and that termination was properly done. However, users are reporting slow performance and intermittent connectivity problems. Which of the following is a likely cause?

EMI Electromagnetic interference (EMI) is a type of interference that can be caused by motors, power lines, televisions, copiers, fluorescent lights, or other sources of electrical activity.

A network technician sees a line in a Cisco router configuration that says: router rip What is the result of this configuration line?

Enables a distance vector routing protocol The router rip statement enables the Routing Information Protocol (RIP) which is a distance vector routing protocol.

A network administrator has been tasked with finding a location for a new datacenter in a new office building. The administrator is looking for a location that meets certain temperature and humidity requirements as well as suitable protection from outside elements and the availability of ample electrical power. What type of requirements is the administrator concerned with?

Environment limitations Environment limitations entail temperature and humidity requirements necessary for safe and reliable equipment operation.

You arrive at a customer site to resolve a problem with a router. After logging on to the router, you find that it uses a different operating system than the routers you are familiar with. Which troubleshooting step should you take next?

Escalate the problem Since you cannot determine or implement a solution, you should escalate the problem.

You have just finished a new network installation that includes ten servers and 150 workstations. You have been told to gather performance metrics on the network that can be compared to future performance metrics. What should do?

Establish a baseline A baseline is a record of how a network operates under normal conditions (including its performance, error statistics, utilization rate, and so on). Baselines are used for comparison when conditions change.

A cable installer is terminating a new cable using an ST connector. Which of the following tools does he need? (Choose two.)

Fiber cleaver Fiber Stripper An ST connector is used to terminate fiber-optic cable. A fiber stripper is used to remove the jacket and bugger on a fiber strand. A fiber cleaver is used to make a clean cut at the end of the fiber strand.

In which type of PDU will you find CRC errors?

Frames The CRC is found in the frame check sequence (FCS) field of a frame. CRC errors are detected on frames by the receiving network interface.

While monitoring an interface statistics on a server, a technician sees a number of packets that exceed the MTU. What are these types of packets called?

Giant A giant is a packet that exceed the medium's maximum transmission unit (MTU) size. For example, an Ethernet packet larger than 1518 bytes is considered a giant.

A network technician has been asked to make a connection between two switches in an IDF and MDF using 100BaseFX Ethernet. The IDF and MDF are about 65 meters apart. The technician brings an adequate length of Cat6a cable to make the connection but finds that he is unable to make a connection. What is the problem?

He needs a multimode fiber cable 100BaseFX is an Ethernet standard that operates at 100 Mbps over multimode fiber optic cable.

A router configuration has the following statement: access-list 100 permit icmp host 192.168.1.200 172.16.0.0 0.0.255.255 What is the affect of this statement?

ICMP traffic is allowed from computer 192.168.1.200 to subnet 172.16.0.0/16

A network administrator configured an ACL on a router intended to prevent access from subnet 172.20.0.0/16 to two servers on subnet 172.23.0.0/16. The entire ACL looked as follows: deny ip 172.20.0.0 0.0.255.255 host 172.23.1.200 deny ip 172.20.0.0 0.0.255.255 host 172.23.1.201 After performing some testing, the administrator finds that no packets from any subnet are reaching the servers or any other device on the 172.23.0.0/16 subnet. What is the most likely problem?

Implicit deny An implicit deny is an ACL rule which ensures that any traffic the ACL does not explicitly permit is denied by default. You do not see this rule in the actual ACL. In this case, because there are no permit statements, all traffic is denied due to the implicit deny.

Mike has installed a computer into a new office and has configured a static IP address. He plugs the cable into the switch in the IDF and sees a link light. However, while testing network connectivity, he finds that he cannot communicate with any network devices on the local subnet. He verifies that the IP address is correctly configured. What is a likely cause of the problem?

Incorrect VLAN assignment If a computer is assigned to the wrong VLAN, it will not be able to communicate with devices on the local subnet.

An engineering firm currently has 100 users on a 1000BaseT network that has a single subnet. The company needs to isolate its engineering and accounting departments to increase security and for broadcast containment, while still allowing all computers to communicate with one another. What can you do to satisfy these requirements?

Install a layer 3 switch and configure ACLs An access control list (ACL) is a list of statements used by a router or layer 3 switch to permit or deny the forwarding of traffic on a network based on one or more criteria. A layer 3 switch will allow VLANs to be created for broadcast containment and will route between the VLANs to allow communication among all computers.

You are testing an internetwork of five subnets A-E. All local communication within each subnet is working. From subnet A, you can ping devices in subnet B and C, but you cannot ping devices in subnets D and E. From subnet D, you can ping devices in subnet E, but not subnets A, B or C. At which layer of the OSI model is the problem most likely occurring?

Layer 3 Communication problems between subnets usually mean routing problems which are devices that work at the Network layer, layer 3.

Which of the following is the most likely cause of intermittent disconnects and slow download speeds on a wireless network?

Low signal strength Low signal strength can cause intermittent disconnects and slow download speeds. If the security settings, SSID, or subnet mask were not correct, there would likely be no connectivity.

While cleaning loose-tube fiber optic cables, a technician gets some of the cleaning solvent near his eyes. Which of the following should the technician check to see how to deal with the problem?

MSDS When dangerous substances are involved, the material safety data sheet (MSDS) for the substance should be inspected to see how to deal with it.

You have configured an email server for your company. You need to make sure the mail server name can be resolved from an email address. What do you need to create?

MX record A Mail Exchanger (MX) record identifies a mail server for a domain.

While troubleshooting a desktop computer's connection to the internetwork, a network technician runs ipconfig and finds the following output: Ethernet adapter Ethernet0: Connection-specific DNS Suffix . : Link-local IPv6 Address . . . . . : fe80::ec42:7e6a:d2d4:5410%20 IPv4 Address. . . . . . . . . . . : 172.31.210.1 Subnet Mask . . . . . . . . . . . : 255.255.0.0 Default Gateway . . . . . . . . . : Why can't this computer communicate with devices on the 172.16.0.0/16 subnet?

Missing default gateway A default gateway must be present to communicate with other subnets.

You need a device that will perform STP, will allow you to configure VLANs, and can route between the VLANs. What type of device do you need?

Multilayer switch A multilayer switch performs both layer 2 and layer 3 functions, so it can perform traditional switch functions such as Spanning Tree Protocol (STP) and VLANs, but also route packets between VLANs.

You are asked to install software that is part of a NAC. This software will perform a posture assessment and then uninstall itself after sending results to the manage station. What should you install?

Non-persistent agent A non-persistent agent is agent software that remains on a device long enough to verify compliance and complete authentication, and then uninstalls. Persistent agents and non-persistent agents are often part of a network access control (NAC) solution.

Which technology uses fiber optic cabling and has a bandwidth of 155.52 Mbps?

OC3 OC3 is a popular throughput rate for fiber optic network services, providing a maximum 155.52 Mbps.

Which of the following is found in the intermediate distribution frame and is used to terminate cabling coming from the work area?

Patch panel Patch panels are found in the intermediate distribution frame (IDF). Work area cabling runs from computer wall jacks to a patch panel in the IDF.

Management wants the network to be tested to see if it is vulnerable to outside attacks. What type of testing is required?

Penetration testing Penetration testing is process of scanning a network for vulnerabilities and investigating potential security flaws.

One of your network technicians recently downloaded an update for her NIC on her Windows PC. After the update, the PC started experiencing slow performance and intermittent system errors and reboots. Which of the following should be done to resolve this problem as quickly as possible?

Perform a driver rollback Rollback is the process of reverting to a previous version of software after attempting to patch or upgrade it.

Which document do you need to update if you update a server to Windows Server 2012 R2 from Windows Server 2008?

Physical network diagram The physical network diagram includes server location and the operating system installed.

What is the purpose of the split horizon feature used in distance vector routing protocols?

Prevent routing loops Split horizon is a method for preventing routing loops. This Layer 3 technology is employed by distance-vector routing protocols to ensure that a router knows which of its interfaces received a routing update so the router will not retransmit that same update back on the same interface.

Your company will be using new accounting software provided by a third-party that will host the application exclusively for your company's use. What type of cloud computing model is your company using?

Private SaaS Software as a Service (SaaS) is a cloud computing service model in which applications are provided through an online user interface and are compatible with a multitude of devices and operating systems. A private SaaS means that the service is hosted exclusively for a particular organization.

After performing some network upgrades with new switches and cables, you notice the activity lights on all the switches are extremely active and the network is performing very sluggishly. You think this could be the result of a broadcast storm. What tool can you use to see if you are correct?

Protocol analyzer A protocol analyzer can capture packets and determine if an inordinate number of broadcasts are occurring.

A network technician connects to a Cisco router's console using a rollover cable connected to the DB-9 connector on his laptop? Which communication standard is in use?

RS-232 A DB-9 connector is used to connect to a computer's serial port. A rollover cable connects from a Cisco console port to a computer's serial port and uses the RS-232 serial communication standard.

Fiber optic cables with an 8 micron core were run from a patch panel in an IDF to a patch panel in the MDF. The network technician used an MMF patch cable to connect from the patch panel to a 10GBaseF switch port in both the IDF and the MDF. However, the technician is not getting a positive link status on either switch port. What should the technician do?

Replace the MMF patch cables with SMF patch cables Because the fiber optic cable run between the IDF and MDF has an 8 micron core, that means the cable is single mode fiber (SMF). You can't use a multimode fiber (MMF) patch cable to connect an SMF cable. This is a fiber type mismatch.

What kind of device should you install if you need the device to perform network address translation, facilitate access to the Internet, and perform packet filtering?

Router A router can perform all the described functions. Switches, hubs, and APs cannot perform these functions.

You are planning to configure a video conferencing system that will use TCP/IP. You need to study the protocols and devices you might be using to deploy the system. Which of the following are you likely to study? (Choose two.)

SIP H.323 terminal Session Initiation Protocol (SIP) and H.323 are used in multimedia applications such as video conferencing.

Which of the following might you want to use to perform in-band switch management? (Choose two.)

SSH Telnet Telnet and SSH are used to connect to a managed device over the network which is in-band management.

Which of the following are reasons to segment a network? (Choose two.)

Security Performance Segmenting a network decreases broadcast traffic on each subnet and can increase performance. By segmenting a network security can be enhanced by using access control lists (ACLs) on routers between the segments. Adding routers increases cost and complexity.

A subnet contains 450 workstations and 15 servers. A recent network monitoring session has determined that there is a high number of broadcast packets utilizing bandwidth and degrading performance. It has been determined that there are no malfunctioning devices; the broadcasts are normal traffic. You want to decrease the overall percentage of broadcast traffic. Which of the following is most likely to help?

Segment the network To decrease the percentage of broadcast traffic on a network, the network can be segmented to create additional broadcast domains, therefore decreasing the percentage of broadcast traffic on each subnet.

One of your clients has opened a branch office in another state. Both the main office and the new branch office have fast, reliable Internet access. You have been asked to connect the branch office with the main office with a secure connection that uses their existing network infrastructure. What do you recommend?

Site to site VPN A site to site VPN is used to securely connect two networks using the existing Internet connection available at both networks. A host to site VPN is used to securely connect a single host computer with a network.

A network administrator has been asked to configure a firewall. The firewall should allow all internal clients to access the Internet using any protocol, but should block traffic coming from the Internet unless the traffic is in response to an internal client request. What type of firewall should be used and which traffic should be blocked?

Stateful, block inbound traffic Stateful firewalls keep track of session information so they can be configured to allow inbound traffic only if it is in response to an internal client request.

Which of the following devices works with frames and MAC addresses and supports STP?

Switch Switches work with frames and MAC addresses and many of them support Spanning Tree Protocol (STP). The other devices do not.

You have set up a new network that contains routers, switches, and WAPs. You want to be able to collect messages generated by any of these devices in a central location. Which of the following should you set up?

Syslog server Syslog is a standard for generating, storing, and processing messages about events on a device. A Syslog server is a central repository for these event messages.

Which of the following is an authentication protocol that encrypts the username, authorization, and accounting information, works only over TCP, and can work with an LDAP database?

TACACS+ TACACS+ is a Cisco proprietary protocol for AAA (access, authentication, and authorization). Unlike RADIUS, TACACS+ relies on TCP at the Transport layer instead of UDP. TACACS+ can use the lightweight directory access protocol (LDAP) for user and authentication data storage and retrieval.

Mike has just installed a new PC. Mike has verified the new PC's IP address and subnet mask are correct for the subnet and he can ping other devices on the subnet. However, Mike cannot ping devices on other subnets. Which of the following is most likely the problem?

The default gateway is set incorrectly. If other devices on the same subnet can be accessed, but devices on other subnets cannot be accessed, the default gateway setting is likely the problem.

You have just installed a router for a new LAN installation for a large internetwork that has about ten subnets and Internet access. After the installation, you test connectivity on several of the computers. You find they can all ping each other using both the computer name and the IP address, and they can ping the default gateway and devices on other subnets but none of them are able to access the Internet. All other subnets can access the Internet. What is the most likely reason for this problem?

The new router does not have a default route A default route is necessary for a router to route packets to the Internet.

Which of the following is an attack that uses ICMP?

The ping of death attack uses the ICMP protocol.

After reviewing the routing tables of the four routers in your internetwork, you have verified that all routers have the correct information about all networks. What can you say about the routers?

The routers have converged When the routing tables in all routers in an internetwork have consistent information, the routers are said to have converged.

You've been called to solve a workstation connectivity problem. After a brief investigation, you have identified the problem as a bad Cat 5e cable. You need to locate the cable in the wall. Which tool should you use?

Toner probe A toner probe can help locate a wire. The other tools are not typically used to locate wires.

Which of the following is associated with SNMP software? (Choose two.)

Trap MIB An SNMP trap is used to detect certain abnormal conditions and prompt the generation of SNMP trap messages. A Management Information Base (MIB) is a database used with SNMP that contains a list of objects managed by the network management system (NMS) and their descriptions as well as data about each object's performance.

You have been told to connect two switches together. Each switch has 16 ports, with 10-12 computers connected. After connecting the two switches you log on to one of the computers and attempt to ping a computer connected to the other switch. The ping is unsuccessful. You can ping other computers connected to the same switch your computer is on. Which of the following are the most likely reasons for the problem? (Choose two.)

Tx/Rx reversed Incorrect cable termination Since you are able to communicate with other computers on the same switch, the most likely reason for not being able to communicate with devices on another switch is that a straight through cable was used instead of a crossover cable (Tx/Rx reversed) or the cable was not correctly terminated.

Which port must be open on your router to allow you to upload device configuration and firmware updates using trivial file transfer protocol to your devices throughout the internetwork?

UDP 69 Trivial file transfer protocol (TFTP) operates over UDP port 69.

Your company is using standard structuring cabling techniques. You need a spreadsheet created that tells you which switch port in the IDF each PC is plugged into. Which of the following will help you with this task? (Choose two.)

Wall Jack Labeling Patch Panel Labeling Labeling the patch panel and wall jack ports will make it easier to document which switch port each device is connected to.

You find that the wireless network has been particularly slow today, but there is very little activity from the users. You check the router logs and find that their is an unidentified address connected to the network. What type of attack are you likely experiencing?

War driving War driving is the practice of an unauthorized user using the WLAN. War drivers often drive around looking for open networks or networks using old and easily crackable security protocols.

While working in a frequented downtown cafe with a laptop computer, the user discovers a number of shared folders that are not usually available. What is the most likely reason this user can see these folders?

Wrong SSID The user's computer probably automatically connected to an open network that does not belong to the cafe.

A network technician is asked to send ICMPv6 packets to the IPv6 loopback address on her computer. What command will the technician use?

ping ::1 The ping command sends ICMPv4 or ICMPv6 packets. The loopback address for IPv6 is ::1.


Conjuntos de estudio relacionados

Kinematics Chapter Test Study Guide

View Set

Causes of exchange rate changes - Exchange rates change whenever there is a change (increase or decrease) in the demand or supply of a currency

View Set

POSHER PRAMS and sentence types for Paper 1, Question 2

View Set

Tagalog - 625 Most Important Words - By Category

View Set