CTS120
Which of the following is a wireless Internet connectivity method that utilizes cellular technology?
3G
Your company is implementing a wireless network and is concerned that someone from a competing company could stand outside the building and collect wireless data. You have assured the company that WPA2 is secure. What makes WPA2 more secure than WPA?
AES
The company where Derek works has tasked him with setting up and securing a SOHO router. He wants to make sure the wireless network is secure and that no unauthorized person can gain access to the network. What is the first step Derek should perform to secure the wireless router?
Change default user name and password
A manager in a small office is asking if it is possible to limit network access to a particular website during business hours. Apparently, several users are spending an excessive amount of time on the site preventing them from completing their work-related tasks. Which of the following is the best solution to accomplish the request from the manager while not limiting access to other websites?
Implement a blacklist on the firewall and add the site the users are visiting
Which of the following is a scenario in which an IT support technician would most likely be required to implement the alternate IP configuration method on a network host?
In the event a DHCP server is unavailable, the workstation will have a valid IP address on the subnet.
Cathy wants to connect to her wireless LAN at home but is not sure where to change the setting so that she can connect. Where in the Windows Control Panel will Cathy find her computer's network connection settings?
Network and Sharing Center
George is concerned that his children might somehow be exposed to things on the Internet that they are not mature enough to handle. He wants a way to limit their ability to view content on the Internet. What will you recommend to George?
Use Parental Controls
A group of wireless devices are using each other as relays to share a network connection across a large area. Which of the following network categories is being used?
WMN
You are tasked with configuring a wireless SOHO router for a customer. Which of the following settings will be the most secure with the least effort and cost to the customer?
WPA2-PSK, AES