ExamCram: 7-8

¡Supera tus tareas y exámenes ahora con Quizwiz!

Which of the following channel options would allow three Wireless Access Points (WAPs) to be set up on non-overlapping channels?

1 6 11

An IPv6 address consists of:

128 bits

Which of the following frequency bands can be used by IEEE 802.11 networks? (Select all that apply)

2.4 GHz 5.0 GHz

What is the channel bandwidth specified in the IEEE 802.11a standard?

20 MHz

Which of the following channel bandwidths is specified in the IEEE 802.11g standard?

20 MHz

The IEEE 802.11n standard specifies available channel bandwidth options of: (Select 2 answers)

20 MHz 40 MHz

Which of the following is a channel bandwidth used in 802.11b networks?

22 MHz

An IPv4 address consists of:

32 bits

An SSL VPN connection typically requires a dedicated VPN client application.

False

IPv6 addresses are expressed by using:

Hexadecimal numbers

Which of the following reflects differences between passive and active network security breach responses?

IDS vs. IPS

Which of the following VPN types is used to connect computers to a network? (Select 2 answers)

Remote-access Client-to-site

Which of the following terms is used to describe a permanent IP address assignment from a DHCP server?

Reservation

What is the function of an HTTP server?

Serving of web pages (

Which type of VPN enables connectivity between two networks?

Site-to-site

Which of the following refers to the permanent assignment of an IP address?

Static IP address

Which of the following determines which network segment an IP address will belong to?

Subnet mask

Which of the following is a type of server used to collect diagnostic and monitoring data from networked devices?

Syslog server

A double colon in an IPv6 address indicates that one part of the address, containing only zeros, has been compressed to make the address shorter.

True

The term "Channel bonding" refers to a technique that allows for combining adjacent channels to increase the amount of available bandwidth.

True

The term "Unified Threat Management" (UTM) refers to a network security solution, commonly in the form of a dedicated device (called a UTM appliance or a web security gateway), which combines the functionality of a firewall with additional safeguards such as URL filtering, content inspection, spam filtering, gateway antivirus protection, IDS/IPS functionality, or malware inspection.

True

Which of the following terms describes a logical grouping of computers that allow computer hosts to act as if they were attached to the same broadcast domain, regardless of their physical location?

VLAN

A system that uses a public network (such as the Internet) to create a private encrypted connection between remote locations is called:

VPN

Which of the following is a dedicated device designed to manage encrypted connections established over an untrusted network such as the Internet?

VPN concentrator

Which of the following refer to IoT technologies designed to permit communication between appliances in a home automation network? (Select 2 answers)

Z-Wave Zigbee

Which of the following answers describe features of the IEEE 802.11ac wireless standard? (Select 3 answers)

5.0 GHz frequency band Maximum data signaling rate of up to 6.77 Gbps Multi-User Multiple Input / Multiple Output (MU-MIMO)

The IEEE 802.11n standard offers backward compatibility with: (Select all that apply)

802.11g 802.11b 802.11a

Which of the following describes the IEEE 802.11ac channel bandwidth option(s)? 20 MHz 40 MHz 80 MHz 160 MHz

Any of the above

Which of the following is one of the functions provided by RADIUS and TACACS servers?

Authentication

What type of server handles the assignment of dynamic IP addresses?

DHCP server

Which of the following server types is used for automatic allocation of IP addresses on a network?

DHCP server

What type of service performs an FQDN-to-IP resolution?

DNS

To connect to a website on the Internet and display its contents, a URL entered in a web browser address bar needs to be translated into an IP address. Which of the following servers handles this type of request?

DNS server

IPv4 addresses are expressed by using:

Decimal numbers

Which of the following is a networked device providing an entry point into another network or onto the Internet?

Default gateway

What is the function of an SMTP server?

Email handling

Which of the following is an IPv6 link-local address?

FE80::/10

A dedicated file server is also known as a(n):

FTP server

Which of the following are characteristic features of the IEEE 802.11n wireless standard? (Select all that apply)

Multiple Input / Multiple Output (MIMO) 2.4 GHz frequency band 5.0 GHz frequency band Maximum data signaling rate of up to 600 Mbps

Which of the following relate to IPv4 link-local addresses? (Select 3 answers)

Non-routable IP address APIPA address 169.254.0.0/16

IPP, LPD/LPR, and SMB/CIFS are examples of protocols that enable:

Printing

Which of the following is a computer system or an application/service that acts as an intermediary between a network host and the Internet?

Proxy

Which of the following wireless technologies enables identification and tracking of tags attached to objects?

RFID

Automatic Private IP Addressing (APIPA) allows a Windows host to self-configure an IP address and subnet mask when a Dynamic Host Configuration Protocol (DHCP) is unavailable. APIPA uses an address block range between 169.254.0.0 and 169.254.255.255. APIPA-assigned addresses are valid only for communications within the network segment that a given host is connected to (i.e. a host with an APIPA-assigned address cannot connect to the Internet).

True

Dynamic Host Configuration Protocol (DHCP) allows for static allocation of an IP address based on an IP-to-MAC address mapping.

True

Intrusion Detection Systems (IDSs) are devices or software applications designed to detect malicious activities or violations of security policies on a network or computer host. An IDS designed to monitor networks is known as a Network Intrusion Detection System (NIDS); an IDS monitoring a single host is called a Host Intrusion Detection System (HIDS). An IDS does not take any active steps to prevent or stop intrusions, relying on passive responses such as sending an alert to a management console or recording information about an event in logs.

True

Long Term Evolution (LTE) is a wireless communications standard for mobile devices and wireless hotspots. LTE is much faster than the older generation of 2G and 3G cellular networks. Both LTE and its later upgrade, LTE-Advanced (LTE-A), are often marketed as 4G standards.

True

Multiple Input / Multiple Output (MIMO) is a wireless technology that allows for significant increase in data throughput due to the use of multiple antennas and multiple data streams.

True

Network Address Translation (NAT) provides an IP proxy between a private LAN and a public network such as the Internet.

True

Networked clients not residing on the same subnet as a DHCP server can still obtain an IP address from the server through a DHCP relay agent (a.k.a. IP helper).

True


Conjuntos de estudio relacionados

Subject Pronouns, Object Pronouns, Using I and Me, And LOTS more! :)

View Set

Advanced Algebra Semester 1 Final Exam Review

View Set

AP Euro- LearningCurve Chapter 28

View Set

Government Exam 3 Quiz Questions

View Set

Business management chapter 5 & 6

View Set

BA 200 Ch 18 Forms of Doing Business

View Set