ITSP 135 chapter 7 review

¡Supera tus tareas y exámenes ahora con Quizwiz!

You have connected an ADSL Internet connection as shown in the exhibit. The ports at the phone jack are connected to the same single-number POTS line. At what location should you place the DSL filter?

"B" only

Which of the following is a wireless Internet connectivity method that utilizes cellular technology?

3G

Which of the following 802.11 wireless networking standards support transfer rates of over 54 Mbps? (Select TWO.)

802.11ac 802.11n

A technician wants to configure a DHCP server to guarantee that certain printers always receive the same address. Which of the following should the technician configure?

Address reservation

A client is requesting an Internet connection type that is not affected by atmospheric conditions and is always on. Which of the following will meet these requirements?

Cable

Which of the following devices are most commonly used to connect a LAN to an ISP for broadband services? (Select TWO.)

Cable modem DSL modem

The company where Derek works has tasked him with setting up and securing a SOHO router. He wants to make sure the wireless network is secure and that no unauthorized person can gain access to the network. What is the first step Derek should perform to secure the wireless router?

Change default user name and password.

A technician is configuring a new SOHO multifunction wireless router at a customer's location to provide network access to several wireless devices. The technician is required to protect the customer's private network from unauthorized access while performing the initial router setup as well as during normal operation after the configuration is completed. Which of the following is the best step for the technician to take in securing the router to meet this requirement?

Change the router's default administrative password.

A client contacted you to request your help in researching and supplying the hardware necessary to implement a SOHO solution at his new home-based business. Which of the following SOHO router features will simplify IP address configuration on the private network for both wired and wireless clients?

DHCP server

You are setting up your Windows computer to connect to the Internet and notice that when you type www.microsoft.com, the browser does not go to the site. Instead, you receive an error message saying that the address cannot be resolved. What network setting should you check to see the address of the server being used to resolve this address?

DNS

Which of the following will use an RJ-11 connector for connectivity?

DSL

You have been tasked with configuring a SOHO network in which all ports on the public untrusted network will be forwarded to one workstation connected to the LAN. Which of the following features will you configure on the SOHO router to accomplish this task?

Demilitarized zone

Your company shares a building with a competitor's branch office. Recently, you noticed that some computers other than company computer have tried to connect to the wireless network unsuccessfully. When you are in the parking lot, you also notice that the company's wireless network SSID can be seen on your smartphone. What can you do to make sure no one outside your company can gain access to its wireless network? (Select all that apply.)

Disable SSID broadcasting. Lower radio power levels. Enable MAC filtering.

Mary, a remote user, connects her Windows 10 laptop to the corporate network by way of the Internet using a VPN tunnel. Which of the following is often configured as a required step for a user each time she attempts to use the VPN connection?

Enter the same user name and password used on the corporate network.

Which of the following wireless networking protocols uses LTE technology with a maximum speed of up to 1 Gbps?

Fourth-generation cellular

A manager in a small office is asking if it is possible to limit network access to a particular website during business hours. Apparently, several users are spending an excessive amount of time on the site preventing them from completing their work-related tasks. Which of the following is the best solution to accomplish the request from the manager while not limiting access to other websites?

Implement a blacklist on the firewall and add the site the users are visiting.

Which of the following is a scenario in which an IT support technician would most likely be required to implement the alternate IP configuration method on a network host?

In the event a DHCP server is unavailable, the workstation will have a valid IP address on the subnet.

Jacob wants to set up extra security on his wireless network; he currently uses WPA2. He wants to allow only his devices to connect to the network and reject devices that he does not own. What extra wireless security should Jacob employ in on his wireless router?

MAC filtering

A small group of travelers is meeting inside an ancient building, and the travelers need access to the Internet using their mobile devices. However, the group is in an area where Wi-Fi Internet is not available and cellular coverage is intermittent. One of the travelers has an unlimited cellular data plan and a strong consistent signal. Which of the following methods would most likely be implemented to provide Internet service to the group?

Mobile hotspot

Cathy wants to connect to her wireless LAN at home but is not sure where to change the setting so that she can connect. Where in the Windows Control Panel will Cathy find her computer's network connection settings?

Network and Sharing Center

You have connected a cable Internet connection as shown in the exhibit. At what location should you place a filter?

No filters are required

What connector is shown in the exhibit?

RJ-45

George is concerned that his children might somehow be exposed to things on the Internet that they are not mature enough to handle. He wants a way to limit their ability to view content on the Internet. What will you recommend to George?

Use Parental Controls.

A remote worker wants to connect his computer to his corporation's private trusted network over the Internet. Which of the following will need to be configured?

VPN tunnel

What is the correct order of network types when categorized by their size or the physical area they cover, from largest to smallest?

WAN, MAN, LAN, PAN

A group of wireless devices are using each other as relays to share a network connection across a large area. Which of the following network categories is being used?

WMN

You are tasked with configuring a wireless SOHO router for a customer. Which of the following settings will be the most secure with the least effort and cost to the customer?

WPA2-PSK, AES

A corporate user is attempting to connect to the company's Windows domain server on the local network with her new laptop through a wired connection. Which of the following is required for the user to successfully sign in to the Windows domain?

Windows domain user name and password


Conjuntos de estudio relacionados

World History: The Industrial Revolution

View Set

Vulnerable Subjects - Research Involving Workers/Employees (ID 483)

View Set

Bio 1260 exam 3 - clicker question

View Set

AWS Certified Solutions Architect - Associate SAA-C03 v1.0

View Set