Net + tets

¡Supera tus tareas y exámenes ahora con Quizwiz!

Which ip is a class b

191

What is the minimum number of interfaces a router must have to rout traffic

2

Which of the following is a well known port

53

Which wireless standard uses a freq of 5 Gz and has a range of 120m

802.11A

A differential backup will backup?

All changed files since last full backup

Which of the following do wireless networks require

All of the above

Which Bluetooth attack exploits a user definable field in the dreams sound packet

Blue jacking

To sync a phone to a smart watch which of the following technology would you use

Bluetooth

In reference to access point modes which mode consists of two access points connected only to each other

Bridge

Which of the following is used to verify that all of the Intendid connections exsist and that there are no unintended connections to the cable being tested

Cable tester

What type of site is a shell, is not fully equipt, and had longest setup time of all is known as what kind of site

Cold

Which of the following is an advantage of wireless networks

Cost effective

In reference to DHCP place 4 step in correct order

Discover offer request acknowledge

Which network TOPOLOGY is commonly implemented as fiber distributed data interface FDDI

Dual ring

Which allocation describes when a dhcp server hands out up addresses from a big pool of addresses with addresses being leased for a set period of time

Dynamic allocation

Which of the following is not implication of raid

Dynamic disks allocation disks are not used unless requested

Which of the following is. Cisco proprietary internal routing protocl

EIgrp

Regarding the "bu" network topology which of the following is a security consideration

Eacesdropping

Dns is a server that translates name into Mac addresses

False

Proxy servers do not shield a client from direct communications with a server

False

Stronger security controls help overcome the weakest of human error and lack of training and awareness

False

The "full mesh" network topology strives to separate critical devices form non critical devices

False

The wireless authentication protocol eap was designed to faciliatate

False

To electronically track a large quantity of goods near field communication is the best technology to leverage to maximum efficient

False

In regards of media access methods, CSMA with collision avoidance has the hosts stop and wait a random period of time before transmitting

Flase

The wireless authentication protocl EAP was designed to facilitate authentication and force WEP key changes

Flase

Which of the following does not pertain to the unshielded twisted pair cable

Freuqentky used in areas with high rf

Which of the following would be considered an item with in the iot

Fridge with wifi

Which technology requires an eaves dropper to send packets in order to solicit and capture a response and potentially poison receiving hosts and or infrastructure devices with the intent of recievung packets addressed to the other hose

Hub?

Regarding wireless LAN which iee802.1 uses ofdm

IEE 802.11A

Which of the following wireless authentication protocols is proprietary and was created by cisco

LEAP

Which of the following determines the largest frame for a a particular technology can handle

MTU

Which of the following is the room that houses the demarcation (demarc) network and telephone cross connects for a building?

Main distribution Frame MDF

The punch down tool is used to trouble shoot which problem

None of the above

What device explicitslly monitors optical transmission media

Odtp

IMAP (Internet Message Access Protocol) does which of the following?

Permits multiple devices to access the same mailbox and see the same set of messages at any given time

Which media access method is used by Bluetooth devices

Polling

Which of the following is likely to be included in a strong password policy

Prohibiting reuse or previously used passwords

Which access is a UDP based solution that is sometimes built into routers

RADIUS

Which of the following is industry slang for combining raid levels

RAID 10

What coaxile cable type is the thick net ethernet

RG8

Details on how a device must be configured in order to remotely connect to an organizations internal network is most likely found in which of the following

Remote access policy

Which coax cable type is the original arcnet cable

Rg62

Which of the following describes blue bugging

Sends commands

Using a fingerprint reader with passcode to enter a secure area is an example of

Something you are and something you know

Remote replication of data that is concurrent with data written to the production system know as _________ replication

Sychronous

Which of the following is a mechanism for awareness that something has been disturbed or meddled with

Tanker detection

A digital signature is a cryptographic process to provide non re

True

Ethernet is a digital synchronous communications standard speicified by IEEE standard 802.3

True

IP ICMP AND IPSec are protocols used in the network layer

True

To communicate on a wireless network, the client must have a wireless card or device to send/receive radio signals and must know the access point details like SSID and security settings

True

What SNMP versions is the first to combine authentication and encryption

V3

Which of the following is NOT true about the use of directional antennas

Wireless signals extend 360 degress


Conjuntos de estudio relacionados

Exam: 7 Chapter 36,37,38,40,41. West Coast University.

View Set

Test 2 Study Guide Chapter 5 & 6

View Set

Learning to Read, Write, and Spell Words in English as a New Language

View Set

Skin Color and Subcutaneous Layer

View Set

Chap 7-Client's Response to Illness

View Set

Professional Nursing EAQ: Ch. 17- Nursing Diagnosis

View Set