Networking Essentials – Modules 13 – 16

¡Supera tus tareas y exámenes ahora con Quizwiz!

ease of expansion lower on-going costs ease of installation

What are three advantages of wireless over wired LAN technology? (Choose three.) a. higher level of security b. longer transmission distance c. ease of expansion d. lower on-going costs e. ease of installation

cable DSL

What are two types of wired high-speed Internet connections? (Choose two.) a. dial-up b. cellular c. satellite d. cable e. DSL

The network is invisible to those who are unaware of the SSID.

What happens when a wireless access point is configured to stop broadcasting the SSID? a. Computer access to the wireless access point is restricted. b. The identity of the network is freely broadcast. c. Signals are prevented from transmission outside the boundaries of the local network. d. The network is invisible to those who are unaware of the SSID.

an access method that is used by wireless technology to avoid collisions

What is CSMA/CA on a network? a. an access method that is used by wired Ethernet technology to avoid collisions b. an access method that is used by wireless technology to avoid collisions c. an access method that is used by wireless technology to avoid duplicate SSIDs d. an access method that is used by any technology that has excessive collisions

exploits vulnerabilities with the intent of propagating itself across a network

What is a characteristic of a computer worm? a. exploits vulnerabilities with the intent of propagating itself across a network b. a set of computer instructions that lies dormant until triggered by a specific event c. tricks users into running the infected software d. malicious software that copies itself into other executable programs

antivirus software

What is a common countermeasure for Trojan horses? a. authentication b. antivirus software c. firewall d. encryption

It allows external hosts to access specific company servers while maintaining the security restrictions for the internal network.

What is the purpose of a DMZ? a. It provides secure connectivity for clients that connect to the internal network through a wireless LAN. b. It creates an encrypted and authenticated tunnel for remote hosts to access the internal network. c. It analyzes traffic for intrusion attempts and sends reports to management stations. d. It allows external hosts to access specific company servers while maintaining the security restrictions for the internal network.

firewall

What specialized network device is responsible for permitting or blocking traffic between networks? a. access point b. switch c. bridge d. firewall

Cloud computing

What technology allows users to access data anywhere and at any time? a. Cloud computing b. virtualization c. micromarketing d. data analytics

802.11ac 802.11a

What two IEEE 802.11 wireless standards operate only in the 5 GHz range? (Choose two.) a. 802.11ad b. 802.11n c. 802.11g d. 802.11ac e. 802.11b f. 802.11a

encryption

What wireless router configuration would stop outsiders from using your home network? a. encryption b. IP address c. router location d. network name

infrastructure as a service (IaaS)

Which cloud computing opportunity would provide the use of network hardware such as routers and switches for a particular company? a. browser as a service (BaaS) b. infrastructure as a service (IaaS) c. software as a service (SaaS) d. wireless as a service (WaaS)

It restricts computer access to a wireless network.

Which feature is characteristic of MAC filtering in wireless networks? a. It allows only authorized users to detect the network. b. It restricts computer access to a wireless network. c. It is configured on the computer rather than on the router. d. It encrypts data that is transmitted on a wireless network.

Internal threats can cause even greater damage than external threats.

Which statement accurately characterizes the evolution of threats to network security? a. Internet architects planned for network security from the beginning. b. Early Internet users often engaged in activities that would harm other users. c. Threats have become less sophisticated while the technical knowledge needed by an attacker has grown. d. Internal threats can cause even greater damage than external threats.

vishing pretexting phishing

Which three attacks exploit human behavior? (Choose three.) a. malware b. brute force c. vishing d. zombies e. pretexting f. phishing

Input the authentication password. Enter the network SSID. Choose the correct security type.

Which three steps must be completed to manually connect an Android or IOS device to a secured wireless network? (Choose three.) a. Set the IP address. b. Activate the Bluetooth antenna. c. Input the authentication password. d. Enter the network SSID. e. Change the MAC address. f. Choose the correct security type.

physical footprint power and air conditioning

Which two business and technical challenges does implementing virtualization within a data center help businesses to overcome? (Choose two.) a. virus and spyware attacks b. physical footprint c. operating system license requirements d. server hardware needs e. power and air conditioning

social engineering

Which type of attack exploits human behavior to gain confidential information?​ a. social engineering b. denial of service c. spyware d. virus

The new laptop does not have antivirus or anti-spam software installed.

A student tells a teacher that many junk emails are appearing on a new personal laptop. What is a possible cause of the problem? a. The new laptop does not have antivirus or anti-spam software installed. b. The school email server is not functioning properly. c. The student has spent too much time surfing the web. d. The laptop needs to be updated to the latest OS version.

port forwarding

An administrator wants to configure a router so that users on the outside network can only establish HTTP connections to the internal web site. Which feature would the administrator configure to accomplish this? a. PAT b. NAT overload c. static NAT d. port forwarding

brute force

Which type of attack involves an attacker using a powerful computer to try a large number of possible passwords in rapid succession to gain access to a system​? a. brute force b. pretexting c. phishing d. DDoS

DSL modem

Which type of device provides an Internet connection through the use of a phone jack? a. DSL modem b. satellite modem c. cable modem d. Wi-Fi AP

2.4 GHz

Which wireless RF band do IEEE 802.11b/g devices use? a. 5 GHz b. 2.4 GHz c. 900 MHz d. 60 GHz

easily crackable

Why should WEP not be used in wireless networks today? a. its lack of support b. its age c. its lack of encryption d. easily crackable e. its use of clear text passwords


Conjuntos de estudio relacionados

Human Anatomy and Physiology - Checkpoints

View Set

Streetcar Named Desire Study Questions

View Set

macro: the money market: foundational concepts

View Set

LS1 Week 8 Chapter 58 Assessment and Management of Patients with Breast Disorders

View Set