TestOut Ch 6
Which cellular network type was the first kind of network to use encryption?
2g
A network administrator wants to change the frequency of their wireless network to allow more channels that do not interfere with each other. Which of the following frequencies or protocols would accomplish this?
5GHz
Which of the following statements is true regarding a VPN?
A VPN masks a user's IP address in order to make their actions untraceable.
What are some characteristics of Bluetooth?
Ad Hoc Connections and 2.4 GHz radio wireless
Kris recently subscribed to a cable Internet provider. Which of the following devices is needed to convert the signal received on the coax cable to data that can be understood by a computer?
Cable Modem
You have entered a URL into a browser and have received a 404 error. Which type of error did you receive?
Client Error
Employees complain to the company IT division that they are spending considerable time and effort discarding unwanted junk email. Which of the following should be implemented?
Email Filtering
Which of the following is a wired networking method most commonly used today by desktop PCs and other network devices to connect to a local area network?
Ethernet
Which of the following Internet technologies provides the FASTEST speeds?
Fiber Optic
Which of the following is the best device to deploy to protect your private network from an untrusted public network?
Firewall
Which of the following protocols is used by an email client to retrieve messages from an email server and gives users the option to keep mail messages on the server?
IMAP
A technician is checking a customer's wireless network performance and has determined it was using 802.11g. The technician's recommendation is for the customer to upgrade to 802.11ac. Which of the following is the BEST reason to upgrade?
Improved Performance
You are an IT technician for your company. Your boss has asked you to set up and configure a wireless network to service all of the conference rooms. Which of the following features lets you allow or reject client connections based on the hardware address?
MAC Address Filtering
Which of the following allows for access to the internet without either a Wi-Fi or a wired connection?
Mobile Data
The TCP/IP suite has three protocols that deal with sending and receiving email. What are these protocols? (Select three.)
SMTP, IMAP, POP3
Which of the following is used on a wireless network to identify the network name?
SSID
A healthcare organization provides mobile clinics throughout the world and needs to transfer patient statistical data to a central database via the Internet. Which network technology should they select to ensure network connectivity for any clinic located anywhere in the world, even remote areas?
Satellite
Which of the following provides services to hosts on its network?
Server
What is the name of the protocol suite used on the Internet?
TCP/IP
You need to add security for your wireless network. You would like to use the most secure method. Which method should you implement?
WPA2