Alexa_Week13

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

Is a key component of Windows Active Directory A) Remote Authentication Dial-In Service (RADIUS) B) Terminal Access Controller Access-Control System C) Kerberos

Kerberos

Provides a trusted Key Distribution Center (KDC) A) Remote Authentication Dial-In Service (RADIUS) B) Terminal Access Controller Access-Control System C) Kerberos

Kerberos

A network in a small geographic area that typically uses wires to connect systems together. A) MAN B) WLAN C) WAN D) PAN E) LAN

LAN

A set of subnets connected to each other, typically by wires, using at least one router. A) MAN B) WLAN C) WAN D) PAN E) LAN

LAN

Match each smart device with its description. Thermostat

Learns from your habits and schedule, allows you to control the climate in your home remotely, shows you energy consumption in real time, and adjusts itself depending on ambient conditions.

Which of the following IP addresses have a default subnet mask of 255.255.0.0? (Select three.) A) 168.16.5.1 B) 129.0.0.1 C) 228.62.18.6 D) 1.6.45.254 E) 123.254.19.6 F) 191.168.2.15

A) 168.16.5.1 B) 129.0.0.1 F) 191.168.2.15

Your Windows workstation has Automatic Private IP Addressing (APIPA) implemented with default settings. Which of the following TCP/IP addresses could you automatically assign to the system, should your DHCP server go down or become inaccessible? A) 169.254.1.26 B) 172.16.1.26 C) 192.168.1.22 D) 168.254.10.25 E) 10.0.0.65 F) 169.198.1.23

A) 169.254.1.26

HyperText Transfer Protocol (HTTP) A) 80 B) 443 C) 143 D) 22 E) 445 F) 427 G) 548

A) 80

A customer is experiencing a sporadic interruption of their Wi-Fi network in one area of their building. A technician investigates and discovers signal interference caused by a microwave oven. The customer approves replacing the wireless access point that covers the area, but asks that the wireless speed also be increased. Which of the following Wi-Fi standards should the replacement device support to BEST fulfill the customer's needs? A) 802.11ac B) 802.11b C) 802.11a D) 802.11g

A) 802.11ac

You have been contacted by OsCorp to recommend a wireless internet solution. The wireless strategy must support a transmission range of 150 feet, use a frequency range of 2.4 GHz, and provide the highest possible transmission speeds. Which of the following wireless solutions should you recommend? A) 802.11g B) 802.11ac C) 802.11a D) 802.11b

A) 802.11g

You want to allow your users to download files from a server running the IP protocol. You also want to protect access to the files by requiring user authentication to access specific directories on the server. Which IP protocol should you implement to provide this capability? A) FTP B) SNMP C) LDAP D) SMTP E) TFTP F) SSH

A) FTP

Which of the following are IoT systems that work together to make communication between two endpoints possible? (Select two.) A) Gateway system B) Wi-Fi C) Data storage D) Middleware E) Access gateway

A) Gateway system C) Data storage

What are two major concerns regarding IoT devices? (Select two.) A) Hacking B) Accessibility C) Short lifespan D) Privacy E) Availability

A) Hacking D) Privacy

Up to 2 meters with a few obstacles in between. A) Infrared B) Bluetooth C) Near Field Communication

A) Infrared

Which of the following defines which network a device is connected to? A) Subnet mask B) Host ID C) Protocol D) Network ID

A) Subnet mask

Which of the following identifies the interface ID component of an IPv6 address? (Select two.) A) The last four quartets of an IPv6 address. B) The first quartet of an IPv6 address. C) The last quartet of an IPv6 address. D) The last 64 bits of an IPv6 address. E) The first four quartets of an IPv6 address. F) The fourth quartet of an IPv6 address.

A) The last four quartets of an IPv6 address. D) The last 64 bits of an IPv6 address.

Which of the following is an inherent vulnerability of embedded devices? A) Unknown environments B) Known environments C) Vulnerable to malware D) Open systems

A) Unknown environments

What are the two mesh protocols that are used most often with IoT devices? (Select two.) A) Z-Wave B) Zerg C) Zbot D) Zigbee E) Zensys

A) Z-Wave D) Zigbee

Switch

Allows you to control hardwired lights, ceiling fans, fireplaces, small appliances, and garbage disposals.

You have a small home network that uses 192.168.1.0 with the default subnet mask for the network address. The default gateway address is 192.168.1.254, and the router is providing DHCP on the network. The Wrk2 computer has been assigned the IP address of 192.168.1.55. Which of the following is considered the loopback address for the Wrk2 computer? A) 192.168.1.255 B) 127.0.0.1 C) 192.168.1.254 D) 192.168.1.0 E) 192.168.1.55

B) 127.0.0.1

Which of the following IP addresses are Class B addresses? (Select three.) A) 115.33.0.0 B) 190.65.2.0 C) 129.0.0.0 D) 195.155.0.0 E) 132.12.0.0 F) 64.2.2.64 G) 224.15.55.2

B) 190.65.2.0 C) 129.0.0.0 E) 132.12.0.0

Which of the following correctly describe the most common format for expressing IPv6 addresses? (Select two.) A) Binary numbers B) 32 numbers, grouped using colons C) Decimal numbers D) 128 numbers, grouped using colons E) Hexadecimal numbers

B) 32 numbers, grouped using colons E) Hexadecimal numbers

HyperText Transfer Protocol Secure (HTTPS) A) 80 B) 443 C) 143 D) 22 E) 445 F) 427 G) 548

B) 443

You are designing a wireless network for a client. Your client needs the network to support a data rate of at least 150 Mbps. In addition, the client already has a wireless telephone system installed that operates 2.4 GHz. Which 802.11 standard works BEST in this situation? A) 802.11g B) 802.11n C) 802.11a D) 802.11b

B) 802.11n

You are working as a junior technician for a small consulting firm. You have been tasked with installing a new computer on the network. You have performed this task and connected the computer to the network. To verify network connectivity, you decide to ping the network server. Before this can happen, the new device needs to know the MAC address of the network server so it can match it to the IP address. The computer sends a broadcast message, asking who has the IP address. The network server responds with its MAC address, and now the computer can communicate with the server. Which protocol is being used when sending the broadcast message to match the MAC address to the IP address? A) IP B) ARP C) HTTP D) ICMP

B) ARP

Up to 10 meters for Class 2 devices. A) Infrared B) Bluetooth C) Near Field Communication

B) Bluetooth

Up to 100 meters for Class 1 devices A) Infrared B) Bluetooth C) Near Field Communication

B) Bluetooth

A technician has configured a client computer's network interface to request an IP address. Which of the following TCP/IP suite protocols does the client computer use to perform the request and receive an IP address from a server? A) Simple Network Management Protocol (SNMP) B) Dynamic Host Configuration Protocol (DHCP) C) Domain Name System (DNS) D) Lightweight Directory Access Protocol (LDAP)

B) Dynamic Host Configuration Protocol (DHCP)

Which of the following UTM appliances monitors all network traffic and blocks malicious traffic while notifying the network security team? A) Firewall B) IPS C) Anti-malware D) NAT

B) IPS

Which of the following is a network that uses internet technologies, but the data and services are only available to the hosts connected to the private network? A) Subnet B) Intranet C) Extranet D) Internetwork

B) Intranet

Which of the following terms refers to a network resource sharing model that uses access control lists saved on each computer? A) Intranet B) Peer-to-peer C) Client/server D) Extranet

B) Peer-to-peer

A small network used for connecting devices, such as a notebook computer, a wireless headset, a wireless printer, and a smartphone. A) MAN B) WLAN C) WAN D) PAN E) LAN

PAN

A group of workers in an office space communicate with each other on their smartphones and tablet devices through an ad hoc network linked using Bluetooth technology protocols. Which of the following network types is in use? A) Wide Area Network (WAN) B) Personal Area Network (PAN) C) Metropolitan Area Network (MAN) D) Local Area Network (LAN)

B) Personal Area Network (PAN)

Which of the following items of information does a packet header contain? (Select three.) A) ACK data B) Receiver C) TFTP data D) SYN data E) Sender F) How to deliver the packet G) Data chunk order

B) Receiver E) Sender G) Data chunk order

You've used your Windows workstation to map a drive to a shared folder on a Windows server. Which protocol was used to access the share? A) LDAP B) SMB C) RDP D) SFTP

B) SMB

You are the IT technician for your company. Which of the following mechanisms would BEST allow you to resolve a hostname to its associated IP address? (Select two.) A) DHCP B) hosts file C) BOOTP D) FTP E) DNS

B) hosts file E) DNS

Internet Message Access Protocol (IMAP) A) 80 B) 443 C) 143 D) 22 E) 445 F) 428 G) 548

C) 143

You are a junior network technician for a small consulting firm. You have recently learned about IP addressing and run the ipconfig command on your local computer. The output from the command is: IPv4 Address..... 192.168.0.52 Subnet Mask..255.255.255.0 Default Gateway..192.168.0.1 Which of the following is the host ID? A) 255.255.255 B) 192.168.0.1 C) 52 D) 192.168.0

C) 52

Which of the following are valid IPv6 addresses? (Select two.) A) A82:5B67:7700:AH0A:446A:779F:FFE3:0091 B) 165.15.78.53.100.1 C) 6384:1319:7700:7631:446A:5511:8940:2552 D) 343F:1EEE:ACDD:2034:1FF3:5012 E) 141:0:0:0:15:0:0:1

C) 6384:1319:7700:7631:446A:5511:8940:2552 E) 141:0:0:0:15:0:0:1

You need a type of wireless connection that can transfer data between your phone, PDA, and laptop. You are transferring sensitive information. Which of the following is the BEST choice for this wireless connection? A) Wireless Ethernet B) Infrared C) Bluetooth D) Cellular WAN

C) Bluetooth

A technician has configured a client computer's network interface with server addresses to which the client will send requests for translating fully qualified domain names (FQDNs) to IP addresses and IP addresses to FQDNs. Which of the following TCP/IP suite protocols is used by the client to perform the request and also used by a server to respond to those requests? A) Dynamic Host Configuration Protocol (DHCP) B) Server Message Block (SMB) C) Domain Name System (DNS) D) Secure Shell (SSH)

C) Domain Name System (DNS)

You are the network administrator for a small consulting firm. The firm has recently rolled out a new intranet site, and you are responsible for configuring the DNS. You are able to connect to the intranet site by using the IP address, but you cannot connect by using the hostname. Which of the following do you need to configure to access the site with the hostname? A) Dynamic DNS B) Reverse lookup zone C) Forward lookup zone D) CNAME record

C) Forward lookup zone

A few centimeters. A) Infrared B) Bluetooth C) Near Field Communication

C) Near Field Communication

Which of the following network components is responsible for converting digital data into a signal that can be transmitted? A) Protocol B) Switch C) Network interface D) Transmission medium

C) Network interface

You are a junior network technician for a small consulting firm. Your team recently split the network into smaller subnets, one for each department. One of your users, Jaclyn in HR, is trying to access shared files from Tom's computer in the sales department. Jaclyn states she was able to previously access these files. As part of your troubleshooting, you verify that both Tom and Jaclyn can access the network printer in their departments. Which of the following would be the MOST likely reason Jaclyn is unable to access files on Tom's computer? A) Tom has an invalid IP address. B) The subnet mask has been misconfigured. C) Tom and Jaclyn are no longer on the same subnet. D) Jaclyn has an invalid IP address.

C) Tom and Jaclyn are no longer on the same subnet.

A company has built a video streaming service that supplies training videos. Quickly transmitting video data to customers is more important than guaranteed delivery. Which of the following Transport layer IP suite protocols is MOST likely used for this service? A) File Transfer Protocol (FTP) B) Transport Layer Protocol (TCP) C) User Datagram Protocol (UDP) D) Internet Control Message Protocol (ICMP)

C) User Datagram Protocol (UDP)

Which of the following authentication methods allows you to securely connect a printer to the wireless network with the least amount of effort? A) Captive Portal B) PSK C) WPS D) Open Network

C) WPS

You are working as an installer for a small IT company. One of your residential clients has purchased some IoT devices and you have been tasked with installing them for the client. These IoT devices will be networked together in a small network. Each device will connect to each other and act a relay for the network signal so additional network infrastructure will not be needed. Which of the following best describes this type of network? A) Local area network B) Wireless wide area network C) Wireless mesh network D) Personal area network

C) Wireless mesh network

Bulb

Can change colors, track motion, stream audio over Bluetooth, and double as a connected camera, but it's only smart when turned on.

You are currently learning about networking devices and have just learned about MAC addresses. You look up your device's MAC address, and it comes back as 00-B0-D0-06-BC-AC. Which portion of this MAC address can tell you who the manufacturer is? A) 00-B0 B) 06-BC-AC C) BC-AC D) 00-B0-D0

D) 00-B0-D0

Match each port number on the left with its associated protocol on the right. Secure Shell (SSH) A) 80 B) 443 C) 143 D) 22 E) 445 F) 427 G) 548

D) 22

To assist a user, a help desk technician is able to take advantage of a Windows proprietary network protocol that allows the technician to open a graphical interface to connect with the user's Windows computer. Which of the following TCP/IP port numbers is the default port used by this protocol? A) 80 B) 143 C) 443 D) 3389

D) 3389

You have recently purchased a toll pass for a bridge that you cross each day on your way to work. Which of the following wireless technologies is MOST likely being used for this pass? A) Bluetooth B) Passive RFID C) Near Field Communication (NFC) D) Active RFID

D) Active RFID

Your employer wants a system that guarantees that all components will work together with minimal configuration and setup. Time is of the essence in getting this new system ready. Which of the following would BEST meet your emoloyer's needs? A) PLC B) HMI C) SCADA D) DCS

D) DCS

Which of the following protocols is used by an email client to retrieve messages from an email server, giving users the option to keep mail messages on the server? A) SMTP B) NTP C) POP3 D) IMAP

D) IMAP

A user pays for a retail purchase by placing a smartphone next to the merchant's reader. Which of the following wireless mobile device connections is this? A) Bluetooth B) MicroUSB C) Lightning D) NFC

D) NFC

Which of the following DHCP scope options will assign a static IP configuration to a device using the device's MAC address? A) Default gateway B) IP range C) Exclusion D) Reservation

D) Reservation

Which of the following network types uses special hardware to provide high-speed access to storage across the network? A) Local area network B) Client-server network C) Peer-to-peer network D) Storage area network

D) Storage area network

You are working as a junior security technician for a consulting firm. One of your clients is upgrading their network infrastructure. The client needs a new firewall and intrusion prevention system installed. They also want to be able to block employees from visiting certain types of websites. The client also needs a VPN. Which of the following internet appliances should you install? A) Proxy server B) Spam gateway C) Load balancer D) Unified Threat Management

D) Unified Threat Management

Server Message Block (SMB/CIFS) directly over TCP A) 80 B) 443 C) 143 D) 22 E) 445 F) 427 G) 548

E) 445

Which of the following wireless communication technologies can be described as follows? It has a limited transmission range of less than two inches. It is used with credit cards and passports. It is slower than other wireless technologies. It constantly emits a signal. A) IEEE 1394 B) Infrared in diffuse mode C) Bluetooth D) Infrared in line-of-sight mode E) NFC

E) NFC

Plug

Easy solution for making small appliances such as lamps, coffee makers, and toasters smart.

Service Location Protocol (SLP) A) 80 B) 443 C) 143 D) 22 E) 445 F) 427 G) 548

F) 427

When using TCP, two hosts first establish a connection through a three-way handshake. From the items on the left, drag the three valid steps in the three-way handshake process to the right in the appropriate order.

First step The first host sends a SYN packet asking to create a new session. Second step The receiving host replies with a SYN-ACK packet acknowledging that the session can be created. Third step The first host replies with the ACK packet, which then opens the session.

Apple Filing Protocol (AFP) A) 80 B) 443 C) 143 D) 22 E) 445 F) 427 G) 548

G) 548

A network that covers an area as small as a few city blocks to as large as an entire city. A) MAN B) WLAN C) WAN D) PAN E) LAN

MAN

A network that is typically owned and managed by a city as a public utility. A) MAN B) WLAN C) WAN D) PAN E) LAN

MAN

Match each authentication protocol on the left with its unique characteristic on the right. (Each protocol may be used more than once). Sends a user's credentials over UDP A) Remote Authentication Dial-In Service (RADIUS) B) Terminal Access Controller Access-Control System C) Kerberos

Remote Authentication Dial-In Service (RADIUS)

Only encrypts the password A) Remote Authentication Dial-In Service (RADIUS) B) Terminal Access Controller Access-Control System C) Kerberos

Remote Authentication Dial-In Service (RADIUS)

Sends a user's credentials over TCP A) Remote Authentication Dial-In Service (RADIUS) B) Terminal Access Controller Access-Control System C) Kerberos

Terminal Access Controller Access-Control System (TACACS+)

Door lock

Uses a wireless protocol and a cryptographic key to execute the authorization process. It can also monitor access and send alerts related to a device's status.

Security camera

Uses an RF transmitter. May include such features as motion detection, scheduled recording, remote viewing, and automatic cloud storage.

Speaker/digital assistant

Uses voice recognition software and activates through a Wake Word or Hot Word.

A group of networks that are geographically isolated, but are connected to form a large internetwork. A) MAN B) WLAN C) WAN D) PAN E) LAN

WAN

Similar to a standard LAN, but uses radio signals instead of wires to connect systems together. A) MAN B) WLAN C) WAN D) PAN E) LAN

WLAN


Ensembles d'études connexes

Casualty Quiz Questions - general part 1

View Set

Economics- chapter 18 & 19 notes

View Set

Chapter 7: The Costs of Credit Alternatives

View Set

World History: Indus Valley River Civilization

View Set