Chapter 6 Quiz

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

Which of the following are characteristics of Bluetooth? (Select two.) 5.75 GHz radio wireless 2.4 GHz radio wireless Line-of-sight transmission Ad hoc connections Red spectrum light waves

2.4 GHz radio wireless Ad hoc connections

Which cellular network type was the first kind of network to use encryption? 2G 4G 1G 5G 3G

2G

Which cellular network type was the first to have gigabit-per-second speeds? 5G 2G 4G 1G 3G

4G

A network administrator wants to change the frequency of their wireless network to allow more channels that do not interfere with each other. Which of the following frequencies or protocols would accomplish this? 5 GHz 802.11b 2.4 GHz 802.11g

5GHz

Which IEEE wireless standards specify transmission speeds up to 54 Mbps? (Select two.) 802.11g 802.11a Bluetooth 802.11b 802.1x

802.11g 802.11a

Gary has finished installing a wireless router for his neighbor's small business. Which wireless standard should Gary use to support up to 150 Mbps on the 5 GHz band? 802.11n 802.11g 802.11a 802.11b

802.11n

Which of the following statements is true regarding a VPN? With a VPN, other sites can use your IP address to determine your physical location. You can hide your browsing history from the VPN company. Sometimes a VPN can increase your browsing speed. A VPN masks a user's IP address in order to make their actions untraceable.

A VPN masks a user's IP address in order to make their actions untraceable.

Which of the following is the best definition for a LAN? An extension of a private network over a shared or public network, such as the Internet. The interconnection of components, such as laptops, printers, keyboards, and other wireless devices within a personal range (typically 10 meters or less). A network whose computers and servers are separated geographically but still connected. A network in a small geographic area, like in an office.

A network in a small geographic area, like in an office.

A technician is tasked to prepare a conference room so that at least 20 guests will be able to wirelessly connect laptop computers to the company network. Which of the following network devices would be the BEST choice for this connectivity? Firewall Switch Router Access Point

Access Point

Which of the following features is supplied by WPA2 on a wireless network? (Select two.) Identification of the network Refusal of client connections based on MAC address Centralized access for clients Authentication Encryption Filtering of traffic based on packet characteristics

Authentication Encryption

Which network type uses a coaxial cable to receive its signal? Fiber-optic Cellular Satellite Cable

Cable

A small business named Widgets, Inc. has hired you to evaluate their wireless network security practices. As you analyze their facility, you note the following using a wireless network locator device. - They use an 802.11n wireless network. - The wireless network is broadcasting an SSID of Linksys. - The wireless network uses WPA2 with AES security. - Directional access points are positioned around the periphery of the building. Which of the following would you MOST likely recommend your client do to increase their wireless network security? (Select two.) Implement omnidirectional access points. Configure the wireless network to use WPA with TKIP security. Change the SSID to something other than the default. Upgrade to an 802.11g wireless network. Disable SSID broadcast.

Change the SSID to something other than the default. Disable SSID broadcast.

Which of the following utilities would you use to automatically assign IP addresses on a network? HTTP DHCP DNS TCP/IP

DCHP

Which of the following is not an example of wireless networking communications? 802.11n Bluetooth DSL Infrared

DSL

Employees complain to the company IT division that they are spending considerable time and effort discarding unwanted junk email. Which of the following should be implemented? Multifactor authentication Email filtering Firewall Antivirus

Email filtering

Which of the following is a wired networking method most commonly used today by desktop PCs and other network devices to connect to a local area network? Bluetooth Token Ring ArcNet 802.11n Ethernet

Ethernet

Which network type uses light pulses to transmit data? Wireless Satellite Fiber optic Cable

Fiber optic

Which of the following Internet technologies provides the FASTEST speeds? Cable DSL Cellular Fiber optic

Fiber optic

Which of the following is the best device to deploy to protect your private network from an untrusted public network? Hub Router Firewall Gateway

Firewall

Which of the following protocols is used by an email client to retrieve messages from an email server and gives users the option to keep mail messages on the server? NTP POP3 SMTP IMAP

IMAP

A technician is checking a customer's wireless network performance and has determined it was using 802.11g. The technician's recommendation is for the customer to upgrade to 802.11ac. Which of the following is the BEST reason to upgrade? Improved performance More overlapping channels 802.11g uses older technology Less attenuation

Improved performance

Which of the following BEST describes the ipconfig utility? It is a utility that gives you a huge amount of control over your system. It is a utility that displays all current TCP/IP network configuration values. It is a utility that shows the exact path a packet takes between two hosts on different networks. It is a utility that verifies connectivity between two nodes on a network.

It is a utility that displays all current TCP/IP network configuration values.

Which of the following BEST describes the ping utility? It displays and modifies the entries in the local IP routing table. It displays all current TCP/IP network configuration values. It sends a single packet to a specified network address and then waits for a reply. It shows the exact path a packet takes between two hosts on different networks.

It sends a single packet to a specified network address and then waits for a reply.

You want to use an application and are not connected to a network. Which of the following application delivery methods should you choose? Network hosting n-tier application Cloud hosting Local installation

Local installation

You are an IT technician for your company. Your boss has asked you to set up and configure a wireless network to service all of the conference rooms. Which of the following features lets you allow or reject client connections based on the hardware address? DCHP MAC address filtering SSID WEP

MAC address filtering

If your network does not have a DHCP server, what must you do to access the internet? Manually change the TCP/IP properties to match your network's settings. Right-click the network adapter and select Update driver. Open PowerShell, enter the ipconfig command, and press the Enter key. Open Command Prompt, enter the tracert command, and press the Enter key.

Manually change the TCP/IP properties to match your network's settings.

Which of the following allows for access to the internet without either a Wi-Fi or a wired connection? 2G Mobile data DSL 1G

Mobile data

Kris recently subscribed to a cable Internet provider. Which of the following devices is needed to convert the signal received on the coax cable to data that can be understood by a computer? Server Switch Router Modem

Modem

You have recently issued new mobile phones to the sales team in your company. Each phone has the ability to store and transmit encrypted information for such things as making payments at a checkout counter. Which of the following is the technology being used in these phones? Bluetooth Transmitters VPN NFC chips Infrared transmitters

NFC chips

Multiple computers configured to be able to communicate and share information with each other form a ____________. Network Group Family Commune

Network

Which of the following Application Architecture Model tiers describes office productivity software? Three Tier n-Tier One Tier Two Tier

One tier

What is the term for software that anyone can use or modify for free? Proprietary software Open-source software Linux software Read-write software

Open-source software

A user read their work email from their home computer and when they returned to work the next day and accessed the email server, all of their email was missing. Which of the following protocols removes mail from a mail server? IMAP POP3 SMTP HTTPS

POP3

The TCP/IP suite has three protocols that deal with sending and receiving email. What are these protocols? (Select three.) WEP WPA POP3 SMTP SSL IMAP DNS HTTP

POP3 SMTP IMAP

What is the term for software that is exclusively controlled by a company and cannot be used or modified without permission? Proprietary Software Microsoft Software Open-source Software Read-only Software

Proprietary software

What protocol is used to send email messages from a mail client to a mail server? SNMP POP3 IMAP FTP SMTP

SMTP

Which of the following is used on a wireless network to identify the network name? WPA2 passphrase WEP key MAC address SSID

SSID

A healthcare organization provides mobile clinics throughout the world and needs to transfer patient statistical data to a central database via the Internet. Which network technology should they select to ensure network connectivity for any clinic located anywhere in the world, even remote areas? Cable modem Dial Up Satellite DSL ISDN

Satellite

Which of the following provides services to hosts on its network? Email Server Storage Client

Server

What is the name of the protocol suite used on the Internet? UDP/IP HTTP/DNS TCP/IP HTTP

TCP/IP

TCP HTTPS DNS HTTP Internet Protocol UDP

TCP: Verifies that each packet has been transmitted and received correctly HTTPS: Encrypts and transfers hypertext pages on the World Wide Web DNS: Matches unique IP addresses with easy-to-read URLs HTTP: Transfers hypertext pages on the World Wide Web Internet Protocol: Divides files into packets and routes them through the Internet to their destination UDP: Transmits packets in a continuous stream but doesn't verify packets

What is the biggest benefit to using a DHCP server in a large network? DHCP servers use DNS. There is no benefit to using a DHCP server. DHCP servers can assign MAC addresses. They save time for the network administrator.

They save time for the network administrator.

Which of the following statements is true regarding a network technician? They troubleshoot reported problems and assist users in resolving network-connection issues. They design intranets, cloud infrastructure, and information security based on the needs of an organization. They manage an organization's email system, configure network printers, and maintain internet connectivity. They are familiar with network protocols, network adapters, data formats, and project management.

They troubleshoot reported problems and assist users in resolving network-connection issues.

Which of the following statements is true regarding a network architect? They perform regular backups of files saved on the network and train users in accessing network resources. They typically require an industry certification in network design and implementation. They work closely with network administrators to ensure uninterrupted access to the company network. They have a broad range of responsibilities, including creating and managing user accounts.

They typically require an industry certification in network design and implementation.

Bob, a network professional, wants to find out where packets are getting stuck on the path to their destination. Which of the following utilities should he use? Tracert Ping Ipconfig Route

Tracert

Which of the following provides security for wireless networks? CSMA/CD 802.3u 802.11a WAP WPA2

WPA2

You need to add security for your wireless network. You would like to use the most secure method. Which method should you implement? WPA2 WEP WPA Kerberos

WPA2

Which application makes sure your computer has the most recent versions of its system software? Windows Defender Windows Update Backup and Restore Disk Cleaner

Windows Update

You work for a large company as the IT administrator. With the many external attacks being perpetrated in the form of security breaches being found in applications, you are concerned that your Windows 10 computers may be vulnerable. You also want to ensure that Windows is using the latest features. Which of the following would BEST protect your computers? Windows updates Scheduled disk maintenance Scheduled backups Antivirus updates

Windows updates

Which of the following components is NOT required to create a network? Network Media Wireless Adapter Computer Systems Network Interfaces

Wireless Adapter

Which of the following refers to digital content that is delivered over the internet? ISP World wide web Network TCP/IP suite

World Wide Web

Your organization has 20 employees who need an accounting software update installed. Due to a miscommunication, the purchaser only paid to update 10 licenses. The software company issued a paper license and a single key for updating 10 users. This is an enterprise paper license and there is no mechanism that enforces a limit to the number of times the key can be used. You decide to update all 20 users. Which of the following are possible consequences of this decision? (Select two.) The software will eventually stop working properly for the 10 extra updates you installed. There are no consequences. By law, you are allowed 1 to 3 activations per user. You risk losing your job. The software company will never detect the violation so negative consequences are unlikely. Your company is exposed to litigation by violating the software license agreement.

You risk losing your job. Your company is exposed to litigation by violating the software license agreement.

You have entered a URL into a browser and have received a 404 error. Which type of error did you receive? Redirection Server error Success Informational Client error

client error

Which of the following utilities can you use to monitor, update, and manage all your hardware devices on a Windows computer? Device Manager Tracert Windows Update Ping

device manager

How many ping packets are sent by default in a successful ping request? Six Four Two One

four

Which installation method is most likely to put your computer at risk of downloading a virus? CD or DVD installation App store installation Software subscription Internet installation

internet installation

You need to troubleshoot a Windows computer that isn't connecting to a network. Which utility should you use? Device Manager Network Properties Network & Internet Windows Update

network & internet

Which of the following IT jobs includes installing and configuring network media? Network administrator Database administrator Network architect Support specialist

network administrator

Which of the following IT jobs specializes in configuring communication hardware such as cabling, routers, and wireless adapters? Network Architect Support Specialist Programmer Database Administrator Security Analyst

network architect

Which of the following IT jobs typically do not require as much education or on-the-job experience? Network technician Network engineer Network architect Network administrator

network technician

One software license model allows software to be freely distributed, downloaded, and installed without paying a license fee but often requires a fee for support, training, or added functionality. What is the name of this model? Personal Proprietary Open-source Persistent Enterprise

open-source

Which of the following tools would you use to check connectivity between two computers? DHCP Tracert TCP/IP Ping

ping

You live in a rural area and don't have a nearby wired network to connect to. What could you use to connect to the Internet? DSL Fiber optic Cable Satellite

satellite

Software that requires a monthly subscription fee is often called _______________. Temporary software Web applications Software as a service Online-only software

software as a service

Which of the following utilities would you use to find the path between two computers? Ping HTTP Tracert DNS

tracert


Ensembles d'études connexes

IBM (Chapter 5 Connect Assignment)

View Set

Superficial extensor muscles of the right forearm posterior view

View Set

Einstein Bros Bagels. Breakfast(1-12), Lunch (14-22)

View Set

Anthropology Chp 22: Politics, Power, War, & Peace

View Set