Chapter 6 Quiz Intro Networking

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

Which type of device provides an Internet connection through the use of a phone jack? cable modem DSL modem satellite modem Wi-Fi AP

DSL modem

A user wants to connect to a wireless network at a shopping center. What wireless network setting tells the user the name of the network? domain name SSID passphrase hostname

SSID

What wireless router configuration would stop outsiders from using your home network? IP address encryption router location network name

encryption

Which type of network technology is used for low-speed communication between peripheral devices? Bluetooth Ethernet 802.11 channels

Bluetooth

Which type of networking technology is used to share an Internet connection wirelessly between two mobile devices? Ethernet Bluetooth cellular satellite

Bluetooth

Refer to the exhibit. Which router port connects to the modem provided by the service provider? A B C D

C

What type of device is commonly connected to the Ethernet ports on a home wireless router? DSL modem cable modem wireless antenna LAN device

LAN device

Which two statements characterize wireless network security? (Choose two.) Wireless networks offer the same security features as wired networks offer. Wireless guest mode provides open access to a protected LAN. With SSID broadcast disabled, an attacker must know the SSID to connect. Using the default IP address on an access point makes hacking easier. An attacker needs physical access to at least one network device to launch an attack.

With SSID broadcast disabled, an attacker must know the SSID to connect., Using the default IP address on an access point makes hacking easier.

What is CSMA/CA on a network? an access method that is used by wireless technology to avoid duplicate SSIDs an access method that is used by any technology that has excessive collisions an access method that is used by wired Ethernet technology to avoid collisions an access method that is used by wireless technology to avoid collisions.

an access method that is used by wireless technology to avoid collisions

What are two types of wired high-speed Internet connections? (Choose two.) cable satellite cellular DSL dial-up

cable, DSL

What can be used to allow visitor mobile devices to connect to a wireless network and restrict access of those devices to only the Internet? MAC address filtering guest SSID encryption authentication

guest SSID

What are three advantages of wireless over wired LAN technology? (Choose three.) lower on-going costs longer transmission distance ease of installation ease of expansion higher level of security

lower on-going costs, ease of installation, ease of expansion

What type of authentication do most access points use by default? open PSK WEP EAP

open

What purpose would a home user have for implementing Wi-Fi?​ to hear various radio stations to connect a keyboard to a PC to connect wireless headphones to a mobile device to create a wireless network usable by other devices

to create a wireless network usable by other devices

Most mobile devices have the ability to connect to a Wi-Fi network.

true

When is a client considered to be "authenticated" when using MAC address filtering to control network access to a wireless network? when the client gives the access point the correct secret key when the client sends the MAC address to the access point when the access point verifies that the MAC address is in the MAC table and sends a confirmation message to the client when the access point sends the MAC address to the server and receives notification that the MAC address is a valid one

when the access point verifies that the MAC address is in the MAC table and sends a confirmation message to the client


Ensembles d'études connexes

Chapter 5: Competitive Rivalry & Competitive Dynamics

View Set

Chapter 6 Quiz: Development of the Person

View Set