Chapter 6 study guide DIT quarter 2

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

Which cellular network type was the first kind of network to use encryption?

2G

Which cellular network type was the first to have gigabit-per-second speeds?

4G

A network administrator wants to change the frequency of their wireless network to allow more channels that do not interfere with each other. Which of the following frequencies or protocols would accomplish this?

5 Ghz

Which IEEE wireless standards specify transmission speeds up to 54 Mbps? (Two answers.)

802.11a, 802.11g

Gary has finished installing a wireless router for his neighbor's small business. Which wireless standard should Gary use to support up to 150 Mbps on the 5 GHz band?

802.11n

Which of the following statements is true regarding a VPN?

A VPN masks a user's IP address in order to make their actions untraceable.

Which of the following is the best definition for a LAN?

A network in a small geographic area, like in an office.

A technician is tasked to prepare a conference room so that at least 20 guests will be able to wirelessly connect laptop computers to the company network. Which of the following network devices would be the BEST choice for this connectivity?

Access point

Which of the following are characteristics of Bluetooth? (Two answers.)

Ad hoc connections, 2.4 GHz radio wireless

Which network type uses a coaxial cable to receive its signal?

Cable

You have entered a URL into a browser and have received a 404 error. Which type of error did you receive?

Client error

Which of the following utilities would you use to automatically assign IP addresses on a network?

DHCP

Which of the following is not an example of wireless networking communications?

DLS

Which of the following utilities can you use to monitor, update, and manage all your hardware devices on a Windows computer?

Device Manager

A small business named Widgets, Inc. has hired you to evaluate their wireless network security practices. As you analyze their facility, you note the following using a wireless network locator device; They use an 802.11n wireless network, The wireless network is broadcasting an SSID of Linksys, The wireless network uses WPA2 with AES security, Directional access points are positioned around the periphery of the building. Which of the following would you MOST likely recommend your client do to increase their wireless network security? (Two answers.)

Disable SSID broadcast, Change the SSID to something other than the default

Employees complain to the company IT division that they are spending considerable time and effort discarding unwanted junk email. Which of the following should be implemented?

Email filtering

Which of the following features is supplied by WPA2 on a wireless network? (Two answers.)

Encryption, Authentication

Which of the following is a wired networking method most commonly used today by desktop PCs and other network devices to connect to a local area network?

Ethernet

Which network type uses light pulses to transmit data?

Fiber optic

Which of the following Internet technologies provides the FASTEST speeds?

Fiber optic

Which of the following is the best device to deploy to protect your private network from an untrusted public network?

Firewall

How many ping packets are sent by default in a successful ping request?

Four

Which of the following protocols is used by an email client to retrieve messages from an email server and gives users the option to keep mail messages on the server?

IMAP

The TCP/IP suite has three protocols that deal with sending and receiving email. What are these protocols? (Three answers.)

IMAP, POP3, SMTP

A technician is checking a customer's wireless network performance and has determined it was using 802.11g. The technician's recommendation is for the customer to upgrade to 802.11ac. Which of the following is the BEST reason to upgrade?

Improved performance

Which installation method is most likely to put your computer at risk of downloading a virus?

Internet installation

Which of the following BEST describes the ipconfig utility?

It is a utility that display all current TCP/IP network configuration values.

Which of the following BEST describes the ping utility?

It sends a single packet to a specified network address and when waits for a reply.

You want to use an application and are not connected to a network. Which of the following application delivery methods should you choose?

Local installation

You are an IT technician for your company. Your boss has asked you to set up and configure a wireless network to service all of the conference rooms. Which of the following features lets you allow or reject client connections based on the hardware address?

MAC address filtering

If your network does not have a DHCP server, what must you do to access the internet?

Manually change the TCP/IP properties to match your network's settings.

Which of the following allows for access to the internet without either a Wi-Fi or a wired connection?

Mobile data

Kris recently subscribed to a cable Internet provider. Which of the following devices is needed to convert the signal received on the coax cable to data that can be understood by a computer?

Modem

You have recently issued new mobile phones to the sales team in your company. Each phone has the ability to store and transmit encrypted information for such things as making payments at a checkout counter. Which of the following is the technology being used in these phones?

NFC chips

Multiple computers configured to be able to communicate and share information with each other form a ____________.

Network

You need to troubleshoot a Windows computer that isn't connecting to a network. Which utility should you use?

Network & Internet

Which of the following IT jobs specializes in configuring communication hardware such as cabling, routers, and wireless adapters?

Network Architect

Which of the following IT jobs includes installing and configuring network media?

Network administrator

Which of the following IT jobs typically do not require as much education or on-the-job experience?

Network technician

Which of the following Application Architecture Model tiers describes office productivity software?

One Tier

One software license model allows software to be freely distributed, downloaded, and installed without paying a license fee but often requires a fee for support, training, or added functionality. What is the name of this model?

Open-source

What is the term for software that anyone can use or modify for free?

Open-source software

A user read their work email from their home computer and when they returned to work the next day and accessed the email server, all of their email was missing. Which of the following protocols removes mail from a mail server?

POP3

Which of the following tools would you use to check connectivity between two computers?

Ping

What is the term for software that is exclusively controlled by a company and cannot be used or modified without permission?

Proprietary Software

What protocol is used to send email messages from a mail client to a mail server?

SMTP

Which of the following is used on a wireless network to identify the network name?

SSID

A healthcare organization provides mobile clinics throughout the world and needs to transfer patient statistical data to a central database via the Internet. Which network technology should they select to ensure network connectivity for any clinic located anywhere in the world, even remote areas?

Satellite

You live in a rural area and don't have a nearby wired network to connect to. What could you use to connect to the Internet?

Satellite

Which of the following provides services to hosts on its network?

Server

Software that requires a monthly subscription fee is often called _______________.

Software as a service

Find the term for each definition; Verifies that each packet has been transmitted and received correctly, Encrypts and transfers hypertext pages on the World Wide Web, Matches unique IP addresses with easy-to-read URLs, Transfers hypertext pages on the World Wide Web, Divides files into packets and routes them through the Internet to their destination, Transmits packets in a continuous stream but doesn't verify packets.

TCP, HTTPS, DNS, Internet Protocol, UDP

What is the name of the protocol suite used on the Internet?

TCP/IP

What is the biggest benefit to using a DHCP server in a large network?

They save time for the network administrator

Which of the following statements is true regarding a network technician?

They troubleshoot reported problems and assist users in resolving network-connection issues.

Which of the following statements is true regarding a network architect?

They typically require n industry certification in network design and implementation.

Bob, a network professional, wants to find out where packets are getting stuck on the path to their destination. Which of the following utilities should he use?

Tracert

Which of the following utilities would you use to find the path between two computers?

Tracert

Which of the following provides security for wireless networks?

WAP2

You need to add security for your wireless network. You would like to use the most secure method. Which method should you implement?

WPA2

Which application makes sure your computer has the most recent versions of its system software?

Windows Update

You work for a large company as the IT administrator. With the many external attacks being perpetrated in the form of security breaches being found in applications, you are concerned that your Windows 10 computers may be vulnerable. You also want to ensure that Windows is using the latest features.Which of the following would BEST protect your computers?

Windows updates

Which of the following components is NOT required to create a network?

Wireless adapter

Which of the following refers to digital content that is delivered over the internet?

World Wide Web

Your organization has 20 employees who need an accounting software update installed. Due to a miscommunication, the purchaser only paid to update 10 licenses. The software company issued a paper license and a single key for updating 10 users. This is an enterprise paper license and there is no mechanism that enforces a limit to the number of times the key can be used. You decide to update all 20 users. Which of the following are possible consequences of this decision? (Two answers.)

Your company is exposed to litigation by violation the software license agreement, You risk losing your job


Ensembles d'études connexes

GEOG 1401 - Weather & Climate SHSU - Exams 3 & 4

View Set

Sociology Introduction (CH. 1-2)

View Set

Chapter 24 Nation Building and Economic Transformation in the Americas, 1800-1900

View Set

A+ Core 1 Practice Exam #4 (220-1101)

View Set

Portable Fire Extinguisher Safety.

View Set