CompTIA A+ 220-1001 Exam (Section 2.1 to 2.8)

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

What are the only three channels in the 2.4 GHz WiFi spectrum that do NOT overlap with each other? A) 1, 5, and 10 B) 1, 6, and 11 C) 3, 7, and 11 D) 6, 10, and 14 Correct Answer) These may be the busiest channels because of their popularity. Everything else) Overlapping makes wireless network throughput quite poor one these. 1) Two of these overlap. 2) Two of these overlap. 3) Two of these overlap.

B) 1, 6, and 11 Everything else (in-order)) 1) 5 and 10. 2) 3 and 7. 3) 10 and 14.

A technician needs to attach an RJ-45 connector to a Cat 5e Ethernet cable, what tool would the technician use? A) BNC coupler B) Crimper C) Punch-down tool D) Reflectometer Correct Answer) This is used to attach an RJ-45 connector. However, this and another answer here are used w/Ethernet cables. Partial Credit) Is used to connect an Ethernet cable to patch panel. Everything else) 1) Is used ONLY ON COAXIAL cables. 2) Uses time-domain reflectometry to characterize and locate faults in metallic cables ONLY.

B) Crimper Partial Credit) C Everything else) A, D.

The Engineering department has been relocated to new offices. You are responsible for moving RJ-45 wall jacks to new locations in these offices. Which tool can you use to verify these RJ-45 port connections after each has been moved? A) Cable crimper B) Loopback plug C) Multimeter D) Punch-down tool Correct Answer) In networking, these are great tools for quickly checking if data is being properly transmitted. - They are inexpensive tools used to create a loop in wiring. Everything else) 1) Can be used to measure voltage, current and resistance. - Resistance readings can be used to determine whether a network cable is functioning correctly not for data transmissions. 2) Fixes a jack to a cable. - Each one is specific to the type of connector, though some may have modular dies to support a range of RJ-type jacks. 3) Is a hand tool used to connect telecommunications and network wires to a patch panel. - The specifically-named part comes from punching a wire into place using an impact action.

B) Loopback plug Everything else (in order)) C, A, D.

Within your large corporate environment, there are hundreds of users and you need to restrict data access based on different groupings easily distributing data over the network. Which device would you use? A) Bridge B) Managed switch C) Repeater D) Unmanaged switch Correct Answer) Joins multiple computers together within one Local Area Network (LAN). - They can isolate the data traffic based on different groups such as users, guests, backups, management and servers. - This not only offers managers a better way to control (i.e.: restrict) the data traffic (based on groups), but also provides strong protection for the whole network. Everything else) 1) Is a legacy device that only passes signals from one segment to another by matching MAC addresses, reducing traffic loads in any one segmented collision domain. 2) Can join multiple computers but are more suited to smaller networks requiring no need for intervention or configuration. - These also do not have features to restrict traffic. 3) Is a device used to overcome the distance limitations imposed by network cabling only.

B) Managed switch Everything else) A, D, C.

Which one of these refers to a wireless connection to connect devices with a few meters? A) LAN B) PAN C) VLAN D) WiFi Correct Answer) Is a computer network that enables communication between computer devices near a person. - This can be wired, such as USB (Universal Serial Bus) or FireWire. - They can also be wireless, such as infrared, ZigBee, Bluetooth and UltraWideBand (UWB). Everything else) 1) Are a multi-user solution to allow you to separate users into individual network segments for security and other reasons. 2) Is a wireless networking technology using radio waves (and only THAT.) to provide wireless Internet and network connections. 3) Is centered around connecting multiple users via wires or wirelessly.

B) PAN Everything else (in order)) C, D, A.

The 2.4 gigahertz (GHz) band is subdivided into up to 14 channels with only 3 that are non-overlapping. There are 23 non-overlapping channels in the 5 GHz band. Which of these channels are permitted for use in the Americas? A) All 14 Channels B) All 23 Channels C) Channels 1-11 D) Channels 1-13 Correct Answer) Wireless networks operate in either 2.4 gigahertz (GHz) or 5 GHz frequency band which are divided up into a number of smaller bands, called channels. - Channel 1 uses the lowest frequency band and each subsequent channel uses a slightly higher frequency. Everything else) 1) Use of all of these is permitted in Europe only, unlike our correct answer. 2) 5 GHz uses this exact number; 2.4 GHz has only 3 of these. - Less than 12 of these can only be used in the US, by the way.

C) Channels 1-11 Otherwise....) 1) A, D (14 total, 1-13) 2) B (23 total)

What broadband Internet access is delivered through your phone land line using either phone lines or fiber-optic cables for transmission? A) Cable B) Cellular C) DSL (Digital Subscriber Line) D) Satellite Correct Answer) Is delivered at higher frequency through phone land lines. - A pseudo-modem makes the connection to the phone system and the phone company becomes the Internet Service Provider (ISP). Everything else) 1) Especially in rural areas, this may be the only option. This requires that a type of dish is installed and does not make use of any phone lines. 2) Rather than using our correct answer over a phone line, you may instead go through a certain local company to get Internet service via the material that brings in TV programming. 3) Provide access to the Internet over 3G or 4G networks wirelessly. - However, our correct answer allows for Internet access over phone or fiber-optic cables.

C) DSL Otherwise (in order)) D, A, B.

Which protocol provides strong authentication methods and secure communications over insecure channels to allow users to execute commands and manage files? A) File Transfer Protocol (FTP) B) HyperText Transfer Protocol (HTTP) C) Secure Shell (SSH) D) Telnet Correct Answer) Uses TCP port 22, provides strong authentication methods and is a much more secure version of administration and file copy programs. - It also allows a variety of methods for the client to authenticate to the service including username/password, Kerberos, host-based authentication, and public key authentication. Everything else) 1) Is unencrypted posing a high security risk; Passwords for sites are submitted in plain text. - Used over TCP Port 20/21. 2) Provides for no authentication of client or server. All data is sent unencrypted. - Used over TCP Port 80. 3) Is unlikely to be used on modern networks. The security risks are too high as all messages are sent in clear text. - Used over TCP Port 23.

C) Secure Shell (SSH) Everything else) A, B, D.

When TCP/IP (Transmission Control Protocol/Internet Protocol) communications need to be routed to systems on other networks, the protocol directs the packets to a special address known as what? A) A default gateway B) A host address (host ID portion of an IP address) C) A static IP address D) A subnet mask (netmask) Correct Answer) THIS is a device or a piece of software that converts data between incompatible systems or devices. - This is different from the typical fare in that the address is typically that of a network router that connects the local network to other external networks. - Without this, a computer would be able to communicate only with devices on the same local network. Everything else) 1) Is the portion of the address used to identify hosts. 2) Is any manually configured IP address. - Note that devices such as the router/modem must be configured with this, because it acts as a DHCP server and client devices need to use it as the default gateway. 3) Is used to distinguish the network and host number components within a single IP address. - It is used to hide the host ID portion of the IP address and thereby reveal the network ID portion.

A) A default gateway Everything else....) 1) B 2) C 3) D

The Finance department in your company has its administrative staff on the second floor connected to a new switch and its professional staff on the third floor connected to a different new switch. These two groups need to work as a team on the same logical and physical network on the server/router side. What would be the best solution? A) Add Virtual Local Area Networks (VLANs) to each of these switches. B) Break the network up into two subnets: one for administration and one for marketing. C) Run new cabling from the switch on the second floor to staff on the third floor. D) Setup Network Address Translation (NAT) on the gateway. Correct Answer) Will allow you to create different logical and physical networks; whereas IP address subnetting will simply allow you to create logical networks through the same physical network. Everything else) 1) Is costlier and time consuming. 2) Assigning public IP addresses to conceal these devices internal private IP addresses from external networks would not help in this situation. 3) Is done on the client side not the server/router side, as it is determined by the IP you use, and the IP can be chosen by the admin of a computer (or device).

A) Add Virtual Local Area Networks (VLANs) to each of these switches. Otherwise.....) C, D, B (in order)

What broadband Internet connection combines a fiber optic core network with coax links to premise equipment? A) Cable (broadband) B) DSL (Digital Subscriber Line) C) FTTP (Fiber to the Premises) D) Satellite Correct Answer) Delivers Internet service via the specific local company that brings in TV programming. - The modem is interfaced to the local network or computer through an Ethernet adapter and with the specific network by a short segment of coax. Everything else) 1) The most expensive solution, is the telecommunications companies' solution to update the last mile of service to the telephone network using replacing copper cable with fiber. - It does not involve the use of coax links. 2) Is delivered at higher frequency through phone land lines. - Our correct answer is delivered using fiber optic material and coax links. 3) Connections to the Internet are delivered using what's called dishes, as there are no specific materials to the premise equipment to use here.

A) Cable (broadband) Otherwise (in order)) C, B, D.

New offices have been built for additional staffing. You need to install cables in each of these offices. After running the cables, what tool will you need to use to prepare the cables before installing the connectors? A) Cable stripper B) Crimper C) Loopback plug D) Punch-down tool Correct Answer) You use this to remove the outer shell of the cables to get access to the wire in the cables, so the connectors can be attached. Everything else) 1) Is a device used ONLY to test ports (such as serial, parallel USB and network ports) to identify network and network interface card (NIC) issues. 2) Is a hand tool used ONLY to connect telecommunications and network wires to a patch panel. 3) Fixes connectors to cables after the cable stripper has been used to remove the outer shell of the cables.

A) Cable stripper Otherwise) C, D, B.

You have been tasked with making Ethernet cables of custom length for a server room refresh. Your coworker sends you to get a tool from the cabinet to utilize while making the new cables. Choose the most necessary tool(s) below: A) Cable stripper and Crimper B) Cable Tester C) Punch-down Tool D) Tone Generator (w/out Probe) Correct Answer) These are the most necessary tools to successfully make a new cable (or many of custom lengths.). - These tools allow for you to correctly expose the wiring of the twisted pair cable and crimp on an 8P8C termination Everything else) 1) With THIS, you can trace and follow a cable end to end. However, one device is useless without the other and neither would be useful for this task. 2) This indispensable network diagnostics tool can otherwise ONLY be used to diagnose wiring problems from broken/cut cables, loose wires to crossed pairs. 3) If you need to connect one end of the cable into a patch panel, then this is what you use, instead.

A) Cable stripper and Crimper Otherwise.....) D, B, C.

You receive a trouble ticket from a user that the network seems to be running slow. You have verified the device side and found no problems and the Ethernet cable is properly connected. What tool would you use next to test the connection? A) Cable tester B) Multimeter C) ping D) Tone generator/probe Correct Answer) Will help you identify the cable condition, any crosstalk, loss of attenuation, noise, resistance, and any other characteristics that may be adversely affecting the cable connection. Everything else) 1) Is a computer network administration software utility used to test connectivity. - It will not help identify issues with the connection only that the computer can be accessed reached over the network. 2) Would ONLY help you identify which cable IS BEING USED. 3) Can be used to measure voltage, current and resistance. - Resistance readings can be used to determine whether a network cable is functioning correctly not for data transmission issues.

A) Cable tester Everything else.....) C, D, B.

What is the defining characteristic of a Virtual Private Network (VPN)? A) Encrypted communications B) Password authentication C) Single sign-on authentication D) Unlimited network access Correct Answer) The purpose of a Virtual Private Network (VPN) is THIS. Everything else) 1) Is weak and highly susceptible to hacking, cracking, keyloggers, and other attacks, despite being apart of a VPN. 2) Is apart of the VPN in the form of a centralized session and user authentication service in which one set of login credentials can be used to access multiple applications. 3) The VPN is a secure message stream that has nothing to do with user rights on the network, hence this not being an advantage anywhere.

A) Encrypted communications Otherwise (in order)) B, C, D.

What Internet connection's most common speeds are 3G and 4G? A) Cellular B) DSL (Digital Subscriber Line) C) Line of Sight D) Satellite Correct Answer) Provides wireless Internet access through cell phones. - Its digital communications are referred to as 2nd, 3rd and 4th generations of wireless technology. - 4G delivers up to 100 Megabits per second (Mbps) for mobile access, and up to 1 Gigabits per second (Gbps) for wireless access. Everything else) 1) Its speeds are stated in Megabits per second (Mbps) with typical speeds between 12 to 100 Mbps. 2) Offers a choice of speeds ranging from 128 kilobits per second (Kbps) to 3 Megabits per second (Mbps), much slower than what's correct. 3) Utilizes microwave dishes. - It is a reliable and high-bandwidth solution to establish connectivity between endpoints but does not provide Internet connectivity like our correct answer.

A) Cellular Everything else (in order)) D, B, C.

It is often useful for hosts such as servers, routers, and printers to use the same Internet Protocol (IP) address. To ensure these hosts keep the same IP address, what configuration setting needs to be made on the Dynamic Host Configuration Protocol (DHCP) server? A) Configure Dynamic Host Control Protocol (DHCP) reservations. B) Dynamically assign IP addresses. C) Use Automatic Private IP Addressing (APIPA). D) Use Static IP addressing. Correct Answer) This maps a media access control (MAC) address to an Internet Protocol (IP) address, so that anytime a machine with a reserved MAC address requests a lease from this exact server, it will always obtain the same IP address. Everything else) 1) Is much more difficult to implement, compared to our correct answer. 2) Doing this may result in other networked devices losing contact to these host appliances when a lease expires and a new IP address is assigned. 3) A host using this can communicate with other hosts on the same network that are using this, but cannot reach other networks or communicate with hosts that have managed to obtain a valid DHCP lease

A) Configure Dynamic Host Control Protocol (DHCP) reservations. Everything else.....) 1) D 2) B 3) C

You need to configure a SOHO (Small Office Home Office) network to provide IP Addresses to devices on the network. Which feature should you enable? A) DHCP B) DNS C) MAC Filtering D) SSID Correct Answer) Assigns Internet Protocol (IP) addresses to network devices via a server of the same name. - IP addresses can either be setup to be leased, IP address changes, or reserved, maintains the same IP address. Everything else) 1) Refers to a security access control method whereby the hardware address assigned to each network card is used to determine access to the network only. 2) Translates between Domain names and IP addresses assigned to machines by our correct answer so browsers can load Internet resources. 3) Is a simple name for users to identify a Wireless Local Area Network (WLAN). - It must be manually changed and should be set to something recognizable.

A) DHCP Otherwise (in order)) C, B, D.

A network made up of computers and peripherals in a distinct geographic area sharing wired or wireless communications is referred to as: A) LAN B) MAN C) PAN D) WAN Correct Answer) Is a self-contained network spanning a small area, such as a building, floor, or room. It is centered around connecting multiple users via wires or wirelessly. Everything else) 1) Is a series of smaller networks that are linked together to form a single, large network typically used by city governments and universities. 2) Is centered around communications to computer devices near one user (ex.: Bluetooth.). 3) creates multi-location versions of what's correct that could span the globe. It allows a business to effectively carry out its daily function regardless of location.

A) LAN Otherwise (in order)) B, C, D.

A portable access point that facilitates connections to a High-Speed Packet Access (HSPA+) or 4G network for multiple devices is referred to as: A) Bluetooth B) A Mobile Hotspot C) Tethering D) USB Correct Answer) Taps directly into 3G and/or 4G cellular networks, just like a smartphone does. - Once it's established a cellular data connection, this can share that connection via WiFi with nearby devices. Everything else) 1) Can be used to wirelessly connect to a mobile device. - Once (2) takes place, it can share the mobile's Internet connection. 2) Is the sharing of a mobile device's Internet connection with a connected tablet, laptop, or PC. - The mobile device can be connected via (1) or (3). 3) Can be used to connect to a mobile device for that it can have (2) applied to share the mobile's device Internet connection.

B) A Mobile Hotspot Everything else.....) A, C, D.

Which of the following describes an Internet connection type referred to as Line of Sight? A) A connection using a cellular (smart phone) subscription B) A modem using a wireless connection to a wireless tower C) A modem with maximum speed of 56 Kbps D) A wireless connection to a satellite Correct Answer) Line of Sight is an Internet service where the signal varies based on interference from outside sources. Everything else) 1) 4G LTE is the most common type of network using this. - Speeds here are often comparable to Cable Internet speeds. 2) Is an internet service that uses a modem with a phone line (RJ-11) cable. - Is also cursed with low speed. 3) Is used when other avenues of high-speed Internet are not available. - A clear Line of Sight to this is required.

B) A modem using a wireless connection to a wireless tower Otherwise (in order)) A, C, D.

You have been assigned to configure a new enterprise wireless router for your employer's network. Which of the following settings should be changed first? A) Configuring the Encryption B) Default Password C) Default Service Set Identifier (SSID) D) Media Access Control (MAC) address filters Correct Answer) Networking equipment typically ships with this OR not at all. - Changing this should be step one, before any other configurations. Everything else) 1) Are set by vendors but should also be changed so that they are recognizable by your users. 2) Is a security technique that allows devices with these very specifics to attach to the wireless network. - This must be configured in the wireless router once these devices are identified. 3) This scrambles the network connection so that no one can "listen in" to it and look at which web pages a user is viewing.

B) Default Password Otherwise (in order)) C, D, A.

Devices on a network are automatically assigned IP addresses for a designated time after which the IP address is either renewed or a new one is assigned. What is this called? A) DHCP reservation B) Dynamic addressing C) Static addressing D) Subnetting Correct Answer) The IP address is assigned through a Dynamic Host Configuration Protocol (DHCP) service on either a DHCP server (more common in larger networks) or an access point (as in the case of a SOHO network). Everything else) 1) The IP address is physically assigned to a device. Any device which will be accessed by multiple devices in a network should have this. 2) Is a process by which the node portions of an IP address create more networks than you would have if you used the default subnet mask. 3) One way in which an IP address can be permanently assigned to a device involves something you do in a hotel, via this type of server.

B) Dynamic addressing Otherwise....) C, D, A

How are Internet Protocol version 4 (IPv4) addresses different from IPv6 addresses? REMEMBER) An IP address is expressed in four octets of eight binary numbers each, with the binary number translated into decimals. A) A single group of one or more consecutive blocks of four 0s in an IPv4 address can be written as a double colon. B) IPv4 are 32-bit addresses displayed as four numbers from 0 to 255. C) IPv4 are 128-bit addresses displayed as eight groups of four hexadecimal numbers. D) Leading zeros in a block of an IPv4 address can be removed. [T / F] IPv6 are 128-bit addresses displayed as eight groups of four hexadecimal numbers.

B) IPv4 are 32-bit addresses displayed as four numbers from 0 to 255. [T / F] TRUE.

Which of the following security appliances analyzes packets entering a network and alerts administrators, but takes no corrective action? A) Authentication server B) Intrusion Detection System (IDS) C) Intrusion Prevention System (IPS) D) Proxy server Correct Answer) Is a device, software application or both that monitors network or system activities for malicious activities or policy violations and produces reports to a management station. - It is a reactive measure that identifies and mitigates ongoing attacks. Everything else) 1) Is an inline security device that monitors suspicious network and/or system traffic and reacts in real time to block it. - It is a proactive security measure. 2) Is set up to check the validity of a user name, password, and any other tokens prior to allowing access to network resources. - It contains an application that has an access list and identifies the permitted access credentials. 3) Is a system that isolates internal clients from the servers by downloading and storing files on behalf of the clients. - In addition to providing security, its data cache can also improve client response time and reduce network traffic by providing frequently used resources to clients from a local source.

B) Intrusion Detection System (IDS) Everything else.....) 1) C 2) A 3) D

A type of network formed by connecting multiple Local Areas Networks (LANs) spanning an entire city or campus is commonly referred to as: A) LAN B) MAN C) VLAN D) WLAN Correct Answer) Is a series of smaller wired networks that are linked together to form a single, large network typically used by city governments and universities. - These are like WANs but are geographically smaller. Everything else) 1) Is a wireless computer network that links two or more devices using wireless communication to form (2) within a limited area such as a home, school, computer lab, office building etc. 2) Is a self-contained wired network spanning a small area, such as a building, floor, or room. 3) Allows you to separate our correct answer into individual network segments for security or other reasons. - These are configured through software instead of physically relocating devices.

B) MAN Everything else (in order)) D, A, C.

Which of the following processes assigns a public Internet Protocol (IP) address to a computer inside a private network? NOTE) These servers are assigned public IP addresses on the firewall, allowing the public to access the servers only through that IP address. A) Dynamic addressing B) Network Address Translation (NAT) C) Subnetting D) Virtual Local Area Network (VLAN) Correct Answer) Is the process where a network device, usually a firewall, assigns a public address to a computer (or group of computers) inside a private network. - In large networks, some servers may act as Web servers and require access from the Internet. Everything else) 1) Is the practice of dividing a network into two or more networks. 2) Allows you to separate users into individual network segments for security and other reasons. 3) Is temporarily assigning an IP address to a computing device or node when it's connected to a network.

B) Network Address Translation (NAT) Otherwise (in order)) C, D, A.

You need to allow network prioritization based on packet contents. What settings would you need to change on your network? A) Firewall B) QoS C) SSID D) VLAN Correct Answer) Is a feature that allows you to prioritize certain types of network traffic. - This can resolve issues where users are experiencing lag in time-sensitive applications such as video conferencing and streaming. Everything else) 1) Is a solution to allow you to separate users into individual network segments for security and other reasons. 2) Is the name used to identify a wireless access point (WAP) on a network. 3) Is something built to block unauthorized access while permitting authorized communications using packet filtering. - Can be implemented in both hardware or software, or a combination of both.

B) QoS Otherwise (in order)) D, C, A.

When you want to connect a group of isolated computers in an organization, which of the following is the best choice? A) Network Address Translation (NAT) B) Virtual Local Area Network (VLAN) C) Wide Area Network (WAN) D) Wireless Local Area Network (WLAN) Correct Answer) Is a group of hosts with a common set of requirements that communicate as though they were connected together as normal on one switch, regardless of their physical location. - Is implemented to segment a network, reduce collisions, organize the network, boost performance, and increase security. Everything else) 1) Computers here are centered around a wireless access point. - This would not help connect isolated computers in an organization. 2) Is a network consisting of multiple LANs in separate locations covering a large territory. 3) Allows devices connected to the wireless router to share one public IP address. - It doesn't isolate groups of devices.

B) Virtual Local Area Network (VLAN) Otherwise (in order)) D, C, A.

A Windows machine has an Internet Protocol (IP) address in the range of 169.254.x.y. What does this mean? A) An alternative IP address was configured for the Windows machine. B) The Windows machine is using an Automatic Private IP Addressing (APIPA) address. C) The Windows machine obtained its IP address automatically. D) There is not enough information to answer the question. Correct Answer) Assigns a class B Internet Protocol (IP) address from 169.254.0.0 to 169.254.255.255 to the client when a Dynamic Host Configuration Protocol (DHCP) server is either permanently or temporarily unavailable. [T / F 1] Is useful when you have a device connecting to a DHCP corporate network that requires a static IP address on the user's home network. - It would not use our correct answer. [T / F 2] Dynamic Host Configuration Protocol (DHCP) assigns IPs to network devices. - It does not do this automatically, like our correct answer. [T / F 3] The range of the Internet Protocol (IP) address tells you that it is from the reserved range assigned by Automatic Private IP Addressing (APIPA) as result of the DHCP server not being present.

B) The Windows machine is using an Automatic Private IP Addressing (APIPA) address. [T / F 1] TRUE. [T / F 2] TRUE. [T / F 3] TRUE.

What solution was developed to update the last mile of the telephone network wiring to provide high bandwidth to small business premise equipment? A) FTTC (Fiber to the Cabinet) B) FTTH (Fiber to the Home) C) FTTP (Fiber to the Premises) D) ISDN (Integrated Services Digital Network) Correct Answer) Is a fiber optic cable delivery medium that provides last mile telecommunications Internet access directly to a business from an Internet service provider. Everything else) 1) Is a digital circuit-switched technology that uses existing copper telephone wiring versus fiber links our correct answer uses. 2) Is a fiber optic cable that is terminated on a customer's more comfortable premise equipment. - It is the domestic variant of our correct answer. 3 From its descriptive location, uses normal copper cable that the telephone/broadband is currently supplied on. - Its link is not terminated the way the correct answer is.

C) FTTP (Fiber to the Premises) Everything else (in order)) D, B, A.

Which of the following resolves host names to Internet Protocol (IP) addresses? A) APIPA B) DHCP C) DNS D) IPv4 Correct Answer) Translates between Domain names and Internet Protocol (IP) addresses assigned to machines so browsers can load Internet resources. Everything else) 1) Assigns Internet Protocol (IP) addresses to network devices via a server of the same name. 2) is Microsoft's term for assigning IP addresses from 169.254.0.0 to 169.254.255.255 to Windows' machines when (1) is unavailable. 3) Is the original and still current standard for IP addressing. - Addresses here are 32-bit addresses, meaning a combination of 32 binary 1s and 0s.

C) DNS Otherwise (in order)) B, A, D.

Which is a simple conversation between two computers that provides the slowest connection speed? A) Cable B) Cellular C) Dial-up D) DSL Correct Answer) Uses modems to convert digital signals to an analog carrier signal and transmit it over the telephone cable at a typical speed between 40 to 50 kilobits per second (Kbps). - The "conversation" is pushed to the whole frequency range, but not very efficiently. Everything else) 1) Is an internet connection delivered through your local cable company at a range of between 20 megabytes per second (Mbps) and 100 Mbps. - This is a type of broadband service, and its speeds are 1000 times faster than our correct answer. 2) Provided access to the Internet over wireless 3G, at a minimum of 144 kilobits per second (Kbps), or 4G, 10 times faster than 3G, networks; both are much faster than our correct answer! 3) Similar to our correct answer, is delivered over phone land lines, but at higher frequency and at an average speed between 768 kilobits per second (Kbps) and 1.5 megabytes per second (Mbps).

C) Dial-up Everything else (in order)) A, B, D.

Your business has purchased the building across the street and needs an office set up there. You have found out that all physical methods of connectivity are cost prohibitive since the street will have to be excavated. Which would you suggest as being the most effective and reliable connection that is more cost-effective? A) BPL (Broadband over Power Line) B) Cellular C) Line of Sight D) Satellite Correct Answer) Is wireless that utilizes microwave dishes. - Is a reliable and high-bandwidth solution to establish connectivity between nearby facilities. Everything else) 1) Is a form of wireless broadband service; however, it is a better option for remote areas. - It can be disrupted in extreme weather conditions making it less reliable and has a higher latency than our correct answer. 2) Provides wireless Internet access through smart phones and does not need a clear line of sight (and is NOT recommended here!). 3) Delivers broadband over the existing electric power distribution network. - However, there is interference caused by leakage of radio frequency signals and other electrical equipment injects noise into the electrical wires.

C) Line of Sight Otherwise (in order)) D, B, A.

You have been given a support ticket to test a cable that does not seem to be working correctly. Using one of your hardware tools to troubleshoot connectivity issues, you get a reading of infinity. What tool did you use and what does the reading tell you about the cable? A) BNC coupler, cables are connected B) Loopback plug, port is valid C) Multimeter, the cable has a break D) Tone generator/probe, cable has been located Correct Answer) Is used to measure voltage, current and resistance. - The resistance reading between the two ends of the Ethernet cable means the cable has a break. Everything else) 1) Would help you identify which cable is being used but not if there are any issues on the cable; a soft beeping tone indicates that you are close to the correct cable; when the beeping is loudest, you have found the cable. 2) Is a device used to test ports (such as serial, parallel USB and network ports) to identify network and network interface card (NIC) issues, not to test the cable itself. 3) Is used only on coaxial cable installations connecting two cables terminated with cable ends of the same name.

C) Multimeter, the cable has a break Otherwise) D, B, A.

IP (Internet Protocol) provides packet addressing and routing at the network layer. It does this through IP addressing which provides two pieces of information encoded within the same value, these are: A) APIPA and link local B) IPv4 and IPv6 C) Network number and host number D) Static address and lease address Correct Answer) 1) Internet Protocol (IP) addressing is the use of one of these to identify a piece of hardware connected to a network. - These numerical addresses include a network common to all hosts on the same IP network and one of these other things for uniquely identifying a host on a IP network. Everything else) 1) IP addressing is either this, where each device has a permanent unique IP address, or this, where IP addresses are delivered to the device by the DHCP protocol. - In one of these, IP addresses are unique for the length of the lease. 2) Are terms referring to the assignment of the IP addresses made up of these, being that of our correct answer. 3) One uses 32-bit numbers; the other uses 128-bit numbers.

C) Network number and host number Everything else (in order)) 1) D (Static address and lease address) 2) A (APIPA and link local) 3) B (IPv4 and IPv6)

What type of device most commonly uses a static Internet Protocol (IP) address? A) Computers B) Laptops C) Server D) Thin clients Correct Answer) Should always be given a static Internet Protocol (IP) address to ensure they can be quickly resolved and any applications using the IP address do not need to be reconfigured. Everything else) 1) In a large network, having to visit each of these and manually enter a static address can be very time consuming and prone to errors. 2) Can move to different subnets requiring an administrator to have to manually reconfigure static IP addresses every time it moves. 3) Are most commonly known to use a leased dynamically allocated IP address. - The IP address is unique up until the lease expires.

C) Server Otherwise (in order)) A, D, B

You can use a cell or smartphone's data plan to allow a laptop or PC to access the Internet. What is this called? A) Bluetooth B) Mobile hotspot C) Tethering D) USB (Universal Serial Bus) Correct Answer) Is the sharing of a mobile device's Internet connection with a connected tablet, laptop, or PC. - The mobile device can be connected via (2) or (3). Everything else) 1) Taps directly into 3G and/or 4G cellular networks, just like a smartphone does. - Once it's established a cellular data connection, this can be used to share that connection via WiFi with nearby devices. 2) Can be used to physically connect to a mobile device so that it can be handled by our correct answer for sharing the mobile's device Internet connection. 3) Can be used to wirelessly connect to a mobile device. Once handled by our correct answer, it can share the mobile's Internet connection.

C) Tethering Otherwise (in order)) B, D, A.

A university relays data to staff and students across its nation-wide network, consisting of smaller networks linked through a Virtual Private Network (VPN) and the Internet. Which term would best apply to this network? A) LAN B) MAN C) WAN D) WLAN Correct Answer) Is a series of smaller networks that are linked together to form a single, large network. - It allows a business to effectively carry out its daily function regardless of location. - Spans multiple geographic locations. Everything else) 1) Spans a small area, such as a building, floor, or room, like (2), but it does this wirelessly. 2) Is a self-contained network spanning a small area, such as a building, floor, or room. 3) Are very similar to our correct answer, but are geographically smaller and typically used by city governments and universities.

C) WAN Otherwise.....) D, A, B (in order)

While working for an IT Consulting firm, you have been tasked with setting up several SOHO (Small Office Home Office) wireless networks. Which of the following will ensure the security of confidential data? A) Configuring the lowest broadcast power possible B) Disabling SSID Broadcast C) Enabling Media Access Control (MAC) / Hardware Address filtering D) Enabling wireless encryption Correct Answer) WiFi Protected Access (WPA) and WiFi Protected Access II (WPA2) are two securities developed to secure wireless computer networks. - These utilize this to fully ensure data security. Everything else) 1) May improve performance or reduce interference issues, but it will not secure the network. 2) Does not offer much protection against attackers but will at least not advertise its presence to nearby devices. 3) Is supposed to improve security by limiting the devices that can join the network. - In practice, this protection is tedious to set up and easy to breach.

D) Enabling wireless encryption Otherwise (in order)) A, B, C.

Which of the following is an Internet appliance that discovers, manages, and controls devices that request access to the corporate network? A) Authentication server B) DHCP server C) DNS server D) Endpoint management server Correct Answer) When a device attempts to log onto the network, this validates user credentials and scans the device to make sure that it complies with defined corporate security policies before allowing access to the network. Everything else) 1) Allows for the setup of Internet Protocol (IP) address pools for the purpose of using this protocol to distribute IP addresses to clients joining the network. - It does not validate user credentials or compliance. 2) Is a server that maps hostnames to Internet Protocol (IP) addresses. - This uses Host entries (known as A files) to store matching hostnames and IP addresses. 3) Is a server that validates a user's and device's claim to a network but not its compliance with corporate security policies.

D) Endpoint management server Everything else.....) 1) B 2) C 3) A

What is a fully digital telephone service, providing data, voice, and video channels over existing phone lines which requires that a phone number be dialed to access the Internet? A) Cellular B) Dial-up C) DSL (Digital Subscriber Line) D) ISDN (Integrated Services Digital Network) Correct Answer) Is a telecommunications technology that enables the delivery of digital data over standard phone lines. - It is a dial-up service that is faster than 56K modem but slower than one of our other answers. Everything else) 1) Is a telecommunications technology that enables the delivery of digital data over standard phone lines. - It is a service, that once installed Internet access, is "always on". 2) Provides wireless Internet access through cell phones. - It does not use standard phones or a dial-up service, like our correct answer 3) Is a telecommunications technology where data is delivered over standard phones lines after a phone number is dialed. - Is an analog signal that must be converted to digital, as well.

D) ISDN (Integrated Services Digital Network) Everything else.....) C, A, B.

What is the function of an Intrusion Prevention System (IPS)? A) It is to allow or block content based on users and/or groups. B) It is to check the validity of users or tokens prior to allowing access to the network. C) It is to monitor a network or system for malicious activities and report on the activity. D) It is to prevent an attack by restarting a router if traffic spikes overall or for a given protocol. Correct Answer) Is an inline security device that monitors suspicious network and/or system traffic and reacts in real time to block it. - It is a proactive security measure. Everything else) 1) Describes an Intrusion Detection System (IDS), which is a reactive measure that identifies and mitigates ongoing attacks. 2) Describes an Authentication Server. 3) Describes a Proxy Server.

D) It is to prevent an attack by restarting a router if traffic spikes overall or for a given protocol. Everything else.....) 1) C 2) B 3) A

What is the term used by open source products as a "fallback" mechanism for assigning an Internet Protocol (IP) when the Dynamic Host Configuration Protocol (DHCP) unavailable? A) APIPA B) DNS C) IPv4 D) Link Local Correct Answer) Is the term used by non-Windows vendors and open source products that assigns a class B Internet Protocol (IP) address from 169.254.0.0 to 169.254.255.255 to a client when a Dynamic Host Configuration Protocol (DHCP) server is unreachable. Everything else) 1) Is Microsoft's term for assigning IP addresses from 169.254.0.0 to 169.254.255.255 to Windows machines when the DHCP server is unavailable. 2) Provides the unique numerical IP addresses necessary for Internet-enabled devices to communicate which are assigned to non-Windows machines that cannot reach the DHCP server, referred to as our correct answer. 3) Translates between Domain names and IP addresses assigned to machines so browsers can load Internet resources.

D) Link Local Everything else (in order)) A, C, B.

The city you work for is looking for a wireless connectivity solution that supports coverage for their public safety and emergency response services. You suggest the implementation of a Wireless Mesh Network (WMN) because: A) It delivers Internet access provided through communications satellites. B) It depends on wired infrastructure that interconnects to central Access Points (APs). C) It utilizes microwave dishes providing a reliable and high-bandwidth solution. D) Mesh nodes "talk" to each over large geographic areas providing high speed mobility and high-quality video surveillance. Correct Answer) Can do so without sacrificing quality of the wireless network. - It is a reliable source of wireless connectivity for a variety of applications. Everything else) 1) Describes Wireless Local Area Networks (WLANs). 2) Describes Line of Sight, which provides a point-to-point wireless solution for connecting facilities. 3) Describes Satellite broadband (a wireless type of service).

D) Mesh nodes "talk" to each over large geographic areas providing high speed mobility and high-quality video surveillance. Everything else.....) B, C, A.

The cable TV is not working in the Director's office. It does seem to be working in other offices. You have verified that the coax cables are all connected. Which tool will you now need to see if there are any issues with the cable? A) BNC coupler B) Cable Tester C) Loopback plug D) Multimeter Correct Answer) This is among the easiest cable testing devices used to check the shorts in a coaxial cable. - It combines many electrical meters as a single unit which can measure current, resistance and voltage. Everything else) 1) Is a tool that causes a device to transmit a signal back to itself. - This is most commonly used for diagnosing transmission problems on Ethernet cables. 2) Can be used to diagnose Ethernet wiring problems from broken/cut cables, loose wires to crossed pairs. 3) Is used only on coaxial cable installations connecting two cables terminated with cable ends of the same name.

D) Multimeter Otherwise (in order)) C, B, A.

The IT department is revamping the wiring closet to improve cable management. A new patch panel has been installed on the rack in the room and you have been tasked with terminating the cables into the patch panel. Which tool would you need to use to complete your task? A) Cable stripper B) Crimper C) Loopback plug D) Punch-down tool Correct Answer) Is most commonly used to connect cable wires directly to a patch panel in a wiring closet. - The tool works by stripping the insulation from the end of the wire and embedding the wire into the connection at the back of the panel. Everything else) 1) Is a tool that is useful when you need to attach media connectors to the end of a cable. 2) Is used when you need to remove the protective coating of a cable and expose the wire inside of it. 3) Is a tool that causes a device to transmit a signal back to itself. This is most commonly used for diagnosing transmission problems.

D) Punch-down tool Otherwise.....) B, A, C.

You have been tasked with making some cable runs to accommodate new offices. After running the cable, you now need to attach the cable to the back of the patch panel. What tool will you need to complete this task? A) BNC coupler B) Cable crimper C) Loopback plug D) Punch-down tool Correct Answer) Is a hand tool used to connect telecommunications and network wires to a patch panel. - A certain part of the name comes from punching a wire into place using an impact action. Everything else) 1) Fixes a jack to a cable. - Each one is specific to the type of connector, though some may have modular dies to support a range of RJ-type jacks. 2) In networking, these re great tools for quickly checking if data is being properly transmitted - These are inexpensive tools used to create a loop in wiring. 3) Is used ONLY ON COAXIAL l cables.

D) Punch-down tool Otherwise.....) B, C, A.

Which of these is an internet connection type that provides far bigger areas of coverage but tends to experience quite severe latency problems? A) Cellular B) DSL (Digital Subscriber Line) C) ISDN (Integrated Services Digital Network) D) Satellite Correct Answer) Use frequency bands in the Super High Frequency range (3-30 gigahertz (GHz)). - The signal must travel over thousands of miles more than terrestrial connections that could result in up to 1000 milliseconds (ms) delay. Everything else) 1) Provides a large coverage area, its average latency is measured in 100 ms delays, which is slower than our correct answer. 2) The coverage area is much smaller than our correct answer. - However, Delays here are from 15 to 50 ms over wired links, compared to our correct answer, which is slower than this. 3) Is a digital circuit-switched technology that uses telephone wiring which is a limited coverage area. - For a typical modem link the latency is usually about 100ms, about 300 times worse than Ethernet but 900ms better than our correct answer.

D) Satellite Everything else.....) A, B, C.

In an IPv4 network, what distinguishes the network and host number components within a single IP address? A) Host address (host ID portion of an IP address) B) Static (IP) addressing C) Subnetting D) Subnet mask Correct Answer) Is a 32-bit number that masks an IP address, and divides the IP address into network address and host address. - It is used to "mask" the host ID portion of the IP address and thereby reveal the network ID portion. Everything else) 1) Is the practice of dividing a network into two or more networks. 2) Is the portion of the address used to identify hosts. 3) The IPv4 address is physically assigned to a device. Any device which will be accessed by multiple devices in a network should have THIS.

D) Subnet mask Otherwise (in order)) C, A, B.

How are tone generators and tone probes different from cable testers? A) They can only certify the cable for transmission quality. B) They can only confirm that a signal is present on a network cable. C) They can only determine the voltage, current and resistance of the cable. D) They can only help you differentiate between different unshielded twisted pair (UTP) cables. Correct Answer) Tone generators and probes ALSO DO NOT confirm that a signal is actually present. Everything else) 1 and 2) Describes a Cable Tester. 3) Describes a Multimeter.

D) They can only help you differentiate between different unshielded twisted pair (UTP) cables. Otherwise) 1 and 2) A and B 3) C

There is a network (RJ45) port in the Director's office, but recently it stopped working. There is no connectivity provided when plugged into the port. The cable and the workstation's Network Interface Card (NIC) are verified good. You need to make sure the cable on the back-end of the port is connected but the cables in the wiring closet are not labeled. Which tool can you use to perform this task? A) Cable tester B) Loopback plug C) ping D) Tone generator/probe Correct Answer) Is what will help you identify which cable runs to the Director's office, so you can see if it is connected. - Once you have identified which cable it is you should label both the port and the cable. Everything else) 1) Is ONLY USEFUL for testing the NIC. 2) Is a computer network administration software utility used to test connectivity. - It will NOT help to identify if the port is connected. 3) Would likely be the NEXT TOOL used once you find the cable and confirm that it is connected.

D) Tone generator/probe Otherwise) B, C, A.

Which of the following Internet Appliances combines several security services into a single system? A) Authentication server B) Intrusion Detection System (IDS) C) Intrusion Protection System (IPS) D) Unified Threat Management (UTM) Correct Answer) Combines firewall, anti-virus, and intrusion detection system/intrusion prevention system (IDS/IPS) into a single appliance. Everything else) 1) Is a device, software application or both that monitors network or system activities for malicious activities or policy violations and produces reports to a management station. - It is a reactive measure that identifies and mitigates ongoing attacks. 2) Is an inline security device that monitors suspicious network and/or system traffic and reacts in real time to block it. - It is a proactive security measure. 3) Contains an application that has an access list and identifies the permitted access credentials. This can be on a separate server or it might be part of another server, a switch, or an access point.

D) Unified Threat Management (UTM) Correct Answer) 1) B 2) C 3) A

A user is complaining of very weak wireless signal. What device would you use to check the signal strength from the user's location? A) Lookback plug B) Multimeter C) Tone generator/probe D) WiFi analyzer Correct Answer) Is a device that can monitor your wireless network environment and help identify potential issues. - It shows the signal strength, measured in dBm (decibel-milliwatts) and expressed in a negative value. - For example, -25 dBm is a stronger signal than -90 dBm. Everything else) 1) In networking, these are great tools for quickly checking if data is being properly transmitted. 2) Can be used to measure voltage, current and resistance in cabling. - It would not be able to test signal strength. 3) Would help you identify which cable is being used. - It wouldn't be used to locate signal strength issues.

D) WiFi analyzer Everything else.....) A, B, C.

What is a network that refers to the interconnection of many nodes that can establish links to connect to others enabling the content to hop between them until it reaches a destination? A) Virtual Local Area Network (VLAN) B) Common WiFi Standards C) Wireless Local Area Network (WLAN) D) Wireless Mesh Network (WMN) Correct Answer) The network connection is spread out among dozens or even hundreds of wireless mesh nodes that "talk" to each other to share the network connection across a large area. - Allows local networks to run faster because local packets don't have to travel back to a central location. Everything else) 1) Is an abstracted LAN which can be used to improve our correct answer's performance by eliminating unnecessary rebroadcasts flooded from stations located outside the mesh. 2) Depends on wired infrastructure that interconnects the central Access Points (APs). 3) Mesh nodes are small radio transmitters that function in the same way as a wireless router using this to communicate wirelessly with each other.

D) Wireless Mesh Network (WMN) Otherwise (in order)) A, C, B.

[T / F 1] The original and still current standard for IP addressing is IPv6 (IP version 6). IPv6 addresses are 32-bit addresses, meaning a combination of 32 binary 1s and 0s. [T / F 2] IPv4 addresses, as opposed to IPv6 addresses, are 128-bit IP addresses, meaning they consist of 128 binary 1s and 0s. [Same of Different] - An IP address is expressed in eight blocks of four hexadecimal numbers each, for a total of 32 hexadecimal numbers. - IPv4 addresses are expressed in four octets of eight binary numbers each, with the binary number translated into decimals. [T / F 3] To combat the unwieldiness of IPv4 addresses omitting the leading zero is a shortcut, as long as it is a leading zero. - For example, 0001 can become 1. [T / F 4] IPv6 addresses are long and unwieldy. - To make life easier, a single group of four zeros or consecutive groups of four zeros can be rewritten as two colons (::), but only once per IPv6 address.

[T / F 1] FALSE (This is IPv4, which is 32 bits.) [T / F 2] FALSE (This is IPv6, which is 128 bits.) [Same or Different] Same. [T / F 3] FALSE (This applies to IPv6 only.) [T / F 4] TRUE.

Matching [DNS, FTP, HTTP, IMAP4, MAPI, NTP, POP3, SMB, SLP, SMTP, SNMP] 1) Sends the email to the Exchange mail server. 2) Delivers the email to the recipient's mail server. 3) Accesses email, via connecting the recipient's mail software to the mail server. 4) Is a network protocol used to transfer data over the web. 5) Is a set of network protocols for network management and monitoring. 6) Is a network file sharing protocol. 4 to 6) Are all network protocols defining rules and conventions for communications between network devices. 7) Is an internet protocol used to transfer computer files between a client and server on a computer network. 8) Is an internet protocol used to synchronize the clocks of computers to some time reference. 9) Is a service discovery protocol which allows computer and other devices to find services in a LAN without prior configuration. 10) Helps Internet users and network devices discover websites using hostnames instead of IP addresses. 11) Is used for retrieving emails, similar to, but more up-to-date, than (3).

1) MAPI 2) SMTP 3) POP3 4) HTTP 5) SNMP 6) SMB 7) FTP 8) NTP 9) SLP 10) DNS 11) IMAP4

Which of these are the maximum transfer rate, band and range of the 802.11ac Wireless Local Area Networks (WLAN), also call WiFi, standard? A) 1.7 Gbps, 5 GHz, up to 100 feet B) 11 Mbps, 2.4 GHz, up to 150 feet C) 54 Mbps, 5 GHz, up to 100 feet D) 54 Mbps, 2.4 GHz, up to 150 feet Correct Answer) Continues the development of 802.11n technologies. Its aim it to get throughput like that of Gigabit Ethernet or better. - Is backward compatible with the 3 legacy standards (a/b/g). Everything else) 1) Describes 802.11b. 2) Describes 802.11a. 3) Describes 802.11g.

A) 1.7 Gbps, 5 GHz, up to 100 feet Everything else) 1) B 2) C 3) D

When talking about "wireless networking" for desktops, laptops, smartphones, and tablets the term is generally understood to mean the Institute of Electrical and Electronics Engineers (IEEE's) 802.11 standards for Wireless LANs (WLAN), also called WiFi. There are five main versions of the standard. What are they and at what frequency(ies) do they operate? A) 802.11a - 5GHz, 802.11b - 2.4GHz, 802.11g - 2.4GHz, 802.11n - 2.4/5GHz, 802.11ac - 5GHz B) 802.11ab - 2.4GHz, 802.11c - 2.4GHz, 802.11d - 2.4GHz, 802.11g - 5GHz, 802.11n - 5GHz C) 802.11a - 2.4GHz, 802.11b - 2.4GHz, 802.11g - 2.4/5GHz, 802.11n - 5GHz, 802.11ac - 5GHz D) 802.11ab - 5GHz, 802.11c - 2.4GHz, 802.11d - 2.4/5GHz, 802.11g - 5GHz, 802.11n - 5GHz Correct Answer) Let's Play Match-Up: 802.11 Standards [a / b / g / n / ac] 802.11 Frequencies (GHz) [2.4 / 5] Hint) One operates on BOTH Frequencies.

A) 802.11a - 5GHz, 802.11b - 2.4GHz, 802.11g - 2.4GHz, 802.11n - 2.4/5GHz, 802.11ac - 5GHz

What protocol and port(s) perform a file sharing function on Apple networks running macOS (Macintosh Operating System)? HINT) It uses two ports. A) AFP over TCP or UDP port 427 and TCP port 548 B) FTP over TCP ports 20 and 21 C) SMB/CIFS over TCP port 445 D) TFTP over UDP port 69 Correct Answer) Is being phased out for Sever Message Block 2 (SMB2). - Is used for file sharing functions over an Apple network running macOS. Everything else) [over TCP ports 20 and 21; over UDP port 69; over TCP port 445; over TCP or UDP port 427 and TCP port 548]: 1) Allows an unauthenticated client to upload and download files from a remote server only. 2) Is used for file sharing functions over a Windows network only. 3) Allows an authenticated client to upload and download files from a remote server only.

A) AFP over TCP or UDP port 427 and TCP port 548 Everything else) D) TFTP over UDP port 69 C) SMB/CIFS over TCP port 445 B) FTP over TCP ports 20 and 21

True or false) [Hub, Switch, Router, Bridge, Network Interface Card (NIC)]: A) A hub controls traffic between networks, a switch merely passes traffic between devices, and a router directs traffic from one device to another. B) A hub directs traffic from one device to another, a switch controls traffic between networks, and a router merely passes traffic between devices. C) A hub merely passes traffic between devices, a switch directs traffic from one device to another, and a router controls traffic between networks. D) A hub merely passes traffic between networks, a switch passes signals from one segment to another, and a router transmits and receives signals and processes them as digital data.

A) ALL FALSE [Router, Hub, Switch] B) ALL FALSE [Switch, Router, Hub] C) TRUE. D) TRUE, FALSE, FALSE [Hub, Bridge, Network Interface Card (NIC)]

If you had both wired and wireless user devices on a network and you needed to connect these devices, what networking device would you need? A) Access Point B) Hub C) Router D) Switch Correct Answer) These are wireless network devices that act as portals for devices to connect to a local area network extending the wireless coverage and increasing the number of connected users. Everything else) 1) Connects nodes together in a single network, repeating and regenerating signals over multiple ports. - It is the network appliance that "ties" the whole local network together. 2) Passes traffic from one device to every other device connected to them. - These are an early type of device used to implement Ethernet cabling design, referred to as a star topology. 3) Are devices designed to filter and transfer data packets between dissimilar types of computer networks by assigning a local IP address to each of the devices.

A) Access Point Everything else (in order)) D, B, C.

Which of these is an embedded system in a corporate environment? A) Alarm system B) DNS server C) Windows Server 2003 D) Windows Server 2012 Correct Answer) An embedded system is designed for a particular function only. - These are purpose-built devices and it is not common to have direct access to their operating systems. Everything else) 1) Is only a legacy system since it has aged to the point where it is no longer supported by Microsoft. Thus, there are no more available security updates. 2) Is neither an embedded system since it has a particular function nor a legacy system since it is still supported by Microsoft. 3) Is not an embedded system as there is direct access to the operating system. - Could also be a legacy system depending on whether or not its operating system is still supported.

A) Alarm system Otherwise...) C, D, B (in order.).

It may be possible to replace, or supplement use of a dedicated hub with a more generic smart speaker/digital assistant-type hub. Which of the following is an example of a smart speaker type hub? A) Amazon Echo B) Apple Siri C) Google Assistant D) Microsoft Cortana Correct Answer) Comes with a voice control digital assistant named Alexa. Alexa lets you speak your wishes to a smart speaker of this bran and see them fulfilled such as dimming your lights or playing music tracks. Everything else) 1) Enables users to speak voice commands to interact with services through this brand's intelligent personal assistant of the same naming. 2) The HomePod is a voice-controlled speaker that listens out for its wake word. It is the digital assistant of what iOS/macOS relates to. 3) Owning our correct answer allows you to speak to this; This can also be used on a Windows 10 PC to talk to Alexa on our correct answer.

A) Amazon Echo Everything else.....) C, B, D.

What makes up the Simple Network Management Protocol (SNMP) used for collecting information from, and configuring, network devices, such as servers, printers, hubs, switches, and routers on an Internet Protocol (IP) network? A) An agent and management systems B) A centralized collection of events from multiple sources C) Hardware sensors and (detection & management) software D) Management System and agents Correct Answer) SNMP has the latter to provide a location for network activity and the former, which maintains a database of network device activity and can initiate traps identifying notable network events. - This has one of the latter, but many of the former. Otherwise) 1) Syslog consists of these and can be used to log different types of these, as well. 2) An Intrusion Detection System (IDS) consists of a variety of these things found internally and externally in your PC; This is used for detecting attacks on the network.

A) An agent and management systems (HINT: the former, the latter.). Otherwise (in this order)) B, C.

What would be a disadvantage, which has a negative impact on performance, of using a hub on a network? A) Any incoming signal on any of the hub's ports is re-created and sent out on any connected ports. B) The hub can connect nodes together in a single network, repeating and regenerating signals over multiple ports. C) The hub only passes signals from one segment to another if there is a match to the destination MAC address. D) The hub transmits and receives signals and processes them as digital data. Correct Answer) In a hub-based network, contention arises because of this. Why? - A lot of the communications are unnecessary and a lot of them "collide." - When there is a collision, all the nodes must stop and resend frames, slowing the network down. Everything else) 1) Describes Bridges. 2) Describes Switches. 3) Describes Network Interface Cards (NICs).

A) Any incoming signal on any of the hub's ports is re-created and sent out on any connected ports. Everything else) C, B, D: C) Bridges only pass signals from one segment to another if there is a match to the destination MAC address, reducing traffic loads in any one segmented collision domain which is where unnecessary communications "collide". B) Switches connect nodes together in a single network, repeating and regenerating signals over multiple ports. D) A computer's Network Interface Card (NIC) is the physical connection to network media that transmits and receives signals and processes them as digital data.

Which type of server checks your security credentials before allowing you to pass through to network services? A) Authentication server B) File server C) Mail (message) server D) Proxy server Correct Answer) Is set up to check the validity of your user name, password, and any other tokens prior to allowing you of the network resources. Everything else) 1) Are computers that store the programs and data files intended to be shared by multiple users. 2) Provides post office facilities by storing incoming mail or messages for distribution to users and forwarding outgoing mails or messages through appropriate channels. 3) Is a system that isolates internal clients from the servers by downloading and storing files on behalf of the clients.

A) Authentication server Everything else.....) 1) B 2) C 3) D

The network is using a mixture of local and cloud-based resources. What would you use to obtain "visibility" of the whole network from a single management interface? A) Cloud-based network controller B) Infrastructure as a Service (IaaS) C) Platform as a Service (PaaS) D) Virtual Private Network (VPN) Correct Answer) Deploying a network using a mixture of local and cloud-based resources, potentially using different-cloud providers, can be difficult to manage, hence our correct answer being something to consider. Everything else) 1) Provides the ability for you to rent, as needed, the cloud-based resources, such as servers, that you would use the cloud-based network controller to manage. 2) Is a cloud servicing platform allowing developers to build applications and services over the Internet utilizing the cloud-based resources such as server, databases, etc. 3) Only extends a private network across a public network.

A) Cloud-based network controller Everything else) B, C, D.

You need to configure a SOHO (Small Office Home Office) network to provide Internet Protocol (IP) Addresses to devices on the network. Which feature should be enabled? A) DHCP (Dynamic Host Configuration Protocol) B) DNS (Domain Name System) C) MAC (Media Access Control) Filtering D) SSID (Service Set Identifier) Correct Answer) Is what's responsible for assigning IP (Internet Protocol) addresses and will need to be enabled. - The IP addresses are allocated dynamically. Everything else) 1) Refers to a security access control method whereby the address of the same name, unique to each network card, is used to determine access to the network. - IP addresses are assigned to network devices. 2) Is used to uniquely identify any given wireless network by giving it a name. - It distinguishes one wireless network from another. 3) Is the Internet's equivalent of a phone book. - It maintains a directory of domain names and translates them to IP addresses.

A) DHCP (Dynamic Host Configuration Protocol) Everything else....) C, D, B (in that order).

What is the critical service on most networks that uses Transmission Control Protocol (TCP) or User Datagram Protocol (UDP) for its transport on port 53? A) Domain Name System (DNS) B) Dynamic Host Configuration Protocol (DHCP) C) HyperText Transfer Protocol (HTTP) D) Simple Network Management Protocol (SNMP) Correct Answer) It is the most critical service on most networks allowing users to access resources using host names by resolving those names to IP addresses. Everything else) 1) Uses TCP port 80 enabling clients to connect to this specific server and submit a request for resources. - This is the basis of the World Wide Web. 2) Dynamically assigns IP address information to a device connecting to the network. - Uses UDP port 67 is as its server destination port. - Uses UDP port 68 is used by its client. 3) Is used for collecting information and configuring network devices. - It manages network traffic over UDP port 161 to query devices - It uses UDP port 162 to communicate traps, via agents.

A) Domain Name System (DNS) Everything else....) C, B, D.

Why have so many growing businesses looking for a single solution adopted Unified Threat Management (UTM)? A) Ease, efficiency, and security B) Identifies and mitigates ongoing attacks C) Malware inspection D) URL filtering Correct Answer) Unified Threat Management (UTM) allows owners to concentrate on growing their business and not worrying about things preventing malware/viruses/etc. Everything else) 1) An IDS can be included in our correct answer, for doing exactly this. 2) Being able to allow or block access to specific web sites based on this would provide both efficiency and security, despite not being single source like our correct answer. 3) It is included in a UTM as part of what the UTM is meant for [our correct answer].

A) Ease, efficiency, and security Everything else (in order)) B, D, C.

A server is a computer that provides services to others and other systems making requests. Which of these servers allows files to be stored on it and handles requests for files and sends files over the network? A) File server B) Mail server C) Print server D) Web server Correct Answer) Hosts a range of things, from images to videos and more, through a different protocol than web servers such as FTP. - It is responsible for the central storage and management of these so that other computers on the same network can access them, too. Everything else) 1) Serves the files that form online resources to users, in response to their requests, through the HTTP or HTTPS protocols. 2) Sends, receives and relays these common things, which may have file attachments, through MAPI, SMTP, and POP3 or IMAP4 protocols. 3) Is used to allow multiple users to queue their print jobs to shared network printers, and only this.

A) File server Everything else.....) D, B, C (in order.).

There are two options for sharing printers on a network: Windows print server or hardware print server. What does a print server do? A) It accepts print jobs from computers and sends the jobs to the appropriate network printers. B) It allows network users to have complete control over the print driver to suit their individual needs as the jobs spool locally. C) It is used to store data remotely, rather than locally, and in a central location to share with other users. D) It requires each node to provide authentication credentials before being given authorized access to network-based applications and services. Correct Answer) In an enterprise environment, this allows for print jobs to be managed from a central device to perform exactly what we're looking for! Everything else) 1) Describes a File Server. 2) Describes Windows direct IP printing for small offices only. 3) Describes an Authentication Server.

A) It accepts print jobs from computers and sends the jobs to the appropriate network printers. Everything else) 1) C 2) B 3) D

What is a proxy server and how does it protect the computer network? A) It hides network IP addresses from external users by making the computer network invisible. B) It identifies an individual process or entity attempting to access a secure domain preventing access by unauthenticated users. C) It logs event messages sent by network devices identifying any issues or problems. D) It translates device names into IP addresses providing resolution of host and domain names to IP addresses. Correct Answer) Is defined as a server that sits between a client computer and the Internet. - Security is one benefit, as all requests going out to the Internet are sourced from the proxy server, resulting in this for IP (Internet Protocol) Addresses. Everything else) 1) Describes a SYSLOG server (tracking and monitoring) 2) Describes a DNS server. 3) Describes an Authentication server (for network or internet-based applications)

A) It hides network IP addresses from external users by making the computer network invisible. Otherwise.....) 1) C 2) D 3) B

What is the function of a computer's network adapter or Network Interface Card (NIC)? A) It is responsible for connecting the computer or device to the network. B) It is responsible for ensuring that all devices receive signals on the network. C) It is responsible for monitoring and controlling traffic on a network. D) It is responsible for monitoring network traffic and blocking or allowing the traffic to pass. Correct Answer) NICs have a unique address known as the Media Access Control (MAC) address. - When troubleshooting network problems, always check that the link light is on, indicating a connection to the network. Everything else) 1) Describes Firewalls. 2) Describes Hubs. 3) Describes Managed Switches.

A) It is responsible for connecting the computer or device to the network. Everything else) D, B, C: D) Firewalls are responsible for monitoring network traffic and blocking or allowing the traffic to pass through the network where the NIC picks up the electrical signal and converts it back to digital data that can be understood by the computer. B) Hubs ensure that the computer receives network signals through the network connection port on the computer's NIC by just repeating transmissions which are subject to collisions. C) Managed switches monitor and control network traffic sent over the network and received through the computer's NIC.

What is a characteristic of connection-oriented communication? A) It provides assurance of packet delivery during data transmission. B) It provides fast but unreliable delivery of packets during data transmission. C) It uses message-oriented communication for processing email. D) It uses store-and-forward techniques to move packets between computers. Correct Answer) It tracks the data sent to ensure no data loss during data transmission. (i.e.: TCP) Everything else) 1) Is a connectionless, simple protocol. It does not ensure whether a receiver receives packets. If packets are missed then, they are just lost. (i.e.: UDP) 2) Is a technique common in messaging services where a data transmission is sent from one device to a receiving device but first passes through a "message center". 3) Is a way of communicating between processes. These correspond to events & are the basic units of data delivered.

A) It provides assurance of packet delivery during data transmission. Everything else) B, D, C.

Every wireless device operates on a specific radio frequency within an overall frequency band. The two most common frequency bands in the Institute of Electrical and Electronics Engineers' (IEEE's) 802.11 standards are 2.4 gigahertz (GHz) and 5.0 GHz. How is the 2.4 GHz frequency range different from 5.0 GHz? A) Longer range, propagates better through solid surfaces, and lower maximum achievable data rates B) Longer wavelength, supports maximum ranges achieved, and supports more individual channels C) Shorter range, less effective propagating through solid surfaces, and supports higher data rates D) Supports more individual channels, suffers less congestion from interference, maximum achievable data rates are higher Correct Answer) Suffers from increased risk of interference and maximum achievable data rates are typically lower than the other frequency range. Everything else [2.4 GHz vs. 5 GHz]) 1) Longer Range and Solid Surface Penetration 2) Higher MAX Data Rates than the other. 3) Higher Number of Individual Channels for Less Congestion. 4) Longer Wavelengths for Longer Range Support.

A) Longer range, propagates better through solid surfaces, and lower maximum achievable data rates Everything else [2.4 GHz vs. 5 GHz]) 1) 2.4 2) 5 3) 5 4) 2.4

What router feature would allow you to specify which wireless clients may join your network? A) Media access control (MAC) filtering B) Network Address Translation (NAT) C) Port triggering D) Quality of Service (QoS) Correct Answer) Is a type of method whereby the 48-bit address assigned to each network card is used to determine access to the network. - This can be enabled for both wired and wireless clients. - This will also require that the network admin configure blacklists or whitelists to manage authorized devices. Everything else) 1) Is to limit the number of public IP addresses a company must use for economic and security purposes. 2) Is the feature that automates port forwarding. Port forwarding allows you to configure a host to forward a network port from one network node to another. 3) Guarantees a portion of total bandwidth specifically to those applications that use it.

A) Media access control (MAC) filtering Everything else) B, C, D (in that order)

Why is Service Location Protocol (SLP), that uses Transmission Control Protocol (TCP) for its transport over port number 427, needed? A) SLP is needed to allow clients to locate servers and other services on the network. B) SLP is needed to allow a user to view and control the desktop of a remote computer. C) SLP is needed to collect and organize information about managed devices on IP networks. D) SLP is needed to transfer files on the World Wide Web. Correct Answer) Is needed to organize and locate resources (such as printers, disk drives, databases, and email directories) in a network, as specified. Everything else) [RDP over TCP port 3389, HTTP over TCP port 80, SNMP over UDP port 161/162]: 1) Collects and organizes information about managed devices on IP networks and modifies that information to change device behavior, all done via using one manager and many agents. 2) Is the set of rules for transferring files (text, graphic images, sound, video, and other multimedia files) on the World Wide Web. 3) Is a Microsoft protocol that allows a user to view and control the desktop of a remote computer.

A) SLP is needed to allow clients to locate servers and other services on the network. Everything else) 1) Simple Network Management Protocol (SNMP) [over UDP port 161/162] 2) HyperText Transfer Protocol (HTTP) [over TCP port 80] 3) Remote Desktop Protocol (RDP) [over TCP port 3389]

What is the result of disabling Service Set Identifier (SSID) broadcast on a wireless access point (WAP)? A) The access point will not advertise its name to clients within range. B) The access point will not have a name to differentiate it from other access points. C) Wireless clients will not be able to connect to it. D) Wireless clients will not need to provide a password to connect to it. Correct Answer) WARNING: This does not offer much protection against attackers. Everything else) [T / F 1] The access point will not have a name to differentiate it from other access points (as in no Service Set Identifier (SSID) here.) [T / F 2] When SSID no longer appears in the list of networks shown to wireless devices, the SSID will have to be manually configured in the profile settings to join the network. [T / F 3] Wireless clients will not need to provide a name and network password to connect to it, thanks to SSID broadcast otherwise usually being disabled for security reasons.

A) The access point will not advertise its name to clients within range. Everything else....) [T / F 1] FALSE (SSID is the name used to identify a wireless access point (WAP) on a network; Also, it's not broadcasted.) [T / F 2] TRUE. [T / F 3] FALSE (Connecting to networks with SSID broadcast disabled REQUIRES that the user to manually create a profile with the name and the network password.)

The steps for setting up a Digital Subscriber Line (DSL) modem are the same as a cable modem except for one. What is the one difference to setting up a cable modem? A) The connection to the provider network will be through a coax cable. B) The connection to the provider network will require a filter to be installed. C) The connection to the provider network will be through the phone point. D) The connection type must be matched to the network type. Correct Answer) Cable modems are connected the same as DSL modems except that they are connected to the provider network using this only. - Make sure this is secure (but do not over-tighten it). - DSL modems use a telephone cable to connect to the provider. Everything else) 1) DSL modems use this to connect to the provider only. 2) These must be installed to separate voice and data signals when using a DSL modem. - These can be installed on each end of what (1) uses. 3) The modem type must be exactly matched to this (whether it's Asymmetrical DSL (ADSL), Very High Bitrate DSL (VDSL), or cable). - This is true for both DSL as well as cable modems.

A) The connection to the provider network will be through a coax cable. Everything else) C, B, D.

You have been tasked with inventorying all networked devices and find several Windows XP computers, why is this a concern? A) These are legacy systems that present a risk to corporate infrastructure. B) These systems are limited as they are designed to perform specific functions. C) These systems cannot be relocated. D) These systems will not run the new applications being deployed across the network. Correct Answer) Primarily, they are no longer being support by the manufacturer. Thus, there are no more available security updates for these systems which means there is no more protection against malicious attacks. Everything else) [T / F 1] These systems are limited as they are designed to perform specific functions. [T / F 2] These systems cannot be relocated. [T / F 3] These systems will not run the new applications being deployed across the network.

A) These are legacy systems that present a risk to corporate infrastructure. [T / F 1] FALSE (They are not designed for a specific function such as an alarm system.) [T / F 2] FALSE (Yes, they can!) [T / F 3] FALSE (Yes, they can!)

For maximum compatibility with any wired network, how would you configure data transferring on the wired Ethernet Network Interface Card (NIC)? A) To auto negotiate B) To operate at half duplex C) To prioritize certain types of traffic over others D) To work at a nominal data rate of 1 Gbps Correct Answer) This must match that of the switch it is connected to. - Most wired network adapters will do this to network settings such as signaling speed and half- or full-duplex operation with the switch. - Sets the maximum network speed compatible to whichever network you are connected Everything else) 1) Will ensure that data transfers are optimal for whatever network you are connected to. Many devices use full duplex and gigabit Ethernet requires full duplex to work. 2) Most devices will support Gigabit Ethernet, working at this exact data rate. However.... 3) Is a function of Quality of Service (QoS) settings; to ensure high-quality bandwidth and high-quality network transmission for applications that require it, you enable QoS Packet Scheduler.

A) To auto negotiate Everything else......) B, D, C.

Transport Control Protocol (TCP) and User Datagram Protocol (UDP) are the most widely used protocols that are built on the top of Internet Protocol (IP). Both protocols are used to send bits of data over the Internet, which is also known as 'packets'. How is UDP different from TCP? A) UDP is connectionless, faster, a lightweight transport layer, and does not ensure packets are received. B) UDP is connectionless, slower, a lightweight transport layer, and ensures packets are received. C) UDP is connection oriented, faster, a heavy weight connection, and does not ensure packets are received. D) UDP is connection oriented, slower, a heavy weight connection, and ensures packets are received. Correct Answer) The opposite of this is a connection-oriented protocol that is slower than what we're looking for. - It is a heavy weight connection and tracks data sent ensuring no data loss during transmission. Partial Credit) C or D??? Take a wild guess and consider our correct answer IS the opposite of this, too.

A) UDP is connectionless, faster, a lightweight transport layer, and does not ensure packets are received. Partial Credit) D, which actually describes TCP.

You have an older desktop PC that you connect to the network using Ethernet, but you would like to add WiFi to it for those occasions when you might need it. You do not want to have to replace the existing motherboard and want the best throughput. What's the best way to do this? A) You can install a PCIe WiFi card. B) You can use a USB WiFi adapter. C) You can use the built-in WiFi. D) You can upgrade the existing Ethernet card. Correct Answer) A Wi-Fi adapter can be installed as this if the function is not available (built-in) on the motherboard. Everything else) 1) While most of these have good connections, the rate of transfer is usually better on our correct answer, provided these cards have multiple antennas with MIMO spatial multiplexing. 2) PCs don't normally come with this, hence our correct answer. 3) Will not provide you with any WiFi connectivity as these specific cards are used for wired connectivity.

A) You can install a PCIe WiFi card. Everything else.....) B, C, D.

Which of the following wireless communication standards requires line of sight (i.e.: a clear path) to operate? A) Bluetooth B) Infrared (IR) C) RF (radio frequency) D) WiFi Correct Answer) Is a wireless technology that requires a clear path between communication devices. A good example of this is a TV Remote. Everything else) 1) Uses radio communications and does not require line-of-sight. Good examples of this are audio speakers and headphones. 2) Refers to a wireless electromagnetic signal used as a form of communication by such devices as wireless keyboard and mouse, whereas TV remotes use our correct answer. 3) Uses radio waves to provide network connectivity for devices like computers and laptops.

B) Infrared (IR) Otherwise.....) A, C, D.

What wireless technology delivers speeds that are at least 200Kbps (Kilobits per second) up to 3Mbps (Megabits per second)? Hint) G == Generation. A) 2G B) 3G C) 4G D) 5G Correct Answer) Is transmitted in digital format in GSM (Global System for Mobile) and CDMA (Code-Division Multiple Access) technologies - Speeds == least 200Kbps (Kilobits per second) up to 3Mbps (Megabits per second). Everything else) 1) Provides up to 20Gbps (Gigabits per second) with standard rates of 1Gbps. 2) First cellular generation to offer digital signals and up to 250Kbps. - It was also the first generation to not only support voice but also text and data services. 3) (i.e. LTE (Long Term Evolution)) - Is supported by all network providers. - Has Downlink speeds of up to 300Mbps and Uplink speeds of up to 76Mbps.

B) 3G Everything else....) D, A, C.

Which 802.11 wireless standard(s) uses the 5 gigahertz (GHz) frequency range? A) 802.11a, 802.11b, and 802.11n B) 802.11a, 802.11n, and 802.11ac C) 802.11b, 802.11g, and 802.11n D) 802.11g, 802.11a, and 802.11ac Correct Answer) One standard out of these 3 combined can use both the 5 GHz and the 2.4 GHz frequency range. Everything else) 1) Three are Legacy standards (2.4 GHz). 2) One is Backwards-compatible (2.4 & 5 GHz). 3) One only uses 5 GHz, despite being better than (2).

B) 802.11a, 802.11n, and 802.11ac Everything else.....) 1) 802.11a/b/g 2) 802.11n 3) 802.11ac

You are planning the installation of several wireless access points in a large office area with multiple high-end devices. Which standard is the best wireless solution for this network? A) 802.11a B) 802.11ac C) 802.11g D) 802.11n Correct Answer) Is what provides enhancements to the techniques pioneered in 802.11n to deliver greater reliability and higher throughput in the 5 gigahertz (GHz) band. - Is preferred where there is a higher density of equipment in a large office area. - Is preferred over a slightly older type where there are multiple high-end devices in a single location. Everything else) 1) Two are legacy standards and would not be the best solution. 2) While this will work in the 5 GHz band, it is limited to use by quite old equipment. 3) Is not a viable option as it only operates in the 2.4 GHz band. 4) Is backwards compatible w/everything relating to (1).

B) 802.11ac Everything else....) 1) A, C 2) A 3) C 4) D

Which standard supports speeds as high as 11 Megabits per second (Mbps) and uses the Direct Sequence Spread Spectrum (DSSS) transmission method in the 2.4 gigahertz (GHz) band for up to 30 meters indoors? A) 802.11ac B) 802.11b C) 802.11g D) 802.11n Correct Answer) Speed: 11 Megabits per second (Mbps); 5.5 Mbps is another supported data rate. - Uses the 2.4 gigahertz (GHz) band. - Has a maximum distance of 32 meters indoors and 140 meters outdoors. Everything else) 1) Supports speeds as high as 1.7 Gbps @ 5 GHz band only; Maximum distance of up to 30 meters; - its aim thru continued R&D (based off (3)) is to get throughput like that of Gigabit Ethernet or better. 2) Speed: 54 Mbps @ 2.4 gigahertz (GHz) band; Maximum distance of 45 meters. 3) Speed: 288.8 Mbps @ 2.4 (GHz) band; 600 Mbps @ 5 GHz band; Maximum distance of up to 45 meters.

B) 802.11b Everything else.....) A, C, D.

A technician needs to install a network device in a Small Office Home Office (SOHO) network. The office requires 9 wired workstations to share and print data. Which of the following can the technician use? A) An 8-port firewall with one console port B) A 12-port unmanaged switch C) A wired router with an 8-port switch and a WAN port D) A wireless router with an 8-port switch, and a WAN port Correct Answer) Is what's used since there are enough ports to connect all client devices and printers. - There is no need for a managed switch as this is small network that only needs to share and print data. Everything else) 1) would be more than the small office requires since there is no requirement to connect dissimilar networks. Also, this port type on the switch will not connect all devices. 2) Can be used in this small office setup, despite us requiring what applies to (1). - There is no requirement for the router to connect dissimilar networks and the office needs more than 8-ports to connect the 9 workstations. 3) Can optionally be used to protect and monitor network traffic and either block or allow traffic to pass through.

B) A 12-port unmanaged switch Everything else) C, D, A.

Which protocol is used to automatically provide Internet Protocol (IP) addresses to network computers? A) ARP B) DHCP C) DNS D) IGMP Correct Answer) Allocates IP addresses to new devices joining the network. - Windows clients default to using Automatic Private IP Addressing (APIPA) addresses if the this server of similar name fails to allocate an IP address. - Failure of this results in the IP address being in the range 169.254.x.y. Everything else) 1) Is a critical service that resolves host names to IP addresses allocated by DHCP. - Uses TCP Port 53. 2) Is a protocol used to map IP network addresses to the hardware addresses used by a data link protocol operating below the network layer. - Has a Reverse version as well (hardware to IP Network.). 3) Is an Internet protocol that provides a way for an Internet computer to report its multicast group membership to adjacent routers.

B) DHCP Everything else) C, A (Reverse = RARP), D.

What network servers assign, release and renew valid Internet Protocol (IP) addresses to computers on the network? A) Authentication server B) DHCP server C) DNS server D) Syslog server Correct Answer) Keeps track of which Internet Protocol (IP) addresses are already assigned so when a computer requests an IP address, the server offers one that's not already in use. - All modern server operating systems have this. - Recall APIPA. Everything else) 1) Are the Internet's equivalent of a phone book; they maintain a directory of domain names and translate them to Internet Protocol (IP) addresses. - These IP addresses are kept track of by our correct answer. 2) Enterprise networks use this to configure user accounts and authenticate the subjects trying to use those accounts. - On a Windows domain, the user database and authentication service are provided by Active Directory. 3) Is a way for network devices to send event messages to a logging server. - This is supported by a wide range of devices and can be used to log different types of events.

B) DHCP server Everything else.....) 1) C 2) A 3) D

SOHO (Small Office Home Office) networks, often built around a single connectivity appliance, face the challenge of joining up devices where the network equipment and Internet access line are located. What would be an alternative solution if network installation is needed quickly and interference may be an issue? A) Data cabling B) Ethernet over Power (EoP) C) Power over Ethernet (PoE) D) Wireless Correct Answer) Utilizes Powerline products that can make use of building power circuits. - A network connection is established via a Powerline adapter plugged directly into an electrical outlet. Everything else) 1) Provides power over Ethernet data cabling; It also would require a longer installation time. - Powerline adapters plugged directly into an electrical outlet provide our correct answer using existing power circuits. 2) While this yields a convenient solution for SOHO networks, it is susceptible to interference issues, unlike our correct answer. 3) Could be installed to setup a SOHO network, but it would result in longer installation time versus using existing power circuits and implementation of our correct answer.

B) Ethernet over Power (EoP) Everything else) C, D, A.

What service uses port 21? A) Domain Name System (DNS) B) File Transfer Protocol (FTP) C) HyperText Transfer Protocol (HTTP) D) Post Office Protocol 3 (POP3) Correct Answer) As the name suggests, it is used for transferring files. Everything else) 1) Uses port 53 and resolves names to IP addresses using a distributed database that contains information on domains and hosts within those domains. 2) Uses port 80 and enables clients (typically web browsers) to request resources from a server of the same name. 3) Uses port 110, serving as an Internal mail protocol for retrieving emails.

B) File Transfer Protocol (FTP) Everything else (in order)) A, C, D.

From the following, which one refers to a software or hardware that monitors network traffic and depending on the configuration settings applied to each data packet either blocks it or allows it to pass through? A) Access Point B) Firewall C) Hub D) Managed switch Correct Answer) Can be software or hardware that monitor network traffic and depending on its configuration settings applied to each data packet either blocks or allows the traffic to pass through. Everything else) 1) Should be used on any network or network segment where the traffic must be monitored and controlled. - They enable complete control of data, bandwidth and traffic control. 2) Are wireless network devices that act as portals for devices to connect to a local area network extending the wireless coverage and increasing the number of connected users. 3) Passes traffic from one device to every other device connected to them. - These are an early type of device used to implement Ethernet cabling design, referred to as a star topology.

B) Firewall Everything else) D, A, C.

For a user who registers on a secure website, identify the protocol, transport(s), and port number(s) in use. A) In use is HTTP over TCP on port number 80. B) In use is HTTPS over TCP on port number 443. C) In use is SNMP over UDP on port number 161. D) In use is SSH over TCP on port number 22. Correct Answer) Is used to secure all communications between the user's browser and the website the user is attempting to reach using encryption. Everything else) 1) Would transmit web-pages between the user's browser and the website the user is attempting to reach but it would be unencrypted. 2) I1s used for secure logins, file transfers, or general-purpose connections to a remote machine. 3) Is used to manage and monitor network devices and their functions.

B) In use is HTTPS over TCP on port number 443. Everything else) A) In use is HTTP over TCP on port number 80. D) In use is SSH over TCP on port number 22. C) In use is SNMP over UDP on port number 161.

Which Internet of Things (IoT) endpoint device is used to set switches to a particular dimmer level over a smartphone app? A) Dimmer B) IoT light switches C) Light switch D) Zigbee Correct Answer) Turn lights on or off or set to a particular dimmer level or color (in the case of smart bulbs). Everything else) 1) Is something most commonly used to operate electric lights, permanently connected equipment, or electrical outlets. 2) Is connected to a light fixture and used to lower the brightness of light. - By changing the voltage waveform applied to the lamp, it is possible to lower the intensity of the light output. 3) Is the wireless language that everyday devices use to connect to one another. - It allows users to remotely control smart devices, such as our correct answer, using their smartphones.

B) IoT light switches Everything else (in order)) C, A, D.

To guarantee high-quality bandwidth and high-quality network transmissions for applications that require it, you enable quality of service (QoS) Packet Scheduler on every workstation. What does QoS do for applications that require it? A) It ensures that the transmissions are clean and error free. B) It guarantees a portion of total bandwidth specifically to those applications that use it. C) It limits what a user can do on the network by disabling listed apps. D) It prevents Ethernet collisions so that your data transmission is faster. Correct Answer) Guarantees about 20 percent of this to applications that use it. - When these types of applications are not in use, you still have access to 100 percent of this, so there is no reason not to have it enabled. Everything else) 1) This is what the Transport Layer does. 2) This describes Full-duplex, as well as the shortcomings of Half-duplex. 3) Turning on content filtering does this to a T.

B) It guarantees a portion of total bandwidth specifically to those applications that use it. Everything else.....) A, D, C.

What are two benefits of using a Power over Ethernet (PoE) switch versus a non-PoE switch? A) It connects computers to the network and monitors and controls network traffic sent. B) It is more efficient than using an electric outlet and allows network software to manage power to devices. C) It overcomes network cabling distance limitations and divides local networks into segments. D) It provides power to non-PoE connections and communicates over electric wiring. Correct Answer) Power over Ethernet (PoE) switches also apply power schemes, such as making unused devices go into sleep states and power capping, besides the TWO EXACT things it's capable of mentioned here. Everything else) 1) A power injectors necessary for this to occur. - If data cabling is not available, this can instead be provided by Ethernet over Power-line (EoP) devices. 2) Other devices used on networks include: a repeater and a bridge to perform these TWO EXACT actions. 3) PoE NICs, such as a VoIP phone, allow for power to be supplied to the phone from the PoE switch through the data cabling. - Whether it's PoE or non-PoE, a managed switch is what does this ONE thing.

B) It is more efficient than using an electric outlet and allows network software to manage power to devices. Everything else) D, C, A.

The main directory standard for interoperability of network resources directories is X.500. What protocol was standardized by Internet Engineering Task Force (IETF) to query and update an X.500 directory over which default protocol(s) and port(s)? A) HyperText Transfer Protocol (HTTP) over TCP port 80 B) Lightweight Directory Access Protocol (LDAP) over TCP or UDP port 389 C) Service Location Protocol (SLP) over TCP port 427 D) Simple Network Management Protocol (SNMP) over UDP port 161 Correct Answer) Is an open, vendor-neutral, industry standard application protocol for accessing and maintaining certain directories over an Internet Protocol (IP). Everything else) [ARP/RARP; HTTP over TCP port 80; DNS over TCP on port numbers 53]: 1) Is a critical service that resolves host names to IP addresses allocated by DHCP. 2) Is a protocol used to map IP network addresses to the hardware addresses used by a data link protocol operating below the network layer. 3) Is the set of rules for transferring files (text, graphic images, sound, video, and other multimedia files) on the World Wide Web.

B) Lightweight Directory Access Protocol (LDAP) over TCP or UDP port 389 Everything else) 1a) DNS over TCP on port numbers 53. 1b) DHCP over UDP on port numbers 67 and 68. 2) ARP (Address Resolution Protocol); Its reverse form (RARP) == Hardware addresses --> IP Network addresses. 3) (A) HyperText Transfer Protocol (HTTP) over TCP port 80.

You are an IT Analyst for a large chain of restaurants. Your department has been asked to evaluate accepting payments through wireless transmission from mobile devices. Which standard technology are they referring to? A) Infrared (IR) B) Near Field Communication (NFC) C) Radio Frequency Identification (RFID) D) WiFi Correct Answer) Is the standard wireless protocol behind wireless payment options such as Android Pay and Apple Pay. Only a simple touch is needed between the devices to transfer the payment data. Everything else) 1) Uses radio waves to provide network connectivity for devices like computers and laptops. It is more complex and requires configuration of hardware and software, and is used for wireless Internet. 2) Is a wireless mobile technology used for device communication over short ranges, mostly used to control electronic devices that can be controlled using a remote such as televisions, projectors, etc. 3) Only provides one-way wireless communication and is better suited for applications such as EZ-Pass or tracking items.

B) Near Field Communication (NFC) Everything else.....) D, A, C.

The use of patch cords, permanent links, and what other devices is referred to as a structured cabling system? A) IDCs (Insulation Displacement Connectors) B) Patch panels C) RJ-45 ports D) Stranded cables Correct Answer) It is important to label the ports and cables when installing our correct answer. Everything else) 1) Are used to connect a port on our correct answer to a port on a switch is made using this, which comprises lots of very thin wires twisted to make a single conductor. 2) Are where solid cables, which use single thick wires for conductors, are terminated into the back of what's our correct answer here and the wall plates. 3) Are on the front of that of our correct answer and are used to connect to Ethernet ports on wall plates via drop cables.

B) Patch panels Everything else (in-order)) D, A, C.

Which protocol and port number allows a user to view and control the desktop of a remote Windows computer? A) DNS over TCP port 53 B) RDP over TCP port 3389 C) SSH over TCP port 22 D) Telnet over TCP port 23 Correct Answer) Is a Microsoft protocol that allows a user to view and control the desktop of a remote computer over this high-numbered TCP port. Everything else) 1) Is used to securely connect to a remote host (typically via a terminal emulator) and was designed to replace programs such as (2) and FTP. - Uses a low-numbered TCP Port. 2) Is a command-line terminal emulation protocol and program. It sends all messages in clear text which results in the security risks using this protocol to be too high. - Uses a low-numbered TCP Port. 3) Is used over TCP (or UDP) ports to resolve domain names to corresponding IP addresses only.

B) RDP over TCP port 3389 Everything else) C) SSH over TCP port 22 D) Telnet over TCP port 23 A) DNS over TCP port 53

What is the purpose of Applications implementing Server Message Block (SMB) sometimes referred to as Common Internet File System (CIFS)? A) SMB/CIFS shares files, printers, and other network resources on Apple networks over TCP or UDP port 427 and TCP port 548. B) SMB/CIFS shares files, printers, and other network resources on Windows networks usually over TCP port 445. C) SMB/CIFS transfers files with a remote host (typically requiring authentication of user credentials) over TCP ports 20 and 21. D) SMB/CIFS transfers files with a remote host (without requiring authentication of user credentials) over UDP port 69. Correct Answer) Applications implementing these does so over TCP port ___. WA 1) Uses this to share files, printers, and network resources on Apple networks via TCP or UDP port ___ and TCP port ___ like SMB/CIFS on a Windows network. WA 2) Allows an authenticated client to upload and download files from a remote server. - Uses TCP ports ___ and ___. WA 3) Allows an unauthenticated client to upload and download files from a remote server. - Uses UDP port ___.

B) SMB/CIFS shares files, printers, and other network resources on Windows networks usually over TCP port 445. Everything else) 1) Apple Filing Protocol (AFP) (TCP/UDP 427, TCP 548) 2) File Transfer Protocol (FTP) (TCP 20/21) 3) Trivial File Transfer Protocol (TFTP) (UDP 69)

A new device is connected to the network. The device automatically receives an Internet Protocol (IP) address. What protocol, transport(s), and port number(s) was responsible for supplying this device its address? A) The device received its IP address from DNS over TCP or UDP on port number 53. B) The device received its IP address from DHCP over UDP on port numbers 67 and 68. C) The device received its IP address from NetBT over UDP or TCP on port numbers 137 through 139. D) The device received its IP address from SNMP over UDP on port number 161 and 162. Correct Answer) Allocates an IP address to a new machine joining the network over a UDP port ONLY. WA1) Resolves the devices name listed on the server to the IP address provided by DHCP. It does this over a TCP or UDP port. WA2) Collects and organizes information about the newly connected device, as well as uses agents to keep things in check. It does this over a UDP port ONLY. WA3) Allowed computers to address one another by name and establish sessions. It does this over a UDP or TCP port. It is only required if the network must support pre-Windows 2000 legacy systems

B) The device received its IP address from DHCP over UDP on port numbers 67 and 68. [i.e. Dynamic Host Control Protocol] WA1) Domain Name System (DNS) (UDP 53) WA2) Simple Network Management Protocol (SNMP) (UDP 161/162) WA3) NetBIOS over TCP/IP (NetBT) (TCP/UDP 137-139)

What is the distance, speed, and frequency of wireless standard 802.11a? A) Up to 30 meters, maximum speed of 1.7 Gbps, 5 GHz B) Up to 30 meters, maximum speed of 54 Mbps, 5 GHz C) Up to 45 meters, maximum speed of 54 Mbps, 2.4 GHz D) Up to 45 meters, maximum speed of 288.8 Mbps, 2.4 GHz Correct Answer) Is limited to old equipment. Everything else) 1) Describes 802.11g. 2) Describes 802.11n, which also works at up to 30 meters, maximum speed of 600 Mbps, 5 GHz for backwards compatibility. 3)Describes 802.11ac.

B) Up to 30 meters, maximum speed of 54 Mbps, 5 GHz Everything else) 1) B 2) D 3) A

Setting up a network requires the use of various devices requiring that you know the difference between each. What are the differences between a hub, a switch, and a router? A) A hub controls traffic between networks, a switch merely passes traffic between devices, and a router directs traffic from one device to another. B) A hub directs traffic from one device to another, a switch controls traffic between networks, and a router merely passes traffic between devices. C) A hub merely passes traffic between devices, a switch directs traffic from one device to another, and a router controls traffic between networks. D) A hub merely passes traffic between networks, a switch passes signals from one segment to another, and a router transmits and receives signals and processes them as digital data. Correct Answer) [Bridges, Hubs, NICs (Network Interface Cards), Routers, Switches]: - One passes traffic from one device to other devices connected to it. - One directs traffic from one device to another on a network. - One controls traffic between networks. - One passes signals from one segment to another. - One transmits and receive signals and process them as digital data.

C) A Hub merely passes traffic between devices. - A Switch directs traffic from one device to another. - A Router controls traffic between networks. Other answers) - A Bridge passes signals from one segment to another. - A Network Interface Card (NIC) transmits and receives signals and processes them as digital data.

A technician is configuring wireless for a home office. The customer wants to prevent others from accessing the wireless network. The customer has a small number of devices on the network and does not want to have to remember a complicated password. Which of the following should the technician recommend? A) Assign static IP addresses B) Disable SSID broadcast C) Enable MAC filtering D) Turn on content filtering Correct Answer) Is enabled on a wireless router by using only addresses of the same type of authorized devices. The router will block access to the network to all systems except for ones with the specifically allowed these. Everything else) 1) Yes, any device which will be accessed by multiple devices in a network should have this! 2) Hides wireless networks from casual users. Doing this makes it difficult for other users to see the network without using special tools. 3) Can be set to limit what a user can do on the network, not to prevent access to the network.

C) Enable MAC filtering (to MAC addresses) Everything else....) A, B, D.

You are a network technician for a small engineering business. The business owner has asked you to evaluate options for several SOHO (Small Office Home Office) networks to allow employees to work from home. Often the employees' modem is in a different area of the house than their home office. The business has a strict policy that prohibits wireless networks. Which of the following is the most cost-effective choice? A) Access Point B) Data cabling C) Ethernet over Power (EoP) D) Power over Ethernet (PoE) Correct Answer) Will allow a SOHO (Small Office Home Office) network to be built using Ethernet power adapters which is much cheaper than running cable. Everything else) 1) Does this over RJ-45 data cabling. - Running cables is more expensive than Powerline adapters which will make use of what's already in the home. 2) Could be installed to setup a SOHO network, but it would result in more expensive installation versus using existing power circuits via our correct answer. 3) Allows a WiFi device to connect to a network; Wireless is prohibited so this isn't a viable option.

C) Ethernet over Power (EoP) Everything else) D, B, A.

Why is it recommended that you disable the Universal Plug and Play (UPnP) feature on your router? A) It increases signal interference with other wireless devices. B) It is a power-hungry service and consumes more electricity. C) It makes it easy for hackers to discover the router and hijack the network. D) It requires Wired Equivalent Privacy (WEP) encryption, which is the weakest type of wireless encryption. Correct Answer) Although Universal Plug and Play (UPnP) allows WiFi-enabled devices to be easily discoverable by the router, it also leads to this weakness in security! Everything else) 1) This is created when so-and-so occurs by using the same channel or radio frequency to transmit and receive WiFi signals. 2) 5 GHz > its 2.4 GHz counterparts, at increasing reduced battery life, especially in mobile devices. 3) Can be easily hacked. - The reason it is still used is either the default security on the wireless access point/router has not been changed or these devices are not capable of WiFi Protected Access (WPA) or higher security.

C) It makes it easy for hackers to discover the router and hijack the network. Everything else....) 1) A (Co-channel interference by 2 or more devices.) 2) B (power-hungry) 3) D (WPA, WPA2 >>>>> WEP)

A bridge divides a local network into two or more segments. Where collisions occur in these segments, the bridge can separate those collision domains. How does the bridge perform this function? A) It forwards signals received out of each port for reception by all devices. B) It receives frames into a port buffer and reads the destination MAC address from the Ethernet frame. C) It tracks MAC addresses of each port and only forwards communications out of the port associated with the destination MAC address. D) It transmits and receives signals and processes them as digital data. Correct Answer [T / F]) 1) The bridge keeps track of the MAC addresses attached to each segment. It can, however, pass signals from one segment to another, regardless if there is a match to the destination MAC address or not. 2) Receiving frames is a function of a switch where the frames are received into a port buffer, the switch then reads the destination MAC address from the Ethernet frame. - The switch then uses its MAC address table to look up the port connected to the destination MAC address and sends the frame. 3) A computer's NIC transmits and receives the signals sent over the bridge and processes the signals as either analog or digital data. 4) Bridges can forward signals received out of each port for reception by all devices; Tracking and forwarding based on MAC addresses help to do so with ease.

C) It tracks MAC addresses of each port and only forwards communications out of the port associated with the destination MAC address. [T / F 1] FALSE (It only passes signals from one segment to another if there is a match to the destination MAC address, reducing traffic loads in any one segment.) [T / F 2] TRUE. [T / F 3] FALSE (Digital data ONLY.) [T / F 4] FALSE (Hubs are what do this; doing so can cause collision and poor network performance. - Tracking and forwarding based on MAC addresses by bridges is what helps to alleviate collisions.

What is Internet Message Access Protocol (IMAP) over TCP port 143 used for? A) Connecting to a remote host B) Retrieving content from a web server C) Retrieving email from an email server D) Sending email Correct Answer) Is performed when configuring an email account. The message is put in the message store on the recipient's mail server. The recipient uses the mail client software to connect with the mailbox server using IMAP. Everything else) 1) Is done over TCP port 25 is used for sending email. 2) Is done over TCP port 23 is used to connect to a remote host (typically via a terminal emulator) and is unlikely to be used on modern networks. 3) Is done over TCP 80 is used to retrieve content from a web server.

C) Retrieving email from an email server Everything else) 1) B (Simple Mail Transfer Protocol (SMTP) over TCP port 25) 2) A (Telnet over TCP port 23) 3) D (Hypertext Transfer Protocol (HTTP) over TCP 80)

LTE (Long Term Evolution) is a wireless broadband technology for communication of high speed data for mobile phones. What is the main difference between GSM (Global System for Mobile) and CDMA (Code-Division Multiple Access) and LTE? A) LTE (Long Term Evolution) is used for voice and texts only. B) LTE (Long Term Evolution) phones do not need SIM (Subscriber Identity Module) cards. C) LTE (Long Term Evolution) phones need SIM (Subscriber Identity Module) cards. D) LTE (Long Term Evolution) was developed for 2G connectivity. [T / F 1] Supported by all network providers otherwise, any device using 4G needs a SIM (Subscriber Identity Module) card. [T / F 2] GSM (Global System for Mobile) and CDMA (Code-Division Multiple Access) are used for data,voice and texts, just like LTE. [T / F 3] Most newer phones also take SIM cards to support LTE. [T / F 4] GSM (Global System for Mobile) and CDMA (Code-Division Multiple Access) were both developed for 2G connectivity, alongside LTE - the only standard for 4G.

C) LTE (Long Term Evolution) phones need SIM (Subscriber Identity Module) cards. [T / F 1] TRUE. [T / F 2] FALSE (GSM, CDMA == voice & texts; LTE == data.) [T / F 3] TRUE. [T / F 4] FALSE (GSM, CDMA were developed mainly for 2G; LTE is one of two standards for 4G.)

What does 5G add to the cellular communications networks that 3G or 4G did not? A) Analog technology and simple telephony service with data B) Long Term Evolution (LTE) and a download speed up to 300Mbps (megabits per second) C) More bandwidth, lower latency, and ability to connect more devices D) Up to 250Kbps speed and support for text and data services, alongside voice support Correct Answer) Provides 3 new features to the cellular networks: up to 20Gbps (Gigabits per second) with standard rates of 1Gbps, a lower latency at only 1ms (milliseconds), and the ability to connect more devices. Everything else (Basically...)) 1) Describes 4G. 2) Describes 1G (replaced by 2G and 3G.). 3) Describes 2G.

C) More bandwidth, lower latency, and ability to connect more devices Otherwise.....) B, A, D.

The network needs to support a pre-Windows 2000 legacy system. What protocol will need to be enabled? A) IP B) LDAP C) NetBT (NetBIOS over TCP/IP) D) TCP/IP Correct answer) This was re-engineered to work over the TCP and UDP protocols. - It is a networking protocol that allows pre-Windows 2000 legacy computers to be used on a modern network called (3). Otherwise) 1) Is responsible for basic networking. At its core, it works with Internet addresses and every computer on a modern network called (3). - To function properly, it must have a numeric address. 2) Is a protocol used to query and update a directory presented as X.500. It is widely supported in current directory products. 3) Is a collection of protocols used for networking designed to work together allowing networked hosts to communicate.

C) NetBT (NETBIOS over TCP/IP) Otherwise (in this order)) A, B, D.

What feature is a requirement for port forwarding to work? A) Dynamic Host Configuration Protocol (DHCP) B) Dynamic Network Address Translation (DNAT) C) Network Address Translation (NAT) D) Universal Plug and Play (UPnP) Correct Answer) This must be enabled on the router, as it is what's used to conceal internal private IP addresses from external networks. - A router is configured with a single public IP address on its external interface and a private address on its internal interface. Everything else) 1) Is a network service in which IP addresses are automatically assigned to devices that have been configured as clients of the same type. 2) Is a technique in which multiple public Internet Protocol (IP) addresses are mapped and used with an internal or private IP address. 3) Is the feature that allows devices on your home network to discover each other and access certain services.

C) Network Address Translation (NAT) Everything else.....) A, B, D.

If you want to run some sort of server application from your network making it accessible to the Internet, what do you need to setup? A) Content filtering B) Media Access Control (MAC) filtering C) Port forwarding D) Port triggering Correct Answer) A router is configured to make a device connected to the network accessible to other devices from outside the local network. - This uses Internet Protocol an (IP) address plus a port number to route network requests to specific devices. - This allows you to configure a host to forward a network port from one network node to another Everything else) 1) Is the feature that automates our correct answer. 2) Is the use of an online program to screen and exclude from access or availability Web pages or email that is deemed objectionable. 3) Determines access based on the network cards address, requiring that blacklists and whitelists are configured to manage authorized devices.

C) Port forwarding Everything else (in-order)) D, A, B.

The utility company you work for is moving to connect the substations to the network. It is a regulatory requirement that proactive security measures against network attacks be implemented immediately. What would you need to do to make sure the network is compliant, and the utility isn't fined? A) Purchase and install an Endpoint Management server B) Purchase and install an Intrusion Detection System (IDS) C) Purchase and install an Intrusion Prevention System (IPS) D) Purchase and install a proxy server Correct Answer) A proactive security measure. - It is an inline security device that monitors suspicious network and/or system traffic and reacts in real time to block it.measure. Partial Credit) A reactive measure that identifies and mitigate ongoing attacks. - It monitors network or system activities for malicious activities or policy violations and produces reports to a management station. Everything else) 2) Is a system that isolates internal clients from the servers by downloading and storing files on behalf of the clients, providing only SOME security. 3) Validates user credentials and scans devices logging into the network for compliance with corporate security policies, providing only SOME security.

C) Purchase and install an Intrusion Prevention System (IPS) Partial Credit) B Everything else...) D, A.

Which of the following wireless communication standards provide only one-way communication? A) Infrared (IR) (light) B) Near Field Communication (NFC) C) Radio Frequency Identification (RFID) D) Zigbee Correct Answer) Only provides one-way wireless communication. - Is better suited for applications such as EZ Pass or tracking items. - It is a means of tagging and tracking objects using specially-encoded tags. Everything else) Is TWO-WAY wireless: 1) Is an open source communications protocol used primarily for home automation. 2) Is a radio communication technology which can be used for such applications as credit card payments and membership cards. - Only a simple touch is needed between the devices to transfer data. 3) Is a mobile technology used for device communication over short ranges, mostly used to control electronic devices such as televisions, projectors, etc.

C) Radio Frequency Identification (RFID) Otherwise) D, B, A.

What type of device is designed to filter and transfer data packets between dissimilar types of computer networks? A) Firewall B) Hub C) Router D) Switch Correct Answer) Involves devices designed to filter and transfer data packets between dissimilar types of computer networks by assigning a local IP address to each of the devices. Everything else) 1) Passes traffic from one device to every other device connected to them. - These are an early type of device used to implement Ethernet cabling design, referred to as a star topology. 2) Connects nodes together in a single network, repeating and regenerating signals over multiple ports. - It is the network appliance that "ties" the whole local network together. 3) Can be software or hardware that monitors network traffic and depending on its configuration settings applied to each data packet either blocks or allows the traffic to pass through.

C) Router Everything else) B, D, A.

At what speed and on what radio frequency does the 802.11g operate? A) Speeds up to 1.7 Gbps in the 5 GHz band B) Speeds up to 11 Mbps in the 2.4 GHz band C) Speeds up to 54 Mbps in the 2.4 GHz band D) Speeds up to 600 Mbps in the 5 GHz band Correct Answer) - Has other support data rates of 6, 9, 12, 18, 24, 36, and 48 Mbps. - Offers backward compatibility to another legacy standard of the same frequency. Everything else) 1) Describes 802.11ac. 2) Describes 802.11b. 3) Describes 802.11n, which also operates in the 2.4 GHz band, at speeds of up to 288.8 Mbps.

C) Speeds up to 54 Mbps in the 2.4 GHz band (backwards compatible w/802.11b) Everything else) 1) A 2) B 3) D

Neither hubs nor bridges are widely used on networks anymore. These appliances have been replaced by Ethernet switches. How are switches like hubs? A) Switches amplify received signals, so they can be transmitted over greater distance without loss of quality. B) Switches are used to reduce the effect of contention on network performance. C) Switches can connect nodes together in a single network, repeating and regenerating signals over multiple ports. D) Switches consist of multiple ports arranged in rows used for cable management. Correct Answer [out of BRIDGES, EXTENDERS, HUBS, PATCH PANELS, REPEATERS, ROUTERS, SWITCHES]) 1) Like ____, switches can connect nodes together in a single network, repeating and regenerating signals over multiple ports. Switches are the network devices that tie the whole local network together. 2) Like ______, these are used to reduce the effect of contention on network performance. 3) _________ amplify received signals, so they can be transmitted over greater distance without loss of quality and is NOT a function of a switch or a hub. 4) __________ consist of multiple ports arranged in rows used for cable management. The port on the patch panel is connected to a port on a switch or hub.

C) Switches can connect nodes together in a single network, repeating and regenerating signals over multiple ports. 1) HUBS. 2) BRIDGES. 3) REPEATERS. 4) PATCH PANELS.

In what way does Dynamic Network Address Translation (DNAT) differ from static NAT? A) It can be implemented as software on a system or as hardware in a dedicated device. B) The internal IP addressing scheme is made visible to external hosts. C) There is not a one-to-one ratio of internal to external addresses. D) The router can translate between two addressing schemes. Correct Answer) With the former, this basically means that any number of internal addresses can share a pool of external addresses. - The latter maps an internal Internet (IP) address to a static port or a specific IP address. Everything else) 1) This makes DNAT > NAT better in some cases. [T / F 1] The internal IP addressing scheme is made visible to external hosts in either NAT or DNAT. [T / F 2] The router can translate between two addressing schemes for DNAT only.

C) There is not a one-to-one ratio of internal to external addresses. Everything else.....) A. [T / F 1] FALSE (Never happens in DNAT). [T / F 2] FALSE (Works for both NAT & DNAT.)

You are creating a wired SOHO (Small Office, Home Office) network. Each computer is set to hibernate after office hours to save energy, electricity, and money. You need the ability to perform software upgrades overnight, what configuration settings could you make on the adapter? A) Auto negotiate B) Virtual Private Network (VPN) C) Wake on LAN (WoL) D) Wake-on-Wireless LAN (WoWLAN) Correct Answer) Powers up a system without human intervention; it will automatically wake up the computer and you will be able to perform that upgrade, and then after a certain amount of idle time, go back to sleep. Everything else) 1) Some devices with wireless chipsets come with this, despite lack of wide support; our correct answer works in a wired network. 2) Sets the NIC at the speed and duplexing of the switch it plugs into via Ethernet cable. 3) Is a ""tunnel"" through the Internet. It allows a remote computer to join the local network securely.

C) Wake on LAN (WoL) Everything else....) D, A, B (in order).

Which encryption protocol should one use on a SOHO (Small Office Home Office) wireless access point? A) Wired Equivalent Privacy (WEP) B) WiFi Protected Access (WPA) C) WiFi Protected Access 2 (WPA2) D) WiFi Protected Setup (WPS) Correct Answer) Should be the protocol chosen for SOHO (Small Office Home Office) networks because of its strong encryption and authentication security. Everything else) 1) Is a security standard to secure computers connected to a WiFi network; the correct answer is much more secure, however. 2) Is a standard for the easy and secure establishment of a wireless network. - Activating this on the access point and the adapter simultaneously will associate the device with the access point using our correct answer. 3) Provides very weak security and should not be relied upon for confidentiality.

C) WiFi Protected Access 2 (WPA2) Everything else) B, D, A.

Which of the following wireless communication standards is a mesh network with a limit of four "hops" between the controller device and endpoint? A) Infrared (IR) B) Near Field Communication (NFC) C) Z-Wave D) Zigbee Correct Answer) Is run by Silicon Labs, which has stricter controls to make sure every one of these devices work with every controller made for this. - It is a mesh network where signals can hop from controlling device to endpoint a maximum of four times. Everything else) 1) Is a two-way short-range radio communications standard operating in the 13.56 MHz, there are no "hops" to other devices. 2) Is a two-way wireless mobile technology used for device communication over short ranges, mostly used to control electronic devices such as televisions, projectors, etc. 3) Is a mesh network (like our correct answer) which means that signals can "hop" from controlling device to endpoint. - It does not have a limit on the number of "hops", however.

C) Z-Wave Otherwise...) B, A, D.

Which one of the wireless technology generations offered the new Long Term Evolution (LTE) only for data? A) 1G B) 2G C) 3G D) 4G Correct Answer) Is one of the two standards offered within this area, WiMax (Worldwide Interoperability for Microwave Access, Inc.) being the second. - The standard calls for downlink speeds of up to 300Mbps and uplink speeds of up to 76Mbps. Everything else) 1) Is the FIRST these 2 phone connection techs: GSM (Global System for Mobile) and CDMA (Code-Division Multiple Access). 2) Has its signals are transmitted in digital format in continued use of GSM (Global System for Mobile) and CDMA (Code-Division Multiple Access) technologies. 3) Is an analog-only format that offered simple telephone service with data.

D) 4G Otherwise) B, C, A.

You need to configure a wireless SOHO (Small Office Home Office) network that can operate at two different channel widths on the same spectrum simultaneously. It needs to ensure that a mixture of old and new company smartphones, tablets, laptops, and desktops can access the WiFi. What network standard will your network setup need to support? A) 802.11a B) 802.11ac C) 802.11b D) 802.11n Correct Answer) Uses channels in the 2.4 GHz band or the 5 GHz band. - A dual band access point can support both 2.4 GHz and 5 GHz bands simultaneously. - This allows legacy clients to access the network on the 2.4 GHz band. Everything else) 1) Is now limited to quite old equipment. - Works only in the 2.4 GHz band. 2) Continues the development of our correct answer's technologies. - Works only in the 5 GHz band. 3) Works only in 5 GHz band and was not as widely adopted as two other legacy bands which work in the 2.4 GHz only.

D) 802.11n Everything else.....) 1) C 2) B 3) A (not as widely adopted as 802.11b/g)

Which standard supports speeds up to 600 Megabits per second (Mbps) in the 2.4 GHz or 5 GHz frequency ranges? A) 3 B) 120 VAC C) 802.11a D) 802.11n Correct Answer) The nominal data rates here are 288.8 Megabits per second (Mbps) for a single channel and 600 Mbps for bonded channels. Everything else) 1) Is a legacy standard using channels in the 5GHz band at data rate of only 54 Mbps. 2) Is a North American household electricity standard, equal to that of 60 Hz (60 cycles/second.

D) 802.11n Everything else.....) C, B.

If the goal is to use Secure Sockets Layer (SSL) for incoming emails, which Post Office Protocol (POP3) incoming mail server port is used to configure the email client settings? A) 110 B) 587 C) 993 D) 995 Correct Answer) The default port number using SSL/TLS security to protect POP3 email communications between the client and server is what this is (i.e. POP3S). Otherwise (These are also Default Port #s)) 1) What's using SSL/TLS security to protect Simple Mail Transfer Protocol (SMTP) email communications between the client and server is what this is (i.e. SMTPS). 2) What's using SSL/TLS security to protect Internet Message Access Protocol (IMAP) email communications between the client and server is what this is (i.e. IMAPS). 3) This is found on TCP & is used by POP3 to connect mail client software with the mailbox on the mail server to retrieve the clients messages.

D) 995 Otherwise (in this order)) B, C, A.

What protocol and port number would you use to secure communication over a computer network? A) HTTP port number 80 B) HTTP port number 443 C) HTTPS port number 80 D) HTTPS port number 443 Correct Answer) Is used to secure communication over a network; its operation is indicated by using https:// for the URL and by a padlock icon shown in the browser. Partial Credit) 1) Is the unsecure communication application that is indicated by using http:// for the URL in the browser.

D) HTTPS port number 443 Partial Credit) A) HTTP port number 80

Why is a Digital Subscriber Line (DSL) modem more ideal for applications such as gaming, VoIP, and viewing videos than a cable modem? A) It can be used for a cable connection. B) It creates the communication between the PC and the service by converting the signal. C) It provides "always on" Internet connectivity. D) It tends to send information packets faster than a cable connection. Correct Answer) When you compare the latency of cable and Digital Subscriber Line (DSL), a DSL is more ideal in these example areas because of this, in terms of speed. Everything else) 1) One connects your PC and the telephone line that contains the Digital Subscriber Line service. - One connects your PC to the cable television line, which is different and incompatible with the other. 2) A cable modem works like the DSL modem except... for this, for compatibility reasons. 3) Both a DSL modem and a cable modem do this.

D) It tends to send information packets faster than a cable connection. Everything else (in-order)) A, B, C.

The sole purpose of a mail server is to process and deliver incoming and outgoing email. What network protocols are used to carry out these functions? A) DNS, SMTP, IMAP4 B) FTP, NTP, SLP C) HTTP, SNMP, SMB D) MAPI, SMTP, POP3 Correct Answer) 1) Sends the email to the Exchange mail server. 2) Delivers the email to the recipient's mail server. 3) Accesses email, via connecting the recipient's mail software to the mail server.

D) MAPI, SMTP, POP3

In setting up a new Small Office Home Office (SOHO) network for a small business, you want to ensure that more bandwidth is allocated to business apps and discourage game-playing during work hours. What would you need to configure on the wireless router? A) Network Address Translation (NAT) B) Port forwarding C) Port triggering D) Quality of service (QoS) Correct Answer) Allows for prioritization of network traffic. For example, more bandwidth can be allocated to business apps while less bandwidth can be allocated to games. Everything else) 1) Allows an outside device to connect to a specific device in a network. - It will not allocate bandwidth, you will need to configure our correct answer. 2) Translates private IP addresses in data packets to a public IP address so information can be routed to and from other networks. - It only routes traffic. 3) Opens a specific incoming port in response to traffic on a specific outgoing port. - To discourage game playing our correct answer will need to be configured.

D) Quality of service (QoS) Everything else.....) B, A, C (in order).

What device is used to overcome network cabling distance limitations? A) Access Point B) Bridge C) Hub D) Repeater Correct Answer) Is a device used to overcome the distance limitations imposed by network cabling. On fiber optic networks it is often necessary to use these on long-distance communications cabling. Everything else) 1) Is a device that divides a local network into segments. - Hosts on one segment can communicate with those on another segment only via this. 2) Is a networking device that allows a Wi-Fi device to connect to a wired network. - It usually connects to a router as a standalone device, but it can also be an integral component of the router itself. 3) Is a device that ensures that all devices receive signals put on the network - It just repeats all transmissions across all ports.

D) Repeater Everything else) B, A, C.

You are installing a wireless Small Office Home Office (SOHO) network for a new client. The business is located near an apartment complex and you are noticing a lot of interference on channel 6. What is one of the first steps you could take to resolve this issue? A) Disable SSID broadcast B) Enable MAC filtering C) Replace the access point D) Select channels 1 or 11 instead Correct Answer) Wireless networks in areas where multiple wireless networks are active frequently have performance problems due to interference from other networks. You can eliminate interference with most networks by finding non-overlapping channels. Everything else) 1) Could be a viable solution, but testing out all possible configuration options and ensuring the access point is working would be one of your first steps, such as our correct answer. 2) Can be used to block access to a network based on the client's address of the same type. - When enabled, it will block access to unidentified clients attempting to access the network. 3) Can hide wireless networks from casual users by doing this. - As a result, it is difficult for other users to see the network without using special tools.

D) Select channels 1 or 11 instead Everything else....) C, B, A.

What mail server uses Transmission Control Protocol (TCP) port 25 by default? A) Internet Message Access Protocol (IMAP) B) MX (Mail Exchanger) C) Post Office Protocol (POP3) D) Simple Mail Transfer Protocol (SMTP) Correct Answer) Is an outgoing mail server which sends email messages between servers using TCP port 25 by default. - The delivery of the message usually requires several "hops" which are recorded in the message header. Everything else) 1) Acts like an address for your domain's email. Records of the same name tells the rest of the Internet where to send the email. 2) Is the most recent level of this protocol, operating on TCP ___. - This is a client/server protocol for connecting to a recipient's mail server. - It's also more widely implemented than (3). 3) Provides extra features like support for mail folders other than inbox and calendar functionality, operating on TCP ___. - It is an incoming mail server not as widely implemented as (2).

D) Simple Mail Transfer Protocol (SMTP) Everything else....) 1) B 2) C (TCP 110) 3) A (TCP 143)

Which of the following servers logs event messages sent from networked devices? A) Authentication server B) DHCP server C) Proxy server D) Syslog server Correct Answer) Is a way for network devices to send event messages to a logging server, usually known as a Syslog server. - This protocol is supported by a wide range of devices and can be used to log different types of events. Everything else) 1) Allows for the setup of IP address pools for the purpose of using this to distribute IP addresses to clients joining the network only. 2) Is a server which is used to control network traffic for client computers, mainly through controlling Internet requests made by computers on a network. 3) Is a server that validates a user and device claim to a network. - An example of this is a RADIUS server which authenticates someone trying to connect to a network through a VPN.

D) Syslog server Everything else...) 1) B 2) C 3) A

You want to measure the current temperature in your home remotely. Which Internet of Things (IoT) endpoint device would you need to purchase and install? A) Alexa B) HVAC (heating, ventilation, and air conditioning) C) Non-programmable thermostat D) Thermostat Correct Answer) Will let you remotely operate heating and hot water controls and measure the current temperature in your home using an app on your smartphone or computer. Everything else) 1) Allows you to control the heating and air conditioning directly from the thermostat, but it cannot be controlled remotely. 2) Tends to be used to describe any air conditioning or heating device, whether it's a window unit or a central system. 3) Could be configured with "skill" shortcuts allowing her to respond to commands, specifically "_____, turn the heating up".

D) Thermostat Everything else (in order)) C, B, A.

In terms of network access, what is the purpose of a blacklist? A)To define the specific clients that will be denied access to the network B) To determine access to the network from the address assigned to each network card C) To identify attempts to access a secure domain and prevent unauthenticated access D) To identify the devices that are not authorized to access the network Correct Answer) This is a list of items, such as usernames or Internet Protocol (IP) addresses, that don't have this allowed to a certain system or protocol. When a blacklist is used for access control, all entities are allowed access, except those listed within this. Everything else) 1) By contrast, this lists the users, clients, or addresses that are authorized on the network. - By default, no one has this in the bag unless that user or machine is specifically given this. 2) Determines access based on the network card's address. It requires that our correct answer and (1) be configured to manage authorized devices. 3) Enterprise networks use these to configure user accounts and perform this for the subjects trying to use those accounts.

D) To identify the devices that are not authorized to access the network Everything else) 1) A (Whitelist, access denied by default.) 2) B (MAC filtering, a moral grey between White-and-Blacklisting.) 3) C (authentication servers authenticating.)

In an enterprise network, a Demilitarized Zone (DMZ) is a means of establishing a more secure configuration. How do many SOHOs (Small Office Home Offices) use the term DMZ? A) To define the specific clients that will be denied access to the network B) To describe a host that is configured to forward a port from one network node to another C) To identify the devices that are not authorized to access the network D) To mean "not protected by the firewall" as the host is fully accessible to other Internet hosts Correct Answer) Refers to a computer on the Local Area Network (LAN) that is configured to receive communications for any ports that have not been forwarded to these. Everything else [Blacklist, Port Forwarding, Whitelist]) 1) Allows you to configure a host to forward a network port from one network node to another; automated by Port Triggering. 2) Is list of items, such as usernames or Internet Protocol (IP) addresses, that are denied access to a certain system or protocol. 3) Lists the users, clients, or addresses that are authorized on the network; access is denied, otherwise (by default.).

D) To mean "not protected by the firewall" as the host is fully accessible to other Internet hosts Everything else...) 1) B (Port Forwarding) 2) A (Blacklist) 3) C (Whitelist)

You are building a Small Office Home Office (SOHO) network for a new upstart gaming business. You are placing the gaming server in the Demilitarized Zone (DMZ). Why? A) To describe a host that is configured to forward a port from one network node to another B) To hide network IP addresses from external users by making the computer network invisible C) To identify attempts to access a secure domain and prevent unauthenticated access D) To protect the server while still making it accessible to other users through the Internet Correct Answer) The demilitarized zone (DMZ) provides something very useful between the internal network and the gaming server being accessed from the Internet. - This is done so the business's customers won't have problems here in the long run. Everything else) 1) Enterprise networks are what primarily do this. 2) Port forwarding describes this. 3) A proxy server sits between a client computer and the Internet, performing this action described.

D) To protect the server while still making it accessible to other users through the Internet Everything else (in-order)) C, A, B.

Smart cameras, Internet of Things (IoT) devices, are built with embedded technology having various functions. What is the main function of IoT security cameras? A) To alert you of an intruder B) To detect potential issues C) To provide face recognition (to a facial recognition file) D) To record images to cloud storage Correct Answer) At the end of the day, or at predefined intervals, or when device memory is nearly full, the camera does this to cover "suspicious" events to this online service for records-keeping & review. Everything else) 1) A guard who used to monitor endless streams of video can now be signaled for this, courtesy of camera monitoring and recognizing this. 2) Future systems will be able to do this to those that have already passed screening or have taken affirmative steps to be included in this type of file. 3)IoT and other building security devices — including microphones, Infrared sensors and smoke detectors —add to this ability.

D) To record images to cloud storage Everything else.....) A, C, B.

What is the primary purpose of a Domain Name System (DNS) server? A) Logging event messages sent by network devices for identification of any issues or problems B) Maintaining a pool of IP addresses and leasing these to network devices C) Storing, processing and delivering web pages to clients D) Translating names into numeric IP addresses Correct Answer) Is the Internet's equivalent of a phone book. - It does what we're looking for here because, although domain names are easy for people to remember, computers or machines access websites based on IP addresses. Everything else) 1) Describes a DHCP server; IP addresses no longer in use are automatically returned to the pool for reallocation. 2) Describes a web server; the communication between client and server takes place using the Hypertext Transfer Protocol (HTTP). 3) Describes a Syslog server.

D) Translating names into numeric IP addresses Everything else) 1) B 2) C 3) A

Telnet on Transmission Control Protocol (TCP) port 23, a command-line emulation protocol and program, is still sometimes used for what? A) Replacement of unsecure administration and file copy programs B) To connect to a Screen Sharing server C) To establish a Wi-Fi Direct connection between devices to transfer files D) Troubleshooting and configuration Correct Answer) Is sometimes still used for doing this to that of SMTP or HTTP. - Another application of this is towards that of ensuring routers or switches work right. - Since security risks are too high, this is unlikely to be used on a modern network. Everything else) 1) Is a replacement for Telnet and FTP. - Uses TCP port 22 by default and encryption to protect a session. 2) Is known as VNC, which is a freeware product that works over TCP port 5900, that connects to this. 3) Is an ad-hoc service in Apple iOS and macOS operating systems called AirDrop.

D) Troubleshooting and configuration. Everything else) A, B, C... A) SSH is designed to replace unsecure administration and file copy programs such as Telnet and FTP. SSH uses TCP port 22 by default and encryption to protect a session. B) For remote desktop functionality, any VNC client can be used to connect to a Screen Sharing server. VNC is a freeware product that works over TCP port 5900. C) AirDrop establishes a Wi-Fi Direct connection between devices for file transfers. It is an ad-hoc service in Apple iOS and macOS operating systems.

In the network, what does HyperText Transfer Protocol (HTTP) use to submit a request for a resource? A) Fully Qualified Domain Name (FQDN) B) Hyperlinks C) HyperText Markup Language (HTML) D) Uniform Resource Locator (URL) Correct Answer) Resources on the Internet are accessed using an addressing scheme, which this is known as. This contains all the information necessary to identify and access a resource requested. Everything else) 1) Is what the location of the host is usually represented by. 2) HTTP is usually used to serve these exact plain text files with coded tags describing how the page should be formatted. The web browser interprets the tags and displays the text and other resources associated with the web page. 3) Is what's found in nearly all web pages, allowing users to click from page to page or other related documents.

D) Uniform Resource Locator (URL) Everything else) A, C, B.

You are installing a Small Office Home Office (SOHO) network. What appliance would you use that requires no configuration, provides basic functions, and ties the network together? A) Firewall B) Hub C) Router D) Unmanaged switch Correct Answer) This connects the devices together on the Small Office Home Office (SOHO) network without requiring any sort of configuration. - You just power it on, connect some hosts to it, and it works without any more intervention. Everything else) 1) Passes traffic from one device to every other device connected to them like a switch. - These are also legacy appliances that you would not install on a modern network. 2) Can be software or hardware that monitors network traffic and depending on its configuration settings applied to each data packet either blocks or allows the traffic to pass through. 3) Is a networking device that connects a local network to other local networks. - It is a more sophisticated device than our correct answer and requires configuration once installed on the network.

D) Unmanaged switch Everything else) B, A, C.

Power over Ethernet (PoE) is a means of supplying electrical power from a switch port over data cabling, category 5 (Cat 5) or better, to a connected powered device. What is a Power over Ethernet (PoE) power injector used for? A) Automatically detecting and communicating over electrical wiring B) Overcoming distance limitations imposed by network cabling C) Providing power to PoE connected devices D) Upgrading non-PoE network connections to PoE Correct Answer) Is as simple as patching it through the power injector (for the opposite end), and as with PoE switches, power injection is controlled and automatic. Everything else) 1) When switches are PoE enabled they can do this to certain peripherals without the need for a power injector. 2) Ethernet over Power (EoP) utilizes the building power circuits to do this, not our correct answer. - Our 2 correct pieces of hardware uses existing data cabling for network connectivity only. 3) Doing this when v]utilizing PoE with or without injectors can be achieved by using a repeater.

D) Upgrading non-PoE network connections to PoE HINT) non-PoE == opposite end. Everything else) C, A, B.

A web server is one that provides client access using the HyperText Transfer Protocol (HTTP) or its secure version (HTTPS). What host name is a common alias to indicate that the resource is a web server? A) AD B) FQDN C) URL D) WWW Correct Answer) Is a common alias to indicate that the resource is a web server. Nowadays web services are used to offer fully-fledged web applications, using a variety of programming and scripting languages and environments. Everything else) 1) Is a directory service that Microsoft developed for the Windows domain networks maintaining a centralized database containing user account and security information. 2) Is another name for a website address. One of its elements is (3), the most specific part of which is the host name. 3) The full name of any host is exactly this.

D) WWW Otherwise) A, C, B (in order.).

Internet of Things (IoT) door locks can offer a good deal of convenience when leaving and entering your home. However, there are several things you should consider before installing an IoT door lock. Which of these is NOT a consideration? A) You should make sure the door closes properly. B) You should make sure the door lock fits. C) You should use good batteries. D) You will need to replace your deadbolt. Correct Answer) Buying a smart lock "conversion kit" that essentially turns your traditional deadbolt into a smart lock is a good idea down the line. Everything else) IS ABSOLUTELY CORRECT.

D) You will need to replace your deadbolt. Everything else.....) A, B, C.

If you wanted to install a wireless mesh network to monitor and remotely control your home using the 2.4 gigahertz (GHz) band, what wireless networking protocol would you use? A) Long Term Evolution (LTE) (4G) B) Near Field Communication (NFC) C) Z-Wave D) Zigbee Correct Answer) Uses the widely populated 2.4-GHz Industrial, Scientific and Medical Radio (ISM) band. - Can be used to remotely monitor and control your home. - It is like another answer but provides an open source solution that supports more overall devices. Partial Credit) 1) Uses radio frequencies in the high 800 to low 900 MHz range. - Is also used for home automation to wirelessly control such devices as lighting, security systems, thermostats, etc. Otherwise) 2) Is a converged cellular wireless protocol supported by all network providers. - It is a cellular digital communication standard for mobile devices. 3) Is a two-way short-range radio communication which can be used for such applications as credit card payments and membership cards. - Only a simple touch is needed between the devices to transfer data.

D) Zigbee Partial Credit) C Otherwise) A, B.


Ensembles d'études connexes

Chapter 11: project risk management [questions]

View Set

Principles of Marketing: Ch. 11 Prep

View Set

Ch. 38 assessment of digestive and GI function PrepU

View Set

Solve Linear Equations - 1 variable; hanlonmath

View Set

Nursing Process (PREPU Questions) CHP. 18 - EVALUATION

View Set