ExamCram: 7-8
Which of the following channel options would allow three Wireless Access Points (WAPs) to be set up on non-overlapping channels?
1 6 11
An IPv6 address consists of:
128 bits
Which of the following frequency bands can be used by IEEE 802.11 networks? (Select all that apply)
2.4 GHz 5.0 GHz
What is the channel bandwidth specified in the IEEE 802.11a standard?
20 MHz
Which of the following channel bandwidths is specified in the IEEE 802.11g standard?
20 MHz
The IEEE 802.11n standard specifies available channel bandwidth options of: (Select 2 answers)
20 MHz 40 MHz
Which of the following is a channel bandwidth used in 802.11b networks?
22 MHz
An IPv4 address consists of:
32 bits
An SSL VPN connection typically requires a dedicated VPN client application.
False
IPv6 addresses are expressed by using:
Hexadecimal numbers
Which of the following reflects differences between passive and active network security breach responses?
IDS vs. IPS
Which of the following VPN types is used to connect computers to a network? (Select 2 answers)
Remote-access Client-to-site
Which of the following terms is used to describe a permanent IP address assignment from a DHCP server?
Reservation
What is the function of an HTTP server?
Serving of web pages (
Which type of VPN enables connectivity between two networks?
Site-to-site
Which of the following refers to the permanent assignment of an IP address?
Static IP address
Which of the following determines which network segment an IP address will belong to?
Subnet mask
Which of the following is a type of server used to collect diagnostic and monitoring data from networked devices?
Syslog server
A double colon in an IPv6 address indicates that one part of the address, containing only zeros, has been compressed to make the address shorter.
True
The term "Channel bonding" refers to a technique that allows for combining adjacent channels to increase the amount of available bandwidth.
True
The term "Unified Threat Management" (UTM) refers to a network security solution, commonly in the form of a dedicated device (called a UTM appliance or a web security gateway), which combines the functionality of a firewall with additional safeguards such as URL filtering, content inspection, spam filtering, gateway antivirus protection, IDS/IPS functionality, or malware inspection.
True
Which of the following terms describes a logical grouping of computers that allow computer hosts to act as if they were attached to the same broadcast domain, regardless of their physical location?
VLAN
A system that uses a public network (such as the Internet) to create a private encrypted connection between remote locations is called:
VPN
Which of the following is a dedicated device designed to manage encrypted connections established over an untrusted network such as the Internet?
VPN concentrator
Which of the following refer to IoT technologies designed to permit communication between appliances in a home automation network? (Select 2 answers)
Z-Wave Zigbee
Which of the following answers describe features of the IEEE 802.11ac wireless standard? (Select 3 answers)
5.0 GHz frequency band Maximum data signaling rate of up to 6.77 Gbps Multi-User Multiple Input / Multiple Output (MU-MIMO)
The IEEE 802.11n standard offers backward compatibility with: (Select all that apply)
802.11g 802.11b 802.11a
Which of the following describes the IEEE 802.11ac channel bandwidth option(s)? 20 MHz 40 MHz 80 MHz 160 MHz
Any of the above
Which of the following is one of the functions provided by RADIUS and TACACS servers?
Authentication
What type of server handles the assignment of dynamic IP addresses?
DHCP server
Which of the following server types is used for automatic allocation of IP addresses on a network?
DHCP server
What type of service performs an FQDN-to-IP resolution?
DNS
To connect to a website on the Internet and display its contents, a URL entered in a web browser address bar needs to be translated into an IP address. Which of the following servers handles this type of request?
DNS server
IPv4 addresses are expressed by using:
Decimal numbers
Which of the following is a networked device providing an entry point into another network or onto the Internet?
Default gateway
What is the function of an SMTP server?
Email handling
Which of the following is an IPv6 link-local address?
FE80::/10
A dedicated file server is also known as a(n):
FTP server
Which of the following are characteristic features of the IEEE 802.11n wireless standard? (Select all that apply)
Multiple Input / Multiple Output (MIMO) 2.4 GHz frequency band 5.0 GHz frequency band Maximum data signaling rate of up to 600 Mbps
Which of the following relate to IPv4 link-local addresses? (Select 3 answers)
Non-routable IP address APIPA address 169.254.0.0/16
IPP, LPD/LPR, and SMB/CIFS are examples of protocols that enable:
Printing
Which of the following is a computer system or an application/service that acts as an intermediary between a network host and the Internet?
Proxy
Which of the following wireless technologies enables identification and tracking of tags attached to objects?
RFID
Automatic Private IP Addressing (APIPA) allows a Windows host to self-configure an IP address and subnet mask when a Dynamic Host Configuration Protocol (DHCP) is unavailable. APIPA uses an address block range between 169.254.0.0 and 169.254.255.255. APIPA-assigned addresses are valid only for communications within the network segment that a given host is connected to (i.e. a host with an APIPA-assigned address cannot connect to the Internet).
True
Dynamic Host Configuration Protocol (DHCP) allows for static allocation of an IP address based on an IP-to-MAC address mapping.
True
Intrusion Detection Systems (IDSs) are devices or software applications designed to detect malicious activities or violations of security policies on a network or computer host. An IDS designed to monitor networks is known as a Network Intrusion Detection System (NIDS); an IDS monitoring a single host is called a Host Intrusion Detection System (HIDS). An IDS does not take any active steps to prevent or stop intrusions, relying on passive responses such as sending an alert to a management console or recording information about an event in logs.
True
Long Term Evolution (LTE) is a wireless communications standard for mobile devices and wireless hotspots. LTE is much faster than the older generation of 2G and 3G cellular networks. Both LTE and its later upgrade, LTE-Advanced (LTE-A), are often marketed as 4G standards.
True
Multiple Input / Multiple Output (MIMO) is a wireless technology that allows for significant increase in data throughput due to the use of multiple antennas and multiple data streams.
True
Network Address Translation (NAT) provides an IP proxy between a private LAN and a public network such as the Internet.
True
Networked clients not residing on the same subnet as a DHCP server can still obtain an IP address from the server through a DHCP relay agent (a.k.a. IP helper).
True