Ch 6

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

You're setting up a home network for your neighbor, who is a music teacher. She has students visiting her home regularly for lessons and wants to provide Internet access for their parents while they're waiting on the children. However, she's concerned about keeping her own data private. What wireless feature can you configure on her AP to meet her requests?

A guest network

What is the WAN Default Gateway? Enter your answer in the space provided.

10.0.0.1

What is the router's WAN IP address? Enter your answer in the space provided.

10.0.0.136

What 802.11 standards (mode) are used for the router's 5Ghz wireless band? a. 11bg mixed b. 11bgn mixed c. 11ac only d. 11a/n/ac mixed

11ac only

What 802.11 standards (mode) are used for the router's 2.4Ghz wireless band? a. 11bg mixed b. 11bgn mixed c. 11ac only d. 11a/n/ac mixed

11bgn mixed

What is the router's LAN IP address? Enter your answer in the space provided.

192.168.0.1

802.11ac provides an advantage over 802.11n by incorporating increased channel bonding capabilities. What size bonded channels does 802.11ac support?

20-, 40-, 80-, and (optional) 160-MHz channels

Which Wi-Fi frequency band offers 24 unlicensed communications channels in the United States?

5-GHz band

Which IoT wireless standard is used to sync data from a smartwatch, bike computer, and smart phone to a single user account?

802.11ac

To exchange information, two antennas must be tuned to the same __________.

Frequency

What feature of a site survey maps the Wi-Fi signals and other noise in your location?

Heat map

What is the router's SSID for the 2.4Ghz wireless band? Enter your answer in the space provided.

LabConnection 2.4n

What is the router's SSID for the 5Ghz wireless band? Enter your answer in the space provided.

LabConnection 5.0ac

Signals traveling through areas in which many wireless communications systems are in use will exhibit a lower due to the higher proportion of noise.

Signal-to-noise ratio

When a wireless signal encounters a large obstacle, what happens to the signal?

The signal may pass through the object or be absorbed by the object, or it may be subject to the following phenomena: reflection, diffraction, or scattering.

Which kind of antenna is used in a point-to-point link, especially over long distances?

Unidirectional antenna

Why do wireless networks experience a greater reduction in throughput compared with wired networks?

Wireless networks experience a high number of collisions and require greater overhead on each transmission.

What type of device can be used to assess the quality of a wireless signal? a. Wi-Fi analyzer b. spectrum analyzer c. channel scanner d. frequency hopper

b. spectrum analyzer

Which 2.4 GHz Wi-Fi channels do not bleed over into others? a. 1, 6, 11 b. 3, 6, 9 c. 2, 4, 8 d. 5, 7, 10

a. 1, 6, 11

You are configuring wireless routers for your company. They are a mix of new and used routers of the same brand and model. Based on the information in the lab, which IP address will you use to access the router? a. 192.168.0.1 b. 192.168.1.1 c. 192.168.0.0 d. 192.254.0.1

a. 192.168.0.1

Nmap is: a. A useful tool for a network security audit b. A computer program designed to discover and exploit vulnerabilities c. GPS mapping software d. A virus

a. A useful tool for a network security audit

How can you configure your router once you've disabled remote configuration? a. By using a wired computer b. By using your wireless laptop c. By using your smart phone d. By using Windows 10 with all updates installed

a. By using a wired computer

Which Bluetooth class has the highest power output? a. Class 1 b. Class 3 c. Class 2 d. They all have equal power output.

a. Class 1

What is one way your router can limit Internet access? a. Close ports b. Reroute ports to another server c. Refuse to assign IP addresses to devices on the network d. Refuse to allow a device on the local network to communicate with the router

a. Close ports

While troubleshooting an E-mail client issue on a user's system, you that the incoming mail server settings are configured to listen on port 143. How will the client be able to access E-mails if you continue to use port 143? [Choose all that apply]. a. Incoming E-mails will be stored on the server. b. You can use multiple devices to access E-mails. c. The E-mail client will not be able to send or relay E-mails. d. There will be no E-mails in the sent folder.

a. Incoming E-mails will be stored on the server. b. You can use multiple devices to access E-mails.

Which one of the following wireless transmission types requires a clear LOS to function? a. Infrared b. NFC c. Wi-Fi d. Bluetooth

a. Infrared

You've just completed a survey of the wireless signals traversing the airspace in your employer's vicinity, and you've found an unauthorized AP with a very strong signal near the middle of the 100-acre campus. What kind of threat do you need to report to your boss? a. Rogue AP b. Bluesnarfing c. Hidden node d. War driving

a. Rogue AP

Which is an example of an open source phone OS? a. Windows b. Android c. Ubuntu d. iOS

b. Android

Why should you update your router's firmware before making any other security changes? a. Because the firmware will not allow security changes until it is updated. b. Because the firmware might have security flaws c. Because a wireless user might steal the router password d. Because the router might lock up without the updates

b. Because the firmware might have security flaws

Why wouldn't "password" or "Linksys" make a good password for your router? a. Because they might be the default password b. Because they don't contain numbers or special characters c. Because they are easy to guess d. Because neither password is allowed by Linksys router firmware

b. Because they don't contain numbers or special characters c. Because they are easy to guess

Which Carrier Sense technology is used on wireless networks to reduce collisions? a. CSMA/CD b. CSMA/CA c. 802.11 d. SSID

b. CSMA/CA

You just settled in for some study time at the local coffee shop, and you pause long enough to connect your smartphone to the Wi-Fi so you can listen to some music while you study. As you're about to sign in, you realize that you clicked on an SSID called "Free Coffee and Internet." What kind of security trap did you almost fall for? a. Guest network b. Evil twin c. Bluejacking d. Brute force attack

b. Evil twin

What is the lowest layer of the OSI model at which wired and wireless transmissions share the same protocols? a. Layer 1 b. Layer 3 c. Layer 2 d. Layer 4

b. Layer 3

Using port 110, you have configured an E-mail client to retrieve E-mails from a remote server over a TCP/IP connection. Which protocol is the E-mail client configured with? a. SNMP b. POP c. SNMP d. SMTP

b. POP

You are configuring wireless routers for your company. They are a mix of new and used routers of the same brand and model. You unbox the first one, connect it and use the default credentials to login. Access is denied. What do you do? a. Remove power, Wait and reconnect b. Reset the router c. Try a different Ethernet cable d. All of these will work

b. Reset the router

If you are accessing the Internet on your laptop through your phone, this is called what? a. War Driving b. Tethering c. Bluetooth d. Call Share

b. Tethering

Diffraction has what affect on a wireless signal's propagation? a. The signal is redirected into multiple directions b. The signal is split into secondary waves that continue in the direction in which they split c. The signal is returned back towards the source of the origional signal d. The signal is completely absorbed be the diffracting material

b. The signal is split into secondary waves that continue in the direction in which they split

What happens when you save a new administrative username and password on a router? a. More settings are available b. You are logged out c. You need to reset the router d. Nothing

b. You are logged out

What client application on your computer is used to configure a home router? a. An FTP client b. An app downloaded from the Windows Store c. A web browser d. Adobe Reader

c. A web browser

What technology does Bluetooth use to take advantage of the 79 channels allocated to the Bluetooth band? a. DSSS b. RTS/CTS c. FHSS d. ZigBee

c. FHSS

A wireless router holds its configuration information on which type of storage? a. SSD b. RAM c. Firmware d. This depends on the manufacturer

c. Firmware

An E-mail client application uses port 25 to connect to the outgoing E-mail server. Which protocol is being used in this scenario? a. IMAP b. SNMP c. SMTP d. POP3

c. SMTP

You have recently installed a new firewall on network. After the firewall is installed, you review the firewall logs and notice that port 25 incoming traffic is blocked. Which of the following protocol is impacted with this? a. SNMP b. IMAP c. SMTP d. POP3

c. SMTP

What is the tool for making a client connection to wireless simple, while not sacrificing strong encryption? a. WPA b. WPA2 c. WPS d. WEP

c. WPS

What is one advantage a wireless connection has over a wired connection? a. Wireless technology is usually faster than the latest wired connection technology b. Wireless connections are easier to secure than wired connections c. Wireless devices have free range of the wireless hotspot d. Wireless devices can receive public IP addresses

c. Wireless devices have free range of the wireless hotspot

When you change the wireless 2.4GHz and 5GHz credentials, how would this affect the actions of a hacker? a. cannot access network b. cannot access router c. can access router d. cannot access anything

c. can access router

Which of the following 802 Wi-Fi technologies is considered the most secure and provides the best performance? a. 802.11q b. 802.11b c. 802.11n d. 802.11ac

d. 802.11ac

Which 802.11 standard functions in both the 2.4-GHz and 5-GHz bands? a. 802.11ac b. 802.11b c. 802.11g d. 802.11n

d. 802.11n

802.11ac provides for channel bonding of a. 20 MHz b. 40 MHz c. 60 MHz d. All of the above

d. All of the above

A hacker takes advantage of an open Bluetooth connection to send a virus to a user's smartphone. What kind of security breach has occurred? a. Bluejacking b. War driving c. Data breach d. Bluesnarfing

d. Bluesnarfing

How could not changing your router's password compromise all of your other security changes? a. Because the router might be stolen b. Because a hacker might gain access to the router firmware utility c. Because the router's default password is easy to guess d. Both B and C

d. Both B and C

Which of the following changes is most likely to improve network performance? a. Disable the wireless connection and enable the Gigabit Ethernet connection b. Disable the Gigabit Ethernet connection and enable the Fast Ethernet connection c. Disable the Fast Ethernet connection and enable the wireless connection d. Disable the wireless connection because it is always slower than a wired connection

d. Disable the wireless connection because it is always slower than a wired connection

As a DHCP server on your local network, what range of IP addresses might your router serve up? a. IP addresses in the range 10.1.1.2 through 10.1.1.254 b. IP addresses in the range 192.168.1.0 through 192.168.1.254 c. IP addresses in the range 10.1.1.0 through 10.1.1.254 d. IP addresses in the range 192.168.1.2 through 192.168.1.254

d. IP addresses in the range 192.168.1.2 through 192.168.1.254

A user swipes her smartphone across a tag on a poster to obtain showtimes for a movie she wants to see later that evening. What wireless technology transmitted the data? a. Bluetooth b. Z-Wave c. ANT+ d. NFC

d. NFC

If users in your organizations use laptops and mobile to access online E-mail accounts. You are using IMAP as the protocol. What will happen if a user, using both mobile and a laptop, deletes one E-mail using either of the device? a. The desktop client will retain one copy of the E-mail as it is locally downloaded. b. The user will be able to see the E-mail in Inbox, but it will be marked as deleted. c. The user will be able to view it from the other device. d. The deletion of the E-mail will occur on both the devices.

d. The deletion of the E-mail will occur on both the devices.

Most wireless routers have a reset switch. In which situation would using the reset switch be useful? a. The router cannot communicate with one device on the LAN although it is able to communicate with other devices on the same LAN. b. You have just turned on the DHCP feature of your router. c. You have just set the router password. d. The router cannot communicate with the ISP.

d. The router cannot communicate with the ISP.

What do Wi-Fi Analyzer apps tell you? a. Everything about the spectrum b. You have an ongoing evil twin attack c. The best spot to put your WAP d. Wi-Fi networks visible and within range of the wireless NIC in your device

d. Wi-Fi networks visible and within range of the wireless NIC in your device

Wi-Fi shares spectrum with which other technologies? a. Zigbee b. NFC c. Bluetooth d. a and c

d. a and c


संबंधित स्टडी सेट्स

Ferdinand Magellan World Explorer

View Set

CySA+ Chapter 11: Frameworks, Policies, Controls, and Procedures

View Set

System Architecture Chapter 6 vocab

View Set

Analysis of Algorithms Final Review

View Set

Psych Ch. 13 Stress, Coping, and Health

View Set