Networking Essentials – Modules 13 – 16
ease of expansion lower on-going costs ease of installation
What are three advantages of wireless over wired LAN technology? (Choose three.) a. higher level of security b. longer transmission distance c. ease of expansion d. lower on-going costs e. ease of installation
cable DSL
What are two types of wired high-speed Internet connections? (Choose two.) a. dial-up b. cellular c. satellite d. cable e. DSL
The network is invisible to those who are unaware of the SSID.
What happens when a wireless access point is configured to stop broadcasting the SSID? a. Computer access to the wireless access point is restricted. b. The identity of the network is freely broadcast. c. Signals are prevented from transmission outside the boundaries of the local network. d. The network is invisible to those who are unaware of the SSID.
an access method that is used by wireless technology to avoid collisions
What is CSMA/CA on a network? a. an access method that is used by wired Ethernet technology to avoid collisions b. an access method that is used by wireless technology to avoid collisions c. an access method that is used by wireless technology to avoid duplicate SSIDs d. an access method that is used by any technology that has excessive collisions
exploits vulnerabilities with the intent of propagating itself across a network
What is a characteristic of a computer worm? a. exploits vulnerabilities with the intent of propagating itself across a network b. a set of computer instructions that lies dormant until triggered by a specific event c. tricks users into running the infected software d. malicious software that copies itself into other executable programs
antivirus software
What is a common countermeasure for Trojan horses? a. authentication b. antivirus software c. firewall d. encryption
It allows external hosts to access specific company servers while maintaining the security restrictions for the internal network.
What is the purpose of a DMZ? a. It provides secure connectivity for clients that connect to the internal network through a wireless LAN. b. It creates an encrypted and authenticated tunnel for remote hosts to access the internal network. c. It analyzes traffic for intrusion attempts and sends reports to management stations. d. It allows external hosts to access specific company servers while maintaining the security restrictions for the internal network.
firewall
What specialized network device is responsible for permitting or blocking traffic between networks? a. access point b. switch c. bridge d. firewall
Cloud computing
What technology allows users to access data anywhere and at any time? a. Cloud computing b. virtualization c. micromarketing d. data analytics
802.11ac 802.11a
What two IEEE 802.11 wireless standards operate only in the 5 GHz range? (Choose two.) a. 802.11ad b. 802.11n c. 802.11g d. 802.11ac e. 802.11b f. 802.11a
encryption
What wireless router configuration would stop outsiders from using your home network? a. encryption b. IP address c. router location d. network name
infrastructure as a service (IaaS)
Which cloud computing opportunity would provide the use of network hardware such as routers and switches for a particular company? a. browser as a service (BaaS) b. infrastructure as a service (IaaS) c. software as a service (SaaS) d. wireless as a service (WaaS)
It restricts computer access to a wireless network.
Which feature is characteristic of MAC filtering in wireless networks? a. It allows only authorized users to detect the network. b. It restricts computer access to a wireless network. c. It is configured on the computer rather than on the router. d. It encrypts data that is transmitted on a wireless network.
Internal threats can cause even greater damage than external threats.
Which statement accurately characterizes the evolution of threats to network security? a. Internet architects planned for network security from the beginning. b. Early Internet users often engaged in activities that would harm other users. c. Threats have become less sophisticated while the technical knowledge needed by an attacker has grown. d. Internal threats can cause even greater damage than external threats.
vishing pretexting phishing
Which three attacks exploit human behavior? (Choose three.) a. malware b. brute force c. vishing d. zombies e. pretexting f. phishing
Input the authentication password. Enter the network SSID. Choose the correct security type.
Which three steps must be completed to manually connect an Android or IOS device to a secured wireless network? (Choose three.) a. Set the IP address. b. Activate the Bluetooth antenna. c. Input the authentication password. d. Enter the network SSID. e. Change the MAC address. f. Choose the correct security type.
physical footprint power and air conditioning
Which two business and technical challenges does implementing virtualization within a data center help businesses to overcome? (Choose two.) a. virus and spyware attacks b. physical footprint c. operating system license requirements d. server hardware needs e. power and air conditioning
social engineering
Which type of attack exploits human behavior to gain confidential information? a. social engineering b. denial of service c. spyware d. virus
The new laptop does not have antivirus or anti-spam software installed.
A student tells a teacher that many junk emails are appearing on a new personal laptop. What is a possible cause of the problem? a. The new laptop does not have antivirus or anti-spam software installed. b. The school email server is not functioning properly. c. The student has spent too much time surfing the web. d. The laptop needs to be updated to the latest OS version.
port forwarding
An administrator wants to configure a router so that users on the outside network can only establish HTTP connections to the internal web site. Which feature would the administrator configure to accomplish this? a. PAT b. NAT overload c. static NAT d. port forwarding
brute force
Which type of attack involves an attacker using a powerful computer to try a large number of possible passwords in rapid succession to gain access to a system? a. brute force b. pretexting c. phishing d. DDoS
DSL modem
Which type of device provides an Internet connection through the use of a phone jack? a. DSL modem b. satellite modem c. cable modem d. Wi-Fi AP
2.4 GHz
Which wireless RF band do IEEE 802.11b/g devices use? a. 5 GHz b. 2.4 GHz c. 900 MHz d. 60 GHz
easily crackable
Why should WEP not be used in wireless networks today? a. its lack of support b. its age c. its lack of encryption d. easily crackable e. its use of clear text passwords