CFS262 | Chapter 7: Setting up a Local Network | P2

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

Which of the following 802.11 wireless networking standards support transfer rates of over 54 Mbps? (Select TWO.)

802.11a 802.11ac 802.11g 802.11b 802.11n

Which of the following is a wireless Internet connectivity method that utilizes cellular technology?

802.11ac WiMAX 3G Satellite

What protocol makes a connection, checks whether the data is received, and resends it if it is not?

TCP UDP IP DNS

Which of the following wireless networking protocols uses LTE technology with a maximum speed of up to 1 Gbps?

Third-generation cellular Fourth-generation cellular Fifth-generation cellular 802.11n Wi-F

Which of the following is a scenario in which an IT support technician would most likely be required to implement the alternate IP configuration method on a network host?

To ensure a workstation receives the same IP address from the DHCP server each time the workstation is booted. In the event a DHCP server is unavailable, the workstation will have a valid IP address on the subnet. When a workstation requires that more than two different DNS server IP addresses be configured for a specific network interface. To assign a secondary DNS server IP address to a specific network interface on the workstation.

What connector is shown in the exhibit?

USB-A RJ-11 F-type RJ-4

What is the name of the 32-bit or 128-bit number that is used to identify a device on a network?

port number protocol number IP address IP version

How are IP addresses available to the Internet classified?

public private non-routable standar

The solution for securing private data traveling over a public network, such as the Internet, is the use of what type of network?

public encrypted network virtual private network private encrypted network virtual prevention network

What functions as the name of a wireless network?

secure key MAC address Network ID SSID

Your company is implementing a wireless network and is concerned that someone from a competing company could stand outside the building and collect wireless data. You have assured the company that WPA2 is secure.What makes WPA2 more secure than WPA?

AES TKIP RADIUS TACACS

If a device does not receive an IP address from a DHCP server, the device may resort to what kind of IP address?

APIPA random IP address public IP address dynamic IP address

A small group of travelers is meeting inside an ancient building, and the travelers need access to the Internet using their mobile devices. However, the group is in an area where Wi-Fi Internet is not available and cellular coverage is intermittent. One of the travelers has an unlimited cellular data plan and a strong consistent signal.Which of the following methods would most likely be implemented to provide Internet service to the group?

Cell phone tethering Satellite Internet Mobile hotspot Dial-up Internet

Which of the following will use an RJ-11 connector for connectivity?

Cellular Cable Fiber DSL Ethernet

A client is requesting an Internet connection type that is not affected by atmospheric conditions and is always on.Which of the following will meet these requirements?

Dial-up Cable Satellite Cellular hotspot

Your company shares a building with a competitor's branch office. Recently, you noticed that some computers other than company computer have tried to connect to the wireless network unsuccessfully. When you are in the parking lot, you also notice that the company's wireless network SSID can be seen on your smartphone.What can you do to make sure no one outside your company can gain access to its wireless network? (Select all that apply.)

Disable SSID broadcasting. Lower radio power levels. Add access points Enable MAC filtering. Set up firewall settings.

Your company shares a building with a competitor's branch office. Recently, you noticed that some computers other than company computer have tried to connect to the wireless network unsuccessfully. When you are in the parking lot, you also notice that the company's wireless network SSID can be seen on your smartphone.What can you do to make sure no one outside your company can gain access to its wireless network? (Select all that apply.)

Disable SSID broadcasting. Lower radio power levels. Add access points Enable MAC filtering. Set up firewall settings

The company where Derek works has tasked him with setting up and securing a SOHO router. He wants to make sure the wireless network is secure and that no unauthorized person can gain access to the network.What is the first step Derek should perform to secure the wireless router?

Disable SSID. Set encryption standard. Check radio power levels. Change default user name and password.

A technician is configuring a new SOHO multifunction wireless router at a customer's location to provide network access to several wireless devices. The technician is required to protect the customer's private network from unauthorized access while performing the initial router setup as well as during normal operation after the configuration is completed.Which of the following is the best step for the technician to take in securing the router to meet this requirement?

Enable DHCP on the router and configure IP address reservations for the wireless clients. Change the router's default administrative password. Disable the router's radio in the wireless network settings. Configure MAC filtering on the router and allow access to only the technician's computer.

A technician is configuring a new SOHO multifunction wireless router at a customer's location to provide network access to several wireless devices. The technician is required to protect the customer's private network from unauthorized access while performing the initial router setup as well as during normal operation after the configuration is completed.Which of the following is the best step for the technician to take in securing the router to meet this requirement?

Enable DHCP on the router and configure IP address reservations for the wireless clients. Change the router's default administrative password. Disable the router's radio in the wireless network settings. Configure MAC filtering on the router and allow access to only the technician's computer.

When using static IP addressing, software automatically configures the network connection on each device.

False

If the computer you are using is a laptop that moves from one network to another, what tab can be used to configure a secondary configuration, such as a static IP if a DHCP server cannot be reached?

General Configuration Alternate Configuration Secondary Configuration Fallback Configuration

You have just finished installing a network adapter and booted up the system, installing the drivers. You open File Explorer on a remote computer and don't see the computer on which you installed the new NIC. What is the first thing you check?

Has IPv6 addressing been enabled? Is the computer using dynamic or static IP addressing? Do the lights on the adapter indicate it's functioning correctly? Has the computer been assigned a computer name?

You have just finished installing a network adapter and booted up the system, installing the drivers. You open File Explorer on a remote computer and don't see the computer on which you installed the new NIC. What is the first thing you check?

Has IPv6 addressing been enabled? Is the computer using dynamic or static IP addressing? Do the lights on the adapter indicate it's functioning correctly? Has the computer been assigned a computer name?

You are setting up your Windows computer to connect to the Internet and notice that when you type www.microsoft.com, the browser does not go to the site. Instead, you receive an error message saying that the address cannot be resolved.What network setting should you check to see the address of the server being used to resolve this address?

IP address Subnet mask Gateway DNS

A manager in a small office is asking if it is possible to limit network access to a particular website during business hours. Apparently, several users are spending an excessive amount of time on the site preventing them from completing their work-related tasks.Which of the following is the best solution to accomplish the request from the manager while not limiting access to other websites?

Implement MAC filtering on the SOHO router for the PCs that are accessing the site. Configure a firewall and add the site the users are visiting to the whitelist. Configure a firewall with content filtering on the PCs of users who are visiting the site. Implement a blacklist on the firewall and add the site the users are visiting.

A client contacted you to request your help in researching and supplying the hardware necessary to implement a SOHO solution at his new home-based business.Which of the following SOHO router features will simplify IP address configuration on the private network for both wired and wireless clients?

Multi-port switch FTP server DHCP server Firewall Wireless access point

Cathy wants to connect to her wireless LAN at home but is not sure where to change the setting so that she can connect.Where in the Windows Control Panel will Cathy find her computer's network connection settings?

Network Control Center Network and Sharing Center Administrative Tools Internet Options

Cathy wants to connect to her wireless LAN at home but is not sure where to change the setting so that she can connect.Where in the Windows Control Panel will Cathy find her computer's network connection settings?

Network Control Center Network and Sharing Center Administrative Tools Internet Options

Which of the following devices are most commonly used to connect a LAN to an ISP for broadband services? (Select TWO.)

Network interface card Cable modem Firewall DSL modem Dial-up modem

As an IT technician, you arrive at a customer's home office to troubleshoot problems he's experiencing with his printer. While questioning the customer to get an understanding of his network, you find that he has a new Wi-Fi router that connects wirelessly to a new desktop and two new laptops, in addition to multiple smartphones, tablets, and the network printer. He also has several smart home devices, including security cameras, light switches, door locks, and a thermostat supported by an IoT controller hub. To work on the printer, which type of network will you be interacting with?

PAN WAN WMN LAN

A corporate user is attempting to connect to the company's Windows domain server on the local network with her new laptop through a wired connection. Which of the following is required for the user to successfully sign in to the Windows domain?

SSID, authentication and encryption settings Windows domain user name and password A valid connection to a DHCP server on the LAN User name and password supplied by the ISP

You run the ipconfig command on your computer, and it reports an IP address of 169.254.75.10 on the Ethernet interface. Which device assigned this IP address to the interface?

The ISP's DNS server The local network's DHCP server on the SOHO router The cable modem The local computer

A remote worker wants to connect his computer to his corporation's private trusted network over the Internet.Which of the following will need to be configured?

VPN tunnel Address reservation DHCP server Firewall

A remote worker wants to connect his computer to his corporation's private trusted network over the Internet.Which of the following will need to be configured?

VPN tunnel Address reservation DHCP server Firewal

You are tasked with configuring a wireless SOHO router for a customer.Which of the following settings will be the most secure with the least effort and cost to the customer?

WPA2-Enterprise WPA-PSK, TKIP WPA2-PSK, TKIP WPA2-PSK, AES

Jacob wants to set up extra security on his wireless network; he currently uses WPA2. He wants to allow only his devices to connect to the network and reject devices that he does not own.What extra wireless security should Jacob employ in on his wireless router?

WPS Port forwarding Disable SSID broadcasting MAC filtering

You've just received a call from Human Resources asking for assistance with a problem. One of your company's employees, Renee, has recently undergone extensive surgery and will be homebound for 3-5 months. She plans on working from home and needs a solution to enable frequent and extended access to the company network's resources. Which WAN technology will you need to configure for Renee and which tool will you use to configure it?

WWAN using the Network Connections window Dial-up using the Network and Sharing Center Ethernet using the Network Connections window VPN using the Network and Sharing Center

Your customer then asks you if it would be worth the investment for him to have Ethernet cabling installed to reach each of his workstations, instead of connecting them by Wi-Fi to his network. Specifically, he wants to know if that would speed up communications for the workstations. You examine his router and find that it's using 802.11ac Wi-Fi. Would you advise him to upgrade to Ethernet? Why or why not?

Yes, because Ethernet is faster than 802.11ac. Yes, because wired connections are always faster than wireless connections. No, because installing Ethernet cabling is more expensive than the increased speed is worth. No, because 802.11ac speeds are faster than Ethernet.

Your customer then asks you if it would be worth the investment for him to have Ethernet cabling installed to reach each of his workstations, instead of connecting them by Wi-Fi to his network. Specifically, he wants to know if that would speed up communications for the workstations. You examine his router and find that it's using 802.11ac Wi-Fi. Would you advise him to upgrade to Ethernet? Why or why not?

Yes, because Ethernet is faster than 802.11ac. Yes, because wired connections are always faster than wireless connections. No, because installing Ethernet cabling is more expensive than the increased speed is worth. No, because 802.11ac speeds are faster than Ethernet.

Packets are delivered to a single node on a network when using what type of IPv6 address?

anycast address default gateway address multicast address unicast address

What type of IP address is configured by a server when a device first initiates a connection to the network?

default dynamic static configured

How is the network portion and the host portion of an IP address identified?

dynamic address DHCP address default gateway subnet mask

What device handles access to another network for a client computer if it does not have a better option?

firewall default gateway network switch network hub

Unicast addresses include what types of addresses? (Choose all that apply).

global address anycast address multicast address link-local address

What type of device can be used to block unwanted traffic initiated from the Internet and can also restrict Internet access from an internal network?

hub switch firewall VPN

The ability to send and receive transmissions at the same time on an Ethernet cable is referred to by what term?

simplex mode half duplex auto transmit full duplex


Set pelajaran terkait

CIS 102B - Networking Fundamentals

View Set

Series 66 Chapter 11: Retirement Plans and College Tuition Plans

View Set

Key Terms - Cardiovascular System

View Set