Cisc Module 13-16

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

Which three steps must be completed to manually connect an Android or IOS device to a secured wireless network? (Choose three.)

Input the authentication password. Enter the network SSID. Choose the correct security type.

Which statement accurately characterizes the evolution of threats to network security?

Internal threats can cause even greater damage than external threats.

What is the purpose of a DMZ?

It allows external hosts to access specific company servers while maintaining the security restrictions for the internal network.

What is CSMA/CA on a network?

an access method that is used by wireless technology to avoid collisions

What is a common countermeasure for Trojan horses?

antivirus software

Which type of attack involves an attacker using a powerful computer to try a large number of possible passwords in rapid succession to gain access to a system​?

brute force

What are two types of wired high-speed Internet connections? (Choose two.)

cable and DSL

What technology allows users to access data anywhere and at any time?

cloud computing

Why should WEP not be used in wireless networks today?

easily crackable

What wireless router configuration would stop outsiders from using your home network?

encryption

What is a characteristic of a computer worm?

exploits vulnerabilities with the intent of propagating itself across a network

What specialized network device is responsible for permitting or blocking traffic between networks?

firewall

Which type of attack exploits human behavior to gain confidential information?​

social engineering

Which wireless RF band do IEEE 802.11b/g devices use?

2.4 GHz

What two IEEE 802.11 wireless standards operate only in the 5 GHz range? (Choose two.)

802.11a and 802.11ac

Which type of device provides an Internet connection through the use of a phone jack?

DSL modem

What happens when a wireless access point is configured to stop broadcasting the SSID?

The network is invisible to those who are unaware of the SSID.

A student tells a teacher that many junk emails are appearing on a new personal laptop. What is a possible cause of the problem?

The new laptop does not have antivirus or anti-spam software installed.

Which cloud computing opportunity would provide the use of network hardware such as routers and switches for a particular company?

infrastructure as a service (IaaS)

Which feature is characteristic of MAC filtering in wireless networks?

it restricts computer access to a wireless network

What are three advantages of wireless over wired LAN technology? (Choose three.)

lower on-going costs ease of installation ease of expansion

Which two business and technical challenges does implementing virtualization within a data center help businesses to overcome? (Choose two.)

physical footprint power and air conditioning

An administrator wants to configure a router so that users on the outside network can only establish HTTP connections to the internal web site. Which feature would the administrator configure to accomplish this?

port forwarding

Which three attacks exploit human behavior? (Choose three.)

pretexting phishing vishing


Set pelajaran terkait

Personal Financial Planning Test 1

View Set

Chapter 7 Human biodiversity today

View Set