Computer Science - Exam 7

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

A client is requesting an Internet connection type that is not affected by atmospheric conditions and is always on. Which of the following will meet these requirements? Dial-up, Cable, Satellite, Hotspot?

Cable

What connector is shown in the image? (10) 329

RJ-45

Which encryption algorithm is no longer considered secure because the key used for encryption doesn't change?

WEP

You have connected an ADSL Internet connection as shown in the image. The ports at the phone jack are connected to the same single-number POTS line. At what location should you place the DSL filter?

"B" only

Which of the following is a wireless Internet connectivity method that utilizes cellular technology? 802.11ac, WiMAX, 3G, Satellite?

3G

Which 802.11 wireless networking standards support transfer rates of over 54 Mbps?

802.11ac and 802.11n

Which encryption algorithm is currently used today?

AES

Your company is implementing a wireless network and is concerned that someone from a competing company could stand outside the building and collect wireless data. You have assured the company that WPA2 is secure. What makes WPA2 more secure than WPA?

AES

Derek has been tasked with setting up and securing a SOHO router. He wants to make sure the wireless network is secure and that no unauthorized person can gain access to the network. What is the first step Derek should perform to secure the wireless router?

Change default username and password.

A client contacted you to request your help in researching and supplying the hardware necessary to implement a SOHO solution at his new home-based business. Which of the following SOHO router features will simplify IP address configuration on the private network for both wired and wireless clients? Switch, FTP Server, DHCP Server, Firewall, or Wireless Access Point?

DHCP server

Which of the following will use an RJ-11 connector for connectivity?

DSL

You have been tasked with configuring a SOHO network in which all ports on the public untrusted network will be forwarded to one workstation connected to the LAN. Which of the following features will you configure on the SOHO router to accomplish this task? Port Forwarding, MAC Filtering, Demilitarized Zone, or Quality of Service?

Demilitarized Zone

Your company shares a building with a competitor's branch office. Recently, you noticed that some computers other than company computers have tried to connect to the wireless network unsuccessfully. When you are in the parking lot, you also notice that the company's wireless network SSID can be seen on your smartphone. What can you do to make sure no one outside your company can gain access to its wireless network? Disable SSID broadcasting; Lower radio power levels; Add access points; Enable MAC filtering; Set up firewall settings.

Disable SSID broadcasting, Lower radio power levels, and Enable MAC Filtering.

Mary, a remote user, connects her Windows 10 laptop to the corporate network by way of the Internet using a VPN tunnel. Which of the following is often configured as a required step for a user each time she attempts to use the VPN connection?

Enter the same username and password used on the corporate network.

Which wireless networking protocol uses LTE technology with a maximum speed of up to 1 Gbps?

Fourth-generation cellular

A manager in a small office is asking if it is possible to limit network access to a particular website during business hours. Apparently, several users are spending an excessive amount of time on the site preventing them from completing their work-related tasks. Which of the following is the best solution to accomplish the request from the manager while not limiting access to other websites? Implement MAC filtering on the SOHO router for the PCs that are accessing the site; Configure a firewall and add the site the users are visiting to the whitelist; Configure a firewall with content filtering on the PCs of users who are visiting the site; Implement a blacklist on the firewall and add the site the users are visiting?

Implement a blacklist on the firewall and add the site the users are visiting.

Jacob wants to set up extra security on his wireless network; he currently uses WPA2. He wants to allow only his devices to connect to the network and reject devices that he does not own. What extra wireless security should Jacob employ in on his wireless router?

MAC filtering

Which wireless protocol uses a different key for every transmission; however, the encryption algorithm used for its calculations is no longer considered secure?

TKIP

George is concerned that his children might somehow be exposed to things on the Internet that they are not mature enough to handle. He wants a way to limit their ability to view content on the Internet. What will you recommend to George?

Use Parental Controls

Several wireless devices are using each other as relays to share a network connection across a large area. Which of the following network categories is being used? PAN, WLAN, MAN, WMN

WMN

Which wireless protocol typically uses TKIP for encryption?

WPA

Which wireless protocol typically uses AES for encryption?

WPA2

You are tasked with configuring a wireless SOHO router for a customer. Which of the following settings will be the most secure with the least effort and cost to the customer? WPA2-Enterprise; WPA-PSK, TKIP; WPA2-PSK, TKIP; WPA2-PSK, AES

WPA2-PSK, AES

A corporate user is attempting to connect to the company's Windows domain server on the local network with her new laptop through a wired connection. Which of the following is required for the user to successfully sign in to the Windows domain? SSID, authentication and encryption settings; Windows domain user name and password; A valid connection to a DHCP server on the LAN; Username and password supplied by ISP?

Windows domain user name and password

Henry is troubleshooting a network connection and wants to see if he can connect to the server on his network. Which Microsoft command-line command should Henry use to check whether he can connect to the server?

ping

A technician wants to configure a DHCP server to guarantee that certain printers always receive the same address. Which of the following should the technician configure? VPN Tunnel, Address Reservation, Subnet Mask, or Default Gateway

Address reservation

Which of the following devices are most commonly used to connect a LAN to an ISP for broadband services? Network Interface Card, Cable Modem, Firewall, DSL Modem, Dial-up Modem

Cable Modem or DSL Modem

A technician is configuring a new SOHO multifunction wireless router at a customer's location to provide network access to several wireless devices. The technician is required to protect the customer's private network from unauthorized access while performing the initial router setup as well as during normal operation after the configuration is completed. Which of the following is the best step for the technician to take in securing the router to meet this requirement? Enable DHCP on the router and configure IP address reservations for the wireless clients; Change the router's default administrative password; Disable the router's radio in the wireless network settings; Configure MAC filtering on the router and allow access to only the technician's computer?

Change the router's default administrative password.

You are setting up your Windows computer to connect to the Internet and notice that when you type www.microsoft.com, the browser does not go to the site. Instead, you receive an error message saying that the address cannot be resolved. What network setting should you check to see the address of the server being used to resolve this address?

DNS

Which of the following is a scenario in which an IT support technician would most likely be required to implement the alternate IP configuration method on a network host?

In the event a DHCP server is unavailable, the workstation will have a valid IP address on the subnet.

A small group of travelers is meeting inside an ancient building, and the travelers need access to the Internet using their mobile devices. However, the group is in an area where Wi-Fi Internet is not available and cellular coverage is intermittent. One of the travelers has an unlimited cellular data plan and a strong consistent signal. Which of the following methods would most likely be implemented to provide Internet service to the group? Tethering, Satellite, Mobile Hotspot, Dial-up Internet?

Mobile Hotspot

Cathy wants to connect to her wireless LAN at home but is not sure where to change the setting so that she can connect. Where in the Windows Control Panel will Cathy find her computer's network connection settings?

Network and Sharing Center

You have connected a cable Internet connection as shown in the image. At what location should you place a filter?

No filters are required

A remote worker wants to connect his computer to his corporation's private trusted network over the Internet. Which of the following will need to be configured?

VPN tunnel

What is the correct order of network types when categorized by their size or the physical area they cover, from largest to smallest?

WAN, MAN, LAN, PAN


Set pelajaran terkait

Dehydration Synthesis and Hydrolysis

View Set

principles of emergency services

View Set

Exam 1- Human Physiology & Anatomy Practice Exam

View Set

NUR 201 EXAM: Therapeutic Relationship/Communication/Techniques/Barriers

View Set

Chapter 4.1: Cost of Merchandise Sold

View Set