Module 7 Test

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

Which of the following 802.11 wireless networking standards support transfer rates of over 54 Mbps? (Select TWO.)

802.11ac 802.11n

Match the protocol or encryption name with the feature.

AES - Current encryption algorithm used today. TKIP - Generates a different key for every transmission; however, the encryption algorithm used for its calculations is no longer considered secure., WEP - No longer considered secure because the key used for encryption doesn't change., WPA - Typically uses TKIP for encryption., WPA2 - Typically uses AES for encryption.

A client is requesting an Internet connection type that is not affected by atmospheric conditions and is always on.Which of the following will meet these requirements?

Cable

A technician is configuring a new SOHO multifunction wireless router at a customer's location to provide network access to several wireless devices. The technician is required to protect the customer's private network from unauthorized access while performing the initial router setup as well as during normal operation after the configuration is completed.

Change the router's default administrative password.

You are setting up your Windows computer to connect to the Internet and notice that when you type www.microsoft.com, the browser does not go to the site. Instead, you receive an error message saying that the address cannot be resolved.What network setting should you check to see the address of the server being used to resolve this address?

DNS

Your company shares a building with a competitor's branch office. Recently, you noticed that some computers other than company computer have tried to connect to the wireless network unsuccessfully. When you are in the parking lot, you also notice that the company's wireless network SSID can be seen on your smartphone.What can you do to make sure no one outside your company can gain access to its wireless network? (Select all that apply.)

Disable SSID broadcasting. Lower radio power levels. Enable MAC filtering

Which of the following is a scenario in which an IT support technician would most likely be required to implement the alternate IP configuration method on a network host?

In the event a DHCP server is unavailable, the workstation will have a valid IP address on the subnet.

A group of wireless devices are using each other as relays to share a network connection across a large area.Which of the following network categories is being used?

WMN

You are tasked with configuring a wireless SOHO router for a customer.Which of the following settings will be the most secure with the least effort and cost to the customer?

WPA2-PSK, AES

Henry is troubleshooting a network connection and wants to see if he can connect to the server on his network.Which Microsoft command-line command should Henry use to check whether he can connect to the server?

ping


Set pelajaran terkait

ServSafe Manager's Training - Chapter 4

View Set

Chapter 17: Preoperative Nursing Management

View Set

"I will Plant you a Lilac Tree" Characters

View Set

Στερεά γεωμετρικά σχήματα

View Set