Networking + Ch 6&7 Quiz

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

The use of multiple antennas on an access point to issue a signal to one or more receivers is enabled by what 802.11 innovation? 1. frame aggregation 2. channel bonding 3. spread spectrum frequency hopping 4. multiple input-multiple output (MIMO)

4. multiple input-multiple output (MIMO)

Which type of cloud service model involves hardware services that are provided virtually, including network infrastructure devices such as virtual servers? A. XaaS B. PaaS C. SaaS D. IaaS

D. IaaS

An enterprise-wide VPN can include elements of both the client-to-site and site-to-site models. False True

True

The Wi-Fi Protected Setup PIN can be easily cracked through a brute force attack. True False

True

Which of the following statements regarding the 802.11ac standard is NOT accurate? A. 802.11ac access points function more like a hub than a switch. B. 802.11ac access points can handle multiple transmissions at one time over the same frequency. C. 802.11ac operates on the 5-GHz band. D. The standard was officially approved in early 2014.

A. 802.11ac access points function more like a hub than a switch 802.11ac access points function more like a SWTICH than a HUB

Office 365 is an example of a SaaS implementation with a subscription model. A. True B. False

A. True

When using RFID, what is an ARPT (Active Reader Passive Tag)? A. It is a battery-powered tag actively transmits its credentials at regular time intervals, which can be read remotely. B. It is a tag that is activated by an active reader, and uses power from the reader's radio to power its transmission. C. It is a tag that can be read remotely up to a distance of 50 m, but requires a powerful active reader. D. It is a tag that requires an active reader, but still contains a battery in the tag.

B. It is a tag that is activated by an active reader, and uses power from the reader's radio to power its transmission.

Which file transfer protocol has no authentication or security for transferring files, uses UDP, and requires very little memory to use? A. File Transfer Protocol (FTP) B. Trivial FTP (TFTP) C. FTP Secure (FTPS) D. Secure FTP (SFTP)

B. Trivial FTP (TFTP)

Diffraction has what affect on a wireless signal's propagation? A. The signal is completely absorbed by the diffracting material. B. The signal is returned back towards the source of the original signal. C. The signal is split into secondary waves that continue in the direction in which they split. D. The signal is redirected into multiple directions.

C. The signal is split into secondary waves that continue in the direction in which they split.

By default, what network connection type is selected when creating a VM in VMware, VirtualBox, or KVM?

NAT mode


Set pelajaran terkait

NURS 405: Med Surg II Presentation NCLEX Questions

View Set

FINAL EXAM - Case Examples, REE Law Exam 3

View Set

Chapter 4 Life Insurance Policies

View Set

9.5 Types of Movements at Synovial Joints

View Set

english IV william blake's "the chimney sweeper" (songs of innocence), "the chimney sweeper" (the songs of experience", and "the poision tree" study guide

View Set

chapter 8 digestive system/ major organs

View Set

Organization Behavior Test 2 (Chapter 4,5,6)

View Set