901 Practice Test 15

Ace your homework & exams now with Quizwiz!

True

A DHCP server enables computers to request IP addresses and networking parameters automatically, reducing the need for a network administrator or a user to configure these settings manually.

True

A common example of channel overlapping in wireless networking would be the 2.4 GHz band used in 802.11, 802.11b, 802.11g, and 802.11n networks, where the 2.401 - 2.473 GHz frequency range is used for allocating 11 channels, each taking up a 22-MHz portion of the available spectrum. Setting up a wireless network to operate on a non-overlapping channel (1, 6, and 11 in this case) allows multiple networks to coexist in the same area without causing interference.

DHCP (Dynamic Host Configuration Protocol)

A network protocol providing an alternative solution to the manual assignment of IP addresses is called:

Channel

A portion of the available Radio Frequency (RF) band allocated for wireless communication is known as:

SNMP (Simple Network Management Protocol)

A protocol used in network management systems for monitoring network-attached devices is known as:

TKIP (Temporal Key Integrity Protocol)

A security protocol introduced in order to strengthen existing WEP implementations without requiring the replacement of legacy hardware is known as:

Port forwarding

A server with private IP address has been set up to handle requests from an outside (public) network. Which of the solutions listed below would enable its function?

Channel overlapping

A situation in which multiple channels share the frequency band causing interference and performance degradation for devices operating on channels that are too close to each other is known as:

True

A three-way handshake is a method used in a TCP/IP network to create a connection between a local host/client and server. It is a three-step method that requires both the client and server to exchange SYN (synchronize) and ACK (acknowledgment) packets before actual data communication begins.

WPA2 (Wi-Fi Protected Access)

AES-based (Advanced encryption standard) encryption mode is a characteristic feature of:

True

API is a set of clearly defined methods of communication between various software components. An API specification can take many forms, but often includes specifications for routines, data structures, object classes, variables or remote calls.

True

Dynamic Host Configuration Protocol (DHCP) is a network protocol that enables a server to automatically assign an IP address to a computer from a defined range of numbers (i.e., a scope) configured for a given network

HTTPS (Hypertext Transfer Protocol) IPsec (Internet Protocol Security) SSH (Secure Socket Shell)

Examples of secure network protocols offering traffic encryption include:

True

IPSec is an Internet Engineering Task Force (IETF) standard suite of protocols that provides data authentication, integrity, and confidentiality as data is transferred between communication points across IP networks. IPSec provides data security at the IP packet level.

Directory access protocol

LDAP (Lightweight Directory Access Protocol) is an example of:

True

NetBIOS over TCP/IP (NBT, or sometimes NetBT) is a networking protocol that allows legacy computer applications relying on the NetBIOS API to be used on modern TCP/IP networks.

True

Port forwarding allows remote computers (for example, computers on the Internet) to connect to a specific computer or service within a private local-area network (LAN).

True

Server Message Block (SMB) and Common Internet File System (CIFS) are examples of network protocols used for providing shared access to files, directories, and devices.

True

Simple Network Management Protocol (SNMP) is a popular protocol for network management. It is used for collecting information from, and configuring, network devices, such as servers, printers, hubs, switches, and routers on an Internet Protocol (IP) network.

True

The DHCP is controlled by a DHCP server that dynamically distributes network configuration parameters, such as IP addresses, for interfaces and services.

Multiple Input / Multiple Output (MIMO) 2.4 GHz frequency band 5.0 GHz frequency band Maximum data signaling rate of 600 Mbps Carrier Sense Multiple Access / Collision Avoidance (CSMA/CA) network access method

The characteristic features of the IEEE 802.11n wireless standard amendment include:

True

The function of the NetBT protocol is to allow NetBIOS services to be used over TCP/IP networks.

False

Transmission Control Protocol (TCP) is an example of a connectionless protocol. TCP doesn't support three-way handshake (thus it is also referred to as unreliable or best-effort protocol).

False

User Datagram Protocol (UDP) is a connection-oriented protocol that requires a set of initial steps in order to establish connection (three-way handshake), supports retransmission of lost packets, flow control (managing the amount of data that is being sent), and sequencing (rearranging packets that arrived out of order).

True

User Datagram Protocol (UDP) is part of the Internet Protocol suite used by programs running on different computers on a network. UDP is used to send short messages called datagrams but overall, it is an unreliable, connectionless protocol. UDP is officially defined in RFC 768 and was formulated by David P. Reed.

Maximum data signaling rate of 54 Mbps Carrier Sense Multiple Access / Collision Avoidance (CSMA/CA) network access method 2.4 GHz frequency range

What are the characteristics of the IEEE 802.11g wireless standard amendment?

Maximum data signaling rate of 54 Mbps 5.0 GHz frequency band Carrier Sense Multiple Access / Collision Avoidance (CSMA/CA) network access method

Which of the answers listed below refer(s) to the characteristic feature(s) of the IEEE 802.11a wireless standard amendment?

2.4 GHz frequency range Maximum data signaling rate of 11 Mbps Carrier Sense Multiple Access / Collision Avoidance (CSMA/CA) network access method

Which of the following answers list(s) the feature(s) of the IEEE 802.11b wireless standard amendment?

FTP (File Transfer Protocol) AFP (Apple Filing Protocol)

Which of the following answers refer(s) to file sharing network protocol(s)?

SSH (Secure Socket Shell)

Which of the following answers refers to a cryptographic network protocol for secure data communication, remote command-line login, remote command execution, and other secure network services between two networked computers?

5.0 GHz frequency band Carrier Sense Multiple Access / Collision Avoidance (CSMA/CA) network access method Multi-User Multiple Input / Multiple Output (MU-MIMO)

Which of the following answers refers(s) to the feature(s) of the IEEE 802.11ac wireless standard amendment?

WPA2 (Wi-Fi Protected Access)

Which of the following wireless encryption schemes offers the highest level of protection?

SLP (Service Location Protocol)

Which of the protocols listed below is used for automated discovery of networked services on Local Area Networks (LANs)?

SSH (Secure Socket Shell)

Which of the protocols listed below was designed as a secure replacement for Telnet?

WEP (Wired Equivalent Privacy)

Which of the wireless security standards listed below has been deprecated in favor of newer standards due to known vulnerabilities resulting from implementation flaws?


Related study sets

HKIN 446 Module 3 Lecture Shoudler and Arm Group 4 Fill in Blank Pt 5

View Set

MBA650 - Ch 7 Economies of Scale and Scope

View Set

describing feelings of anger, sadness, anxiety, shock and confusion

View Set