ITSP136 practice exams week 2

Ace your homework & exams now with Quizwiz!

What is the maximum range of the Bluetooth 2.0 specification for Class 1 devices?

100 M

Which of the following are valid IP addresses? (Select TWO.)

2.2.2.2 172.16.1.26

Which frequencies does Zigbee operate on?

2.4 GHz, 900 MHz, and 868 MHz

Which port does Telnet use?

23

A host wants to send a message to another host with the IP address 115.99.80.157. IP does not know the hardware address of the destination device. Which protocol can be used to discover the MAC address?

ARP

A group of workers attend a team-building retreat at a remote cabin. They can place calls on their mobile smartphones, but the cabin has no wired phone, television, or wired internet connectivity. The workers need to access an internet webpage using their laptop computers. Which of the following internet connection types might be available to the workers?

Cellular

Which of the following techniques are used in a pharming attack to redirect legitimate web traffic to malicious websites? (Select TWO).

Changing the hosts file of a user's computer Exploiting DHCP servers to deliver the IP address of poisoned DNS servers

Currently, the users in your company are required to use their IP addresses when connecting to other hosts. Since IP addresses are difficult to remember, you want to implement a protocol on your network that allows computers to automatically find another host's IP address using a logical name. Which of the following protocols would be the BEST to implement?

DNS

A company has chosen a UTM instead of an IDS or IPS appliance to protect their network. Which of the following UTM security features is not available with an IDS or IPS?

Email and antispam filtering

Which of the following network technologies is packaged as part of a BRI plan?

ISDN

Which of the following are features of Basic Rate ISDN (BRI)? (Select THREE.)

One control channel Dial-up connection Two data Channels

Which of the following protocols do email clients use to download messages from a remote mail server?

POP3

Which of the following devices can be used to distribute electrical power along with network data on twisted-pair Ethernet cabling (CAT 5 or higher)?

Power over Ethernet

Which printer management components would you use to view the port a printer uses? (Select TWO.)

Print server properties Printer properties

You are configuring an ADSL connection. Which of the following will be part of the configuration? (Select TWO.)

RJ11 connectors Filters or splitters

Match each smart device with its description.

Thermostat Learns from your habits and schedule, allows you to control the climate in your home remotely, shows you energy consumption in real-time, and adjusts itself depending on ambient conditions. Switch Allows you to control hardwired lights, ceiling fans, fireplaces, small appliances, and garbage disposals. Bulb Can change colors, track motion, stream audio over Bluetooth, and double as a connected camera, but it's only smart when turned on. It doesn't work when turned off. Plug Easy solution for making small appliances, such as lamps, coffee makers, and toasters, smart. Security camera Uses an RF transmitter. May include such features as motion detection, scheduled recording, remote viewing, and automatic cloud storage. Door lock Uses a wireless protocol and a cryptographic key to execute the authorization process. It can also monitor access and send alerts related to the status of the device. Speaker/digital assistant Uses voice recognition software and activates through a Wake Word or Hot Word.

A company has built a video streaming service that supplies training videos. Quickly transmitting video data to customers is more important than guaranteed delivery. Which of the following transport layer TCP/IP suite protocols is MOST likely used for this service?

User Datagram Protocol (UDP)

The servers for the company are all virtual machines and hosted on the same hypervisor. You need to keep users in all other departments from accessing the virtual servers used by the finance department. Which of the following technologies should you use to logically isolate the network?

VLANs

Which of the following protocols carry phone calls over an IP-based network?

VoIP

While working on a Windows workstation, you've enabled Remote Desktop. Which of the following ports MUST be opened in the server's firewall to allow remote clients to access the desktop?

3389


Related study sets

Ch. 3 Linear Functions Vocabulary Terms

View Set

HESI PLAN A -Reduce Risk Potenital

View Set

Microeconomics Exam 1 Review (Chapter 1, 2, 3, 4)

View Set

Fundamentals of Nursing Care-FINAL Practice Test

View Set

Chapter 4 - Consumer and Producer Surplus

View Set

Concepts: Oxygenation, Chapter 41: Oxygenation Potter & Perry (Review Questions), Chapter 36: Oxygenation, Unit 11 Oxygenation Test 4 Nclex style questions, Oxygenation, Yoost Chapter 38: Oxygenation and Tissue Perfusion PRACTICE QUESTIONS, Chapter 4...

View Set

Microbiology Exam 4 (not complete)

View Set

chapter 41: management of patients with musculoskeletal disorders

View Set

chapter 11 Administración y Selección de Recursos Humanos

View Set