M06-Ch.19-Network Security and troubleshooting.

Ace your homework & exams now with Quizwiz!

Bill is out camping with his family and is attempting to connect his phone to the radio, but for some reason he cannot find the correct frequency. What should he be looking for in order to get his favorite station playing?

Channel Correct. A channel is a specific radio frequency within a broader frequency.

What is a list of what content cannot be accessed through a router's preferences?

Correct Answer Blacklists.

A user has just finished surfing the Internet. What is the suggested best practice to secure the browser?

Correct Answer Clear the cache and all browsing data about you each time the browser is closed

John is currently out for a business trip but requires access to his machine back in the office for a specific file. John uses a process that will allow him to access his machine through the Internet. What is this method of connection called?

Correct Answer Remote Desktop Connection

A user calls in about an issue they are having on their computer. In order to remotely control the user's computer, the help desk technician requires the user's IP address. Which of the following would provide the IP address?

Correct Answer ipconfig

Bill just sent himself an important document that includes his personal information. Unfortunately, he needs a secure device to receive this document on and all he can find is a public computer. What are the type of computers that aren't protected by a firewall or that have limited protection, that Bill should avoid?

Correct! DMZ (Demilitarized Zone) Correct. A DMZ in networking refers to a computer or network that is not protected by a firewall or has limited protection.

Suppose you wanted to download a new browser on your machine, but you are unsure if you are downloading from a trusted source. What can be used to verify that the download is genuine and error-free?

Correct! Hash generator Correct. A hash generator is used to verify the integrity of a file by ensuring that the file you're downloading matches the original hash value by checking its digital signature.

A user calls the service desk for assistance with an issue they are having on their computer. The service desk technician uses a program to remote into the user's computer in order to troubleshoot. What allowed the technician to access the user's computer?

Correct! Microsoft Remote Assistance (MSRA) Correct. Microsoft Remote Assistance allows a user on the server computer to remain signed in during the remote session, retains control of the session, and can see the screen. This is helpful when troubleshooting problems on a computer.

Daniel has been tasked with setting up an option for users who work from home to gain access to the desktops within the office. What would allow the users to access the office desktops from their local network so that they may continue their work from home environment?

Correct! Microsoft Terminal Services Client (mstsc.exe) Correct. Microsoft Terminal Services Client provides access for remoting into a Desktop from a user's local network.

What are applications that can be installed in a browser to change the way the browser functions or to enhance the features of a single website?

Correct! Plug-ins and extensions Correct. Plug-ins and extensions are small programs that install in a browser to change the way the browser functions or enhances the features of a single website.

Steve is in charge of security for his company's resources, and his firewall controls what is allowed on his local network. His firewall picks up a message at the router. Where will that message be directed next?

Correct! Port Address Correct. When a message arrives at a router, it is directed to a specific IP address and to a particular port address or port number.

What is another name for a type of computer that has no firewall, limited protections, and can receive any communication from the Internet?

Correct! Screened subnet Correct. A screened subnet is similar to a DMZ. It is a network where a single firewall is used with three separate network interfaces.

Steve noticed that Janette finished setting up some equipment in the office but realized she forgot to connect the rest of the wired devices on the local network. What device can heconnect the equipment in order to fix the problem?

Correct! Switch Correct. A switch manages several network ports that can be connected to wired devices on the local network.

Cody is signing into the corporate network by using a VPN. Using this method, the VPN encrypts and protects data from when it leaves his computer until it reaches a server on the corporate network. What is the process referred to as?

Correct! Tunneling Correct. Tunneling is an encryption technique often used by a VPN for remote workers.

What network protocol allows devices to discover and communicate with each other on the network, without the need for manual configuration or user intervention?

Correct! Universal Plug and Play Correct. Universal Plug and Play allows printers, mobile devices, and some smart home IoT appliances to discover and communicate with each other on the network.

A technician is in the process of installing a program that would assist her with her work in the office. The technician unknowingly downloads the program from an unsafe website. Luckily the installation is canceled due to an internal source on her computer that also prevents her computer from attacking other computers. What was this application?

Correct! Windows Defender Firewall Correct. Windows Defender Firewall is a personal firewall that protects a computer from intrusion and from attacking other computers; it is automatically configured when you set up your security level for a new network connection.

Bill is attempting to connect his new phone to his Wi-Fi network but is having trouble enabling the connection to his home network. What can he use to connect his phone?

Correct! Wireless access point (WAP) Correct. A WAP enables wireless devices to connect to the network.

Danielle is setting up wirelessly connected lights for the team's office space so they can monitor their power usage. During setup, she uses her device to connect to the light bulb's own wi-fi like connection. Once the lights have been set up, the wi-fi connection is no longer needed, and the lights can be wirelessly connected from Danielle's device. The connection range is up to 100 meters in open air alone. What type of connection is this?

Correct! Z-Wave Correct. A Z-Wave is a wireless connection that transmits around the 900 MHz band and requires less power than Wi-Fi. It has a larger range than Bluetooth, reaching a range of up to 100 meters in open air (although significantly less inside buildings).

Susan has been tasked with setting up wireless connecting lights that do not require too much power and have no need for Wi-Fi. The connection must reach at least 20 meters within the office. What type of connection would fit these parameters?

Correct! Zigbee Correct. This wireless connection operates in either the 2.4 GHz band or the 900 MHz band, requires less power than Wi-Fi, and generally reaches a range of about 20 meters inside, but it can reach much farther.

A user reports having issues with Internet Explorer on Windows 10. The service technician would like to further troubleshoot by checking the configuration in the control panel. This will allow the technician to check the current certificates and delete browsing history. What would the applet be called?

Correct! Internet optionsCorrect. Internet Options is an applet that configures Internet Explorer for Windows 10.

Andy is working as a service technician and has been asked by a user for assistance with transferring files. Andy would like to not only assist in transferring files but also remote in and take control of the user's computer to further help walk through the requested process. What would allow Andy to do all three?

Correct! Virtual Network Computing (VNC)Correct. VNC is client or server software used to remotely control a computer, transfer files, and screen sharing.

What can be done to prevent your wireless SSID from showing up on a list of available networks?

Disable SSID broadcast Correct. You can choose to Hide SSID, which disables SSID broadcasting. Doing so causes the wireless network to appear as Unnamed or Unknown Network on an end user's device. When a user selects this network, they are given the opportunity to enter the SSID.

When installing a file, a technician notices that a value has been generated at the end of the file name. Once the installation is completed, the technician notices that the value is not similar to the one that was seen during installation. This indicates that an issue occurred when installing the file. What is the generated value called?

Hash Correct. If the technician notices that the hash values do not match, that information can be used to identify where the error in download occurred.

Jannette has just finished setting up the modem within the corporate office and would like to connect several devices to the modem at once in an organized method. She needs something that can manage the traffic between all the networks. What would help to facilitate this scenario?

Router Correct. A router is a device that manages traffic between two or more networks and can help find the best path for traffic to get from one network to another

Steve is having a hard time finding a network to connect to his new laptop. What should he be looking for in order to get properly connected?

Service Set Identifier (SSID) Correct. An SSID is the name of a wireless network.

Suppose you wanted to run a publicly accessible website from your network server. For user activity from the auto-configured to access your website and bypass your firewall, you allow incoming traffic on port 80 on your router for this purpose. What is this process called?

Port forwarding Correct. Port forwarding is a technique that enables (opens) certain ports to certain computers so that activity initiated from the Internet can get past your firewall.

A technician is working out of town at a new job site, but unfortunately has left some important documents on his home computer. He could email them to himself if he could connect his phone to his home computer remotely. What would allow his phone to connect past his home network's firewall?

Port forwarding Correct. Port forwarding opens certain ports to specific computers so that activity initiated from the Internet can get past your firewall.


Related study sets

H.M case study multi store model

View Set

Chapter 53: Concepts of Care for Patients With Liver Problems

View Set

Financial Markets and Institutions

View Set

Uppers: Lesson 9 (Positioning Obl Elbow & Routine Humerus)

View Set

Chapter 23- Endocrine Emergencies

View Set

Adult Development and Aging exam 1

View Set