Net + tets
Which ip is a class b
191
What is the minimum number of interfaces a router must have to rout traffic
2
Which of the following is a well known port
53
Which wireless standard uses a freq of 5 Gz and has a range of 120m
802.11A
A differential backup will backup?
All changed files since last full backup
Which of the following do wireless networks require
All of the above
Which Bluetooth attack exploits a user definable field in the dreams sound packet
Blue jacking
To sync a phone to a smart watch which of the following technology would you use
Bluetooth
In reference to access point modes which mode consists of two access points connected only to each other
Bridge
Which of the following is used to verify that all of the Intendid connections exsist and that there are no unintended connections to the cable being tested
Cable tester
What type of site is a shell, is not fully equipt, and had longest setup time of all is known as what kind of site
Cold
Which of the following is an advantage of wireless networks
Cost effective
In reference to DHCP place 4 step in correct order
Discover offer request acknowledge
Which network TOPOLOGY is commonly implemented as fiber distributed data interface FDDI
Dual ring
Which allocation describes when a dhcp server hands out up addresses from a big pool of addresses with addresses being leased for a set period of time
Dynamic allocation
Which of the following is not implication of raid
Dynamic disks allocation disks are not used unless requested
Which of the following is. Cisco proprietary internal routing protocl
EIgrp
Regarding the "bu" network topology which of the following is a security consideration
Eacesdropping
Dns is a server that translates name into Mac addresses
False
Proxy servers do not shield a client from direct communications with a server
False
Stronger security controls help overcome the weakest of human error and lack of training and awareness
False
The "full mesh" network topology strives to separate critical devices form non critical devices
False
The wireless authentication protocol eap was designed to faciliatate
False
To electronically track a large quantity of goods near field communication is the best technology to leverage to maximum efficient
False
In regards of media access methods, CSMA with collision avoidance has the hosts stop and wait a random period of time before transmitting
Flase
The wireless authentication protocl EAP was designed to facilitate authentication and force WEP key changes
Flase
Which of the following does not pertain to the unshielded twisted pair cable
Freuqentky used in areas with high rf
Which of the following would be considered an item with in the iot
Fridge with wifi
Which technology requires an eaves dropper to send packets in order to solicit and capture a response and potentially poison receiving hosts and or infrastructure devices with the intent of recievung packets addressed to the other hose
Hub?
Regarding wireless LAN which iee802.1 uses ofdm
IEE 802.11A
Which of the following wireless authentication protocols is proprietary and was created by cisco
LEAP
Which of the following determines the largest frame for a a particular technology can handle
MTU
Which of the following is the room that houses the demarcation (demarc) network and telephone cross connects for a building?
Main distribution Frame MDF
The punch down tool is used to trouble shoot which problem
None of the above
What device explicitslly monitors optical transmission media
Odtp
IMAP (Internet Message Access Protocol) does which of the following?
Permits multiple devices to access the same mailbox and see the same set of messages at any given time
Which media access method is used by Bluetooth devices
Polling
Which of the following is likely to be included in a strong password policy
Prohibiting reuse or previously used passwords
Which access is a UDP based solution that is sometimes built into routers
RADIUS
Which of the following is industry slang for combining raid levels
RAID 10
What coaxile cable type is the thick net ethernet
RG8
Details on how a device must be configured in order to remotely connect to an organizations internal network is most likely found in which of the following
Remote access policy
Which coax cable type is the original arcnet cable
Rg62
Which of the following describes blue bugging
Sends commands
Using a fingerprint reader with passcode to enter a secure area is an example of
Something you are and something you know
Remote replication of data that is concurrent with data written to the production system know as _________ replication
Sychronous
Which of the following is a mechanism for awareness that something has been disturbed or meddled with
Tanker detection
A digital signature is a cryptographic process to provide non re
True
Ethernet is a digital synchronous communications standard speicified by IEEE standard 802.3
True
IP ICMP AND IPSec are protocols used in the network layer
True
To communicate on a wireless network, the client must have a wireless card or device to send/receive radio signals and must know the access point details like SSID and security settings
True
What SNMP versions is the first to combine authentication and encryption
V3
Which of the following is NOT true about the use of directional antennas
Wireless signals extend 360 degress
