Networking

Ace your homework & exams now with Quizwiz!

What is the approximate maximum indoor range for a wireless router using the 802.11g protocol? (300 feet, 50 feet, 125 feet, 600 feet)

125 feet

What is the length of an IPv6 address? (64 bits, 256 bits, 128 bits, 32 bits)

128 bits

You are configuring a router. You need to configure a subnet with a subnet address of 192.168.128.0 that supports a range of up to 1022 host address values. You need stay within this limit to avoid interfering with future expansion plans. The router requires you to enter configuration information in CIDR format. Which address should you use? (192.168.128.0/10, 192.168.128.0/20, 192.168.128.0/22, 192.168.128.0/24)

192.168.128.0/22

You are configuring a host firewall. You need to ensure that the computer cannot respond to Telnet request. Which port should you block? (22, 23, 110, 443)

23

You are implementing a wireless LAN at one of your corporate offices. You need to provide the maximum data transfer rate possible. Which wireless protocol should you use? (802.11n, 802.11g, 802.11b, 802.11ac, 802.11a)

802.11ac

A business is preparing to convert from wired to wireless networking. Access points need to support a range of at least 150 feet. There is a concern about possible interference because of the number of Bluetooth devices already in use. Which 802.11 standard should the business select? (802.11n, 802.11g, 802.11b, 802.11ac, 802.11a)

802.11n

Central connection for devices on an infrastructure wireless LAN? (Select the appropriate device....Access point, Bridge, Firewall, Hub, Patch panel, Switch)

Access Point

Your client has a router that is connected to the internet and an Ethernet switch. What additional network device is needed to give your client wireless access to the local area network? Modem, Hub, Firewall, Access Point

Access Point

Which server can act as a centralized authentication server in your network? (Exchange server, Active Directory domain controller, Domain name system, Proxy server)

Active Directory domain controller

Which of the following best identifies the role of a proxy server? (An email system that is designed for mobile devices, An intermediary device that can filter and cache information, A server that allows a user to share a printer in the network, A gateway that allows users to create a remote desktop connection)

An intermediary device that can filter and cache information

A company uses an online database to store information about all production servers, using short descriptions. The database has five categories: print servers, files servers, authentication servers, syslog servers, and mail servers. A technician receives a request to add three servers to the database based on the description provided by the server team. How should the technician categorize the servers? Choose the appropriate server category Description: The server is Linus- based. It runs the RADIUS protocol to grant access to VPN users. (print servers, files servers, authentication servers, syslog servers, and email servers.)

Authentication servers

You want Windows 10 computers on your network to receive IP address automatically. What kind of server is needed to support this? DHCP, FTP, WINS, DNS

DHCP (Dynamic Host Configuration Protocol)

What server should a company use to make sure that users do not receive APIPA addresses? (DNS server, Proxy server, DHCP server, VPN server)

DHCP server

A customer is setting up to run a small business from a home office. The customer wants to host a web server from home and provide easy public access to the web server, but he wants to protect the internal home office network that already exists. The network is configured with private IP addresses. The customer has already configured the network to enable devices on the network to access the internet. You help the customer configure his router. What technology should the customer configure to accomplish this? (DNS, NAT, QoS, DMZ)

DMZ

A company uses an online database to store information about all production servers, using short descriptions. The database has five categories: print servers, files servers, authentication servers, syslog servers, and mail servers. A technician receives a request to add three servers to the database based on the description provided by the server team. How should the technician categorize the servers? Choose the appropriate server category Description: The server has three TCP ports open: 110, 25, and 143 (print servers, files servers, authentication servers, syslog servers, and email servers.)

Email servers

Which address is an IPv6 multicast address? (169.254.1.3/16, FEC0::/10, FF01::1, 224.10.3.8/4)

FF01::1

Which network protocol uses port 21? Secure Shell SSH, Hypertext Transfer Protocol HTTP, Files Transfer Protocol FTP, Hypertext Transfer Protocol Secure HTTPS)

FTP (File Transfer Protocol)

Device that is used to filter traffic into and out of a network and that is based on characteristics such as port use. (Select the appropriate device....Access point, Bridge, Firewall, Hub, Patch panel, Switch)

Firewall

You are configuring a router for a business customer's network. The customer has provided you with a list of network protocols and services that the router needs to support. The customer wants to use only well-known ports. You need to configure open ports as necessary in the router. Select the appropriate port for each protocol. HTTP, HTTPS, DNS, RDP, POP3

Http 80, HTTPSoE 443, DNS 53,RDP 3389, POP3 110,

Ethernet connection device on which all traffic into the device goes out on ports. (Select the appropriate device....Access point, Bridge, Firewall, Hub, Patch panel, Switch)

Hub

Which three protocols are used to send or receive emails? Choose 3? IMAP,SSH,POP3,TELNET,DHCP,SMTP

IMAP, POP3, SMTP

You are helping a customer select a SOHO broadband router to meet specific performance requirements. The router needs to be able to detect and prioritize high-quality video streaming and online gaming traffic. What features does the router needs to support? ( Networking monitoring, Port forwarding, Intelligent QoS, UPnP)

Intelligent QoS

You are connected to a router. To provide access to the internet, you need to create a rule that would hide private IP addresses behind one public IP address. Which technology should you use? (DHCP, Port forwarding, WPA, NAT)

NAT

What communication technology is used with the mobile pay technology used during point of sale (POS)? (Wi-Fi, NFC, Bluetooth, Cellular)

NFC

What allows the 5G network to be 10 times faster than the 4G network? (Integration of RFID, MAC filtering, New frequencies with shorter wavelengths, Introduction of MIMO)

New frequencies with shorter wavelengths

Connection point for incoming and outgoing cables with connections that are rearranged by physically moving cables. (Select the appropriate device....Access point, Bridge, Firewall, Hub, Patch panel, Switch)

Patch panel

You are advising a company that is planning to install IP cameras to enhance security around the building. That cameras will be located 30 meters to 60 meters from the wiring closet. Most locations do not have AC power available, and the company does not want to go through the expense of running additional power lines. What technology would you recommend for deploying the cameras? PoE, USB, Ethernet over Power, FireWire

PoE

Your customer wants to deploy a new IP phone. He finds a label on the device that says PoE-enable. What device should you install in the local area network to support this phone? PoE computer, PoE battery, PoE switch, PoE firewall

PoE switch

Which protocol uses port 110? SMTP, FTP, HTTPS OVER SSL/TLS, POP3

Pop3 (Post Office Protocol Version 3)

You need to allow a remote user to access Windows Server 2012 directly using RDP. What is the first feature you should enable on the router? (Port forwarding, Dynamic Host Configuration Protocol, Quality of service, Port triggering)

Port forwarding

Which network type is most vulnerable to weather-related interference? (DSL, Cable modem, Fiber, Satellite)

Satellite

What are two advantages of using a cloud-managed WIFI solution over an autonomous WAP network? (Choose 2 ....Support for frequencies, MAC filtering, Simplified setup of additional WAPs, No on-site WAPs required, Centralized management)

Simplified setup of additional WAPs and Centralized management

You are replacing a computer in an office. The existing computer has been connected to a TCP/IP network, and you want to use the existing network card in the new computer. Which three configuration settings would you have to ensure are set properly for the new computer? (Choose 3) ( Subnet Mask, Default gateway, Network topology, MAC address, Network media, IP address, Network access method)

Subnet Mask, Default gateway, IP address

You manually configure static IP addresses on network computer. Which parameters, if set incorrectly, will prevent a computer from communicating with any other computer within the same subnet? (Subnet mask, MAC address, Default gateway, Primary DNS server address)

Subnet mask

A company wants to configure VLANs to improve performance. It's needs to determine if the infrastructure can support VLANs. What device should the company use to configure VLANs? Switch, Bridge, Router, Repeater

Switch

Ethernet connection device that processes and delivers traffic based on network adapter MAC address. (Select the appropriate device....Access point, Bridge, Firewall, Hub, Patch panel, Switch)

Switch

For auditing purposes, a customer wants to receive a list of active physical addresses in the local network. What device should the customer use to generate the report? (Hub, IPS, Switch, Firewall)

Switch

A company uses an online database to store information about all production servers, using short descriptions. The database has five categories: print servers, files servers, authentication servers, syslog servers, and mail servers. A technician receives a request to add three servers to the database based on the description provided by the server team. How should the technician categorize the servers? Choose the appropriate server category Description: The server is used to collect firewall logs. (print servers, files servers, authentication servers, syslog servers, and email servers.)

Syslog servers

What is the role of a DHCP server? (To map FQDNs to IP addresses, To automatically assign client IP addresses and configuration settings, To act as an intermediary device that can filter and cache information, To provide centralized support for network authentication)

To automatically assign client IP addresses and configuration settings

You need to deploy a device that supports the following consolidated security services through a single platform: Incoming and outgoing traffic filtering, Detecting and responding to traffic anomalies, Virus detection, Web content filtering, Spam detection. What type of device should you use? (UTM, IDS, Firewall, IPS)

UTM

You are helping set up a small office/home office (SOHO) network. You are asked to implement QoS support on the network. Which of the following would be the most likely to require QoS support? (VoIP, Email, Instant messaging, SSID)

VoIP


Related study sets

NURX108 Transition to the Professional Nurse Role

View Set

Forearm Flexors and Superficial Hand

View Set

Comprehensive practice medsurge 2

View Set

PrepU Topic 16: Family Caregiving and End of Life Care

View Set

Chapter 9 - Cozy Global Business

View Set

Digestive and Gastrointestinal Treatment Modalities

View Set

3, 4, 5, and 6, Times Tables (Combined)

View Set