Setting Up a Local Network - COMPTIA A+ Cert Review
Which of the following is a wireless Internet connectivity method that utilizes cellular technology? 802.11ac WiMAX 3G Satellite
3G
Which of the following 802.11 wireless networking standards support transfer rates of over 54 Mbps? (Select TWO.) 802.11a 802.11ac 802.11g 802.11b 802.11n
802.11ac and 802.11n
What makes WPA2 more secure than WPA?
AES
A technician is configuring a new SOHO multifunction wireless router at a customer's location to provide network access to several wireless devices. The technician is required to protect the customer's private network from unauthorized access while performing the initial router setup as well as during normal operation after the configuration is completed. Which of the following is the best step for the technician to take in securing the router to meet this requirement? A. Enable DHCP on the router and configure IP address reservations for the wireless clients. B. Change the router's default administrative password. C. Disable the router's radio in the wireless network settings. D. Configure MAC filtering on the router and allow access to only the technician's computer.
Change the router's default administrative password.
A manager in a small office is asking if it is possible to limit network access to a particular website during business hours. Apparently, several users are spending an excessive amount of time on the site preventing them from completing their work-related tasks. What is the best solution to accomplish the request from the manager while not limiting access to other websites?
Implement a blacklist on the firewall and add the site the users are visiting.
Which of the following is a scenario in which an IT support technician would most likely be required to implement the alternate IP configuration method on a network host?
In the event a DHCP server is unavailable, the workstation will have a valid IP address on the subnet.
Henry is troubleshooting a network connection and wants to see if he can connect to the server on his network. Which Microsoft command-line command should Henry use to check whether he can connect to the server?
Ping
What connector is shown in the exhibit?
RJ-45
Match the protocol or encryption name with the feature. Generates a different key for every transmission; however, the encryption algorithm used for its calculations is no longer considered secure. No longer considered secure because the key used for encryption doesn't change. Typically uses AES for encryption. Current encryption algorithm used today. Typically uses TKIP for encryption.
TKIP, WEP, WPA2, AES, WPA
A client contacted you to request your help in researching and supplying the hardware necessary to implement a SOHO solution at his new home-based business. Which of the following SOHO router features will simplify IP address configuration on the private network for both wired and wireless clients?
DHCP server
You are setting up your Windows computer to connect to the Internet and notice that when you type www.microsoft.com, the browser does not go to the site. Instead, you receive an error message saying that the address cannot be resolved. What network setting should you check to see the address of the server being used to resolve this address?
DNS
Your company shares a building with a competitor's branch office. Recently, you noticed that some computers other than company computer have tried to connect to the wireless network unsuccessfully. When you are in the parking lot, you also notice that the company's wireless network SSID can be seen on your smartphone. What can you do to make sure no one outside your company can gain access to its wireless network?
Disable SSID Brodcasting, Lower Radio Power Levels, Enable MAC Filtering
Cathy wants to connect to her wireless LAN at home but is not sure where to change the setting so that she can connect. Where in the Windows Control Panel will Cathy find her computer's network connection settings
Network and Sharing Center
George is concerned that his children might somehow be exposed to things on the Internet that they are not mature enough to handle. He wants a way to limit their ability to view content on the Internet. What will you recommend to George?
Use Parental Controls.
What is the correct order of network types when categorized by their size or the physical area they cover, from largest to smallest? A. MAN, WAN, WLAN, PAN B. WAN, WLAN, PAN, LAN C. PAN, WLAN, MAN, WAN D. WAN, MAN, LAN, PAN
WAN, MAN, LAN, PAN