38-366: 133-196 Flashcards
For which two reasons should you use IPsec between computers? (Choose two.) A. Data compression B. Data integrity C. Data redundancy D. Data confidentiality
B. Data integrity
D. Data confidentiality
This question requires that you evaluate the underlined text to determine if it is correct.
Every router today is “TCP/IP” enabled, which is an industry-standard protocol that you use on the Internet and for local addressing.
Select the correct answer if the underlined text does not make the statement correct. Select ‘No change is needed” if the underlined text makes the statement correct.
A. HTTP
B. FTP
C. SNMP
D. No change is needed
D. No change is needed
You are home for vacation, and a family member wants your help to purchase and install network cable for a home office.
The cable needs to support at least 300 Mbps.
What is the least expensive option that meets this requirement?
A. Cat3
B. CAT5
C. Cat5e
D. Cat6
C. Cat5e
This question requires that you evaluate the underlined text to determine if it is correct.
“WEP” wireless encryption is the most susceptible to interception and decryption.
Select the correct answer if the underlined text does not make the statement correct. Select ‘No change is needed’’ if the underlined text makes the statement correct
A. WPA-AES
B. WPA2
C. WPA-PSK
D. No change is needed
D. No change is needed
HOTSPOT -
For each of the following statements, select Yes if the statement is true. Otherwise, select No. Each correct selection is worth one point.
Hot Area:
A switch sends unicast packets to one destination port only
A switch floods ports if it does not know where to send a packet
A switch sends broadcast packets to the uplink port only
Yes
Yes
No
What is an example of a network device that associates a network address with a port? A. Switch B. Router C. Hub D. DSL modem
B. Router
Which wireless communication problem is caused by electromagnetic waves? A. Fading B. Attenuation C. Interference D. Diffraction
C. Interference
An Action Center alert recommends that you enable Windows Firewall.
After enabling the firewall, you can no longer access websites.
Which two TCP ports should you add exceptions for on the firewall? (Choose two.)
A. Port 21
B. Port 23
C. Port 25
D. Port 80
E. Port 443
Port 80: HTTP
Port 443: HTTPS
What are two advantages of using star topology rather than ring topology in a computer lab workgroup? (Choose two.)
A. Failure of a central connectivity device does not bring down the entire network.
B. A central connection point allows for flexibility and scalability.
C. Data travels on redundant paths, so one cable cannot stop its transmission.
D. A cable problem within the group affects two nodes, at most.
B. A central connection point allows for flexibility and scalability.
D. A cable problem within the group affects two nodes, at most.
What are three characteristics of Ethernet network topology? (Choose three.)
A. It uses tokens to avoid collisions on the network.
B. It can use coaxial, twisted pair, and fiber optic media.
C. It comprises the largest share of the networks in place today.
D. It is a non-switching protocol.
E. It can negotiate different transmission speeds.
B. It can use coaxial, twisted pair, and fiber optic media.
C. It comprises the largest share of the networks in place today.
E. It can negotiate different transmission speeds.
This question requires that you evaluate the underlined text to determine if it is correct.
Plain old telephone service (POTS), most ISDN lines, and switched T1 lines are all examples of “Message Switching”.
Select the correct answer if the underlined text does not make the statement correct. Select ‘No change is needed’’ if the underlined text makes the statement correct.
A. Circuit Switching
B. Packet Switching
C. FDDI Switching
D. No change is needed
A. Circuit Switching
HOTSPOT -
For each of the following statements, select Yes if the statement is true. Otherwise, select No. Each correct selection is worth one point.
Hot Area:
You use a perimeter network to grant internal clients access to external resources
A LAN has no access to the perimeter network
A perimeter network typically contains servers that require Internet access, such as web or email servers
No
No
Yes
HOTSPOT -
You are an intern for Contoso Ltd. Your supervisor asks you to configure the security zones for three new PCs so that they are able to connect to two web servers.
The servers connect to the three new PCs as shown in the following image:
Use the drop-down menus to select the answer choice that completes each statement. Each correct selection is worth one point.
Hot Area:
The appropriate type of security zone for https://sales.northwindtraders.com is: Restricted Sites / Local Intranet / Trusted Sites
The appropriate type of security zone for https://hr.contoso.com is Restricted Sites / Local Intranet / Trusted Sites
Trusted Site
Local Intranet
Your home computer is having problems accessing the Internet.
You suspect that your Internet router’s DHCP service is not functioning, so you check your computer’s IP address.
Which address indicates that your router’s DHCP service is NOT functioning?
A. 169.254.1.15
B. 172.16.1.15
C. 192.168.1.15
D. 10.19.1.15
A. 169.254.1.15
Which of these is a public address space? A. 192.168.0.0/16 B. 197.16.0.0/12 C. 10.0.0.0/8 D. 172.16.0.0/12
B. 197.16.0.0/12
This question requires that you evaluate the underlined text to determine if it is correct.
In a wireless network that requires an SSL certificate, “WEP” handles the SSL certificate.
Select the correct answer if the underlined text does not make the statement correct. Select ‘No change is needed” if the underlined text makes the statement correct.
A. 802.1X
B. WPA2-PSK
C. WPA-PSK
D. No change is needed
A. 802.1X
This question requires that you evaluate the underlined text to determine if it is correct.
To set lower security settings in Internet Explorer for an extranet site, add the site’s URL to the “Local Intranet “zone.
Select the correct answer if the underlined text does not make the statement correct. Select ‘No change is needed” if the underlined text makes the statement correct.
A. Internet
B. Trusted Sites
C. Extranet Sites
D. No change is needed
B. Trusted Sites
You are helping a friend set up a public-facing web server for a home office.
Your friend wants to protect the internal network from intrusion.
What should you do?
A. Set the web server in a perimeter network.
B. Set the web server to block access on ports 80 and 443.
C. Configure the firewall to block access on ports 80 and 443.
D. Set the IP address of the web server to be within the LAN.
A. Set the web server in a perimeter network.
HOTSPOT -
For each of the following statements, select Yes if the statement is true. Otherwise, select No. Each correct selection is worth one point.
Hot Area:
A wireless bridge connects Ethernet-based devices to the network
A wireless bridge increase the wireless signal strength of the access point
Wirelesss bridge always work in pairs
No
Yes
No
What are two characteristics of the CSMA/CD access method? (Choose two.)
A. It checks to see if a collision has been detected.
B. It does a round robin search for requests to transmit from all nodes on the network.
C. It signals its intent to transmit on the network.
D. It waits until the transmission medium is idle.
A. It checks to see if a collision has been detected.
D. It waits until the transmission medium is idle.
What are two characteristics of a mesh network topology? (Choose two.)
A. It is fault tolerant because of redundant connections.
B. Every node connects to every other node on the network.
C. It works best for networks with a large number of nodes.
D. It requires less cabling than either a star or ring topology.
A. It is fault tolerant because of redundant connections.
B. Every node connects to every other node on the network.
Which protocol is responsible for automatically assigning IP addresses? A. HTTP B. DHCP C. DNS D. WINS
B. DHCP
This question requires that you evaluate the underlined text to determine if it is correct.
According to the OSI model, encryption takes place on the “transport layer”.
Select the correct answer if the underlined text does not make the statement correct. Select ‘No change is needed” if the underlined text makes the statement correct.
A. Presentation
B. Network
C. Application
D. No change is needed
A. Presentation
HOTSPOT -
For each of the following statements, select Yes if the statement is true. Otherwise, select No. Each correct selection is worth one point.
Hot Area:
An IPv4 address consist of 64 bits
It is standard practise to divide the binary bits of an IPv4 address into 8-bit fields named octets
The value of any IPv4 octet can be from 0 to 256
No
Yes
No
This question requires that you evaluate the underlined text to determine if it is correct.
IPSec policies for two machines on a LAN can be modified by using the “IPSec policy snap-in” on Windows 7.
Select the correct answer if the underlined text does not make the statement correct. Select ‘No change is needed” if the underlined text makes the statement correct.
A. Windows Firewall with Advanced Security snap-in
B. LAN adapter properties
C. Remote Access snap-in
D. No change is needed
A. Windows Firewall with Advanced Security snap-in