A+ 901 Test 15 Flashcards

1
Q

The function of the NetBT protocol is to allow NetBIOS services to be used over TCP/IP networks.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Which of the protocols listed below is used for automated discovery of networked services on Local Area Networks (LANs)?

A

SLP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Which of the following answers refer(s) to file sharing network protocol(s)?

A

FTP

AFP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

A network protocol providing an alternative solution to the manual assignment of IP addresses is called:

A

DHCP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

LDAP is an example of:

A

Directory access protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

A protocol used in network management systems for monitoring network-attached devices is known as:

A

SNMP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Server Message Block (SMB) and Common Internet File System (CIFS) are examples of network protocols used for providing shared access to files, directories, and devices.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Examples of secure network protocols offering traffic encryption include:

A

HTTPS
IPsec
SSH

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Which of the following answers refers to a cryptographic network protocol for secure data communication, remote command-line login, remote command execution, and other secure network services between two networked computers?

A

SSH

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Which of the protocols listed below was designed as a secure replacement for Telnet?

A

SSH

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Transmission Control Protocol (TCP) is an example of a connectionless protocol. TCP doesn’t support three-way handshake (thus it is also referred to as unreliable or best-effort protocol).

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

User Datagram Protocol (UDP) is a connection-oriented protocol that requires a set of initial steps in order to establish connection (three-way handshake), supports retransmission of lost packets, flow control (managing the amount of data that is being sent), and sequencing (rearranging packets that arrived out of order).

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Which of the answers listed below refer(s) to the characteristic feature(s) of the IEEE 802.11a wireless standard amendment?

A

Maximum data signaling rate of 54 Mbps
5.0 GHz frequency band
Carrier Sense Multiple Access / Collision Avoidance (CSMA/CA) network access method

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Which of the following answers list(s) the feature(s) of the IEEE 802.11b wireless standard amendment?

A

2.4 GHz frequency range
Maximum data signaling rate of 11 Mbps
Carrier Sense Multiple Access / Collision Avoidance (CSMA/CA) network access method

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What are the characteristics of the IEEE 802.11g wireless standard amendment?

A

Maximum data signaling rate of 54 Mbps
Carrier Sense Multiple Access / Collision Avoidance (CSMA/CA) network access method
2.4 GHz frequency range

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

The characteristic features of the IEEE 802.11n wireless standard amendment include:

A
Multiple Input / Multiple Output (MIMO)
2.4 GHz frequency band
5.0 GHz frequency band
Maximum data signaling rate of 600 Mbps
Carrier Sense Multiple Access / Collision Avoidance (CSMA/CA) network access method
17
Q

Which of the following answers refers(s) to the feature(s) of the IEEE 802.11ac wireless standard amendment?

A

5.0 GHz frequency band
Carrier Sense Multiple Access / Collision Avoidance (CSMA/CA) network access method
Multi-User Multiple Input / Multiple Output (MU-MIMO)

18
Q

Which of the wireless security standards listed below has been deprecated in favor of newer standards due to known vulnerabilities resulting from implementation flaws?

A

WEP

19
Q

Which of the following wireless encryption schemes offers the highest level of protection?

A

WPA2

20
Q

A security protocol introduced in order to strengthen existing WEP implementations without requiring the replacement of legacy hardware is known as:

A

TKIP

21
Q

AES-based encryption mode is a characteristic feature of:

A

WPA2

22
Q

A portion of the available Radio Frequency (RF) band allocated for wireless communication is known as:

A

Channel

23
Q

A situation in which multiple channels share the frequency band causing interference and performance degradation for devices operating on channels that are too close to each other is known as:

A

Channel overlapping

24
Q

A common example of channel overlapping in wireless networking would be the 2.4 GHz band used in 802.11, 802.11b, 802.11g, and 802.11n networks, where the 2.401 - 2.473 GHz frequency range is used for allocating 11 channels, each taking up a 22-MHz portion of the available spectrum. Setting up a wireless network to operate on a non-overlapping channel (1, 6, and 11 in this case) allows multiple networks to coexist in the same area without causing interference.

A

True

25
Q

A server with private IP address has been set up to handle requests from an outside (public) network. Which of the solutions listed below would enable its function?

A

Port forwarding