A+ 901 Test 15 Flashcards
The function of the NetBT protocol is to allow NetBIOS services to be used over TCP/IP networks.
True
Which of the protocols listed below is used for automated discovery of networked services on Local Area Networks (LANs)?
SLP
Which of the following answers refer(s) to file sharing network protocol(s)?
FTP
AFP
A network protocol providing an alternative solution to the manual assignment of IP addresses is called:
DHCP
LDAP is an example of:
Directory access protocol
A protocol used in network management systems for monitoring network-attached devices is known as:
SNMP
Server Message Block (SMB) and Common Internet File System (CIFS) are examples of network protocols used for providing shared access to files, directories, and devices.
True
Examples of secure network protocols offering traffic encryption include:
HTTPS
IPsec
SSH
Which of the following answers refers to a cryptographic network protocol for secure data communication, remote command-line login, remote command execution, and other secure network services between two networked computers?
SSH
Which of the protocols listed below was designed as a secure replacement for Telnet?
SSH
Transmission Control Protocol (TCP) is an example of a connectionless protocol. TCP doesn’t support three-way handshake (thus it is also referred to as unreliable or best-effort protocol).
False
User Datagram Protocol (UDP) is a connection-oriented protocol that requires a set of initial steps in order to establish connection (three-way handshake), supports retransmission of lost packets, flow control (managing the amount of data that is being sent), and sequencing (rearranging packets that arrived out of order).
False
Which of the answers listed below refer(s) to the characteristic feature(s) of the IEEE 802.11a wireless standard amendment?
Maximum data signaling rate of 54 Mbps
5.0 GHz frequency band
Carrier Sense Multiple Access / Collision Avoidance (CSMA/CA) network access method
Which of the following answers list(s) the feature(s) of the IEEE 802.11b wireless standard amendment?
2.4 GHz frequency range
Maximum data signaling rate of 11 Mbps
Carrier Sense Multiple Access / Collision Avoidance (CSMA/CA) network access method
What are the characteristics of the IEEE 802.11g wireless standard amendment?
Maximum data signaling rate of 54 Mbps
Carrier Sense Multiple Access / Collision Avoidance (CSMA/CA) network access method
2.4 GHz frequency range
The characteristic features of the IEEE 802.11n wireless standard amendment include:
Multiple Input / Multiple Output (MIMO) 2.4 GHz frequency band 5.0 GHz frequency band Maximum data signaling rate of 600 Mbps Carrier Sense Multiple Access / Collision Avoidance (CSMA/CA) network access method
Which of the following answers refers(s) to the feature(s) of the IEEE 802.11ac wireless standard amendment?
5.0 GHz frequency band
Carrier Sense Multiple Access / Collision Avoidance (CSMA/CA) network access method
Multi-User Multiple Input / Multiple Output (MU-MIMO)
Which of the wireless security standards listed below has been deprecated in favor of newer standards due to known vulnerabilities resulting from implementation flaws?
WEP
Which of the following wireless encryption schemes offers the highest level of protection?
WPA2
A security protocol introduced in order to strengthen existing WEP implementations without requiring the replacement of legacy hardware is known as:
TKIP
AES-based encryption mode is a characteristic feature of:
WPA2
A portion of the available Radio Frequency (RF) band allocated for wireless communication is known as:
Channel
A situation in which multiple channels share the frequency band causing interference and performance degradation for devices operating on channels that are too close to each other is known as:
Channel overlapping
A common example of channel overlapping in wireless networking would be the 2.4 GHz band used in 802.11, 802.11b, 802.11g, and 802.11n networks, where the 2.401 - 2.473 GHz frequency range is used for allocating 11 channels, each taking up a 22-MHz portion of the available spectrum. Setting up a wireless network to operate on a non-overlapping channel (1, 6, and 11 in this case) allows multiple networks to coexist in the same area without causing interference.
True
A server with private IP address has been set up to handle requests from an outside (public) network. Which of the solutions listed below would enable its function?
Port forwarding