Chapter 7 Quiz Flashcards

1
Q

Jacob wants to set up extra security on his wireless network; he currently uses WPA2. He wants to allow only his devices to connect to the network and reject devices that he does not own.

What extra wireless security should Jacob employ in on his wireless router?

A

MAC filtering

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

You are tasked with configuring a wireless SOHO router for a customer.

Which of the following settings will be the most secure with the least effort and cost to the customer?

A

WPA2-PSK, AES

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Which of the following is a scenario in which an IT support technician would most likely be required to implement the alternate IP configuration method on a network host?

A

In the event a DHCP server is unavailable, the workstation will have a valid IP address on the subnet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

A manager in a small office is asking if it is possible to limit network access to a particular website during business hours. Apparently, several users are spending an excessive amount of time on the site preventing them from completing their work-related tasks.

Which of the following is the best solution to accomplish the request from the manager while not limiting access to other websites?

A

Implement a blacklist on the firewall and add the site the users are visiting.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

A technician is configuring a new SOHO multifunction wireless router at a customer’s location to provide network access to several wireless devices. The technician is required to protect the customer’s private network from unauthorized access while performing the initial router setup as well as during normal operation after the configuration is completed.

Which of the following is the best step for the technician to take in securing the router to meet this requirement?

A

Change the router’s default administrative password

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Which of the following wireless networking protocols uses LTE technology with a maximum speed of up to 1 Gbps?

A

Fourth-generation cellular

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

A remote worker wants to connect his computer to his corporation’s private trusted network over the Internet.

Which of the following will need to be configured?

A

VPN tunnel

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

A client is requesting an Internet connection type that is not affected by atmospheric conditions and is always on.

Which of the following will meet these requirements?

A

Cable

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

A group of wireless devices are using each other as relays to share a network connection across a large area.

Which of the following network categories is being used?

A

WMN

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

A corporate user is attempting to connect to the company’s Windows domain server on the local network with her new laptop through a wired connection.

Which of the following is required for the user to successfully sign in to the Windows domain?

A

Windows domain user name and password

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Henry is troubleshooting a network connection and wants to see if he can connect to the server on his network.

Which Microsoft command-line command should Henry use to check whether he can connect to the server?

A

ping

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

You are setting up your Windows computer to connect to the Internet and notice that when you type www.microsoft.com, the browser does not go to the site. Instead, you receive an error message saying that the address cannot be resolved.

What network setting should you check to see the address of the server being used to resolve this address?

A

DNS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

The company where Derek works has tasked him with setting up and securing a SOHO router. He wants to make sure the wireless network is secure and that no unauthorized person can gain access to the network.

What is the first step Derek should perform to secure the wireless router?

A

Change default user name and password.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

A client contacted you to request your help in researching and supplying the hardware necessary to implement a SOHO solution at his new home-based business.

Which of the following SOHO router features will simplify IP address configuration on the private network for both wired and wireless clients?

A

DHCP server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

You have been tasked with configuring a SOHO network in which all ports on the public untrusted network will be forwarded to one workstation connected to the LAN.

Which of the following features will you configure on the SOHO router to accomplish this task?

A

Demilitarized zone

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Which of the following is a wireless Internet connectivity method that utilizes cellular technology?

A

3G

17
Q

A technician wants to configure a DHCP server to guarantee that certain printers always receive the same address. Which of the following should the technician configure?

A

Address reservation

18
Q

A small group of travelers is meeting inside an ancient building, and the travelers need access to the Internet using their mobile devices. However, the group is in an area where Wi-Fi Internet is not available and cellular coverage is intermittent. One of the travelers has an unlimited cellular data plan and a strong consistent signal.

Which of the following methods would most likely be implemented to provide Internet service to the group?

A

Mobile hotspot

19
Q

What is the correct order of network types when categorized by their size or the physical area they cover, from largest to smallest?

A

WAN, MAN, LAN, PAN

20
Q

Which of the following will use an RJ-11 connector for connectivity?

A

DSL

21
Q

Mary, a remote user, connects her Windows 10 laptop to the corporate network by way of the Internet using a VPN tunnel.

Which of the following is often configured as a required step for a user each time she attempts to use the VPN connection?

A

Enter the same user name and password used on the corporate network.

22
Q

Cathy wants to connect to her wireless LAN at home but is not sure where to change the setting so that she can connect.

Where in the Windows Control Panel will Cathy find her computer’s network connection settings?

A

Network and Sharing Center

23
Q

Your company is implementing a wireless network and is concerned that someone from a competing company could stand outside the building and collect wireless data. You have assured the company that WPA2 is secure.

What makes WPA2 more secure than WPA?

A

AES

24
Q

George is concerned that his children might somehow be exposed to things on the Internet that they are not mature enough to handle. He wants a way to limit their ability to view content on the Internet.

What will you recommend to George?

A

Use Parental Controls

25
Q

Which of the following devices are most commonly used to connect a LAN to an ISP for broadband services? (Select TWO.)

A

Cable modem
DSL modem

26
Q

Which of the following 802.11 wireless networking standards support transfer rates of over 54 Mbps? (Select TWO.)

A

802.11n
802.11ac

27
Q

Your company shares a building with a competitor’s branch office. Recently, you noticed that some computers other than company computer have tried to connect to the wireless network unsuccessfully. When you are in the parking lot, you also notice that the company’s wireless network SSID can be seen on your smartphone.

What can you do to make sure no one outside your company can gain access to its wireless network? (Select all that apply.)

A

Enable MAC filtering.
Disable SSID broadcasting.
Lower radio power levels.

28
Q

Match the protocol or encryption name with the feature.

1 Typically uses TKIP for encryption.

2 Current encryption algorithm used today.

3 No longer considered secure because the key used for encryption doesn’t change.

4 Generates a different key for every transmission; however, the encryption algorithm used for its calculations is no longer considered secure.

5 Typically uses AES for encryption.

WEP
WPA
WPA2
TKIP
AES

A

WEP: no longer considered secure because the key used for encryption doesn’t change.

AES - current encryption algorithm used today.

TKIP - generates a different key for every transmission; however, the encryption algorithm used for its calculations is no longer considered secure.

WPA2 - typically uses AES for encryption.

WPA - typically uses TKIP for encryption.