MeasureUP MTA 98-366 Networking Fundamentals (Set 1) Flashcards
What is the highest bit rate supported by 802.11g?
11 mb/ second
2 mb/second
54 mb/second
300 mb/second
54 megabits per second (Mbps)
For what purpose is an ad hoc networking mode used in wireless networking?
To provide the highest possible level of authentication and transport security
To hide the wireless network from computers
To enable wireless computers to form a network when no WAP is present
To allow a wireless computer to locate a WAP when the Service Set Identifier is not transmitted
To enable wireless computers to form a network when no wireless access point (WAP) is present
What is the role of a RADIUS server in a wireless network that is secured using Wi-Fi Protected Access (WPA)?
Client address filtering
Encryption key management
Wired network interface
User authentication
User authentication
Which media access protocol is used by 802.11 wireless communications?
Token passing
CSMA/CD
CSMA/CA
Polling
CSMA/CA
The maximum throughput of an 802.11n network is:
11 Mbps
54 Mbps
600 Mbps
100 Mbps
600 Mbps
Which two WLAN standards operate at the 2.4 GHz frequency? (Choose two)
- 11a
- 3
- 11b
- 15
- 11g
802.11g, 802.11b
An infrastructure mode WLAN:
can be used to connect wireless clients to a wired network.
requires a RADIUS server
only supports WEP security
always broadcasts SSIDs
can be used to connect wireless clients to a wired network.
Which WLAN security standard supports AES encryption?
PPTP
WPA
L2TP
WEP
WPA (WiFi Protected Access)
Which type of firewall filtering would you configure to filter traffic based on packet content?
Application level
Stateful inspection
Port and address
Intrusino detection
Application level
You want to set up a subnet that is isolated from the rest of your local area network (LAN). You want to filter all traffic based on the parameters you define. Which type of device should you use?
Bridge
Hub
Firewall
Network address translation (NAT) server
Firewall
Your network is configured to allow select business partners access to resources on your internal network through virtual private network (VPN) connections. This is an example of a:
screened subnet
virtual local area network (VLAN)
extranet
perimeter network
extranet
The term “intranet” refers to:
local host computers configured to connect to the Internet
your private, internal network
connections to external resources provided to external users
an isolating network between your internal network and the Internet
your private, internal network.
Which type of network is only used to connect computers within a single company?
VPN
Extranet
Intranet
WLAN
Intranet
Which device is used to prevent traffic destined for a specific port from being received from the Internet?
IDS
Switch
Bridge
Firewall
Firewall
The Internet security zone includes:
all internal and external web sites, except those listed in the the Intranet zone
all internal and external Web sites that are not listed in the restricted or trusted sites zone
all external web sites
all external Web sites that are not listed in the Restricted or Trusted Sites zone.
all external Web sites that are not listed in the Restricted or Trusted Sites zone.
Which technology is used to allow a client computer to securely connect to a remote private network across the Internet?
WLAN
VPN
CAN
MAN
VPN
You want to allow external users access to a specific web server, but block access to resources on your intranet. You need to configure a :
wide area network (WAN)
perimeter network
virtual local area network (VLAN)
perimeter network
Which kind of device is used to connect a wireless LAN segment to a wired LAN segment?
Switch
Modem
Wireless Access Point (WAP)
Hub
Wireless Access Point (WAP)
You want to configure computers in different locations on your network as if they were all part of the same subnet. You need to set up a:
virtual local area network (VLAN)
virtual machine manager (VMM)
perimeter network
virtual private network (VPN)
virtual local area network (VLAN)
You want to ensure that computers on your internal LAN cannot use their assigned IP addresses to communication directly on the Internet. Which address range is valid for this purpose?
- 0.0.1 through 127.0.0.254
- 0.0.1 through 11.0.0.254
- 169.21.1 through 192.169.21.254
- 16.20.1 through 172.16.20.254
172.16.20.1 through 172.16.20.254
What type of server would you place in a perimeter network?
A database server that stores information used by the company’s accounting program
A Web server that must be accessed by external users.
An Active Directory domain controller
A file server that contains highly confidential files
A Web server that must be accessed by external users.
A three-homed perimeter network configuration requires:
one wireless access point
three firewalls
one firewall
three wireless access points
one firewall
What is a primary reason to implement a VLAN?
To allow computers with 802.11n adapters to connect to the network
To provide secure access for users connecting through an unsecure network
To manage bandwidth allocation based on the type of user.
To provide centralized authentication for users connecting through wireless and dial-up connections
To manage bandwidth allocation based on the type of user.
Which method of configuring a VLAN offers the best scalability?
Subnetting
Frame tagging
Supernetting
Frame filtering
Frame tagging