Module 4 Flashcards

1
Q

Which 802.11 standards used the 5GHz band to transmit and receive?

A

A
AC

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Which statements correctly differentiate the 2.4GHz transmission band from the 5GHz band?

A

2.4GHz transmission can penetrate through obstacles more easily than 5 Ghz.
2.4 GHz transmission carry farther than 5Ghz.
2.4 GHz transmissions are more susceptible to interference.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Which channels are recommended to use for a wireless device using the 2.4GHz transmission band?

A

1, 6 and 11

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Bluetooth transmissions generally tend not to interfere with Wi-Fi communications for which reasons?

A

Bluetooth uses frequency hopping
Bluetooth signals are typically much weaker than Wi-Fi

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Long-range fixed wireless networking is commonly implemented in which configurations?

A

Point-To-Point

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is the typical transmission range of devices using NFC?

A

A few inches

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Which type of DNS record can be used to associate more than one host name to a single IP address?

A

CNAME

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Which component of a DHCP implementation determines the validity period of an IP address configuration?

A

Lease

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Which types of server roles are often combined on the same server?

A

File and print

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Which platform does not natively support the use of Syslog server?

A

Microsoft

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Which component of the AAA framework would you be using if your organization required users to enter a password and swipe a fingerprint when logging in?

A

Multi-factor authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Which type of internet appliance or device might be implemented for a service that is becoming overwhelmed by client requests?

A

Load Balancer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Which factor would be considered to represent the most significant risk to an organization’s network when using a legacy system or device?

A

Maintaining Security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Which type of device would generally not be regarded as an IoT device?

A

Laptop computer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly