Module 7: Setting Up a Local Network Flashcards
A small group of travelers is meeting inside an ancient building, and the travelers need access to the Internet using their mobile devices. However, the group is in an area where Wi-Fi Internet is not available and cellular coverage is intermittent. One of the travelers has an unlimited cellular data plan and a strong consistent signal.
Which of the following methods would most likely be implemented to provide Internet service to the group?
Mobile hotspot
A mobile hotspot can be used to share the Internet connection on a mobile device with other mobile devices or computers using the hotspot device’s Wi-Fi. The devices connecting to the hotspot utilize their Wi-Fi to connect to the mobile hotspot and then to the Internet
What is the correct order of network types when categorized by their size or the physical area they cover, from largest to smallest?
WAN, MAN, LAN, PAN
This list is from largest to smallest.
Your company is implementing a wireless network and is concerned that someone from a competing company could stand outside the building and collect wireless data. You have assured the company that WPA2 is secure.
What makes WPA2 more secure than WPA?
AES
AES (Advanced Encryption Standard) provides faster and more secure encryption than TKIP. WPA2 also changes the encryption with every packet so that it would be difficult to brute-force the encryption.
What connector is shown in the exhibit?
RJ-45
RJ-45 connectors use twisted pair cabling and have eight pins. Copper Ethernet patch cables utilize the RJ-45 connector.
A client contacted you to request your help in researching and supplying the hardware necessary to implement a SOHO solution at his new home-based business.
Which of the following SOHO router features will simplify IP address configuration on the private network for both wired and wireless clients?
DHCP server
An integral feature of a SOHO router is the DHCP (Dynamic Host Configuration Protocol) server, which automatically assigns IP address information to network clients with either wired or wireless connections. The host device is configured to obtain IP address information automatically.
Which of the following is a scenario in which an IT support technician would most likely be required to implement the alternate IP configuration method on a network host?
In the event a DHCP server is unavailable, the workstation will have a valid IP address on the subnet.
The most common use of the alternate IP configuration method is to assign a valid IP address to a host when it cannot reach a DHCP server. For example, a client uses her laptop at home (using DHCP) and at work (using static assignment). If the host is set to obtain an IP address automatically, it will receive an IP address at home but not at work. Without an alternate configuration, if the host cannot reach a DHCP server, the host will automatically assign an automatic private Internet protocol address (APIPA).
You have connected an ADSL Internet connection as shown in the exhibit. The ports at the phone jack are connected to the same single-number POTS line.
At what location should you place the DSL filter?
“B” only
Placing a DSL filter at position “B” is correct. The network and analog phone will operate as intended. The DSL filter is designed to be placed at each analog phone connection.
Which of the following 802.11 wireless networking standards support transfer rates of over 54 Mbps? (Select TWO.)
- 11ac
- 11n
- 11ac supports data transfer rates up to 1.3 Gbps.
- 11n supports data transfer rates up to 600 Mbps.
You have been tasked with configuring a SOHO network in which all ports on the public untrusted network will be forwarded to one workstation connected to the LAN.
Which of the following features will you configure on the SOHO router to accomplish this task?
Demilitarized zone
A DMZ (demilitarized zone) is enabled on a SOHO router to forward all protocols (ports) from the public untrusted network to a host on the private LAN. Use this setting carefully on a SOHO device as it can have serious security ramifications to all hosts on the private network.
A manager in a small office is asking if it is possible to limit network access to a particular website during business hours. Apparently, several users are spending an excessive amount of time on the site preventing them from completing their work-related tasks.
Which of the following is the best solution to accomplish the request from the manager while not limiting access to other websites?
Implement a blacklist on the firewall and add the site the users are visiting.
The blacklist contains restricted or blocked sites and can be configured on a SOHO router, making this the best network-based solution.
Which of the following will use an RJ-11 connector for connectivity?
DSL
DSL (Digital Subscriber Line) connections use copper twisted pair cable on POTS lines using RJ-11 connectors. (RJ stands for registered jack.) RJ-11 connectors are constructed to accept one or two pairs of individual wires.
Match the protocol or encryption name with the feature.
TKIP Generates a different key for every transmission;
however, the encryption algorithm used for its
calculations is no longer considered secure.
WEP No longer considered secure because the key
used for encryption doesn’t change.
WPA2 Typically uses AES for encryption.
AES Current encryption algorithm used today.
WPA Typically uses TKIP for encryption.
You have connected a cable Internet connection as shown in the exhibit.
At what location should you place a filter?
No filters are required
Cable requires no filters. Filters are used for ADSL and VDSL when simultaneous voice and data are desired.
A corporate user is attempting to connect to the company’s Windows domain server on the local network with her new laptop through a wired connection.
Which of the following is required for the user to successfully sign in to the Windows domain?
Windows domain user name and password
The user must have a valid user name and password configured on the Windows domain controller to authenticate on the network.
Cathy wants to connect to her wireless LAN at home but is not sure where to change the setting so that she can connect.
Where in the Windows Control Panel will Cathy find her computer’s network connection settings?
Network and Sharing Center
Cathy will find the computer’s network connection settings in the Network and Sharing Center. She will also see all the network connection types.