Net+ Session 4 Post-lab follow-up Flashcards
Which is NOT true about a load balancer?
A - Load balancing can work over multiple NICs
B - Load balancers control traffic over multiple routers
C - Load balancers distribute requests across servers in a server farm
D - If a server that is part of a load balance is removed from the group, the load balancer fails
D - If a server that is part of a load balance is removed from the group, the load balancer fails
What is the act of throttling bandwidth on the basis of applications known as? A - Traffic control B - Packet shaping C - Content filtering D - Traffic classification
B - Packet shaping
A junior network administrator needs a definition for a critical node. What would the best definition be?
A - A device with no mirroring
B - A device with no redundancy
C - A file that will cause a loss of business function if it is lost
D - A device that will cause a loss of business function if it fails
D - A device that will cause a loss of business function if it fails
What is data that must be protected in case of disaster known as? A - Critical node B - Critical asset C - Critical data set D - Critical software
B - Critical asset
A tech support firm agrees to make sure their cloud services are up and running 99.999% of the time. What is this type of agreement known as? A - SLA B - MLA C - MOU D - SOW
A - SLA
Two manufacturers make an agreement to build the same type of external hard drives. This agreement represents which type of business document? A - SLA B - MSA C - MOU D - SOW
B - MSA
Which business document type is often legally equivalent to a contract? A - SLA B - MSA C - MOU D - SOW
D - SOW
A technician is in a small office, trying to figure out how to remove a cable running all the way across a room, connecting a computer with no wireless adapter to a wireless router. What device can the technician add to the network to then be able to remove the cable? A - A hub B - A repeater C - A wireless bridge D - A wireless adapter
C - A wireless bridge
A technician needs to measure device density in a wireless network in an industrial building. What is the technician specifically checking for?
A - The number of devices within the building
B - The number of access points within the building
C - The number of users accessing the wireless access point
D - The number of machines that interfere with the wireless access points
A - The number of devices within the building
Which wireless concept involves getting multiple interfaces to be set up as a single entity? A - LWAPP B - VLAN pooling C - Wireless bridges D - Wireless controllers
B - VLAN pooling
What is a protocol wireless LAN controllers use to manage multiple access points in a wireless network? A - SMB B - LDAP C - SNMP D - LWAPP
D - LWAPP
Which wireless standards run on the 2.4 GHz frequency? Choose three. A - 802.11b B - 802.11g C - 802.11n D - 802.11ac
A - 802.11b
B - 802.11g
C - 802.11n
Which wireless standards operate on the 5 GHz frequency? Choose two. A - 802.11b B - 802.11g C - 802.11n D - 802.11ac
C - 802.11n
D - 802.11ac
An 802.11n wireless network has a speed standard of 600 Mbps. The actual average speed has been consistently measuring at 300 Mbps. What is this known as? A - Goodput B - Throughput C - Interference D - Bad antenna signal
A - Goodput
What does the ht stand for in the 802.11a-ht networks? A - High transit B - High transfer C - Higher throughput D - Higher technology
C - Higher throughput
What determines an antenna's signal strength in a wireless network? A - The gain value B - The type of standard it is on C - The resistance to interference D - The distance the signal can travel
A - The gain value
A network administrator needs to purchase a wireless antenna that beams a signal in all directions. Which type of antenna does the administrator need to purchase? A - Alldirectional B - Unidirectional C - Multidirectional D - Omnidirectional
D - Omnidirectional
Which wireless standard supports MU-MIMO? A - 802.11b B - 802.11g C - 802.11n D - 802.11ac
D - 802.11ac
Which is the most likely factor that contributes to a weak signal strength for a client?
A - Distance from the access point
B - Client is on a different channel than the access point
C - Client is on a different frequency than the access point
D - Client is on a different wireless standard than the access point
A - Distance from the access point
Which is considered the best way to secure a wireless network? A - Use MAC filtering B - Use WPA2 encryption C - Lower the signal strength D - Disable the SSID broadcast
D - Disable the SSID broadcast
Which type of wireless network involves a direct connection between two devices? A - Mesh B - Ad hoc C - Infrastructure D - Unidirectional
B - Ad hoc
Which type of wireless network uses access points to connect devices to a wired network? A - Mesh B - Ad hoc C - Infrastructure D - Unidirectional
C - Infrastructure
What network policy should be implemented before personal cell phones are allowed on a corporate network? A - MAM B - MDM C - BYOD D - MSDS
C - BYOD
A junior technician is saying that Android tablets all have different locations for wireless settings and connections. This is due to the Android operating system being what type of operating system? A - Thin B - Open C - Thick D - Closed
B - Open
A home office needs its gaming device connected to a wireless network as the owner wants to be able to use the fitness app on the gaming device. What information is needed in order to connect this device to the wireless network? Choose two. A - SSID B - Password C - IP address of device D - IP address of access point
A - SSID
B - Password
Which is considered the weakest when it comes to security for wireless authentication? A - TKIP B - WEP C - WPA D - WPA2
B - WEP
Which type of wireless authentication needs an authentication server in order to connect to a network? A - WPA B - WEP-Shared C - WPA2-Personal D - WPA2-Enterprise
D - WPA2-Enterprise
Which is true about encryption protocols used in WPA and WPA2? A - Both WPA and WPA2 use AES B - Both WPA and WPA2 use TKIP C - WPA uses AES while WPA2 uses TKIP D - WPA uses TKIP while WPA2 uses AES
D - WPA uses TKIP while WPA2 uses AES
What are the main components of 802.1X? Choose three. A - Supplicant B - Authenticator C - Authorization agent D - Authentication server
A - Supplicant
B - Authenticator
D - Authentication server
A user wants to make sure his/her wireless hotspot only allows devices the user chooses. What is the best way to accomplish this? A - Use IP filtering B - Use MAC filtering C - Use WPA2 encryption D - Enable the SSID broadcast
B - Use MAC filtering
What is true about circuit switching and packet switching?
A - Circuit switching uses virtual circuits while packet switching packets all take the same path to their destination
B - Circuit switching uses virtual circuits while packet switching packets can take different paths to their destination
C - Circuit switching uses a dedicated transmission channel while packet switching packets all take the same path to their destination
D - Circuit switching uses a dedicated transmission channel while packet switching packets can take different paths to their destination
D - Circuit switching uses a dedicated transmission channel while packet switching packets can take different paths to their destination
What type of multiplexing uses up to 32 wavelengths on a single fiber? A - PON B - SONET C - CWDM D - DWDM
D - DWDM
Which WAN technology is usually associated with cable television networks? A - ATM B - CWDM C - DWDM D - Frame relay
B - CWDM