Networking Flashcards

Objective 2

1
Q

A new device has been installed on a wired network and can be accessed via the LAN but cannot be accessed remotely. Which of the following is the most likely cause?

A. Firewall settings

B. Improper switch configuration

C. Incorrect IP address

D. Misconfigured access point

A

A. Firewall settings

accessed via LAN, not remotely

Firewall settings are the most likely cause for a device being accessible on the local area network (LAN) but not remotely. Firewalls can be configured to restrict incoming network traffic, which may prevent remote access to the device from outside the local network. If the device can be accessed locally but not remotely, it suggests that the firewall may be blocking incoming connections from external networks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

An application is hosted on a local network. Which of the following descriptions is correct?

A. LAN access is required.

B. The application exists locally.

C. Files are saved in the cloud.

D. Internet access is required.

A

A. LAN access is required.

local network

In a local network (LAN) environment, devices are connected within a limited geographic area, such as a home, office, or campus, using wired or wireless connections. When an application is hosted on a local network, it means that the application’s resources, such as servers or data storage, are located within that network’s infrastructure. Therefore, LAN access is required for devices within the same network to access and interact with the hosted application.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Which of the following protocols is used to relay email from a user’s mail server?

A. IMAP

B. FTP

C. SMTP

D. POP3

A

C. SMTP (Simple Mail Transfer Protocol)

relay email

SMTP (Simple Mail Transfer Protocol) is a standard protocol used for sending email messages between servers on the internet. When a user sends an email message from their mail client, such as Outlook or Gmail, the message is transferred from the user’s mail server to the recipient’s mail server using SMTP. SMTP is responsible for relaying email messages and ensuring their delivery to the appropriate destination server.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

A technician is having trouble connecting multiple users’ laptops to the internet wirelessly. The users are on the west side of the building, which is hardwired. Which of the following should the technician do to resolve this issue quickly?

A. Add a switch and hardwire the users’ laptops.

B. Add a network router.

C. Replace the users’ laptops with desktop computers.

D. Add an access point for the users.

A

D. Add an access point for the users

trouble with wireless connection

The most appropriate solution to provide wireless connectivity to multiple users’ laptops on the west side of the building is to add an access point. An access point (AP) is a networking device that allows wireless devices to connect to a wired network. By strategically placing an access point on the west side of the building where the users are located, the technician can extend the wireless coverage and provide reliable wireless connectivity to the laptops.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Which of the following internet service types is most susceptible to weather disruptions?

A. Cable

B. Satellite

C. DSL

D. Fiber

A

B. Satellite

Satellite internet service relies on communication between a ground-based satellite dish and satellites orbiting the Earth. As a result, it is highly susceptible to disruptions caused by inclement weather conditions such as heavy rain, snow, fog, or storms. These weather conditions can interfere with the satellite signal, leading to degraded or interrupted internet connectivity for users. Additionally, satellite internet may experience latency issues due to the distance signals must travel between the ground and satellites in space.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Which of the following would be the best reason to implement a host firewall?

A. To prevent external access

B. To prevent hardware failures

C. To prevent the removal of software

D. To prevent wiretapping

A

A. To prevent external access

Host firewalls are designed to control and monitor incoming and outgoing network traffic based on predetermined security rules. By implementing a host firewall, organizations can restrict unauthorized external access to their hosts (computers, servers, etc.) from the internet or other external networks. This helps protect against various external threats, such as unauthorized access attempts, malware infections, and network-based attacks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Employees of a large technology company are provided access to the internet as a work resource. Which of the following most likely represents the level of privacy employees should expect when utilizing this resource?

A. Only the attempts to access unapproved URLs are logged.

B. All internet usage is logged by a corporate server and may be monitored live.

C. All internet browsing is private and anonymous.

D. Only the attempts to access sites that include prohibited keywords are logged.

A

B. All internet usage is logged by a corporate server and may be monitored live.

expect no privacy

In a corporate environment, it is common for companies to log and monitor employees’ internet usage for various reasons, including security, compliance, and productivity monitoring. This level of monitoring allows the company to track employee activities, enforce acceptable use policies, detect potential security threats, and ensure compliance with regulations. Employees should expect that their internet activities, including visited websites, accessed content, and online communications, may be logged and monitored by the corporate IT department or security team.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Which of the following internet connection types is MOST affected by adverse weather, such as rain or snow?

A. Cable

B. Fiber

C. Cellular

D. DSL

A

A. Cable

Cable internet connections typically use coaxial cables to deliver internet service. These cables are often installed above ground and are vulnerable to weather conditions, especially heavy rain or snow. Water can seep into the cables and cause signal degradation or outages, impacting internet performance.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Which of the following protocols is used to download messages from an email server?

A. HTTP

B. IMAP

C. HTTPS

D. POP3

A

D. POP3

POP3 (Post Office Protocol version 3): POP3 is a protocol used for retrieving emails from a remote server to a local client. It allows users to download messages from their mailbox on the server to their computer or device. POP3 is one of the most common protocols used for email retrieval, especially in scenarios where users want to store messages locally on their device.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Which of the following would be BEST to use to protect a network?

A. Antivirus software

B. Proxy server

C. Anti-malware

D. Firewall

A

D. Firewall

protect a network

A firewall is a network security device that monitors and controls incoming and outgoing network traffic based on predetermined security rules. It acts as a barrier between a trusted internal network and untrusted external networks, such as the internet, and helps prevent unauthorized access, data breaches, and cyber attacks by filtering traffic and blocking potentially harmful connections.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Which of the following would be BEST to use to form an internal network?

A. Hub

B. Switch

C. Firewall

D. Router

A

B. Switch

switches stay on the internal network

A switch is a networking device that connects multiple devices within a local area network (LAN) and forwards data packets between them based on their MAC addresses. Switches provide efficient and dedicated communication between devices, allowing for high-speed data transfer within the internal network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Which of the following wireless technologies has the shortest transmission distance?

A. NFC

B. IR

C. Bluetooth

D. Wi-Fi

A

A. NFC

shortest distance

NFC operates over very short distances, typically within a few centimeters. While its range is limited, it is designed for close proximity communication and is commonly used for contactless payments, ticketing, and data exchange between devices.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Which of the following explains why the default administrator password for a home wireless router should be changed?

A. To prevent unauthorized router configuration changes

B. To prevent data transmission encryption

C. To improve wireless signal strength

D. To prevent social engineering attacks

A

A. To prevent unauthorized router configuration changes

logging in with default credentials is the easiest way to get hacked

Changing the default administrator password for a home wireless router is crucial to prevent unauthorized access to router settings and configurations. Default passwords are widely known and can be exploited by attackers to gain unauthorized access to the router’s administration interface. By changing the password to a strong, unique one, users can mitigate the risk of unauthorized router configuration changes, which could potentially compromise network security.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Which of the following BEST describes the technology utilized in digital wallets?

A. Infrared

B. NFC

C. Bluetooth

D. RFID

A

B. NFC (Near Field Communication)

Digital wallets typically utilize Near Field Communication (NFC) technology for contactless payments. NFC enables two devices to establish communication when they are brought close together, typically within a few centimeters. In the context of digital wallets, NFC allows smartphones or other devices to communicate with point-of-sale terminals or other NFC-enabled devices to initiate payment transactions securely.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

A user’s personal wireless network name includes the user’s last name. To make the wireless network less identifiable, which of the following would the user access to change the wireless network name to exclude?

A. WEP

B. SSID

C. WAP

D. WPA2

A

B. SSID

the ssid is the name of the wifi/internet network

SSID (Service Set Identifier) is a unique name assigned to a wireless network. It is what users see when they scan for available Wi-Fi networks on their devices. To make the wireless network less identifiable, the user should access the router’s settings interface and change the SSID to exclude their last name or any other identifiable information. This change helps enhance privacy and security by making it more challenging for unauthorized users to identify and target the network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Which of the following is used to connect to a wireless access point?

A. NIC

B. SSD

C. GPU

D. USB

A

A. NIC (Network Interface Card)

A NIC (Network Interface Card) is a hardware component that allows a device to connect to a network, including wireless networks. In the context of wireless networking, a wireless NIC, also known as a wireless adapter or Wi-Fi card, is used to connect a device (such as a computer or laptop) to a wireless access point. The wireless NIC communicates with the wireless access point using radio waves, allowing the device to access the network and connect to the internet or other network resources wirelessly.

16
Q

A technician is tasked with installing a network device that allows for internet connection from the ISP but blocks all sites on the company’s deny list. Which of the following devices is MOST likely used to complete this task?

A. Router

B. IDS

C. IPS

D. Firewall

A

D. Firewall

A firewall is the most likely device used to complete this task. Firewalls are network security devices that monitor and control incoming and outgoing network traffic based on predetermined security rules. By configuring the firewall rules, the technician can block access to specific websites listed on the company’s deny list while allowing internet connection from the Internet Service Provider (ISP).

17
Q

A customer recently purchased an item at a store using a mobile phone to make the payment. Which of the following technologies was MOST likely used to complete the purchase?

A. Bluetooth

B. NFC

C. Hotspot

D. Wi-Fi

A

B. NFC

Near Field Communication (NFC) is the most likely technology used to complete the purchase. NFC allows for short-range communication between devices, typically within a few centimeters. It is commonly used for contactless payments, where the customer’s mobile phone communicates with a payment terminal by tapping or holding it close to the terminal. NFC technology enables secure and convenient transactions without the need for physical contact between the devices.

18
Q

An administrator wants to block application traffic on specific ports from entering into the local area network. Which of the following devices would be the BEST choice to perform this task?

A. Router

B. Firewall

C. Switch

D. Access point

A

B. Firewall

A firewall is the best choice for blocking application traffic on specific ports from entering the local area network (LAN). Firewalls are designed to monitor and control incoming and outgoing network traffic based on predetermined security rules. By configuring the firewall rules, an administrator can specify which ports and protocols are allowed or blocked, effectively controlling the flow of traffic into and out of the network.

19
Q

Which of the following internet service types require filters to be installed on telephone lines at the location?

a. Fiber

b. DSL

c. Cable

d. Satellite

A

b. DSL

DSL (Digital Subscriber Line) requires filters to be installed on telephone lines at the location. DSL utilizes existing telephone lines to provide internet access. However, since DSL operates over the same copper lines used for telephone service, it requires filters to separate the DSL signals from voice signals. These filters prevent interference between the DSL connection and telephone service, ensuring both operate effectively.

20
Q

Concerned with vulnerabilities on a home network, an administrator replaces the wireless router with a recently released new device. After configuring the new device utilizing the old SSID and key, some light switches are no longer communicating. Which of the following is the MOST likely cause?

The light switches do not support WPA2
B. The router is operating on a different channel
C. The key does not meet word complexity requirements
D. The SSID is not being broadcast

A

A. The router is operating on a different channel

Some smart devices, such as light switches, may be sensitive to the Wi-Fi channel they are using. They often work with specific channels, and a new router may default to a different one. Reconfiguring the router to use the same channel as before or ensuring it is compatible with the devices can solve this issue.

21
Q

A company wants its employee to use an email client that downloads and removes messages from the email server. Which of the following protocols must be configured in the email client to facilitate this?

A. POP3

B. IMAP

C. ICMP

D. SMTP

A

A. POP3

POP3 (Post Office Protocol version 3): is used to download emails from an email server to a client device (such as a computer or smartphone) and typically removes them from the server after downloading. This fits the scenario described where the company wants its employees to download and remove messages from the server using their email client.

22
Q

A user is attempting to print a document to a wireless printer and receives an error stating the operation could not be completed. Which of the following should the user do to correct this issue?

A. Ensure both devices are connected to the LAN

B. Enable task scheduling

C. Reset the proxy settings to their default values

D. Review the fault tolerance configurations

A

A. Ensure both devices are connected to the LAN

For wireless printing to work, both the user’s device (e.g., computer, phone) and the wireless printer must be connected to the same local area network (LAN). If either the printer or the device is not connected to the network properly, the printing operation will fail. Checking the network connections is the first troubleshooting step for this kind of error.

23
Q

The broadcast signal from a recently installed wireless access point is not as strong as expected. Which of the following actions would best improve the signal strength?

A. Update from 802.11b to 802.11g

B. Ensure sources of EMI are removed

C. Enable WPA2- Enterprise

D. Use WiFi Protected Setup

A

B. Ensure sources of EMI are removed

improve signal strength

Electromagnetic interference (EMI) can significantly affect the signal strength of a wireless access point (WAP). Common sources of EMI include microwave ovens, cordless phones, and other wireless devices. Removing or relocating these sources can improve the signal strength and overall performance of the wireless network.

24
Q

Which of the following allows wireless devices to communicate to a wired network?

A. Modem

B. Switch

C. Firewall

D. Access point

A

D. Access point

wireless connection to a network

A switch provides us with wired connections that allow us to connect to the LAN via RJ45 cables. Access points allow devices to connect to the LAN via wireless signals.

25
Q

When setting up a SOHO (Small Office/Home Office) wireless network, which of the following would best be used to limit interference with other home devices?

A) 2.4 GHz
B) 5 GHz
C) 802.11b
D) 802.11g

A

B) 5 GHz

The 5 GHz frequency band is less crowded than the 2.4 GHz band, which is commonly used by many household devices (e.g., microwaves, cordless phones, Bluetooth devices). Using the 5 GHz band can help reduce interference with those devices, improving network performance.

26
Q

A tech is setting up a SOHO system and is using RJ11 to connect a router. What type of network connection is being established?

A. Satellite

B. Cable

C. DSL

D. Cable

A

C. DSL

RJ11 connectors are typically used for phone lines, and DSL (Digital Subscriber Line) internet connections use phone lines to provide internet service. Therefore, if the technician is using an RJ11 cable, it’s most likely for a DSL connection.

27
Q

What is the difference between data and information?

A. Data is organized, while information is raw and unprocessed.
B. Data refers to facts or figures without context, while information is data presented with meaning.
C. Data is subjective, while information is objective.
D. Data is always accurate, while information is often inaccurate.

A

B. Data refers to facts or figures without context, while information is data presented with meaning.

Data is raw, unprocessed facts or figures (e.g., numbers, symbols, or text) without meaning on their own. Information is data that has been processed, organized, or structured in a way that gives it context and meaning.

28
Q

Of your internal network connection options, which one can provide the fastest speeds?

A. UTP

B. Fiber

C. Infrared

D. 802.11n

A

B. Fiber

Fiber = Fastest

Fiber optic connections use light to transmit data and are capable of providing extremely fast speeds, often exceeding other types of connections. It is the fastest option listed here.

29
Q

Which one of these connection types has the longest delay?

A. Wireless

B. Infrared

C. Wired

D. Cellular

A

D. Cellular

Cellular connections, such as 4G or 5G networks, rely on wireless communication technology to connect devices to the internet. While cellular networks offer widespread coverage and mobility, they often have higher latency compared to other connection types. Latency in cellular networks can be affected by factors such as signal strength, network congestion, and distance from cellular towers.

30
Q

Your friend Michael is setting up a wireless network and asks you which security option he should choose to make the network the most secure. What do you suggest?

A. WEP

B. WPA

C. WPA2

D. NAT

A

C. WPA2

MOST secure

WPA2 (Wi-Fi Protected Access 2) is currently one of the most secure encryption methods available for wireless networks. It uses AES (Advanced Encryption Standard), providing robust security compared to older protocols.

31
Q

You are configuring a computer to participate on a network. Which of the following are mandatory? (Choose two.)

A. IP address

B. Default gateway

C. DHCP server

D. Subnet mask

A

A. IP Address
D. Subnet Mask

IP address: An IP address is a unique numerical identifier assigned to each device on a network. It is essential for communication between devices within the network and for identifying the device’s location on the network.

Subnet mask: A subnet mask is used in conjunction with an IP address to determine the network and host portions of the address. It helps the device identify which portion of the IP address represents the network and which portion represents the host. Subnet masks are crucial for routing data packets within the network.

32
Q

You have remotely logged into your corporate network. Which of the following is used to ensure encryption of data in transit between your laptop and corporate servers?

A. HTTPS

B. Email encryption

C. VPN

D. Host firewall

A

C.VPN

Encrypted tunnel, used for secure remote connections, data in transit

A Virtual Private Network (VPN) ensures that all data transmitted between your laptop and the corporate network is encrypted. This protects the data from being intercepted or read by unauthorized parties while in transit over the internet.

33
Q

Which type of software will help protect your computer from malicious network traffic?

A. Software firewall

B. Password complexity tool

C. Antispyware

D. Antivirus

A

A. Software Firewall

network traffic

A software firewall helps protect your computer from malicious network traffic by monitoring and controlling incoming and outgoing network traffic based on predetermined security rules. It acts as a barrier between your computer and potentially harmful external network connections.

34
Q

A user is trying to set up a new wireless access point. Which of the following should the user do first?

A. Change the SSID to a unique name.

B. Change the default password.

C. Enable WPA2 encryption.

D. Enable the highest available wireless standard.

A

B. Change the default password

Changing the default password is crucial because many wireless access points come with default credentials that are widely known and documented. If these are not changed, it poses a security risk, as unauthorized users could easily gain access to the network or change its settings.