Networking Flashcards
Objective 2
A new device has been installed on a wired network and can be accessed via the LAN but cannot be accessed remotely. Which of the following is the most likely cause?
A. Firewall settings
B. Improper switch configuration
C. Incorrect IP address
D. Misconfigured access point
A. Firewall settings
accessed via LAN, not remotely
Firewall settings are the most likely cause for a device being accessible on the local area network (LAN) but not remotely. Firewalls can be configured to restrict incoming network traffic, which may prevent remote access to the device from outside the local network. If the device can be accessed locally but not remotely, it suggests that the firewall may be blocking incoming connections from external networks.
An application is hosted on a local network. Which of the following descriptions is correct?
A. LAN access is required.
B. The application exists locally.
C. Files are saved in the cloud.
D. Internet access is required.
A. LAN access is required.
local network
In a local network (LAN) environment, devices are connected within a limited geographic area, such as a home, office, or campus, using wired or wireless connections. When an application is hosted on a local network, it means that the application’s resources, such as servers or data storage, are located within that network’s infrastructure. Therefore, LAN access is required for devices within the same network to access and interact with the hosted application.
Which of the following protocols is used to relay email from a user’s mail server?
A. IMAP
B. FTP
C. SMTP
D. POP3
C. SMTP (Simple Mail Transfer Protocol)
relay email
SMTP (Simple Mail Transfer Protocol) is a standard protocol used for sending email messages between servers on the internet. When a user sends an email message from their mail client, such as Outlook or Gmail, the message is transferred from the user’s mail server to the recipient’s mail server using SMTP. SMTP is responsible for relaying email messages and ensuring their delivery to the appropriate destination server.
A technician is having trouble connecting multiple users’ laptops to the internet wirelessly. The users are on the west side of the building, which is hardwired. Which of the following should the technician do to resolve this issue quickly?
A. Add a switch and hardwire the users’ laptops.
B. Add a network router.
C. Replace the users’ laptops with desktop computers.
D. Add an access point for the users.
D. Add an access point for the users
trouble with wireless connection
The most appropriate solution to provide wireless connectivity to multiple users’ laptops on the west side of the building is to add an access point. An access point (AP) is a networking device that allows wireless devices to connect to a wired network. By strategically placing an access point on the west side of the building where the users are located, the technician can extend the wireless coverage and provide reliable wireless connectivity to the laptops.
Which of the following internet service types is most susceptible to weather disruptions?
A. Cable
B. Satellite
C. DSL
D. Fiber
B. Satellite
Satellite internet service relies on communication between a ground-based satellite dish and satellites orbiting the Earth. As a result, it is highly susceptible to disruptions caused by inclement weather conditions such as heavy rain, snow, fog, or storms. These weather conditions can interfere with the satellite signal, leading to degraded or interrupted internet connectivity for users. Additionally, satellite internet may experience latency issues due to the distance signals must travel between the ground and satellites in space.
Which of the following would be the best reason to implement a host firewall?
A. To prevent external access
B. To prevent hardware failures
C. To prevent the removal of software
D. To prevent wiretapping
A. To prevent external access
Host firewalls are designed to control and monitor incoming and outgoing network traffic based on predetermined security rules. By implementing a host firewall, organizations can restrict unauthorized external access to their hosts (computers, servers, etc.) from the internet or other external networks. This helps protect against various external threats, such as unauthorized access attempts, malware infections, and network-based attacks.
Employees of a large technology company are provided access to the internet as a work resource. Which of the following most likely represents the level of privacy employees should expect when utilizing this resource?
A. Only the attempts to access unapproved URLs are logged.
B. All internet usage is logged by a corporate server and may be monitored live.
C. All internet browsing is private and anonymous.
D. Only the attempts to access sites that include prohibited keywords are logged.
B. All internet usage is logged by a corporate server and may be monitored live.
expect no privacy
In a corporate environment, it is common for companies to log and monitor employees’ internet usage for various reasons, including security, compliance, and productivity monitoring. This level of monitoring allows the company to track employee activities, enforce acceptable use policies, detect potential security threats, and ensure compliance with regulations. Employees should expect that their internet activities, including visited websites, accessed content, and online communications, may be logged and monitored by the corporate IT department or security team.
Which of the following internet connection types is MOST affected by adverse weather, such as rain or snow?
A. Cable
B. Fiber
C. Cellular
D. DSL
A. Cable
Cable internet connections typically use coaxial cables to deliver internet service. These cables are often installed above ground and are vulnerable to weather conditions, especially heavy rain or snow. Water can seep into the cables and cause signal degradation or outages, impacting internet performance.
Which of the following protocols is used to download messages from an email server?
A. HTTP
B. IMAP
C. HTTPS
D. POP3
D. POP3
POP3 (Post Office Protocol version 3): POP3 is a protocol used for retrieving emails from a remote server to a local client. It allows users to download messages from their mailbox on the server to their computer or device. POP3 is one of the most common protocols used for email retrieval, especially in scenarios where users want to store messages locally on their device.
Which of the following would be BEST to use to protect a network?
A. Antivirus software
B. Proxy server
C. Anti-malware
D. Firewall
D. Firewall
protect a network
A firewall is a network security device that monitors and controls incoming and outgoing network traffic based on predetermined security rules. It acts as a barrier between a trusted internal network and untrusted external networks, such as the internet, and helps prevent unauthorized access, data breaches, and cyber attacks by filtering traffic and blocking potentially harmful connections.
Which of the following would be BEST to use to form an internal network?
A. Hub
B. Switch
C. Firewall
D. Router
B. Switch
switches stay on the internal network
A switch is a networking device that connects multiple devices within a local area network (LAN) and forwards data packets between them based on their MAC addresses. Switches provide efficient and dedicated communication between devices, allowing for high-speed data transfer within the internal network.
Which of the following wireless technologies has the shortest transmission distance?
A. NFC
B. IR
C. Bluetooth
D. Wi-Fi
A. NFC
shortest distance
NFC operates over very short distances, typically within a few centimeters. While its range is limited, it is designed for close proximity communication and is commonly used for contactless payments, ticketing, and data exchange between devices.
Which of the following explains why the default administrator password for a home wireless router should be changed?
A. To prevent unauthorized router configuration changes
B. To prevent data transmission encryption
C. To improve wireless signal strength
D. To prevent social engineering attacks
A. To prevent unauthorized router configuration changes
logging in with default credentials is the easiest way to get hacked
Changing the default administrator password for a home wireless router is crucial to prevent unauthorized access to router settings and configurations. Default passwords are widely known and can be exploited by attackers to gain unauthorized access to the router’s administration interface. By changing the password to a strong, unique one, users can mitigate the risk of unauthorized router configuration changes, which could potentially compromise network security.
Which of the following BEST describes the technology utilized in digital wallets?
A. Infrared
B. NFC
C. Bluetooth
D. RFID
B. NFC (Near Field Communication)
Digital wallets typically utilize Near Field Communication (NFC) technology for contactless payments. NFC enables two devices to establish communication when they are brought close together, typically within a few centimeters. In the context of digital wallets, NFC allows smartphones or other devices to communicate with point-of-sale terminals or other NFC-enabled devices to initiate payment transactions securely.
A user’s personal wireless network name includes the user’s last name. To make the wireless network less identifiable, which of the following would the user access to change the wireless network name to exclude?
A. WEP
B. SSID
C. WAP
D. WPA2
B. SSID
the ssid is the name of the wifi/internet network
SSID (Service Set Identifier) is a unique name assigned to a wireless network. It is what users see when they scan for available Wi-Fi networks on their devices. To make the wireless network less identifiable, the user should access the router’s settings interface and change the SSID to exclude their last name or any other identifiable information. This change helps enhance privacy and security by making it more challenging for unauthorized users to identify and target the network.