Practice Test #4 Flashcards
Networking
QUESTION NO: 73
Joe, a user, has just installed his first home wireless router. Which of the following tasks should be
considered to help secure the unit from any confirmed exploits?
A.
Change the router administrator username.
B.
Change the router’s broadcasting channel.
C.
Update the unit’s firmware.
D.
Use a complex administrator password.
Answer: C
QUESTION NO: 74 Which of the following is the BEST security practice to use when configuring the management options of a wireless router? A. Disable DHCP B. Change the admin password C. Enable SSID D. Enable remote administration
Answer: B
QUESTION NO: 75 When operating under optimal network conditions, which of the following has the HIGHEST reliability? A. Bluetooth B. Wired C. Cellular D. WiFi
Answer: B
QUESTION NO: 76 A user needs to download tax documents from a financial website. Which of the following is the website MOST likely to use for transmission of the tax document to the user’s browser? A. HTTP B. HTTPS C. SFTP D. FTP
Answer: B
QUESTION NO: 77 Which of the following are secure network protocols? (Select TWO). A. IMAP B. FTPS C. SMTP D. HTTPS E. DNS
Answer: B,D
QUESTION NO: 78 Which of the following will allow the easiest and fastest way to share a single file between two modern smartphones without joining the same WiFi network? A. Micro SD card B. Bluetooth C. USB connection D. Infrared
Answer: B
QUESTION NO: 79
Which of the following BEST describes the pros and cons of a home wired network?
A.
Low throughput, low mobility, high availability, high latency, high security
B.
High throughput, high mobility, low availability, low latency, high security
C.
High throughput, low mobility, high availability, low latency, high security
D.
Low throughput, high mobility, low availability, high latency, low security
Answer: C
QUESTION NO: 80
A technician has just finished setting up a SOHO wireless router but the client does not want the
PC on the wireless network for security reasons. The technician connects an RJ-45 cable to the
computer and the router, but does not receive network connectivity. Which of the following is the
NEXT step to diagnose the problem?
A.
Change the IP address on the computer to match the router.
B.
Reseat the power cable on the computer and reboot.
C.
Check for link light activity on the computer and the router.
D.
Change the hostname of the router to match the computer’s network
Answer: C
QUESTION NO: 81 Which of the following is an advantage of using cloud-based collaborative applications and storage, rather than local applications and storage? A. Decreased software licensing costs B. Higher security encryption C. Limited storage space for files D. Increased accessibility to files
Answer: D
QUESTION NO: 82
Which of the following data connections would provide a user the BEST Internet availability while
traveling?
A.
Workstation with only RJ-45 connectors
B.
Smartphone with cellular service
C.
Laptop with Bluetooth wireless connectivity
D.
Tablet connected to a SOHO wireless network
Answer: B
QUESTION NO: 83 A technician is configuring a wireless router for a small office and the business owner would like the wireless network to be secured using the strongest encryption possible. Which of the following should the technician choose? A. WPA2 B. WAP C. WPA D. WEP
Answer: A
QUESTION NO: 84
A user’s laptop hard drive contains sensitive information. The user often plugs the laptop into the
corporate network. A sensitive file from the laptop has been found on another user’s laptop. How
could the user have prevented this breach?
A.
Disable file and print sharing on the laptop.
B.
Delete unused drives from network.
C.
Remove shared keys from the key ring.
D.
Set the read-only attribute on the files
Answer: A
QUESTION NO: 85 Joe, a user, needs to store a large amount of data, but does not have enough space on his local computer. Which of the following are the BEST options for him to use? (Select TWO). A. Network attached storage B. External hard drive C. Optical drive D. USB thumb drive E. Another computer
Answer: A,B
QUESTION NO: 86 When connecting a printer to a network, which of the following is needed to complete the process? (Select TWO). A. IP address B. User's password C. Computer’s name D. Subnet mask E. HTTP port F. Fax number
Answer: A,D
QUESTION NO: 87 Which of the following protocols is used to secure communications between sender and receiver? A. SIP B. SNMP C. SSL D. SMTP
Answer: C