True or False Flashcards
VPN’s can be used to make a secure connection to a corporate network through the internet.
Yes
Users connecting to a VPN using a dialup connection can only connect to a server using a dialup connection.
Yes
RAS Gateway can be used to configure a VPN connection that is always active when the user is connected to the internet.
yes
Clients by default attempt to renew an address lease halfway through the lease period.
yes
Clients will continue to use the address for the full length of the lease even when the server is unavailable.
Yes
Clients will continue to use the leased address after the end of the lease period until the DHCP server becomes available again.
No
HTTP, Telnet and SMTP operate on Layer 7 of the OSI model.
Yes
Layer 4 defines how connection between applications is established, managed and terminated.
NO
Layer 3 defines how traffic is routed between network devices.
Yes
Layer 4 defines how traffic is moved across a LAN
No
802.11ac is backwards compatible with 802.11a, b, g and n.
Yes
802.11ac WAPs support simultaneous transmissions on both the 2.4GHz and 5 GHz frequency ranges.
Yes
The maximum bandwidth for 802.11ac is 1.3 Gbps
Yes
802.11ac Aps are capable of transmission to multiple clients at the same time.
Yes
IPv4 routers are capable of forwarding network broadcasts outside of the local network
Yes
IPv6 traffic can be transported over an IPv4 network
Yes
If a device is configured to obtain an IP address automatically and cannot contact a DHYCP server, it will assign itself an APIPA address.
Yes
OSPF uses bandwidth and delay as its routing metrics.
Yes
RIP routes can contain no more than 15 hops.
Yes
OSPF takes longer to update routing tables than RIP
NO
RIP generates more update traffic than OSPF when broadcasting route changes.
NO
Which role should you install on Windows Server to configure remote access for dialup clients?
Remote Access
What is true about fibre optic cables.
It supports splicing.
It requires special polish for end connection.
Which type of wireless encryption is the most susceptible to interception and decryption?
WEP
Which feature of wireless networks causes the biggest security concern?
Radio broadcast method