You are on page 1of 6

1. What are three advantages of wireless over wired LAN technology?

(Choose
three.)

o lower on-going costs


o longer transmission distance
o ease of installation
o ease of expansion
o higher level of security
Answers Explanation & Hints:
Wireless technology can provide anytime, anywhere connectivity and allows devices to stay connected
as their location may change. Wireless technology is fairly easy and inexpensive to install and enables
networks to be easily expanded, without the limitations of cabled connections.

2. Which wireless RF band do IEEE 802.11b/g devices use?

o 900 MHz
o 2.4 GHz
o 5 GHz
o 60 GHz
Answers Explanation & Hints:
900 MHz is an FCC wireless technology that was used before development of the 802.11 standards.
900 MHz devices have a larger coverage range than the higher frequencies have and do not require line
of sight between devices. 802.11b/g/n/ad devices all operate at 2.4 GHz. 802.11a/n/ac/ad devices
operate at 5 GHz, and 802.11ad devices operate at 60 GHz.

3. What two IEEE 802.11 wireless standards operate only in the 5 GHz range?
(Choose two.)

o 802.11a
o 802.11b
o 802.11g
o 802.11n
o 802.11ac
o 802.11ad
Answers Explanation & Hints:
The 802.11a and 802.11ac standards operate only in the 5 GHZ range. The 802.11b and 802.11g
standards operate only in the 2.4 GHz range. The 802.11n standard operates in both the 2.4 and 5 GHz
ranges. The 802.11ad standard operates in the 2.4, 5, and 60 GHz ranges.

4. What wireless router configuration would stop outsiders from using your
home network?

o IP address
o encryption
o router location
o network name
Answers Explanation & Hints:
Encryption configured on the wireless router can provide secure communications and stop outsiders
from using your home network.

5. What is CSMA/CA on a network?

o an access method that is used by wireless technology to avoid duplicate SSIDs


o an access method that is used by any technology that has excessive collisions
o an access method that is used by wired Ethernet technology to avoid collisions
o an access method that is used by wireless technology to avoid collisions
Answers Explanation & Hints:
Carrier Sense Multiple Access with Collision Avoidance (CSMA/CA) is a wireless technology that
allows only one device to transmit on a channel at a given moment and prevents collisions from
occurring.

6. Which feature is characteristic of MAC filtering in wireless networks?

o It allows only authorized users to detect the network.


o It encrypts data that is transmitted on a wireless network.
o It is configured on the computer rather than on the router.
o It restricts computer access to a wireless network.
Answers Explanation & Hints:
MAC address filtering uses the MAC address to identify which devices are allowed to connect to the
wireless network.

7. What are two types of wired high-speed Internet connections? (Choose two.)

o cable
o satellite
o cellular
o DSL
o dial-up
Answers Explanation & Hints:
Cable and DSL Internet technologies both use physical cabling to provide an Internet connection to a
residence or a small business. Although dial-up is a wired technology, it does not provide a high-speed
Internet connection. Satellite and cellular connections provide a wireless Internet connection.

8. Which type of device provides an Internet connection through the use of a


phone jack?

o cable modem
o DSL modem
o satellite modem
o Wi-Fi AP
Answers Explanation & Hints:
DSL technology uses the existing telephone network. For that reason, a DSL modem commonly has an
RJ-11 phone port.

9. Which cloud computing opportunity would provide the use of network


hardware such as routers and switches for a particular company?
o browser as a service (BaaS)
o infrastructure as a service (IaaS)
o software as a service (SaaS)
o wireless as a service (WaaS)
Answers Explanation & Hints:
This item is based on information contained in the presentation.
Routers, switches, and firewalls are infrastructure devices that can be provided in the cloud.

10. What technology allows users to access data anywhere and at any time?

o data analytics
o Cloud computing
o virtualization
o micromarketing
Answers Explanation & Hints:
Cloud computing allows organizations to eliminate the need for on-site IT equipment, maintenance,
and management. Cloud computing allows organizations to expand their services or capabilities while
avoiding the increased costs of energy and space.

11. Which two business and technical challenges does implementing virtualization
within a data center help businesses to overcome? (Choose two.)

o server hardware needs


o physical footprint
o power and air conditioning
o operating system license requirements
o virus and spyware attacks
Answers Explanation & Hints:
Traditionally, one server was built within one machine with one operating system. This server required
power, a cool environment, and a method of backup. Virtualized servers require more robust hardware
than a standard machine because a computer or server that is in a virtual machine commonly shares
hardware with one or more servers and operating systems. By placing multiple servers within the same
physical case, space is saved. Virtualized systems still need the proper licenses for operating systems or
applications or both and still need the proper security applications and settings applied.

12. Which three steps must be completed to manually connect an Android or IOS
device to a secured wireless network? (Choose three.)

o Input the authentication password.


o Enter the network SSID.
o Choose the correct security type.
o Set the IP address.
o Activate the Bluetooth antenna.
o Change the MAC address.
Answers Explanation & Hints:
In order to connect an Android or IOS device to a Wi-Fi network manually, perform these steps:Enter
the network SSID of the wireless network.
Choose the security type used by the wireless network.
Input the password to authenticate successfully.
13. Which statement accurately characterizes the evolution of threats to network
security?

o Internal threats can cause even greater damage than external threats.
o Internet architects planned for network security from the beginning.
o Early Internet users often engaged in activities that would harm other users.
o Threats have become less sophisticated while the technical knowledge needed by an attacker has
grown.
Answers Explanation & Hints:
Internal threats can be intentional or accidental and cause greater damage than external threats because
the internal user has direct access to the internal corporate network and corporate data.

14. Which type of attack exploits human behavior to gain confidential


information?

o virus
o social engineering
o denial of service
o spyware
Answers Explanation & Hints:
Social engineering attacks deceive users into revealing private information or performing specific
actions.

15. Which three attacks exploit human behavior? (Choose three.)

o pretexting
o brute force
o phishing
o zombies
o vishing
o malware
Answers Explanation & Hints:
Attacks aimed at exploiting human behavior such as pretexting, phishing, and vishing are commonly
used by hackers to obtain information directly from authorized users.

16. What is a characteristic of a computer worm?

o malicious software that copies itself into other executable programs


o tricks users into running the infected software
o a set of computer instructions that lies dormant until triggered by a specific event
o exploits vulnerabilities with the intent of propagating itself across a network
Answers Explanation & Hints:
A worm is similar to a virus. However, a worm is self-spreading and can send copies of itself to
connected hosts over the network.

17. Which type of attack involves an attacker using a powerful computer to try a
large number of possible passwords in rapid succession to gain access to a
system?
o brute force
o phishing
o pretexting
o DDoS
Answers Explanation & Hints:
In a brute force attack an attacker will try to gain access to a system by guessing passwords as fast as
possible.

18. What is a common countermeasure for Trojan horses?

o antivirus software
o authentication
o encryption
o firewall
Answers Explanation & Hints:
The primary means of mitigating virus and Trojan horse attacks is antivirus software. Antivirus
software helps prevent hosts from getting infected and spreading malicious code.

19. A student tells a teacher that many junk emails are appearing on a new
personal laptop. What is a possible cause of the problem?

o The student has spent too much time surfing the web.
o The school email server is not functioning properly.
o The laptop needs to be updated to the latest OS version.
o The new laptop does not have antivirus or anti-spam software installed.
Answers Explanation & Hints:
A new computer should have antivirus, or anti-spam filter for the email client, or anti-spam software
installed to protect from spammers.

20. What happens when a wireless access point is configured to stop broadcasting
the SSID?

o Computer access to the wireless access point is restricted.


o The identity of the network is freely broadcast.
o The network is invisible to those who are unaware of the SSID.
o Signals are prevented from transmission outside the boundaries of the local network.
Answers Explanation & Hints:
By default, wireless routers and access points broadcast SSIDs to all computers within the wireless
range. This allows any wireless client to detect the network and to connect to it. The SSID broadcast
feature can be turned off. When it is turned off, the network is no longer made public. It becomes
invisible to clients that are not manually configured with the SSID.

21. Why should WEP not be used in wireless networks today?

o its age
o easily crackable
o its lack of support
o its lack of encryption
o its use of clear text passwords
Answers Explanation & Hints:
Despite improvements, WEP is still vulnerable to various security issues including the ability to be
cracked.

22. What specialized network device is responsible for permitting or blocking


traffic between networks?

o switch
o access point
o bridge
o firewall
Answers Explanation & Hints:
Firewalls are used to permit or block traffic between networks according to access control policies.

23. An administrator wants to configure a router so that users on the outside


network can only establish HTTP connections to the internal web site. Which
feature would the administrator configure to accomplish this?

o PAT
o static NAT
o NAT overload
o port forwarding
Answers Explanation & Hints:
Port forwarding allows connections to one port on the external interface to be redirected to a specific
device and a specific port on the inside interface. In this way specific inside services can be accessible
from the outside network without permitting all traffic to the inside device.

24. What is the purpose of a DMZ?

o It analyzes traffic for intrusion attempts and sends reports to management stations.
o It creates an encrypted and authenticated tunnel for remote hosts to access the internal network.
o It provides secure connectivity for clients that connect to the internal network through a wireless LAN.
o It allows external hosts to access specific company servers while maintaining the security restrictions
for the internal network.
Answers Explanation & Hints:
The DMZ is an area of the network that is accessible to both internal and external users. It is more
secure than the external network but not as secure as the internal network. It allows external hosts to
access internal servers.

You might also like