Professional Documents
Culture Documents
(Choose
three.)
o 900 MHz
o 2.4 GHz
o 5 GHz
o 60 GHz
Answers Explanation & Hints:
900 MHz is an FCC wireless technology that was used before development of the 802.11 standards.
900 MHz devices have a larger coverage range than the higher frequencies have and do not require line
of sight between devices. 802.11b/g/n/ad devices all operate at 2.4 GHz. 802.11a/n/ac/ad devices
operate at 5 GHz, and 802.11ad devices operate at 60 GHz.
3. What two IEEE 802.11 wireless standards operate only in the 5 GHz range?
(Choose two.)
o 802.11a
o 802.11b
o 802.11g
o 802.11n
o 802.11ac
o 802.11ad
Answers Explanation & Hints:
The 802.11a and 802.11ac standards operate only in the 5 GHZ range. The 802.11b and 802.11g
standards operate only in the 2.4 GHz range. The 802.11n standard operates in both the 2.4 and 5 GHz
ranges. The 802.11ad standard operates in the 2.4, 5, and 60 GHz ranges.
4. What wireless router configuration would stop outsiders from using your
home network?
o IP address
o encryption
o router location
o network name
Answers Explanation & Hints:
Encryption configured on the wireless router can provide secure communications and stop outsiders
from using your home network.
7. What are two types of wired high-speed Internet connections? (Choose two.)
o cable
o satellite
o cellular
o DSL
o dial-up
Answers Explanation & Hints:
Cable and DSL Internet technologies both use physical cabling to provide an Internet connection to a
residence or a small business. Although dial-up is a wired technology, it does not provide a high-speed
Internet connection. Satellite and cellular connections provide a wireless Internet connection.
o cable modem
o DSL modem
o satellite modem
o Wi-Fi AP
Answers Explanation & Hints:
DSL technology uses the existing telephone network. For that reason, a DSL modem commonly has an
RJ-11 phone port.
10. What technology allows users to access data anywhere and at any time?
o data analytics
o Cloud computing
o virtualization
o micromarketing
Answers Explanation & Hints:
Cloud computing allows organizations to eliminate the need for on-site IT equipment, maintenance,
and management. Cloud computing allows organizations to expand their services or capabilities while
avoiding the increased costs of energy and space.
11. Which two business and technical challenges does implementing virtualization
within a data center help businesses to overcome? (Choose two.)
12. Which three steps must be completed to manually connect an Android or IOS
device to a secured wireless network? (Choose three.)
o Internal threats can cause even greater damage than external threats.
o Internet architects planned for network security from the beginning.
o Early Internet users often engaged in activities that would harm other users.
o Threats have become less sophisticated while the technical knowledge needed by an attacker has
grown.
Answers Explanation & Hints:
Internal threats can be intentional or accidental and cause greater damage than external threats because
the internal user has direct access to the internal corporate network and corporate data.
o virus
o social engineering
o denial of service
o spyware
Answers Explanation & Hints:
Social engineering attacks deceive users into revealing private information or performing specific
actions.
o pretexting
o brute force
o phishing
o zombies
o vishing
o malware
Answers Explanation & Hints:
Attacks aimed at exploiting human behavior such as pretexting, phishing, and vishing are commonly
used by hackers to obtain information directly from authorized users.
17. Which type of attack involves an attacker using a powerful computer to try a
large number of possible passwords in rapid succession to gain access to a
system?
o brute force
o phishing
o pretexting
o DDoS
Answers Explanation & Hints:
In a brute force attack an attacker will try to gain access to a system by guessing passwords as fast as
possible.
o antivirus software
o authentication
o encryption
o firewall
Answers Explanation & Hints:
The primary means of mitigating virus and Trojan horse attacks is antivirus software. Antivirus
software helps prevent hosts from getting infected and spreading malicious code.
19. A student tells a teacher that many junk emails are appearing on a new
personal laptop. What is a possible cause of the problem?
o The student has spent too much time surfing the web.
o The school email server is not functioning properly.
o The laptop needs to be updated to the latest OS version.
o The new laptop does not have antivirus or anti-spam software installed.
Answers Explanation & Hints:
A new computer should have antivirus, or anti-spam filter for the email client, or anti-spam software
installed to protect from spammers.
20. What happens when a wireless access point is configured to stop broadcasting
the SSID?
o its age
o easily crackable
o its lack of support
o its lack of encryption
o its use of clear text passwords
Answers Explanation & Hints:
Despite improvements, WEP is still vulnerable to various security issues including the ability to be
cracked.
o switch
o access point
o bridge
o firewall
Answers Explanation & Hints:
Firewalls are used to permit or block traffic between networks according to access control policies.
o PAT
o static NAT
o NAT overload
o port forwarding
Answers Explanation & Hints:
Port forwarding allows connections to one port on the external interface to be redirected to a specific
device and a specific port on the inside interface. In this way specific inside services can be accessible
from the outside network without permitting all traffic to the inside device.
o It analyzes traffic for intrusion attempts and sends reports to management stations.
o It creates an encrypted and authenticated tunnel for remote hosts to access the internal network.
o It provides secure connectivity for clients that connect to the internal network through a wireless LAN.
o It allows external hosts to access specific company servers while maintaining the security restrictions
for the internal network.
Answers Explanation & Hints:
The DMZ is an area of the network that is accessible to both internal and external users. It is more
secure than the external network but not as secure as the internal network. It allows external hosts to
access internal servers.