Professional Documents
Culture Documents
Networking Essentials (Version 2) – Modules 13 – 16: Home Networking Essentials 2.0 Exam
Network Basics Pre-Test Exam Answers
Jan 29, 2021 | Last Updated: Dec 9, 2021 | Networking Essentials | No Comments Networking Essentials v2.0
Networking Essentials (Version 2) – Modules 13 – 16: Home Network Modules 1 - 4: Internet Connection:
Getting Online Group Exam
Basics Pre-Test Exam Answers
Module Group 2: Pre-Test & Exam
How to find: Press “Ctrl + F” in the browser and fill in whatever wording is in the question to Modules 5 - 8: Network Protocols and
find that question/answer. If the question is not here, find it in Questions Bank. Architecture Pre-Test Exam
Explanation: The default settings on a wireless network usually include an SSID that is being Modules 13 - 16: Home Network
broadcast as well as default IP address settings. These default settings are considered Basics Group Exam
insecure because with them an attacker can easily see a wireless network and attempt to Module Group 5: Pre-Test & Exam
connect to it and make changes to the network.
Modules 17 - 20: Introduction to Cisco
Networking Pre-Test Exam
2. Which type of network technology is used for low-speed communication between
peripheral devices? Modules 17 - 20: Introduction to
Cisco Networking Group Exam
channels
Skills Exam & FINAL EXAM
Ethernet
ANSWERS
Bluetooth
802.11 NetEss Packet Tracer Skills
Assessment (PTSA) Answers
Explanation: Bluetooth is a wireless technology that uses the 2.4 GHz frequency to connect NetEss Final Packet Tracer Skills
peripheral devices over a short-range, low-speed connection. Assessment (PTSA) Answers
4. Which type of wireless communication is based on 802.11 standards? 19.1.4 Packet Tracer – Implement Basic
Connectivity Answers
Cellular WAN
Infrared 6.2.4 Lab – View Wireless and Wired NIC
Information Answers
Wi-Fi
Bluetooth 7.1.4 Lab – IPv4 Addresses and Network
Communication Answers
Explanation: The IEEE 802.11 standards define Wi-Fi wireless LAN specifications. Networking Essentials (Version 2) – Modules 9
– 12: Data Communications and Network
Services Group Exam
5. Which DSL technology provides higher downstream bandwidth to the user than
upstream bandwidth? 13.2.4 Check Your Understanding – Network
Technologies in the Home Answers
CDMA
2.3.5 Check Your Understanding – Network
SDSL Documentation Answers
TDMA
Module 6 – Network Design and Access Layer
ADSL
Quiz Answers
Explanation: A hypervisor is used to create a virtual machine (VM). The hypervisor can be Pardip on Introduction to Cybersecurity Module
part of an operating system such as Windows Hyper-V or it can be downloaded from a 5 Quiz Test Online
virtualization vendor such as VMWare or Oracle.
Leo T on 6.4.1 Packet Tracer – Skills Integration
Challenge Answers
7. Which statement describes a characteristic of cloud computing?
Explanation: Cloud computing allows users to access applications, back up and store files,
and perform tasks without needing additional software or servers. Cloud users access
resources through subscription-based or pay-per-use services, in real time, using nothing
more than a web browser.
Wi-Fi
Bluetooth
Yosemite
4G
9. What is the primary means for mitigating virus and Trojan horse attacks?
encryption
antisniffer software
antivirus software
blocking ICMP echo and echo-replies
Explanation: Antivirus software is the primary means of mitigating both virus and Trojan
horse attacks. By using up-to-date antivirus software, the spread of viruses and Trojan horse
attacks can be reduced.
10. What type of program installs and gathers personal information, including password
and account information, from a computer without permission or knowledge of the user?
pop-ups
pop-unders
spyware
adware
denial of service
brute force
social engineering
virus
Explanation: The ping death is a denial of service attack and involves sending IP packets
that are too large to a target device with the goal of disrupting the function of the device so
that its services are denied to users.
12. What is the term used when a malicious party sends a fraudulent email disguised as
being from a legitimate, trusted source?
backdoor
phishing
vishing
Trojan
Explanation: Phishing is used by malicious parties who create fraudulent messages that
attempt to trick a user into either sharing sensitive information or installing malware.
13. Which wireless access point association parameter is used by the wireless client to
distinguish between multiple wireless networks in the same vicinity?
SSID
network mode
password
channel setting
Explanation: Wireless access points are used to bridge traffic between wireless devices and
other devices on the network. A wireless device uses the SSID association parameters to
distinguish between multiple wireless networks. The SSID uniquely identifies a wireless LAN
and is broadcast by most wireless access points.
14. What is a feature that can be used by an administrator to prevent unauthorized users
from connecting to a wireless access point?
MAC filtering
software firewall
WPA encryption
proxy server
Explanation: Limiting a certain set of MAC addresses to connect to an access point is a way
to ensure that only those devices are allowed to use the wireless network. A software firewall
is used to prevent other users from gaining access to the protected computer. Configuring
WPA encryption does not guarantee that the unauthorized user will not find the way to connect
to the network. A proxy server is mostly used to filter traffic based on content.
15. A network administrator has decided to use WPA2 for security in a WLAN. Which
statement describes WPA2?
Explanation: WPA2, unlike WEP which uses preconfigured keys, generates new, dynamic
keys each time a client establishes a connection with the AP.
It analyzes traffic for intrusion attempts and sends reports to management stations.
It provides secure connectivity for clients that connect to the internal network through a
wireless LAN.
It allows external hosts to access specific company servers while maintaining the
security restrictions for the internal network.
It creates an encrypted and authenticated tunnel for remote hosts to access the internal
network.
Explanation: The DMZ is an area of the network that is accessible to both internal and
external users. It is more secure than the external network but not as secure as the internal
network. It allows external hosts to access internal servers.
Subscribe
0 COMMENTS