You are on page 1of 1

 IT Questions Bank  IOS Command List  Ebooks  IP Calculators »  Donations Search the site 

 Home  CCNA » Security » CyberOps »

Networking Essentials (Version 2) – Modules 13 – 16: Home Networking Essentials 2.0 Exam
Network Basics Pre-Test Exam Answers
 Jan 29, 2021 |  Last Updated: Dec 9, 2021 |  Networking Essentials |  No Comments Networking Essentials v2.0

 Share  Tweet  Share  Pin it

Module Group 1: Pre-Test & Exam

Networking Essentials Module Group 4: Pretest Exam Modules 1 - 4: Internet Connection:


Getting Online Pre-Test Exam

Networking Essentials (Version 2) – Modules 13 – 16: Home Network Modules 1 - 4: Internet Connection: 
Getting Online Group Exam
Basics Pre-Test Exam Answers
Module Group 2: Pre-Test & Exam

How to find: Press “Ctrl + F” in the browser and fill in whatever wording is in the question to Modules 5 - 8: Network Protocols and
find that question/answer. If the question is not here, find it in Questions Bank. Architecture Pre-Test Exam

Modules 5 - 8: Network Protocols


and Architecture Group Exam
NOTE: If you have the new question on this test, please comment Question and
Multiple-Choice list in form below this article. We will update answers for you in the Module Group 3: Pre-Test & Exam
shortest time. Thank you! We truly value your contribution to the website.
Modules 9 - 12: Data Communications
and Network Services Pre-Test Exam
1. Which two statements characterize wireless network security? (Choose two.)
Modules 9 - 12: Data
Using the default IP address on an access point makes hacking easier. Communications and Network
An attacker needs physical access to at least one network device to launch an attack. Services Group Exam
Wireless networks offer the same security features as wired networks offer. Module Group 4: Pre-Test & Exam
With SSID broadcast disabled, an attacker must know the SSID to connect.
Wireless guest mode provides open access to a protected LAN. Modules 13 - 16: Home Network
Basics Pre-Test Exam

Explanation: The default settings on a wireless network usually include an SSID that is being Modules 13 - 16: Home Network

broadcast as well as default IP address settings. These default settings are considered Basics Group Exam

insecure because with them an attacker can easily see a wireless network and attempt to Module Group 5: Pre-Test & Exam
connect to it and make changes to the network.
Modules 17 - 20: Introduction to Cisco
Networking Pre-Test Exam
2. Which type of network technology is used for low-speed communication between
peripheral devices? Modules 17 - 20: Introduction to
Cisco Networking Group Exam
channels
Skills Exam & FINAL EXAM
Ethernet
ANSWERS
Bluetooth
802.11 NetEss Packet Tracer Skills
Assessment (PTSA) Answers

Explanation: Bluetooth is a wireless technology that uses the 2.4 GHz frequency to connect NetEss Final Packet Tracer Skills
peripheral devices over a short-range, low-speed connection. Assessment (PTSA) Answers

Networking Essentials ( Version 2)


3. What two radio frequency bands are used in home Wireless LANs? (Choose two.) – Networking Essentials 2.0 Final
Exam SD
9 MHz
900 GHz
5 GHz
5 MHz
2.4 GHz Related Posts
8.4.3 Check Your Understanding – Classful IPv4
Explanation: The wireless technologies most frequently used in home networks are in the Addressing Answers
unlicensed 2.4 GHz and 5 GHz frequency ranges. Module 15 – Security Considerations Quiz
Answers

4. Which type of wireless communication is based on 802.11 standards? 19.1.4 Packet Tracer – Implement Basic
Connectivity Answers
Cellular WAN
Infrared 6.2.4 Lab – View Wireless and Wired NIC
Information Answers
Wi-Fi
Bluetooth 7.1.4 Lab – IPv4 Addresses and Network
Communication Answers

Explanation: The IEEE 802.11 standards define Wi-Fi wireless LAN specifications. Networking Essentials (Version 2) – Modules 9
– 12: Data Communications and Network
Services Group Exam
5. Which DSL technology provides higher downstream bandwidth to the user than
upstream bandwidth? 13.2.4 Check Your Understanding – Network
Technologies in the Home Answers
CDMA
2.3.5 Check Your Understanding – Network
SDSL Documentation Answers
TDMA
Module 6 – Network Design and Access Layer
ADSL
Quiz Answers

Networking Essentials (Version 2) – System


Explanation: ADSL provides higher downstream bandwidth to the user than upload Test Exam Answers
bandwidth. SDSL provides the same capacity in both directions. TDMA and CDMA are not
DSL technologies.
Recent Comments
john lemmon on 2.2.13 Packet Tracer – Point-
6. What would a technician require in order to install a hypervisor on a client machine?
to-Point Single-Area OSPFv2 Configuration
(Answers)
virtualization software
multiple storage drives Jhony on Linux Essentials – Chapter 08 Exam
a server housed by a cloud service provider Answers
an SSD Mork Raksa on CCNA 2 v7 Modules 7 – 9:
Available and Reliable Networks Exam Answers

Explanation: A hypervisor is used to create a virtual machine (VM). The hypervisor can be Pardip on Introduction to Cybersecurity Module
part of an operating system such as Windows Hyper-V or it can be downloaded from a 5 Quiz Test Online
virtualization vendor such as VMWare or Oracle.
Leo T on 6.4.1 Packet Tracer – Skills Integration
Challenge Answers
7. Which statement describes a characteristic of cloud computing?

Applications can be accessed over the Internet through a subscription.


Investment in new infrastructure is required in order to access the cloud.
Devices can connect to the Internet through existing electrical wiring.
A business can connect directly to the Internet without the use of an ISP.

Explanation: Cloud computing allows users to access applications, back up and store files,
and perform tasks without needing additional software or servers. Cloud users access
resources through subscription-based or pay-per-use services, in real time, using nothing
more than a web browser.

8. What technology enables a cell phone to be used as a hands-free device?

Wi-Fi
Bluetooth
Yosemite
4G

Explanation: Bluetooth provides a way to connect wireless devices, such as headsets, to a


nearby mobile device. Wi-Fi and 4G provide WAN access to voice and data. Yosemite is the
code name applied to a recent version of Apple OS X.

9. What is the primary means for mitigating virus and Trojan horse attacks?

encryption
antisniffer software
antivirus software
blocking ICMP echo and echo-replies

Explanation: Antivirus software is the primary means of mitigating both virus and Trojan
horse attacks. By using up-to-date antivirus software, the spread of viruses and Trojan horse
attacks can be reduced.

10. What type of program installs and gathers personal information, including password
and account information, from a computer without permission or knowledge of the user?

pop-ups
pop-unders
spyware
adware

Explanation: An unauthorized program that gathers personal information from a computer is


known as spyware.

11. What type of attack is the ping of death?

denial of service
brute force
social engineering
virus

Explanation: The ping death is a denial of service attack and involves sending IP packets
that are too large to a target device with the goal of disrupting the function of the device so
that its services are denied to users.

12. What is the term used when a malicious party sends a fraudulent email disguised as
being from a legitimate, trusted source?

backdoor
phishing
vishing
Trojan

Explanation: Phishing is used by malicious parties who create fraudulent messages that
attempt to trick a user into either sharing sensitive information or installing malware.

13. Which wireless access point association parameter is used by the wireless client to
distinguish between multiple wireless networks in the same vicinity?

SSID
network mode
password
channel setting

Explanation: Wireless access points are used to bridge traffic between wireless devices and
other devices on the network. A wireless device uses the SSID association parameters to
distinguish between multiple wireless networks. The SSID uniquely identifies a wireless LAN
and is broadcast by most wireless access points.

14. What is a feature that can be used by an administrator to prevent unauthorized users
from connecting to a wireless access point?

MAC filtering
software firewall
WPA encryption
proxy server

Explanation: Limiting a certain set of MAC addresses to connect to an access point is a way
to ensure that only those devices are allowed to use the wireless network. A software firewall
is used to prevent other users from gaining access to the protected computer. Configuring
WPA encryption does not guarantee that the unauthorized user will not find the way to connect
to the network. A proxy server is mostly used to filter traffic based on content.

15. A network administrator has decided to use WPA2 for security in a WLAN. Which
statement describes WPA2?

WPA2 requires use of an open authentication method.


WPA2 uses preconfigured keys to encrypt and decrypt data.
WPA2 specifies the use of a static encryption key that must be changed frequently to
enhance security.
WPA2 specifies the use of a dynamic encryption key.

Explanation: WPA2, unlike WEP which uses preconfigured keys, generates new, dynamic
keys each time a client establishes a connection with the AP.

16. What is the purpose of a DMZ?

It analyzes traffic for intrusion attempts and sends reports to management stations.
It provides secure connectivity for clients that connect to the internal network through a
wireless LAN.
It allows external hosts to access specific company servers while maintaining the
security restrictions for the internal network.
It creates an encrypted and authenticated tunnel for remote hosts to access the internal
network.

Explanation: The DMZ is an area of the network that is accessible to both internal and
external users. It is more secure than the external network but not as secure as the internal
network. It allows external hosts to access internal servers.

← Previous Article Next Article →


Networking Essentials (Version 2) – Networking Essentials (Version 2) –
Modules 9 – 12: Data Communications and Modules 13 – 16: Home Network Basics
Network Services Group Exam Group Exam

 Subscribe 

Be the First to Comment!

0 COMMENTS

ITExamAnswers.net Copyright © 2024. Privacy Policy


Contact

You might also like