Filters
Question type

Study Flashcards

Match the protocol or encryption name with the feature.

Premises
Generates a different key for every transmission; however, the encryption algorithm used for its calculations is no longer considered secure.
Responses
WEP
TKIP
WPA
WPA2
AES

Correct Answer

WEP
TKIP
WPA
WPA2
AES

The company where Derek works has tasked him with setting up and securing a SOHO router. He wants to make sure the wireless network is secure and that no unauthorized person can gain access to the network. What is the first step Derek should perform to secure the wireless router?


A) Disable SSID.
B) Set encryption standard.
C) Check radio power levels.
D) Change default user name and password.

E) None of the above
F) C) and D)

Correct Answer

verifed

verified

D

Match the protocol or encryption name with the feature.

Premises
Typically uses AES for encryption.
Responses
WPA
WPA2
TKIP
AES
WEP

Correct Answer

WPA
WPA2
TKIP
AES
WEP

A corporate user is attempting to connect to the company's Windows domain server on the local network with her new laptop through a wired connection. Which of the following is required for the user to successfully sign in to the Windows domain?


A) SSID, authentication and encryption settings
B) Windows domain user name and password
C) A valid connection to a DHCP server on the LAN
D) User name and password supplied by the ISP

E) A) and D)
F) A) and C)

Correct Answer

verifed

verified

Which of the following is a scenario in which an IT support technician would most likely be required to implement the alternate IP configuration method on a network host?


A) To ensure a workstation receives the same IP address from the DHCP server each time the workstation is booted.
B) In the event a DHCP server is unavailable, the workstation will have a valid IP address on the subnet.
C) When a workstation requires that more than two different DNS server IP addresses be configured for a specific network interface.
D) To assign a secondary DNS server IP address to a specific network interface on the workstation.

E) A) and B)
F) All of the above

Correct Answer

verifed

verified

A technician is configuring a new SOHO multifunction wireless router at a customer's location to provide network access to several wireless devices. The technician is required to protect the customer's private network from unauthorized access while performing the initial router setup as well as during normal operation after the configuration is completed. Which of the following is the best step for the technician to take in securing the router to meet this requirement?


A) Enable DHCP on the router and configure IP address reservations for the wireless clients.
B) Change the router's default administrative password.
C) Disable the router's radio in the wireless network settings.
D) Configure MAC filtering on the router and allow access to only the technician's computer.

E) A) and C)
F) C) and D)

Correct Answer

verifed

verified

Match the protocol or encryption name with the feature.

Premises
Current encryption algorithm used today.
Responses
TKIP
WPA
WPA2
WEP
AES

Correct Answer

TKIP
WPA
WPA2
WEP
AES

A remote worker wants to connect his computer to his corporation's private trusted network over the Internet. Which of the following will need to be configured?


A) VPN tunnel
B) Address reservation
C) DHCP server
D) Firewall

E) None of the above
F) All of the above

Correct Answer

verifed

verified

Which of the following will use an RJ-11 connector for connectivity?


A) Cellular
B) Cable
C) Fiber
D) DSL
E) Ethernet

F) C) and D)
G) A) and D)

Correct Answer

verifed

verified

You have connected an ADSL Internet connection as shown in the exhibit. The ports at the phone jack are connected to the same single-number POTS line. At what location should you place the DSL filter? You have connected an ADSL Internet connection as shown in the exhibit. The ports at the phone jack are connected to the same single-number POTS line. At what location should you place the DSL filter?   A)   A  only B)   A  and  B  C)   B  only D)   A  and  C  E)   C  only F)  No filters are required


A) "A" only
B) "A" and "B"
C) "B" only
D) "A" and "C"
E) "C" only
F) No filters are required

G) C) and D)
H) A) and C)

Correct Answer

verifed

verified

  What connector is shown in the exhibit? A)  USB-A B)  RJ-11 C)  F-type D)  RJ-45 What connector is shown in the exhibit?


A) USB-A
B) RJ-11
C) F-type
D) RJ-45

E) A) and C)
F) A) and D)

Correct Answer

verifed

verified

You are tasked with configuring a wireless SOHO router for a customer. Which of the following settings will be the most secure with the least effort and cost to the customer?


A) WPA2-Enterprise
B) WPA-PSK, TKIP
C) WPA2-PSK, TKIP
D) WPA2-PSK, AES

E) B) and C)
F) A) and B)

Correct Answer

verifed

verified

You are setting up your Windows computer to connect to the Internet and notice that when you type www.microsoft.com, the browser does not go to the site. Instead, you receive an error message saying that the address cannot be resolved. What network setting should you check to see the address of the server being used to resolve this address?


A) IP address
B) Subnet mask
C) Gateway
D) DNS

E) A) and D)
F) None of the above

Correct Answer

verifed

verified

A technician wants to configure a DHCP server to guarantee that certain printers always receive the same address. Which of the following should the technician configure?


A) VPN tunnel
B) Address reservation
C) Subnet mask
D) Default gateway

E) A) and C)
F) C) and D)

Correct Answer

verifed

verified

Match the protocol or encryption name with the feature.

Premises
No longer considered secure because the key used for encryption doesn't change.
Responses
AES
WEP
WPA2
TKIP
WPA

Correct Answer

AES
WEP
WPA2
TKIP
WPA

A client is requesting an Internet connection type that is not affected by atmospheric conditions and is always on. Which of the following will meet these requirements?


A) Dial-up
B) Cable
C) Satellite
D) Cellular hotspot

E) B) and D)
F) All of the above

Correct Answer

verifed

verified

Match the protocol or encryption name with the feature.

Premises
Typically uses TKIP for encryption.
Responses
WEP
AES
WPA
TKIP
WPA2

Correct Answer

Typically uses TKIP for encryption.
WPA

  You have connected a cable Internet connection as shown in the exhibit. At what location should you place a filter? A)   A  only B)   A  and  B  C)   B  only D)   A  and  C  E)   C  only F)  No filters are required You have connected a cable Internet connection as shown in the exhibit. At what location should you place a filter?


A) "A" only
B) "A" and "B"
C) "B" only
D) "A" and "C"
E) "C" only
F) No filters are required

G) D) and E)
H) A) and D)

Correct Answer

verifed

verified

A manager in a small office is asking if it is possible to limit network access to a particular website during business hours. Apparently, several users are spending an excessive amount of time on the site preventing them from completing their work-related tasks. Which of the following is the best solution to accomplish the request from the manager while not limiting access to other websites?


A) Implement MAC filtering on the SOHO router for the PCs that are accessing the site.
B) Configure a firewall and add the site the users are visiting to the whitelist.
C) Configure a firewall with content filtering on the PCs of users who are visiting the site.
D) Implement a blacklist on the firewall and add the site the users are visiting.

E) C) and D)
F) A) and B)

Correct Answer

verifed

verified

You have been tasked with configuring a SOHO network in which all ports on the public untrusted network will be forwarded to one workstation connected to the LAN. Which of the following features will you configure on the SOHO router to accomplish this task?


A) Port forwarding
B) MAC filtering
C) Demilitarized zone
D) Quality of service

E) B) and C)
F) C) and D)

Correct Answer

verifed

verified

C

Showing 1 - 20 of 35

Related Exams

Show Answer