Filters
Question type

Study Flashcards

Henry is troubleshooting a network connection and wants to see if he can connect to the server on his network. Which Microsoft command-line command should Henry use to check whether he can connect to the server?


A) ipconfig
B) netstat
C) ifconfig
D) ping

E) None of the above
F) All of the above

Correct Answer

verifed

verified

Which of the following devices are most commonly used to connect a LAN to an ISP for broadband services? (Select TWO.)


A) Network interface card
B) Cable modem
C) Firewall
D) DSL modem
E) Dial-up modem

F) A) and C)
G) D) and E)

Correct Answer

verifed

verified

Your company is implementing a wireless network and is concerned that someone from a competing company could stand outside the building and collect wireless data. You have assured the company that WPA2 is secure. What makes WPA2 more secure than WPA?


A) AES
B) TKIP
C) RADIUS
D) TACACS

E) None of the above
F) A) and B)

Correct Answer

verifed

verified

A small group of travelers is meeting inside an ancient building, and the travelers need access to the Internet using their mobile devices. However, the group is in an area where Wi-Fi Internet is not available and cellular coverage is intermittent. One of the travelers has an unlimited cellular data plan and a strong consistent signal. Which of the following methods would most likely be implemented to provide Internet service to the group?


A) Cell phone tethering
B) Satellite Internet
C) Mobile hotspot
D) Dial-up Internet

E) A) and D)
F) A) and B)

Correct Answer

verifed

verified

Which of the following 802.11 wireless networking standards support transfer rates of over 54 Mbps? (Select TWO.)


A) 802.11a
B) 802.11ac
C) 802.11g
D) 802.11b
E) 802.11n

F) B) and E)
G) B) and C)

Correct Answer

verifed

verified

Which of the following wireless networking protocols uses LTE technology with a maximum speed of up to 1 Gbps? ​


A) Third-generation cellular
B) Fourth-generation cellular
C) Fifth-generation cellular
D) 802.11n Wi-Fi

E) All of the above
F) B) and C)

Correct Answer

verifed

verified

Which of the following is a wireless Internet connectivity method that utilizes cellular technology?


A) 802.11ac
B) WiMAX
C) 3G
D) Satellite

E) A) and C)
F) B) and C)

Correct Answer

verifed

verified

Jacob wants to set up extra security on his wireless network; he currently uses WPA2. He wants to allow only his devices to connect to the network and reject devices that he does not own. What extra wireless security should Jacob employ in on his wireless router?


A) WPS
B) Port forwarding
C) Disable SSID broadcasting
D) MAC filtering

E) A) and B)
F) None of the above

Correct Answer

verifed

verified

A client contacted you to request your help in researching and supplying the hardware necessary to implement a SOHO solution at his new home-based business. Which of the following SOHO router features will simplify IP address configuration on the private network for both wired and wireless clients?


A) Multi-port switch
B) FTP server
C) DHCP server
D) Firewall
E) Wireless access point

F) B) and D)
G) A) and B)

Correct Answer

verifed

verified

Mary, a remote user, connects her Windows 10 laptop to the corporate network by way of the Internet using a VPN tunnel. Which of the following is often configured as a required step for a user each time she attempts to use the VPN connection?


A) Call the help desk at the corporate office to obtain a random VPN password.
B) Configure the laptop to a static IP address on the corporate LAN subnet.
C) Enter the same user name and password used on the corporate network.
D) Select the encryption and authentication methods in Connection Properties.

E) A) and C)
F) A) and B)

Correct Answer

verifed

verified

George is concerned that his children might somehow be exposed to things on the Internet that they are not mature enough to handle. He wants a way to limit their ability to view content on the Internet. What will you recommend to George?


A) Use a firewall.
B) Use Parental Controls.
C) Use port forwarding.
D) Use WPA2.

E) A) and D)
F) C) and D)

Correct Answer

verifed

verified

What is the correct order of network types when categorized by their size or the physical area they cover, from largest to smallest?


A) MAN, WAN, WLAN, PAN
B) WAN, WLAN, PAN, LAN
C) PAN, WLAN, MAN, WAN
D) WAN, MAN, LAN, PAN

E) All of the above
F) None of the above

Correct Answer

verifed

verified

Cathy wants to connect to her wireless LAN at home but is not sure where to change the setting so that she can connect. Where in the Windows Control Panel will Cathy find her computer's network connection settings?


A) Network Control Center
B) Network and Sharing Center
C) Administrative Tools
D) Internet Options

E) None of the above
F) A) and B)

Correct Answer

verifed

verified

Your company shares a building with a competitor's branch office. Recently, you noticed that some computers other than company computer have tried to connect to the wireless network unsuccessfully. When you are in the parking lot, you also notice that the company's wireless network SSID can be seen on your smartphone. What can you do to make sure no one outside your company can gain access to its wireless network? (Select all that apply.)


A) Disable SSID broadcasting.
B) Lower radio power levels.
C) Add access points.
D) Enable MAC filtering.
E) Set up firewall settings.

F) A) and B)
G) A) and C)

Correct Answer

verifed

verified

A group of wireless devices are using each other as relays to share a network connection across a large area. Which of the following network categories is being used?


A) PAN
B) WLAN
C) MAN
D) WMN

E) All of the above
F) A) and B)

Correct Answer

verifed

verified

Showing 21 - 35 of 35

Related Exams

Show Answer