Filters
Question type

Study Flashcards

Henry is troubleshooting a network connection and wants to see if he can connect to the server on his network. ​ Which Microsoft command-line command should Henry use to check whether he can connect to the server?


A) ipconfig
B) netstat
C) ifconfig
D) ping

E) B) and C)
F) All of the above

Correct Answer

verifed

verified

Your company shares a building with a competitor's branch office. Recently, you noticed that some computers other than company computer have tried to connect to the wireless network unsuccessfully. When you are in the parking lot, you also notice that the company's wireless network SSID can be seen on your smartphone.   What can you do to make sure no one outside your company can gain access to its wireless network? (Select all that apply.)


A) Disable SSID broadcasting.
B) Lower radio power levels.
C) Add access points.
D) Enable MAC filtering.
E) Set up firewall settings.

F) B) and D)
G) B) and C)

Correct Answer

verifed

verified

Match the protocol or encryption name with the feature.

Premises
No longer considered secure because the key used for encryption doesn't change.
Generates a different key for every transmission; however, the encryption algorithm used for its calculations is no longer considered secure.
Typically uses AES for encryption.
Current encryption algorithm used today.
Typically uses TKIP for encryption.
Responses
TKIP
WEP
WPA
AES
WPA2

Correct Answer

No longer considered secure because the key used for encryption doesn't change.
Generates a different key for every transmission; however, the encryption algorithm used for its calculations is no longer considered secure.
Typically uses AES for encryption.
Current encryption algorithm used today.
Typically uses TKIP for encryption.

Cathy wants to connect to her wireless LAN at home but is not sure where to change the setting so that she can connect.   Where in the Windows Control Panel will Cathy find her computer's network connection settings?


A) Network Control Center
B) Network and Sharing Center
C) Administrative Tools
D) Internet Options

E) A) and D)
F) B) and D)

Correct Answer

verifed

verified

A corporate user is attempting to connect to the company's Windows domain server on the local network with her new laptop through a wired connection. ​ Which of the following is required for the user to successfully sign in to the Windows domain?


A) SSID, authentication and encryption settings
B) Windows domain user name and password
C) A valid connection to a DHCP server on the LAN
D) User name and password supplied by the ISP

E) A) and B)
F) A) and C)

Correct Answer

verifed

verified

You are tasked with configuring a wireless SOHO router for a customer.   Which of the following settings will be the most secure with the least effort and cost to the customer?


A) WPA2-Enterprise
B) WPA-PSK, TKIP
C) WPA2-PSK, TKIP
D) WPA2-PSK, AES

E) A) and B)
F) C) and D)

Correct Answer

verifed

verified

A small group of travelers is meeting inside an ancient building, and the travelers need access to the Internet using their mobile devices. However, the group is in an area where Wi-Fi Internet is not available and cellular coverage is intermittent. One of the travelers has an unlimited cellular data plan and a strong consistent signal.   Which of the following methods would most likely be implemented to provide Internet service to the group?


A) Cell phone tethering
B) Satellite Internet
C) Mobile hotspot
D) Dial-up Internet

E) A) and B)
F) C) and D)

Correct Answer

verifed

verified

You are setting up your Windows computer to connect to the Internet and notice that when you type www.microsoft.com, the browser does not go to the site. Instead, you receive an error message saying that the address cannot be resolved.   What network setting should you check to see the address of the server being used to resolve this address?


A) IP address
B) Subnet mask
C) Gateway
D) DNS

E) B) and C)
F) None of the above

Correct Answer

verifed

verified

Which of the following 802.11 wireless networking standards support transfer rates of over 54 Mbps? (Select TWO.)


A) 802.11a
B) 802.11ac
C) 802.11g
D) 802.11b
E) 802.11n

F) All of the above
G) B) and D)

Correct Answer

verifed

verified

A technician is configuring a new SOHO multifunction wireless router at a customer's location to provide network access to several wireless devices. The technician is required to protect the customer's private network from unauthorized access while performing the initial router setup as well as during normal operation after the configuration is completed.   Which of the following is the best step for the technician to take in securing the router to meet this requirement?


A) Enable DHCP on the router and configure IP address reservations for the wireless clients.
B) Change the router's default administrative password.
C) Disable the router's radio in the wireless network settings.
D) Configure MAC filtering on the router and allow access to only the technician's computer.

E) B) and C)
F) All of the above

Correct Answer

verifed

verified

Mary, a remote user, connects her Windows 10 laptop to the corporate network by way of the Internet using a VPN tunnel.   Which of the following is often configured as a required step for a user each time she attempts to use the VPN connection?


A) Call the help desk at the corporate office to obtain a random VPN password.
B) Configure the laptop to a static IP address on the corporate LAN subnet.
C) Enter the same user name and password used on the corporate network.
D) Select the encryption and authentication methods in Connection Properties.

E) A) and D)
F) All of the above

Correct Answer

verifed

verified

Showing 21 - 31 of 31

Related Exams

Show Answer