B085A2DC8B0CE81559A954729F6B20E1

Networking Essentials (Version 2) – Modules 13 – 16: Home Network Basics Pre-Test Exam

 

Networking Essentials Module Group 4: Pretest Exam

Networking Essentials (Version 2) – Modules 13 – 16: Home Network Basics Pre-Test Exam Answers

How to find: Press “Ctrl + F” in the browser and fill in whatever wording is in the question to find that question/answer. If the question is not here, find it in Questions Bank.

NOTE: If you have the new question on this test, please comment Question and Multiple-Choice list in form below this article. We will update answers for you in the shortest time. Thank you! We truly value your contribution to the website.

1. Which two statements characterize wireless network security? (Choose two.)

  • Using the default IP address on an access point makes hacking easier.
  • An attacker needs physical access to at least one network device to launch an attack.
  • Wireless networks offer the same security features as wired networks offer.
  • With SSID broadcast disabled, an attacker must know the SSID to connect.
  • Wireless guest mode provides open access to a protected LAN.

Explanation: The default settings on a wireless network usually include an SSID that is being broadcast as well as default IP address settings. These default settings are considered insecure because with them an attacker can easily see a wireless network and attempt to connect to it and make changes to the network.

2. Which type of network technology is used for low-speed communication between peripheral devices?

  • channels
  • Ethernet
  • Bluetooth
  • 802.11

Explanation: Bluetooth is a wireless technology that uses the 2.4 GHz frequency to connect peripheral devices over a short-range, low-speed connection.

3. What two radio frequency bands are used in home Wireless LANs? (Choose two.)

  • 9 MHz
  • 900 GHz
  • 5 GHz
  • 5 MHz
  • 2.4 GHz

Explanation: The wireless technologies most frequently used in home networks are in the unlicensed 2.4 GHz and 5 GHz frequency ranges.

4. Which type of wireless communication is based on 802.11 standards?

  • Cellular WAN
  • Infrared
  • Wi-Fi
  • Bluetooth

Explanation: The IEEE 802.11 standards define Wi-Fi wireless LAN specifications.

5. Which DSL technology provides higher downstream bandwidth to the user than upstream bandwidth?

  • CDMA
  • SDSL
  • TDMA
  • ADSL

Explanation: ADSL provides higher downstream bandwidth to the user than upload bandwidth. SDSL provides the same capacity in both directions. TDMA and CDMA are not DSL technologies.

6. What would a technician require in order to install a hypervisor on a client machine?

  • virtualization software
  • multiple storage drives
  • a server housed by a cloud service provider
  • an SSD

Explanation: A hypervisor is used to create a virtual machine (VM). The hypervisor can be part of an operating system such as Windows Hyper-V or it can be downloaded from a virtualization vendor such as VMWare or Oracle.

7. Which statement describes a characteristic of cloud computing?

  • Applications can be accessed over the Internet through a subscription.
  • Investment in new infrastructure is required in order to access the cloud.
  • Devices can connect to the Internet through existing electrical wiring.
  • A business can connect directly to the Internet without the use of an ISP.

Explanation: Cloud computing allows users to access applications, back up and store files, and perform tasks without needing additional software or servers. Cloud users access resources through subscription-based or pay-per-use services, in real time, using nothing more than a web browser.

8. What technology enables a cell phone to be used as a hands-free device?

  • Wi-Fi
  • Bluetooth
  • Yosemite
  • 4G

Explanation: Bluetooth provides a way to connect wireless devices, such as headsets, to a nearby mobile device. Wi-Fi and 4G provide WAN access to voice and data. Yosemite is the code name applied to a recent version of Apple OS X.

9. What is the primary means for mitigating virus and Trojan horse attacks?

  • encryption
  • antisniffer software
  • antivirus software
  • blocking ICMP echo and echo-replies

Explanation: Antivirus software is the primary means of mitigating both virus and Trojan horse attacks. By using up-to-date antivirus software, the spread of viruses and Trojan horse attacks can be reduced.

10. What type of program installs and gathers personal information, including password and account information, from a computer without permission or knowledge of the user?

  • pop-ups
  • pop-unders
  • spyware
  • adware

Explanation: An unauthorized program that gathers personal information from a computer is known as spyware.

11. What type of attack is the ping of death?

  • denial of service
  • brute force
  • social engineering
  • virus

Explanation: The ping death is a denial of service attack and involves sending IP packets that are too large to a target device with the goal of disrupting the function of the device so that its services are denied to users.

12. What is the term used when a malicious party sends a fraudulent email disguised as being from a legitimate, trusted source?

  • backdoor
  • phishing
  • vishing
  • Trojan

Explanation: Phishing is used by malicious parties who create fraudulent messages that attempt to trick a user into either sharing sensitive information or installing malware.

13. Which wireless access point association parameter is used by the wireless client to distinguish between multiple wireless networks in the same vicinity?

  • SSID
  • network mode
  • password
  • channel setting

Explanation: Wireless access points are used to bridge traffic between wireless devices and other devices on the network. A wireless device uses the SSID association parameters to distinguish between multiple wireless networks. The SSID uniquely identifies a wireless LAN and is broadcast by most wireless access points.

14. What is a feature that can be used by an administrator to prevent unauthorized users from connecting to a wireless access point?

  • MAC filtering
  • software firewall
  • WPA encryption
  • proxy server

Explanation: Limiting a certain set of MAC addresses to connect to an access point is a way to ensure that only those devices are allowed to use the wireless network. A software firewall is used to prevent other users from gaining access to the protected computer. Configuring WPA encryption does not guarantee that the unauthorized user will not find the way to connect to the network. A proxy server is mostly used to filter traffic based on content.

15. A network administrator has decided to use WPA2 for security in a WLAN. Which statement describes WPA2?

  • WPA2 requires use of an open authentication method.
  • WPA2 uses preconfigured keys to encrypt and decrypt data.
  • WPA2 specifies the use of a static encryption key that must be changed frequently to enhance security.
  • WPA2 specifies the use of a dynamic encryption key.

Explanation: WPA2, unlike WEP which uses preconfigured keys, generates new, dynamic keys each time a client establishes a connection with the AP.

16. What is the purpose of a DMZ?

  • It analyzes traffic for intrusion attempts and sends reports to management stations.
  • It provides secure connectivity for clients that connect to the internal network through a wireless LAN.
  • It allows external hosts to access specific company servers while maintaining the security restrictions for the internal network.
  • It creates an encrypted and authenticated tunnel for remote hosts to access the internal network.

Explanation: The DMZ is an area of the network that is accessible to both internal and external users. It is more secure than the external network but not as secure as the internal network. It allows external hosts to access internal servers.


Post a Comment

0 Comments
* Please Don't Spam Here. All the Comments are Reviewed by Admin.