HomeWHICHWhich Feature Is Characteristic Of Mac Filtering In Wireless Networks

Which Feature Is Characteristic Of Mac Filtering In Wireless Networks

Module Group 4: Modules 13 – 16 Group Exam Answers

Networking Essentials (Version 2) – Modules 13 – 16: Home Network Basics Group Exam Answers

1. What is CSMA/CA on a network?

  • an access method that is used by wired Ethernet technology to avoid collisions
  • an access method that is used by wireless technology to avoid collisions
  • an access method that is used by wireless technology to avoid duplicate SSIDs
  • an access method that is used by any technology that has excessive collisions

2. Which two business and technical challenges does implementing virtualization within a data center help businesses to overcome? (Choose two.)

  • virus and spyware attacks
  • physical footprint
  • operating system license requirements
  • server hardware needs
  • power and air conditioning

3. What is a common countermeasure for Trojan horses?

  • authentication
  • antivirus software
  • firewall
  • encryption

4. A student tells a teacher that many junk emails are appearing on a new personal laptop. What is a possible cause of the problem?

  • The new laptop does not have antivirus or anti-spam software installed.
  • The school email server is not functioning properly.
  • The student has spent too much time surfing the web.
  • The laptop needs to be updated to the latest OS version.
Refer to more articles:  Which Is True Of An Enterprise Resource Planning Erp System

5. What are three advantages of wireless over wired LAN technology? (Choose three.)

  • higher level of security
  • longer transmission distance
  • ease of expansion
  • lower on-going costs
  • ease of installation

6. Which wireless RF band do IEEE 802.11b/g devices use?

  • 5 GHz
  • 2.4 GHz
  • 900 MHz
  • 60 GHz

7. What two IEEE 802.11 wireless standards operate only in the 5 GHz range? (Choose two.)

  • 802.11ad
  • 802.11n
  • 802.11g
  • 802.11ac
  • 802.11b
  • 802.11a

8. What wireless router configuration would stop outsiders from using your home network?

  • encryption
  • IP address
  • router location
  • network name

9. Which feature is characteristic of MAC filtering in wireless networks?

  • It allows only authorized users to detect the network.
  • It restricts computer access to a wireless network.
  • It is configured on the computer rather than on the router.
  • It encrypts data that is transmitted on a wireless network.

10. What are two types of wired high-speed Internet connections? (Choose two.)

  • dial-up
  • cellular
  • satellite
  • cable
  • DSL

11. Which type of device provides an Internet connection through the use of a phone jack?

  • DSL modem
  • satellite modem
  • cable modem
  • Wi-Fi AP

12. Which cloud computing opportunity would provide the use of network hardware such as routers and switches for a particular company?

  • browser as a service (BaaS)
  • infrastructure as a service (IaaS)
  • software as a service (SaaS)
  • wireless as a service (WaaS)

13. What technology allows users to access data anywhere and at any time?

  • Cloud computing
  • virtualization
  • micromarketing
  • data analytics

14. Which three steps must be completed to manually connect an Android or IOS device to a secured wireless network? (Choose three.)

  • Set the IP address.
  • Activate the Bluetooth antenna.
  • Input the authentication password.
  • Enter the network SSID.
  • Change the MAC address.
  • Choose the correct security type.
Refer to more articles:  Which Resistor Is In Series With Resistor R

15. Which statement accurately characterizes the evolution of threats to network security?

  • Internet architects planned for network security from the beginning.
  • Early Internet users often engaged in activities that would harm other users.
  • Threats have become less sophisticated while the technical knowledge needed by an attacker has grown.
  • Internal threats can cause even greater damage than external threats.

16. Which type of attack exploits human behavior to gain confidential information?​

  • social engineering
  • denial of service
  • spyware
  • virus

17. Which three attacks exploit human behavior? (Choose three.)

  • malware
  • brute force
  • vishing
  • zombies
  • pretexting
  • phishing

18. What is a characteristic of a computer worm?

  • exploits vulnerabilities with the intent of propagating itself across a network
  • a set of computer instructions that lies dormant until triggered by a specific event
  • tricks users into running the infected software
  • malicious software that copies itself into other executable programs

19. Which type of attack involves an attacker using a powerful computer to try a large number of possible passwords in rapid succession to gain access to a system​?

  • brute force
  • pretexting
  • phishing
  • DDoS

20. What happens when a wireless access point is configured to stop broadcasting the SSID?

  • Computer access to the wireless access point is restricted.
  • The identity of the network is freely broadcast.
  • Signals are prevented from transmission outside the boundaries of the local network.
  • The network is invisible to those who are unaware of the SSID.

21. Why should WEP not be used in wireless networks today?

  • its lack of support
  • its age
  • its lack of encryption
  • easily crackable
  • its use of clear text passwords
Refer to more articles:  Which Toilet Paper Is Septic Safe

22. What specialized network device is responsible for permitting or blocking traffic between networks?

  • access point
  • switch
  • bridge
  • firewall

23. An administrator wants to configure a router so that users on the outside network can only establish HTTP connections to the internal web site. Which feature would the administrator configure to accomplish this?

  • PAT
  • NAT overload
  • static NAT
  • port forwarding

24. What is the purpose of a DMZ?

  • It provides secure connectivity for clients that connect to the internal network through a wireless LAN.
  • It creates an encrypted and authenticated tunnel for remote hosts to access the internal network.
  • It analyzes traffic for intrusion attempts and sends reports to management stations.
  • It allows external hosts to access specific company servers while maintaining the security restrictions for the internal network.

RELATED ARTICLES

Most Popular

Recent Comments