• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/48

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

48 Cards in this Set

  • Front
  • Back
Which protocol was developed to be a secure alternative to Telnet?
SSH - Secure Shell - Port 22
802.11G- Maximum indoor range and outdoor range
40-140 Meters
What is the default subnet mask of a Class A network?
/8 and 255.0.0.0
What are some benefits of coaxial cables over UTP (Unshielded Twisted Pair cabling)?
Coaxial cables stretch for longer distances, are more rugged, and are immune to EMI
What wireless network communication standard would you employ if you need high-bandwidth wireless communication?
Ethernet
What is the first step a tech should take in securing a SOHO wireless/wired router using appropriate settings?
Change the administrative password.
You are running an 802.11g router in mixed mode. You have three NICs using the router. A new user connects using 802.11b wireless NIC. What will happen?
The new user with 802.11b communicate at 802.11b speeds (11 Mbps) with both the router and the other users. The 802.11 G users will communicate at 802.11G speeds (56 Mbps)
Which of the following security standards was the first to introduce a dynamic 128-bit per-packet security key?
TKIP - Temporal Key Integrity Protocol
On a home network, which of the following devices would be the most common to be placed in a DMZ (Demarcation Zone)?
Gaming Server
For a home user, what uses a wizard to quickly and easily setup a secure wireless network?
WPS - WiFi Protected Setup - secures a home network using WPA/WPA2 (WPS is not recommended due to security weaknesses
Which of the following are considered 4G standards?
LTE and WiMax
Common TCP ports associated with a web site include...?
HTTP - 80
HTTPS - 443
Web site Administration - 443
Which of the following protocols uses TCP port 23?
Telnet
Your friend is concerned with the security of online purchases. What should you look for in an address bar to ascertain that you are securely connected?
HTTPS
Which of the following IP addresses would not be valid for a DNS server on the internet?
10.25.11.33 - lies in a private address space
_____ is immune to electromagnetic or radio-frequence interference.
Fiber-optic cabling
Of all the network cabling options, _____ offers the longest possible segment length.
Fiber-optic
In which network design do users access resources from other workstations rather than from a central location?
Peer - to - peer
Wireless Personal Area Network
Bluetooth
What type of device will block unwanted traffic from your network using a set of rules called an ACL (Access Control List)?
Firewall
What type of cable is recommended for digital television cable signals?
RG-6
Which of the following devices work at Layer 2 of the OSI model?
Bridges and Switches
When enabled, what feature of a wireless router allows only specified computers to access the network?
MAC filtering
What WAN technology uses a circuit switching technology?
ISDN - Integrated Services Digital Network
Which WAN technology has the greatest latency?
Satellite
Which WAN technology uses a telephone cable?
POTS - Plain Old Telephone Service
DSL - Digital Subscriber Technology
Which WAN technology uses a fiber optic cable?
SONET - Synchronous Optic Networking
SDH - Synchronous Digital Hierarchy
What are VLANs/LANs?
Broadcast Domain
LAN
Local Area Network
VLAN
Virtual Local Area Network
LANs use ____ to connect to other PCs?
Switches
LANs are limited to ____
a building
IPv4 has a 32 bit or 64 bit address space?
32 bit
IPv6 has a 32, 64, or 128 bit address space?
128 bit
What feature of a wireless router allows only specified computers to access the network?
MAC Filtering
What protocol is used for secure delivery of email?
IMAP4
Which of the following is an IPv6 broadcast address?
IPv6 does not have broadcast addresses, IPv6 does have multicast, which are like targeted broadcasts. FF:: is the first part of a multicast address.
You want computers to be able to connect to each other by using hostnames. What service accomplishes this?
DNS - Dynamic Naming System
What hybrid network topology is used for fault tolerance in which all computers must connect to each other....
Mesh
Give examples of a ring topologies
SONET, FDDI, and Token Ring
Which topology uses the least cable?
Bus
Looking at IP classes, which address class includes a diagnostic network?
A
What address class does 171.226.18.1 belong to?
Class B
What are some advantages to using dial-up?
Low cost and broad availability
What are some steps required if a corporation needs to reserve 1000 IP addresses?
Subnet a Class B Network, Supernet a Class C, Subnet a Class A network
Which OSI layer signals "all clear" by making sure the data segments are error free?
Transport layer
You have set up a wireless router on your network and configured it to use AES. What configuration option do you need for the client computers?
WPA2
What functions do network devices have?
Telephony, Security, and Connectivity