Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
25 Cards in this Set
- Front
- Back
The function of the NetBT protocol is to allow NetBIOS services to be used over TCP/IP networks.
|
True
|
|
Which of the protocols listed below is used for automated discovery of networked services on Local Area Networks (LANs)?
|
SLP
|
|
Which of the following answers refer(s) to file sharing network protocol(s)? (Select all that apply)
|
FTP AFP |
|
A network protocol providing an alternative solution to the manual assignment of IP addresses is called:
|
DHCP
|
|
LDAP is an example of:
|
Directory access protocol
|
|
A protocol used in network management systems for monitoring network-attached devices is known as:
|
SNMP
|
|
Server Message Block (SMB) and Common Internet File System (CIFS) are examples of network protocols used for providing shared access to files, directories, and devices.
|
True
|
|
Examples of secure network protocols offering traffic encryption include: (Select 3 answers)
|
HTTPS IPsec SSH |
|
Which of the following answers refers to a cryptographic network protocol for secure data communication, remote command-line login, remote command execution, and other secure network services between two networked computers?
|
SSH
|
|
Which of the protocols listed below was designed as a secure replacement for Telnet?
|
SSH
|
|
Transmission Control Protocol (TCP) is an example of a connectionless protocol. TCP doesn't support three-way handshake (thus it is also referred to as unreliable or best-effort protocol).
|
False
|
|
User Datagram Protocol (UDP) is a connection-oriented protocol that requires a set of initial steps in order to establish connection (three-way handshake), supports retransmission of lost packets, flow control (managing the amount of data that is being sent), and sequencing (rearranging packets that arrived out of order).
|
False
|
|
Which of the answers listed below refer(s) to the characteristic feature(s) of the IEEE 802.11a wireless standard amendment? (Select all that apply)
|
Maximum data signaling rate of 54 Mbps 5.0 GHz frequency band Carrier Sense Multiple Access / Collision Avoidance (CSMA/CA) network access method |
|
Which of the following answers list(s) the feature(s) of the IEEE 802.11b wireless standard amendment? (Select all that apply)
|
2.4 GHz frequency range Maximum data signaling rate of 11 Mbps Carrier Sense Multiple Access / Collision Avoidance (CSMA/CA) network access method |
|
What are the characteristics of the IEEE 802.11g wireless standard amendment? (Select all that apply)
|
Maximum data signaling rate of 54 Mbps Carrier Sense Multiple Access / Collision Avoidance (CSMA/CA) network access method 2.4 GHz frequency range |
|
The characteristic features of the IEEE 802.11n wireless standard amendment include: (Select all that apply)
|
Multiple Input / Multiple Output (MIMO) 2.4 GHz frequency band 5.0 GHz frequency band Maximum data signaling rate of 600 Mbps Carrier Sense Multiple Access / Collision Avoidance (CSMA/CA) network access method |
|
Which of the following answers refers(s) to the feature(s) of the IEEE 802.11ac wireless standard amendment? (Select all that apply)
|
5.0 GHz frequency band Carrier Sense Multiple Access / Collision Avoidance (CSMA/CA) network access method Multi-User Multiple Input / Multiple Output (MU-MIMO) |
|
Which of the wireless security standards listed below has been deprecated in favor of newer standards due to known vulnerabilities resulting from implementation flaws?
|
WEP
|
|
Which of the following wireless encryption schemes offers the highest level of protection?
|
WPA2
|
|
A security protocol introduced in order to strengthen existing WEP implementations without requiring the replacement of legacy hardware is known as:
|
TKIP
|
|
AES-based encryption mode is a characteristic feature of:
|
WPA2
|
|
A portion of the available Radio Frequency (RF) band allocated for wireless communication is known as:
|
Channel
|
|
A situation in which multiple channels share the frequency band causing interference and performance degradation for devices operating on channels that are too close to each other is known as:
|
Channel overlapping
|
|
A common example of channel overlapping in wireless networking would be the 2.4 GHz band used in 802.11, 802.11b, 802.11g, and 802.11n networks, where the 2.401 - 2.473 GHz frequency range is used for allocating 11 channels, each taking up a 22-MHz portion of the available spectrum. Setting up a wireless network to operate on a non-overlapping channel (1, 6, and 11 in this case) allows multiple networks to coexist in the same area without causing interference.
|
True
|
|
A server with private IP address has been set up to handle requests from an outside (public) network. Which of the solutions listed below would enable its function?
|
Port forwarding
|