Which of the following are characteristics features of the IEEE 802.11 n wireless standard?

Which of the following best describes the disabling of an SSID broadcast?

It makes a WLAN harder to discover

A lightly protected subnet consisting of publicly available servers placed on the outside of the company's firewall is known as:

Which of the following solutions will allow a server with a private IP address to handle requests from an outside (public) network?

What is the name of a router configuration feature that allows to open an inbound port based on the outbound requests made by hosts placed inside a private network?

Which of the following solutions alleviates the depletion of IPv4 address space by allowing multiple hosts on the same private LAN to share a single public IP address?

Which of the following solutions hides internal IP addresses by modifying the IP address information in IP packet headers while it is in transit across a traffic routing device?

Dynamic Network Address Translation (DNAT) provides a permanent mapping between an individual private IP address and a public IP address.

Static Network Address Translation (SNAT) provides a mapping between an individual private IP address and any of the IP addresses belonging to the available public IP address pool.

Which of the following is a Network Address Translation (NAT) method that takes a combination of a private IP address and a port number, then binds them with the corresponding public IP address and port information?

A type of architecture that simplifies networking by allowing devices to dynamically join a network, autoconfigure, and learn about the presence and capabilities of other devices is known as:

Which of the following describes zero-configuration networking?

Which of the following is a set of firewall entries containing information on traffic considered safe enough to pass through?

Which one of the following is a network security access control method in which a 48-bit physical address assigned to each network card is used to determine access to the network?

Which of the following solutions allows network administrators to prioritize certain types of network traffic?

Which of the following wireless security protocols has been discouraged in favor of newer standards due to known vulnerabilities resulting from implementation flaws?

Wired Equivalent Privacy (WEP) and Wi-Fi Protected Access (WPA) are encryption standards designed for securing wireless networks. WEP is an older standard and is not recommended because of its vulnerabilities. WPA was designed as an interim replacement for WEP, and WPA2 was introduced as the official standard that offers the strongest security of the three.

Which of the following is the best method to secure a small network lacking an authentication server?

Wi-Fi Protected Setup (WPS) simplifies the configuration of new wireless networks by enabling non-technical users to easily set up new networks, configure network security settings and add new devices to an existing network. However, due to its known security vulnerabilities, WPS is not recommended and should be disabled.

What are the characteristic features of a WPA/WPA2 Enterprise mode? (Select 2 answers)

Suitable for large corporate networks
Requires RADIUS authentication server

Setting up a wireless network to operate on a non-overlapping channel allows multiple networks to coexist in the same area without causing interference.

Which of the following IEEE standards provides the basis for implementing most modern WLANs?

Which of the following answers apply to the IEEE 802.11a wireless standard? (Select 2 answers)

Maximum data signaling rate of 54 Mbps
5.0 GHz frequency band

What are the characteristic features of the IEEE 802.11b wireless standard? (Select 2 answers)

Maximum data signaling rate of 11 Mbps

2.4 GHz frequency range

Which of the following answers apply to the IEEE 802.11g wireless standard? (Select 2 answers)

Maximum data signaling rate of 54 Mbps

2.4 GHz frequency range

The IEEE 802.11g standard is backwards compatible with

Which of the following are characteristic features of the IEEE 802.11n wireless standard? (Select all that apply)

Multiple Input / Multiple Output (MIMO)

Maximum data signaling rate of up to 600 Mbps

The IEEE 802.11n standard offers backward compatibility with: (Select all that apply)

Multiple Input / Multiple Output (MIMO) is a wireless technology that allows for significant increase in data throughput due to the use of multiple antennas and multiple data streams.

Which of the following answers describe features of the IEEE 802.11ac wireless standard? (Select 3 answers)

5.0 GHz frequency band
Maximum data signaling rate of up to 6.77 Gbps
Multi-User Multiple Input / Multiple Output (MU-MIMO)

Which of the following frequency bands can be used by IEEE 802.11 networks? (Select all that apply)

What is the channel bandwidth specified in the IEEE 802.11a standard?

Which of the following is a channel bandwidth used in 802.11b networks?

Which of the following channel bandwidths is specified in the IEEE 802.11g standard?

The term "Channel bonding" refers to a technique that allows for combining adjacent channels to increase the amount of available bandwidth.

The IEEE 802.11n standard specifies available channel bandwidth options of: (Select 2 answers)

Which of the following describes the IEEE 802.11ac channel bandwidth option(s)?

Which of the following channel options would allow three Wireless Access Points (WAPs) to be set up on non-overlapping channels?

Which of the following wireless technologies enables identification and tracking of tags attached to objects?

Which of the following refer to IoT technologies designed to permit communication between appliances in a home automation network? (Select 2 answers)

Long Term Evolution (LTE) is a wireless communications standard for mobile devices and wireless hotspots. LTE is much faster than the older generation of 2G and 3G cellular networks. Both LTE and its later upgrade, LTE-Advanced (LTE-A), are often marketed as 4G standards.

What is the function of an HTTP server?

A dedicated file server is also known as a(n):

IPP, LPD/LPR, and SMB/CIFS are examples of protocols that enable:

Which of the following server types is used for automatic allocation of IP addresses on a network?

To connect to a website on the Internet and display its contents, a URL entered in a web browser address bar needs to be translated into an IP address. Which of the following servers handles this type of request?

Which of the following is a computer system or an application/service that acts as an intermediary between a network host and the Internet?

What is the function of an SMTP server?

Which of the following is one of the functions provided by RADIUS and TACACS servers?

Which of the following is a type of server used to collect diagnostic and monitoring data from networked devices?

The term "Unified Threat Management" (UTM) refers to a network security solution, commonly in the form of a dedicated device (called a UTM appliance or a web security gateway), which combines the functionality of a firewall with additional safeguards such as URL filtering, content inspection, spam filtering, gateway antivirus protection, IDS/IPS functionality, or malware inspection.

Intrusion Detection Systems (IDSs) are devices or software applications designed to detect malicious activities or violations of security policies on a network or computer host. An IDS designed to monitor networks is known as a Network Intrusion Detection System (NIDS); an IDS monitoring a single host is called a Host Intrusion Detection System (HIDS). An IDS does not take any active steps to prevent or stop intrusions, relying on passive responses such as sending an alert to a management console or recording information about an event in logs.

Which of the following reflects differences between passive and active network security breach responses?

Which of the following refers to the permanent assignment of an IP address?

What type of server handles the assignment of dynamic IP addresses?

Automatic Private IP Addressing (APIPA) allows a Windows host to self-configure an IP address and subnet mask when a Dynamic Host Configuration Protocol (DHCP) is unavailable. APIPA uses an address block range between 169.254.0.0 and 169.254.254.255. APIPA-assigned addresses are valid only for communications within the network segment that a given host is connected to (i.e. a host with an APIPA-assigned address cannot connect to the Internet).

Which of the following relate to IPv4 link-local addresses? (Select 3 answers)

Non-routable IP address
APIPA address
169.254.0.0/16

Which of the following is an IPv6 link-local address?

What type of service performs an FQDN-to-IP resolution?

Dynamic Host Configuration Protocol (DHCP) allows for static allocation of an IP address based on an IP-to-MAC address mapping.

Which of the following terms is used to describe a permanent IP address assignment from a DHCP server?

Networked clients not residing on the same subnet as a DHCP server can still obtain an IP address from the server through a DHCP relay agent (a.k.a. IP helper).

An IPv4 address consists of:

IPv4 addresses are expressed by using:

An IPv6 address consists of:

IPv6 addresses are expressed by using

A double colon in an IPv6 address indicates that one part of the address, containing only zeros, has been compressed to make the address shorter.

Which of the following determines which network segment an IP address will belong to?

Which of the following is a networked device providing an entry point into another network or onto the Internet?

A system that uses a public network (such as the Internet) to create a private encrypted connection between remote locations is called:

Which type of VPN enables connectivity between two networks?

Which of the following is a dedicated device designed to manage encrypted connections established over an untrusted network such as the Internet?

Which of the following VPN types is used to connect computers to a network? (Select 2 answers)

Remote-access, Client-to-site

An SSL VPN connection typically requires a dedicated VPN client application.

Which of the following terms describes a logical grouping of computers that allow computer hosts to act as if they were attached to the same broadcast domain, regardless of their physical location?

Network Address Translation (NAT) provides an IP proxy between a private LAN and a public network such as the Internet.

Using cable modems for Internet access within a standard cable television infrastructure is known as:

Which of the following is the most common type of DSL Internet access?

Which of the following types of Internet access uses traditional analog telephone lines?

Which of the following are characteristics of fiber-optic network cabling? (Select 3 answers)

Immunity to electromagnetic interference

More suitable for carrying digital information than copper cabling

Used for network backbone cabling

What are characteristic features of satellite Internet connections? (Select 3 answers)

High signal latency

Interference (weather dependent)

Relatively high cost in comparison to terrestrial links

Which of the following solutions enables simultaneous digital transmission of voice, video, data, and other network services over a PSTN?

Which of the following WAN technologies uses cell towers that provide wireless signal coverage for mobile devices?

Examples of tethering methods used in mobile Internet connection sharing include: (Select all that apply)

Bluetooth

Wi-Fi/>
USB cable

The term "Mobile hotspot" refers to a type of WLAN that enables network access through a mobile device that acts as a portable WAP.

Which of the following is a long-distance line-of-sight Internet service?

Which of the following is a network connecting computers within a small geographical area, such as within a single building or between a group of buildings?

The Internet is an example of a large public WAN.

A computer network that connects multiple smaller networks over very large geographical areas is called a:

A type of limited-range computer network used for data transmission among various types of personal devices is known as:

In terms of its size and reach, a Metropolitan Area Network (MAN) is larger than a LAN but smaller than a WAN.

A computer network connecting multiple LANs within a city or a campus is known as a:

A type of network topology in which each node directly connects to every other node is called a:

Which type of network topology provides the most redundancy?

Which wireless network type has a design that uses mesh topology?

Which of the following tools should be used to attach an RJ-45 connector to a twisted-pair Ethernet cable?

Which of the following tools should be used to remove electrical insulation covers from electric wires?

Which of the following tools should be used to test power supply voltage output?

Which of the following tools should be used to locate a cable in a cabling bundle, or to trace individual wires in a cable?

What is the function of a Time-Domain Reflectometer (TDR)?

Finding breaks in copper network cables

An Optical Time-Domain Reflectometer (OTDR) is a type of specialized cable tester that locates faults and breaks in fiber-optic cabling.

Which of the following tools is used to verify that the electrical connections of wires in a cable are correct?

When troubleshooting problems with a Network Interface Card (NIC), which of the following tools can be used to test connector pins on the NIC's port?

Which of the following tools is used to attach network cables to a patch panel?

Which of the following is a type of diagnostic tool used for measuring the strength of a wireless signal?

Which of the following allows for determination of the optimal WAP placement?

What is the typical maximum segment length for a copper twisted-pair Ethernet cable?

Which of the following are characteristic features of Category 5 (Cat 5) cabling? (Select all that apply)

100 Mbps Ethernet (100BaseT networks)

1 Gbps Ethernet (1000BaseT networks

100-meter cable segment length

RJ-45 connector

Twisted-pair copper cabling

What is the common minimum requirement for twisted-pair copper cabling in modern Ethernet networks?

Which of the following are characteristic features of Category 5e (Cat 5e) cabling? (Select all that apply)

100 Mbps Ethernet (100BaseT networks

RJ-45 connector

100-meter cable segment length

Twisted-pair copper cabling

1 Gbps Ethernet (1000BaseT networks

What is the minimum cabling requirement needed to create a 10 Gbps Ethernet connection over copper twisted-pair cable?

In 10GBaseT networks, Category 6 (Cat 6) cabling supports a 10 Gbps data transfer rate at a limited range of 33-55 meters, whereas Cat 6A (Augmented) cabling allows for a 10 Gbps data transfer rate over a segment length of 100 meters.

A type of enclosed space in a building (such as the area between a dropped ceiling and a structural ceiling) that is used for air handling is known as a(n):

A special type of cabling with a fire-retardant jacket that is placed inside spaces between structural floors and dropped ceilings or inside of walls is known as plenum-rated cabling.

Examples of copper cabling types used in Ethernet networks include: (Select all that apply)

The main difference between UTP and STP cabling is that STP cables have additional protective covers that reduce signal interference from outside sources.

Which of the following are features of UTP cabling? (Select all that apply)

Twisted-pair copper cabling

Used in Ethernet networks and telephone systems

Low cost and ease of installation

Not surrounded by any shielding that would provide protection against interference from outside sources

In Ethernet networks, installed with RJ-45 connector type

Which of the following are copper cabling termination specifications? (Select 2 answers)

What type of Ethernet cable is used to establish a direct communication link between two PCs?

A type of twisted-pair copper cable used for connecting workstations to network devices is known as: (Select 2 answers

Patch cable, Straight-through cable

Which of the following statements describe the features of multimode fiber optics? (Select 3 answers)

Transmits for distances of up to 2 km, Costs less than single-mode fiber optic cabling, Uses LED as a source of light

Which of the following describe characteristics of single-mode fiber optic cabling? (Select 3 answers)

Costs more than multimode fiber optics

Transmits for distances of up to 100 km

Uses laser as a source of light

Which of the following statements describe(s) coaxial cabling? (Select all that apply)

Used for carrying a cable television signal

Protects against EMI

Copper cabling

Used for broadband cable Internet access

Examples of video connection standards include:

DVI, DisplayPort, HDMI, and VGA

DE-15, DB-15, and HD-15 are different names used for a(n):

A Video Graphics Array (VGA) connector is a:

Three-row 15-pin connector

Which of the following are characteristic features of the IEEE 802.11 N?

Basic specification for the IEEE 802.11n standard.
Changes to implementation of OFDM..
Introduction of MIMO..
MIMO power saving..
Wider channel bandwidth..
Antenna technology..
Reduced support for backward compatibility under special circumstances to improve data throughput..

What are the characteristic features of the IEEE 802.11 a wireless standard?

802.11a Protocol Features.
802.11a uses 5GHz frequency band which is less crowded and hence has relatively smaller interference problem..
802.11a supports up to 54Mbps of bandwidth, which is much faster than the 11Mbps bandwidth provided by 802.11b standard devices..
802.11a offers as many as 12 non-overlapping channels..

What is the standard for 802.11 n?

IEEE 802.11n-2009 or 802.11n is a wireless-networking standard that uses multiple antennas to increase data rates. The Wi-Fi Alliance has also retroactively labelled the technology for the standard as Wi-Fi 4.

What are the main benefits of IEEE 802.11 e WLAN standards?

802.11e offers subscribers high speed internet access with VoIP, full motion video and high quality audio. Networks using 802.11e operate at radio frequencies ranging between 2.4 GHz and 2.4835 GHz or between 5.75 GHz and 5.850 GHz.