Practice Test #4 Flashcards

Networking

1
Q

QUESTION NO: 73
Joe, a user, has just installed his first home wireless router. Which of the following tasks should be
considered to help secure the unit from any confirmed exploits?
A.
Change the router administrator username.
B.
Change the router’s broadcasting channel.
C.
Update the unit’s firmware.
D.
Use a complex administrator password.

A

Answer: C

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q
QUESTION NO: 74
Which of the following is the BEST security practice to use when configuring the management
options of a wireless router?
A.
Disable DHCP
B.
Change the admin password
C.
Enable SSID
D.
Enable remote administration
A

Answer: B

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q
QUESTION NO: 75
When operating under optimal network conditions, which of the following has the HIGHEST
reliability?
A.
Bluetooth
B.
Wired
C.
Cellular
D.
WiFi
A

Answer: B

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q
QUESTION NO: 76
A user needs to download tax documents from a financial website. Which of the following is the
website MOST likely to use for transmission of the tax document to the user’s browser?
A.
HTTP
B.
HTTPS
C.
SFTP
D.
FTP
A

Answer: B

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q
QUESTION NO: 77
Which of the following are secure network protocols? (Select TWO).
A.
IMAP
B.
FTPS
C.
SMTP
D.
HTTPS
E.
DNS
A

Answer: B,D

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q
QUESTION NO: 78
Which of the following will allow the easiest and fastest way to share a single file between two
modern smartphones without joining the same WiFi network?
A.
Micro SD card
B.
Bluetooth
C.
USB connection
D.
Infrared
A

Answer: B

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

QUESTION NO: 79
Which of the following BEST describes the pros and cons of a home wired network?
A.
Low throughput, low mobility, high availability, high latency, high security
B.
High throughput, high mobility, low availability, low latency, high security
C.
High throughput, low mobility, high availability, low latency, high security
D.
Low throughput, high mobility, low availability, high latency, low security

A

Answer: C

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

QUESTION NO: 80
A technician has just finished setting up a SOHO wireless router but the client does not want the
PC on the wireless network for security reasons. The technician connects an RJ-45 cable to the
computer and the router, but does not receive network connectivity. Which of the following is the
NEXT step to diagnose the problem?
A.
Change the IP address on the computer to match the router.
B.
Reseat the power cable on the computer and reboot.
C.
Check for link light activity on the computer and the router.
D.
Change the hostname of the router to match the computer’s network

A

Answer: C

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q
QUESTION NO: 81
Which of the following is an advantage of using cloud-based collaborative applications and
storage, rather than local applications and storage?
A.
Decreased software licensing costs
B.
Higher security encryption
C.
Limited storage space for files
D.
Increased accessibility to files
A

Answer: D

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

QUESTION NO: 82
Which of the following data connections would provide a user the BEST Internet availability while
traveling?
A.
Workstation with only RJ-45 connectors
B.
Smartphone with cellular service
C.
Laptop with Bluetooth wireless connectivity
D.
Tablet connected to a SOHO wireless network

A

Answer: B

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q
QUESTION NO: 83
A technician is configuring a wireless router for a small office and the business owner would like
the wireless network to be secured using the strongest encryption possible. Which of the following
should the technician choose?
A.
WPA2
B.
WAP
C.
WPA
D.
WEP
A

Answer: A

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

QUESTION NO: 84
A user’s laptop hard drive contains sensitive information. The user often plugs the laptop into the
corporate network. A sensitive file from the laptop has been found on another user’s laptop. How
could the user have prevented this breach?
A.
Disable file and print sharing on the laptop.
B.
Delete unused drives from network.
C.
Remove shared keys from the key ring.
D.
Set the read-only attribute on the files

A

Answer: A

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q
QUESTION NO: 85
Joe, a user, needs to store a large amount of data, but does not have enough space on his local
computer. Which of the following are the BEST options for him to use? (Select TWO).
A.
Network attached storage
B.
External hard drive
C.
Optical drive
D.
USB thumb drive
E.
Another computer
A

Answer: A,B

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q
QUESTION NO: 86
When connecting a printer to a network, which of the following is needed to complete the process?
(Select TWO).
A.
IP address
B.
User's password
C.
Computer’s name
D.
Subnet mask
E.
HTTP port
F.
Fax number
A

Answer: A,D

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q
QUESTION NO: 87
Which of the following protocols is used to secure communications between sender and receiver?
A.
SIP
B.
SNMP
C.
SSL
D.
SMTP
A

Answer: C

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q
QUESTION NO: 88
Which of the following connections provide data with the MOST secure protection from
interception?
A.
Wired
B.
WiFi
C.
IR
D.
Cellular
A

Answer: A

17
Q
QUESTION NO: 89
A technician has been tasked with changing the settings for a used SOHO router, but does not
have the administrator password because the previous owner changed it. Which of the following
actions will resolve this issue?
A.
Click “Forgot password.”
B.
Use a password cracker.
C.
Hold the reset button.
D.
Use the password: password.
A

Answer: C

18
Q
QUESTION NO: 90
A user is setting up an older wireless access point that has only WEP for encryption. Which of the
following additional steps will help to secure the network? (Select TWO).
A.
Disable SSID broadcast.
B.
Refresh the MAC address.
C.
Filter the MAC address.
D.
Refresh the IP address.
E.
Use CAT6 cables.
A

Answer: A,C