Module Group 4: Modules 13 – 16 Group Exam Answers
Networking Essentials (Version 2) – Modules 13 – 16: Home Network Basics Group Exam Answers
1. What is CSMA/CA on a network?
- an access method that is used by wired Ethernet technology to avoid collisions
- an access method that is used by wireless technology to avoid collisions
- an access method that is used by wireless technology to avoid duplicate SSIDs
- an access method that is used by any technology that has excessive collisions
2. Which two business and technical challenges does implementing virtualization within a data center help businesses to overcome? (Choose two.)
- virus and spyware attacks
- physical footprint
- operating system license requirements
- server hardware needs
- power and air conditioning
3. What is a common countermeasure for Trojan horses?
- antivirus software
4. A student tells a teacher that many junk emails are appearing on a new personal laptop. What is a possible cause of the problem?
- The new laptop does not have antivirus or anti-spam software installed.
- The school email server is not functioning properly.
- The student has spent too much time surfing the web.
- The laptop needs to be updated to the latest OS version.
5. What are three advantages of wireless over wired LAN technology? (Choose three.)
- higher level of security
- longer transmission distance
- ease of expansion
- lower on-going costs
- ease of installation
6. Which wireless RF band do IEEE 802.11b/g devices use?
- 5 GHz
- 2.4 GHz
- 900 MHz
- 60 GHz
7. What two IEEE 802.11 wireless standards operate only in the 5 GHz range? (Choose two.)
8. What wireless router configuration would stop outsiders from using your home network?
- IP address
- router location
- network name
9. Which feature is characteristic of MAC filtering in wireless networks?
- It allows only authorized users to detect the network.
- It restricts computer access to a wireless network.
- It is configured on the computer rather than on the router.
- It encrypts data that is transmitted on a wireless network.
10. What are two types of wired high-speed Internet connections? (Choose two.)
11. Which type of device provides an Internet connection through the use of a phone jack?
- DSL modem
- satellite modem
- cable modem
- Wi-Fi AP
12. Which cloud computing opportunity would provide the use of network hardware such as routers and switches for a particular company?
- browser as a service (BaaS)
- infrastructure as a service (IaaS)
- software as a service (SaaS)
- wireless as a service (WaaS)
13. What technology allows users to access data anywhere and at any time?
- Cloud computing
- data analytics
14. Which three steps must be completed to manually connect an Android or IOS device to a secured wireless network? (Choose three.)
- Set the IP address.
- Activate the Bluetooth antenna.
- Input the authentication password.
- Enter the network SSID.
- Change the MAC address.
- Choose the correct security type.
15. Which statement accurately characterizes the evolution of threats to network security?
- Internet architects planned for network security from the beginning.
- Early Internet users often engaged in activities that would harm other users.
- Threats have become less sophisticated while the technical knowledge needed by an attacker has grown.
- Internal threats can cause even greater damage than external threats.
16. Which type of attack exploits human behavior to gain confidential information?
- social engineering
- denial of service
17. Which three attacks exploit human behavior? (Choose three.)
- brute force
18. What is a characteristic of a computer worm?
- exploits vulnerabilities with the intent of propagating itself across a network
- a set of computer instructions that lies dormant until triggered by a specific event
- tricks users into running the infected software
- malicious software that copies itself into other executable programs
19. Which type of attack involves an attacker using a powerful computer to try a large number of possible passwords in rapid succession to gain access to a system?
- brute force
20. What happens when a wireless access point is configured to stop broadcasting the SSID?
- Computer access to the wireless access point is restricted.
- The identity of the network is freely broadcast.
- Signals are prevented from transmission outside the boundaries of the local network.
- The network is invisible to those who are unaware of the SSID.
21. Why should WEP not be used in wireless networks today?
- its lack of support
- its age
- its lack of encryption
- easily crackable
- its use of clear text passwords
22. What specialized network device is responsible for permitting or blocking traffic between networks?
- access point
23. An administrator wants to configure a router so that users on the outside network can only establish HTTP connections to the internal web site. Which feature would the administrator configure to accomplish this?
- NAT overload
- static NAT
- port forwarding
24. What is the purpose of a DMZ?
- It provides secure connectivity for clients that connect to the internal network through a wireless LAN.
- It creates an encrypted and authenticated tunnel for remote hosts to access the internal network.
- It analyzes traffic for intrusion attempts and sends reports to management stations.
- It allows external hosts to access specific company servers while maintaining the security restrictions for the internal network.