Chap.6 | Test Review

Chap.6 | Test Review

Professional Development

29 Qs

quiz-placeholder

Similar activities

tcp firewall dns vpn

tcp firewall dns vpn

Professional Development

30 Qs

Day 10 Quiz - Physical & Network Security

Day 10 Quiz - Physical & Network Security

Professional Development

27 Qs

BCS Network Security Test 6

BCS Network Security Test 6

University - Professional Development

24 Qs

SPR Sieci Komputerowe

SPR Sieci Komputerowe

Professional Development

27 Qs

E-Commerce Revision 1

E-Commerce Revision 1

Professional Development

30 Qs

AIJ

AIJ

KG - Professional Development

33 Qs

BCS Systems & Architecture Quiz 4

BCS Systems & Architecture Quiz 4

University - Professional Development

24 Qs

Networking 2

Networking 2

Professional Development

30 Qs

Chap.6 | Test Review

Chap.6 | Test Review

Assessment

Quiz

Professional Development

Professional Development

Easy

Created by

Cyber Professor - Mr. B

Used 45+ times

FREE Resource

29 questions

Show all answers

1.

MULTIPLE SELECT QUESTION

2 mins • 1 pt

1. Users in a recently installed wireless network are complaining of slow data transfer and frequent loss of connectivity. The technician checks that the wireless security is correctly implemented, and there is no evidence of unauthorized users on the network. Which two problems might the technician suspect? (Choose two.)

There is interference from outside sources.

The DHCP server is faulty.

The wireless signal is too weak.

The antenna on the access point is too powerful.

The network passwords need to be reissued to the users.

2.

MULTIPLE SELECT QUESTION

2 mins • 1 pt

2. A wired network is undergoing several changes that could leave it vulnerable to connection by unauthorized devices while the work is in progress. Which two temporary measures would enable the authorized devices to continue to have network access but prevent unauthorized devices from connecting? (Choose two.)

Disable DNS.

Disable SSID broadcast.

Disable DHCP.

Subnet the network.

Assign static IP addresses to the authorized devices.

3.

MULTIPLE SELECT QUESTION

2 mins • 1 pt

Media Image

3. What two default wireless router settings can affect network security? (Choose two.)

MAC address filtering is enabled.

The SSID is broadcast.

A well-known administrator password is set.

WEP encryption is enabled.

The wireless channel is automatically selected.

4.

MULTIPLE SELECT QUESTION

2 mins • 1 pt

4. A network technician is checking a computer to see if the DHCP client is working correctly. The technician issues the ipconfig /all command. Which two parameters should the technician review? (Choose two.)

Description

Default gateway

Host name

Media state

Subnet mask

5.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

5. A technician is troubleshooting a problem where the user claims access to the Internet is not working, but there was access to the Internet the day before. Upon investigation, the technician determines that the user cannot access the network printer in the office either. The network printer is on the same network as the computer. The computer has 169.254.100.88 assigned as an IP address. What is the most likely problem?

The computer cannot communicate with a DHCP server.

The IP default gateway on the computer is incorrect.

The network interface card driver needs to be updated.

The router that connects this network to other networks is down.

6.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

6. A user can print to a printer that is on the same network, but the traffic of the user cannot reach the Internet. What is a possible cause of the problem?

The PC has an incorrect IP address.

The network cable connected to the user PC is faulty.

The PC default gateway address is missing or incorrect.

The NIC on the PC is faulty.

7.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

7. Port triggering has been configured on a wireless router. Port 25 has been defined as the trigger port and port 113 as an open port. What effect does this have on network traffic?

Any traffic that is using port 25 going out of the internal network will also be allowed to transmit out port 113.

All traffic that is sent out port 25 will open port 113 to allow inbound traffic into the internal network through port 113.

Any traffic that comes into port 25 allows outgoing port 113 to be used.

All traffic that is sent into port 25 to the internal network will also be allowed to use port 113.

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?