Exam 7: Setting up a Local Network

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

You have been tasked with configuring a SOHO network in which all ports on the public untrusted network will be forwarded to one workstation connected to the LAN. Which of the following features will you configure on the SOHO router to accomplish this task?

Free
(Multiple Choice)
4.8/5
(40)
Correct Answer:
Verified

C

The company where Derek works has tasked him with setting up and securing a SOHO router. He wants to make sure the wireless network is secure and that no unauthorized person can gain access to the network. What is the first step Derek should perform to secure the wireless router?

Free
(Multiple Choice)
4.8/5
(31)
Correct Answer:
Verified

D

Match the protocol or encryption name with the feature.
Premises:
Typically uses TKIP for encryption.
Responses:
WEP
AES
WPA
Correct Answer:
Verified
Premises:
Responses:
Typically uses TKIP for encryption.
WEP
Free
(Matching)
4.7/5
(36)
Correct Answer:
Verified

  You have connected a cable Internet connection as shown in the exhibit. At what location should you place a filter? You have connected a cable Internet connection as shown in the exhibit. At what location should you place a filter?

(Multiple Choice)
4.8/5
(33)

A technician wants to configure a DHCP server to guarantee that certain printers always receive the same address. Which of the following should the technician configure?

(Multiple Choice)
4.9/5
(32)

  What connector is shown in the exhibit? What connector is shown in the exhibit?

(Multiple Choice)
4.7/5
(30)

You have connected an ADSL Internet connection as shown in the exhibit. The ports at the phone jack are connected to the same single-number POTS line. At what location should you place the DSL filter? You have connected an ADSL Internet connection as shown in the exhibit. The ports at the phone jack are connected to the same single-number POTS line. At what location should you place the DSL filter?

(Multiple Choice)
4.9/5
(32)
Match the protocol or encryption name with the feature.
Premises:
Current encryption algorithm used today.
Responses:
TKIP
WPA
WPA2
Correct Answer:
Verified
Premises:
Responses:
Current encryption algorithm used today.
TKIP
(Matching)
4.8/5
(27)

A remote worker wants to connect his computer to his corporation's private trusted network over the Internet. Which of the following will need to be configured?

(Multiple Choice)
5.0/5
(37)

Which of the following is a scenario in which an IT support technician would most likely be required to implement the alternate IP configuration method on a network host?

(Multiple Choice)
5.0/5
(30)

A corporate user is attempting to connect to the company's Windows domain server on the local network with her new laptop through a wired connection. Which of the following is required for the user to successfully sign in to the Windows domain?

(Multiple Choice)
4.8/5
(41)

You are tasked with configuring a wireless SOHO router for a customer. Which of the following settings will be the most secure with the least effort and cost to the customer?

(Multiple Choice)
4.8/5
(33)

You are setting up your Windows computer to connect to the Internet and notice that when you type www.microsoft.com, the browser does not go to the site. Instead, you receive an error message saying that the address cannot be resolved. What network setting should you check to see the address of the server being used to resolve this address?

(Multiple Choice)
5.0/5
(34)

Which of the following will use an RJ-11 connector for connectivity?

(Multiple Choice)
4.8/5
(37)

A manager in a small office is asking if it is possible to limit network access to a particular website during business hours. Apparently, several users are spending an excessive amount of time on the site preventing them from completing their work-related tasks. Which of the following is the best solution to accomplish the request from the manager while not limiting access to other websites?

(Multiple Choice)
5.0/5
(31)

A technician is configuring a new SOHO multifunction wireless router at a customer's location to provide network access to several wireless devices. The technician is required to protect the customer's private network from unauthorized access while performing the initial router setup as well as during normal operation after the configuration is completed. Which of the following is the best step for the technician to take in securing the router to meet this requirement?

(Multiple Choice)
4.9/5
(36)
Match the protocol or encryption name with the feature.
Premises:
No longer considered secure because the key used for encryption doesn't change.
Responses:
AES
WEP
WPA2
Correct Answer:
Verified
Premises:
Responses:
No longer considered secure because the key used for encryption doesn't change.
AES
(Matching)
4.8/5
(26)
Match the protocol or encryption name with the feature.
Premises:
Typically uses AES for encryption.
Responses:
WPA
WPA2
TKIP
Correct Answer:
Verified
Premises:
Responses:
Typically uses AES for encryption.
WPA
(Matching)
4.7/5
(39)
Match the protocol or encryption name with the feature.
Premises:
Generates a different key for every transmission; however, the encryption algorithm used for its calculations is no longer considered secure.
Responses:
WEP
TKIP
WPA
Correct Answer:
Verified
Premises:
Responses:
Generates a different key for every transmission; however, the encryption algorithm used for its calculations is no longer considered secure.
WEP
(Matching)
4.8/5
(36)

A client is requesting an Internet connection type that is not affected by atmospheric conditions and is always on. Which of the following will meet these requirements?

(Multiple Choice)
4.8/5
(31)
Showing 1 - 20 of 35
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)