Question: Which technology allows users to connect to a private network over the Internet securely?

Answer Choices:
A. DNS
B. VPN
C. TCP
D. LAN

Answer: B. VPN

Question: Which networking parameter provides information about a network’s highest levels of utilization?

Answer Choices:
A. Peak utilization
B. Network utilization
C. User application utilization
D. Resource utilization

Answer: A. Peak utilization

Question: What are the two types of cryptography used for data encryption?

Answer Choices:
A. Rivest-Shamir-Adleman and data encryption standard
B. Root and intermediate certificate authority
C. Secure socket layer and transport layer security
D. Asymmetric key and symmetric key

Answer: D. Asymmetric key and symmetric key

Question: Which device connects multiple networks and determines the best path for data?

Answer Choices:
A. Switch
B. Router
C. Hub
D. Bridge

Answer: B. Router

Question: How do the waves of infrared transmissions compare to the waves of visible light?

Answer Choices:
A. Infrared transmissions have longer wavelengths and higher frequencies.
B. Infrared transmissions have shorter wavelengths and lower frequencies.
C. Infrared transmissions have shorter wavelengths and higher frequencies.
D. Infrared transmissions have longer wavelengths and lower frequencies.

Answer: D. Infrared transmissions have longer wavelengths and lower frequencies.

Question: Which type of signals are transmitted through wireless media?

Answer Choices:
A. Electrical signals
B. Thermomagnetic signals
C. Optical signals
D. Electromagnetic signals

Answer: D. Electromagnetic signals

Question: When a wireless network device attempts to connect to the wireless network, what engages with the ACL to determine access?

Answer Choices:
A. Wide area network (WAN)
B. Wired Equivalent Privacy (WEP)
C. Working group wireless personal area network (WPAN)
D. Wireless access point (WAP)

Answer: D. Wireless access point (WAP)

Question: Which two frequency bands are typically used by Wi-Fi routers?

Answer Choices:
A. 2.4 MHz and 5 MHz
B. 1.5 MHz and 3 MHz
C. 2.4 GHz and 5 GHz
D. 1.5 GHz and 3 GHz

Answer: C. 2.4 GHz and 5 GHz

Question: What is the optimal encryption protocol while establishing a wireless network?

Answer Choices:
A. Wired Equivalent Privacy (WEP)
B. Wi-Fi Protected Access (WPA)
C. Extensible Authentication Protocol (EAP)
D. Wi-Fi Protected Access 2 (WPA2)

Answer: D. Wi-Fi Protected Access 2 (WPA2)

Question: What is war driving?

Answer Choices:
A. A process of exploring area Wi-Fi for vulnerable networks to infiltrate
B. A technique, based on mathematical algorithms, used to guess a password
C. A remote connection system that drives connections between a network device and a remote device
D. A secure way to transfer files between computers

Answer: A. A process of exploring area Wi-Fi for vulnerable networks to infiltrate

Question: Which range describes the frequencies used in cellular transmission?

Answer Choices:
A. 1.2 GHz to 5.4 GHz
B. 100 MHz to 850 MHz
C. 18 MHz to 2.8 GHz
D. 600 MHz to 39 GHz

Answer: D. 600 MHz to 39 GHz

Question: Which LAN component serves as a storage location for shared access to files?

Answer Choices:
A. Switch
B. Hub
C. Bridge
D. Server

Answer: D. Server

Question: Which multiplexing technique uses laser beams and a single clock for timing and control of different transmission devices?

Answer Choices:
A. Statistical time-division multiplexing
B. Transmission System 1 multiplexing
C. Integrated Services Digital Network (ISDN) multiplexing
D. Synchronous Optical Network (SONET) multiplexing

Answer: D. Synchronous Optical Network (SONET) multiplexing

Question: Which IEEE standard working group should be referenced when designing and implementing a wireless LAN for a college?

Answer Choices:
A. 802.11
B. 802.24
C. 802.3
D. 802.4

Answer: A. 802.11

Question: What is the advantage provided by the deployment of the multiple port channels?

Answer Choices:
A. Network segmentation
B. Network traffic flow redundancy
C. Port density at the desktop switch
D. Port isolation at the desktop switch

Answer: B. Network traffic flow redundancy

Question: What is the term for the change that takes place in response to a stressor?

Answer Choices:
A rehabilitation
B negative movement
C adaptation
D positive movement

Answer: C – adaptation.

Question: Which part of the system needs to be replaced in this scenario?

Answer Choices:
A. Random access memory (RAM)
B. Network interface card (NIC)
C. Application-specific integrated circuit (ASIC)
D. Central processing unit (CPU)

Answer: A. Random access memory (RAM)

Question: Which historical documentation identifies instances of how a particular kind of network is implemented?

Answer Choices:
A. Experimental studies
B. Case studies
C. Metadata studies
D. Correlational studies

Answer: B. Case studies

Question: Which of the following network topologies uses a central hub or switch to which all computers connect?

Answer Choices:
A. Ring
B. Mesh
C. Star
D. Bus

Answer: C. Star

Question: What is one disadvantage of checksum?

Answer Choices:
A. It has a tendency to overlook small common errors.
B. It is slowed by its use of a large number of bits.
C. It has a large overhead compared to the frame size.
D. It is difficult to implement in software applications.

Answer: A. It has a tendency to overlook small common errors.

Question: Which network component facilitates the connection of a wireless device to a wired LAN?

Answer Choices:
A. Modem
B. Firewall
C. Repeater
D. Access point

Answer: D. Access point

Question: Which command is used to identify where the connection is timing out?

Answer Choices:
A. Tracert
B. Nbstat
C. Ping
D. Nslookup

Answer: A. Tracert

Question: Which concept accurately encapsulates a system’s ability to continue operating in the event of a hardware or software failure?

Answer Choices:
A. Failure tolerance
B. Bilateral tolerance
C. Fault tolerance
D. Succession tolerance

Answer: C. Fault tolerance

Question: Which is a use for cellular digital packet data?

Answer Choices:
A. To send and receive SMS messages
B. To collect and transfer geospatial information
C. To enable mobile internet access
D. To connect devices in close proximity

Answer: C. To enable mobile internet access

Question: Which type of network is used to connect the computers within a school building?

Answer Choices:
A. LAN
B. MAN
C. PAN
D. WAN

Answer: A. LAN