Question: Which technology allows users to connect to a private network over the Internet securely?
Answer Choices:
A. DNS
B. VPN
C. TCP
D. LAN
Answer: B. VPN
Question: Which networking parameter provides information about a network’s highest levels of utilization?
Answer Choices:
A. Peak utilization
B. Network utilization
C. User application utilization
D. Resource utilization
Answer: A. Peak utilization
Question: What are the two types of cryptography used for data encryption?
Answer Choices:
A. Rivest-Shamir-Adleman and data encryption standard
B. Root and intermediate certificate authority
C. Secure socket layer and transport layer security
D. Asymmetric key and symmetric key
Answer: D. Asymmetric key and symmetric key
Question: Which device connects multiple networks and determines the best path for data?
Answer Choices:
A. Switch
B. Router
C. Hub
D. Bridge
Answer: B. Router
Question: How do the waves of infrared transmissions compare to the waves of visible light?
Answer Choices:
A. Infrared transmissions have longer wavelengths and higher frequencies.
B. Infrared transmissions have shorter wavelengths and lower frequencies.
C. Infrared transmissions have shorter wavelengths and higher frequencies.
D. Infrared transmissions have longer wavelengths and lower frequencies.
Answer: D. Infrared transmissions have longer wavelengths and lower frequencies.
Question: Which type of signals are transmitted through wireless media?
Answer Choices:
A. Electrical signals
B. Thermomagnetic signals
C. Optical signals
D. Electromagnetic signals
Answer: D. Electromagnetic signals
Question: When a wireless network device attempts to connect to the wireless network, what engages with the ACL to determine access?
Answer Choices:
A. Wide area network (WAN)
B. Wired Equivalent Privacy (WEP)
C. Working group wireless personal area network (WPAN)
D. Wireless access point (WAP)
Answer: D. Wireless access point (WAP)
Question: Which two frequency bands are typically used by Wi-Fi routers?
Answer Choices:
A. 2.4 MHz and 5 MHz
B. 1.5 MHz and 3 MHz
C. 2.4 GHz and 5 GHz
D. 1.5 GHz and 3 GHz
Answer: C. 2.4 GHz and 5 GHz
Question: What is the optimal encryption protocol while establishing a wireless network?
Answer Choices:
A. Wired Equivalent Privacy (WEP)
B. Wi-Fi Protected Access (WPA)
C. Extensible Authentication Protocol (EAP)
D. Wi-Fi Protected Access 2 (WPA2)
Answer: D. Wi-Fi Protected Access 2 (WPA2)
Question: What is war driving?
Answer Choices:
A. A process of exploring area Wi-Fi for vulnerable networks to infiltrate
B. A technique, based on mathematical algorithms, used to guess a password
C. A remote connection system that drives connections between a network device and a remote device
D. A secure way to transfer files between computers
Answer: A. A process of exploring area Wi-Fi for vulnerable networks to infiltrate
Question: Which range describes the frequencies used in cellular transmission?
Answer Choices:
A. 1.2 GHz to 5.4 GHz
B. 100 MHz to 850 MHz
C. 18 MHz to 2.8 GHz
D. 600 MHz to 39 GHz
Answer: D. 600 MHz to 39 GHz
Question: Which LAN component serves as a storage location for shared access to files?
Answer Choices:
A. Switch
B. Hub
C. Bridge
D. Server
Answer: D. Server
Question: Which multiplexing technique uses laser beams and a single clock for timing and control of different transmission devices?
Answer Choices:
A. Statistical time-division multiplexing
B. Transmission System 1 multiplexing
C. Integrated Services Digital Network (ISDN) multiplexing
D. Synchronous Optical Network (SONET) multiplexing
Answer: D. Synchronous Optical Network (SONET) multiplexing
Question: Which IEEE standard working group should be referenced when designing and implementing a wireless LAN for a college?
Answer Choices:
A. 802.11
B. 802.24
C. 802.3
D. 802.4
Answer: A. 802.11
Question: What is the advantage provided by the deployment of the multiple port channels?
Answer Choices:
A. Network segmentation
B. Network traffic flow redundancy
C. Port density at the desktop switch
D. Port isolation at the desktop switch
Answer: B. Network traffic flow redundancy
Question: What is the term for the change that takes place in response to a stressor?
Answer Choices:
A rehabilitation
B negative movement
C adaptation
D positive movement
Answer: C – adaptation.
Question: Which part of the system needs to be replaced in this scenario?
Answer Choices:
A. Random access memory (RAM)
B. Network interface card (NIC)
C. Application-specific integrated circuit (ASIC)
D. Central processing unit (CPU)
Answer: A. Random access memory (RAM)
Question: Which historical documentation identifies instances of how a particular kind of network is implemented?
Answer Choices:
A. Experimental studies
B. Case studies
C. Metadata studies
D. Correlational studies
Answer: B. Case studies
Question: Which of the following network topologies uses a central hub or switch to which all computers connect?
Answer Choices:
A. Ring
B. Mesh
C. Star
D. Bus
Answer: C. Star
Question: What is one disadvantage of checksum?
Answer Choices:
A. It has a tendency to overlook small common errors.
B. It is slowed by its use of a large number of bits.
C. It has a large overhead compared to the frame size.
D. It is difficult to implement in software applications.
Answer: A. It has a tendency to overlook small common errors.
Question: Which network component facilitates the connection of a wireless device to a wired LAN?
Answer Choices:
A. Modem
B. Firewall
C. Repeater
D. Access point
Answer: D. Access point
Question: Which command is used to identify where the connection is timing out?
Answer Choices:
A. Tracert
B. Nbstat
C. Ping
D. Nslookup
Answer: A. Tracert
Question: Which concept accurately encapsulates a system’s ability to continue operating in the event of a hardware or software failure?
Answer Choices:
A. Failure tolerance
B. Bilateral tolerance
C. Fault tolerance
D. Succession tolerance
Answer: C. Fault tolerance
Question: Which is a use for cellular digital packet data?
Answer Choices:
A. To send and receive SMS messages
B. To collect and transfer geospatial information
C. To enable mobile internet access
D. To connect devices in close proximity
Answer: C. To enable mobile internet access
Question: Which type of network is used to connect the computers within a school building?
Answer Choices:
A. LAN
B. MAN
C. PAN
D. WAN
Answer: A. LAN