Chap.6 | Test Review

Chap.6 | Test Review

Professional Development

29 Qs

quiz-placeholder

Similar activities

GDSC quiz

GDSC quiz

Professional Development

25 Qs

Network Pre-Test Under Cyber Closet Project

Network Pre-Test Under Cyber Closet Project

Professional Development

25 Qs

e-COM 2024/s0s5 MID TERM

e-COM 2024/s0s5 MID TERM

Professional Development

26 Qs

IT Essentials Chapter 6

IT Essentials Chapter 6

12th Grade - Professional Development

29 Qs

BCS Network Security Test 6

BCS Network Security Test 6

University - Professional Development

24 Qs

Netzwerk und IP

Netzwerk und IP

Professional Development

28 Qs

MID GENAP XI 21-22 TLJ

MID GENAP XI 21-22 TLJ

Professional Development

30 Qs

NET+ Review Week 6

NET+ Review Week 6

Professional Development

25 Qs

Chap.6 | Test Review

Chap.6 | Test Review

Assessment

Quiz

Professional Development

Professional Development

Easy

Created by

Cyber Professor - Mr. B

Used 45+ times

FREE Resource

29 questions

Show all answers

1.

MULTIPLE SELECT QUESTION

2 mins • 1 pt

1. Users in a recently installed wireless network are complaining of slow data transfer and frequent loss of connectivity. The technician checks that the wireless security is correctly implemented, and there is no evidence of unauthorized users on the network. Which two problems might the technician suspect? (Choose two.)

There is interference from outside sources.

The DHCP server is faulty.

The wireless signal is too weak.

The antenna on the access point is too powerful.

The network passwords need to be reissued to the users.

2.

MULTIPLE SELECT QUESTION

2 mins • 1 pt

2. A wired network is undergoing several changes that could leave it vulnerable to connection by unauthorized devices while the work is in progress. Which two temporary measures would enable the authorized devices to continue to have network access but prevent unauthorized devices from connecting? (Choose two.)

Disable DNS.

Disable SSID broadcast.

Disable DHCP.

Subnet the network.

Assign static IP addresses to the authorized devices.

3.

MULTIPLE SELECT QUESTION

2 mins • 1 pt

Media Image

3. What two default wireless router settings can affect network security? (Choose two.)

MAC address filtering is enabled.

The SSID is broadcast.

A well-known administrator password is set.

WEP encryption is enabled.

The wireless channel is automatically selected.

4.

MULTIPLE SELECT QUESTION

2 mins • 1 pt

4. A network technician is checking a computer to see if the DHCP client is working correctly. The technician issues the ipconfig /all command. Which two parameters should the technician review? (Choose two.)

Description

Default gateway

Host name

Media state

Subnet mask

5.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

5. A technician is troubleshooting a problem where the user claims access to the Internet is not working, but there was access to the Internet the day before. Upon investigation, the technician determines that the user cannot access the network printer in the office either. The network printer is on the same network as the computer. The computer has 169.254.100.88 assigned as an IP address. What is the most likely problem?

The computer cannot communicate with a DHCP server.

The IP default gateway on the computer is incorrect.

The network interface card driver needs to be updated.

The router that connects this network to other networks is down.

6.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

6. A user can print to a printer that is on the same network, but the traffic of the user cannot reach the Internet. What is a possible cause of the problem?

The PC has an incorrect IP address.

The network cable connected to the user PC is faulty.

The PC default gateway address is missing or incorrect.

The NIC on the PC is faulty.

7.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

7. Port triggering has been configured on a wireless router. Port 25 has been defined as the trigger port and port 113 as an open port. What effect does this have on network traffic?

Any traffic that is using port 25 going out of the internal network will also be allowed to transmit out port 113.

All traffic that is sent out port 25 will open port 113 to allow inbound traffic into the internal network through port 113.

Any traffic that comes into port 25 allows outgoing port 113 to be used.

All traffic that is sent into port 25 to the internal network will also be allowed to use port 113.

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?