Why should WEP not be used in wireless networks today?
Why should WEP not be used in wireless networks today? its age easily crackable its lack of support its lack of encryption its use of clear text passwords Answers Explanation…
Why should WEP not be used in wireless networks today? its age easily crackable its lack of support its lack of encryption its use of clear text passwords Answers Explanation…
What happens when a wireless access point is configured to stop broadcasting the SSID? Computer access to the wireless access point is restricted. The identity of the network is freely…
What is a common countermeasure for Trojan horses? antivirus software authentication encryption firewall Answers Explanation & Hints: The primary means of mitigating virus and Trojan horse attacks is antivirus software.…
Which type of attack involves an attacker using a powerful computer to try a large number of possible passwords in rapid succession to gain access to a system? brute force…
What is a characteristic of a computer worm? malicious software that copies itself into other executable programs tricks users into running the infected software a set of computer instructions that…
Which three attacks exploit human behavior? (Choose three.) pretexting brute force phishing zombies vishing malware Answers Explanation & Hints: Attacks aimed at exploiting human behavior such as pretexting, phishing, and…
Which type of attack exploits human behavior to gain confidential information? virus social engineering denial of service spyware Answers Explanation & Hints: Social engineering attacks deceive users into revealing private…
Which three steps must be completed to manually connect an Android or IOS device to a secured wireless network? (Choose three.) Input the authentication password. Enter the network SSID. Choose…
Which two business and technical challenges does implementing virtualization within a data center help businesses to overcome? (Choose two.) server hardware needs physical footprint power and air conditioning operating system…
Which type of device provides an Internet connection through the use of a phone jack? cable modem DSL modem satellite modem Wi-Fi AP Answers Explanation & Hints: DSL technology uses…
What is CSMA/CA on a network? an access method that is used by wireless technology to avoid duplicate SSIDs an access method that is used by any technology that has…
Which wireless RF band do IEEE 802.11b/g devices use? 900 MHz 60 GHz 2.4 GHz 5 GHz Explanation and Hint: 900 MHz is an FCC wireless technology that was used…
What wireless router configuration would stop outsiders from using your home network? IP address encryption router location network name Answers Explanation & Hints: Encryption configured on the wireless router can…
What are three advantages of wireless over wired LAN technology? (Choose three.) lower on-going costs longer transmission distance ease of installation ease of expansion higher level of security Answers Explanation…
Which protocol retains a message in a mailbox on a server, even after the message is accessed by a user on a local client device? IMAP4 DNS SMTP POP3 Answers…
What two characteristics describe an FTP connection? (Choose two.) A large file requires more than two connections between the client and the server to successfully download it. The server establishes…
Which protocol is used to transfer web pages from a server to a client device? HTML SMTP HTTP SSH POP Answers Explanation & Hints: The Hypertext Transfer Protocol (HTTP) provides…
Refer to the exhibit. Which protocol allows a user to type www.cisco.com instead of an IP address to access the web server? DNS FTP HTML HTTP SNMP Answers Explanation &…
Which network technology allows devices to communicate using both IPv4 and IPv6 addressing at the same time? SLAAC NAT64 dual stack tunneling Answers Explanation & Hints: Dual stack allows IPv4…
Typically, which network device would be used to perform NAT for a corporate environment? DHCP server host device router server switch Answers Explanation & Hints: Typically, the translation from private…