Networking Essentials (Version 2) – Modules 13 – 16: Home Network Basics Group Exam Answers Full 100% 2021

  1. What are three advantages of wireless over wired LAN technology? (Choose three.)

    • lower on-going costs
    • longer transmission distance
    • ease of installation
    • ease of expansion
    • higher level of security
      Answers Explanation & Hints:

      Wireless technology can provide anytime, anywhere connectivity and allows devices to stay connected as their location may change. Wireless technology is fairly easy and inexpensive to install and enables networks to be easily expanded, without the limitations of cabled connections.

  2. Which wireless RF band do IEEE 802.11b/g devices use?

    • 900 MHz
    • 2.4 GHz
    • 5 GHz
    • 60 GHz
      Answers Explanation & Hints:

      900 MHz is an FCC wireless technology that was used before development of the 802.11 standards. 900 MHz devices have a larger coverage range than the higher frequencies have and do not require line of sight between devices. 802.11b/g/n/ad devices all operate at 2.4 GHz. 802.11a/n/ac/ad devices operate at 5 GHz, and 802.11ad devices operate at 60 GHz.

  3. What two IEEE 802.11 wireless standards operate only in the 5 GHz range? (Choose two.)

    • 802.11a
    • 802.11b
    • 802.11g
    • 802.11n
    • 802.11ac
    • 802.11ad
      Answers Explanation & Hints:

      The 802.11a and 802.11ac standards operate only in the 5 GHZ range. The 802.11b and 802.11g standards operate only in the 2.4 GHz range. The 802.11n standard operates in both the 2.4 and 5 GHz ranges. The 802.11ad standard operates in the 2.4, 5, and 60 GHz ranges.

  4. What wireless router configuration would stop outsiders from using your home network?

    • IP address
    • encryption
    • router location
    • network name
      Answers Explanation & Hints:

      Encryption configured on the wireless router can provide secure communications and stop outsiders from using your home network.

  5. What is CSMA/CA on a network?

    • an access method that is used by wireless technology to avoid duplicate SSIDs
    • an access method that is used by any technology that has excessive collisions
    • an access method that is used by wired Ethernet technology to avoid collisions
    • an access method that is used by wireless technology to avoid collisions
      Answers Explanation & Hints:

      Carrier Sense Multiple Access with Collision Avoidance (CSMA/CA) is a wireless technology that allows only one device to transmit on a channel at a given moment and prevents collisions from occurring.

  6. Which feature is characteristic of MAC filtering in wireless networks?

    • It allows only authorized users to detect the network.
    • It encrypts data that is transmitted on a wireless network.
    • It is configured on the computer rather than on the router.
    • It restricts computer access to a wireless network.
      Answers Explanation & Hints:

      MAC address filtering uses the MAC address to identify which devices are allowed to connect to the wireless network.

  7. What are two types of wired high-speed Internet connections? (Choose two.)

    • cable
    • satellite
    • cellular
    • DSL
    • dial-up
      Answers Explanation & Hints:

      Cable and DSL Internet technologies both use physical cabling to provide an Internet connection to a residence or a small business. Although dial-up is a wired technology, it does not provide a high-speed Internet connection. Satellite and cellular connections provide a wireless Internet connection.

  8. Which type of device provides an Internet connection through the use of a phone jack?

    • cable modem
    • DSL modem
    • satellite modem
    • Wi-Fi AP
      Answers Explanation & Hints:

      DSL technology uses the existing telephone network. For that reason, a DSL modem commonly has an RJ-11 phone port.

  9. Which cloud computing opportunity would provide the use of network hardware such as routers and switches for a particular company?

    • browser as a service (BaaS)
    • infrastructure as a service (IaaS)
    • software as a service (SaaS)
    • wireless as a service (WaaS)
      Answers Explanation & Hints:

      This item is based on information contained in the presentation.
      Routers, switches, and firewalls are infrastructure devices that can be provided in the cloud.

  10. What technology allows users to access data anywhere and at any time?

    • data analytics
    • Cloud computing
    • virtualization
    • micromarketing
      Answers Explanation & Hints:

      Cloud computing allows organizations to eliminate the need for on-site IT equipment, maintenance, and management. Cloud computing allows organizations to expand their services or capabilities while avoiding the increased costs of energy and space.

  11. Which two business and technical challenges does implementing virtualization within a data center help businesses to overcome? (Choose two.)

    • server hardware needs
    • physical footprint
    • power and air conditioning
    • operating system license requirements
    • virus and spyware attacks
      Answers Explanation & Hints:

      Traditionally, one server was built within one machine with one operating system. This server required power, a cool environment, and a method of backup. Virtualized servers require more robust hardware than a standard machine because a computer or server that is in a virtual machine commonly shares hardware with one or more servers and operating systems. By placing multiple servers within the same physical case, space is saved. Virtualized systems still need the proper licenses for operating systems or applications or both and still need the proper security applications and settings applied.

  12. Which three steps must be completed to manually connect an Android or IOS device to a secured wireless network? (Choose three.)

    • Input the authentication password.
    • Enter the network SSID.
    • Choose the correct security type.
    • Set the IP address.
    • Activate the Bluetooth antenna.
    • Change the MAC address.
      Answers Explanation & Hints:

      In order to connect an Android or IOS device to a Wi-Fi network manually, perform these steps:Enter the network SSID of the wireless network.
      Choose the security type used by the wireless network.
      Input the password to authenticate successfully.

  13. Which statement accurately characterizes the evolution of threats to network security?

    • Internal threats can cause even greater damage than external threats.
    • Internet architects planned for network security from the beginning.
    • Early Internet users often engaged in activities that would harm other users.
    • Threats have become less sophisticated while the technical knowledge needed by an attacker has grown.
      Answers Explanation & Hints:

      Internal threats can be intentional or accidental and cause greater damage than external threats because the internal user has direct access to the internal corporate network and corporate data.

  14. Which type of attack exploits human behavior to gain confidential information?​

    • virus
    • social engineering
    • denial of service
    • spyware
      Answers Explanation & Hints:

      Social engineering attacks deceive users into revealing private information or performing specific actions.

  15. Which three attacks exploit human behavior? (Choose three.)

    • pretexting
    • brute force
    • phishing
    • zombies
    • vishing
    • malware
      Answers Explanation & Hints:

      Attacks aimed at exploiting human behavior such as pretexting, phishing, and vishing are commonly used by hackers to obtain information directly from authorized users.​​

  16. What is a characteristic of a computer worm?

    • malicious software that copies itself into other executable programs
    • tricks users into running the infected software
    • a set of computer instructions that lies dormant until triggered by a specific event
    • exploits vulnerabilities with the intent of propagating itself across a network
      Answers Explanation & Hints:

      A worm is similar to a virus. However, a worm is self-spreading and can send copies of itself to connected hosts over the network.

  17. Which type of attack involves an attacker using a powerful computer to try a large number of possible passwords in rapid succession to gain access to a system​?

    • brute force
    • phishing
    • pretexting
    • DDoS
      Answers Explanation & Hints:

      In a brute force attack an attacker will try to gain access to a system by guessing passwords as fast as possible.

  18. What is a common countermeasure for Trojan horses?

    • antivirus software
    • authentication
    • encryption
    • firewall
      Answers Explanation & Hints:

      The primary means of mitigating virus and Trojan horse attacks is antivirus software. Antivirus software helps prevent hosts from getting infected and spreading malicious code.

  19. A student tells a teacher that many junk emails are appearing on a new personal laptop. What is a possible cause of the problem?

    • The student has spent too much time surfing the web.
    • The school email server is not functioning properly.
    • The laptop needs to be updated to the latest OS version.
    • The new laptop does not have antivirus or anti-spam software installed.
      Answers Explanation & Hints:

      A new computer should have antivirus, or anti-spam filter for the email client, or anti-spam software installed to protect from spammers.

  20. What happens when a wireless access point is configured to stop broadcasting the SSID?

    • Computer access to the wireless access point is restricted.
    • The identity of the network is freely broadcast.
    • The network is invisible to those who are unaware of the SSID.
    • Signals are prevented from transmission outside the boundaries of the local network.
      Answers Explanation & Hints:

      By default, wireless routers and access points broadcast SSIDs to all computers within the wireless range. This allows any wireless client to detect the network and to connect to it. The SSID broadcast feature can be turned off. When it is turned off, the network is no longer made public. It becomes invisible to clients that are not manually configured with the SSID.

  21. Why should WEP not be used in wireless networks today?

    • its age
    • easily crackable
    • its lack of support
    • its lack of encryption
    • its use of clear text passwords
      Answers Explanation & Hints:

      Despite improvements, WEP is still vulnerable to various security issues including the ability to be cracked.

  22. What specialized network device is responsible for permitting or blocking traffic between networks?

    • switch
    • access point
    • bridge
    • firewall
      Answers Explanation & Hints:

      Firewalls are used to permit or block traffic between networks according to access control policies.

  23. An administrator wants to configure a router so that users on the outside network can only establish HTTP connections to the internal web site. Which feature would the administrator configure to accomplish this?

    • PAT
    • static NAT
    • NAT overload
    • port forwarding
      Answers Explanation & Hints:

      Port forwarding allows connections to one port on the external interface to be redirected to a specific device and a specific port on the inside interface. In this way specific inside services can be accessible from the outside network without permitting all traffic to the inside device.

  24. What is the purpose of a DMZ?

    • It analyzes traffic for intrusion attempts and sends reports to management stations.
    • It creates an encrypted and authenticated tunnel for remote hosts to access the internal network.
    • It provides secure connectivity for clients that connect to the internal network through a wireless LAN.
    • It allows external hosts to access specific company servers while maintaining the security restrictions for the internal network.
      Answers Explanation & Hints:

      The DMZ is an area of the network that is accessible to both internal and external users. It is more secure than the external network but not as secure as the internal network. It allows external hosts to access internal servers.