Finalquiz Logo

Q&A Hero

  • Home
  • Plans
  • Login
  • Register
Finalquiz Logo
  • Home
  • Plans
  • Login
  • Register

Home » Networking » Page 17

Networking

Q: Which of the following protocols provides for both authentication and encryption?a. HTTP b. HTTP-S c. S-HTTPd. HTTPS

Q: Which protocol is used to exchange information over the World Wide Web?a. HTTP b. FTP c. NFSd. SMB

Q: PPP supports network protocols, such as IPX/SPX, NetBEUI, and TCP/IP. _________________________

Q: Remote access protocols are used to carry network packets over a WAN link. _________________________

Q: X.25 is more commonly used in Europe and other countries than in the United States. _________________________

Q: ISDN basic rate interface consists of two channels. _________________________

Q: Mozilla is an open-source Web browser that is installed in Mac OS X by default. _________________________

Q: In Internet Explorer, the restricted sites zone is used to designate specific sites that are safe to access. _________________________

Q: The NFS software that was originally developed by Sun Microsystems uses remote procedure calls via TCP port 111. _________________________

Q: With FTP, Port 20 is a control port for FTP commands that control how data is sent. _________________________

Q: In SSL, the client makes a secure connection request, and the server replies with a digital certificate accompanied by a public key. _________________________

Q: When used with S-HTTP, CMS is used to provide encryption for MIME data and to apply a digital signature to MIME data. ______________________________

Q: A Windows 2000/2003 server can be set up as a VPN server by implementing Routing and Remote Access Services.

Q: MS-CHAP v2 is used for clients who access RAS through special devices such as smart cards, token cards, and others that use certificate authentication.

Q: A VPN is a private network that is like a tunnel through a larger network.

Q: CSLIP supports network connection authentication to prevent someone from intercepting a communication.

Q: The maximum downstream transmission speed of ADSL is 6.0 Mbps.

Q: Windows 2000 Professional and Windows XP Professional do not offer RAS services and rely on their server counterparts to provide this service.

Q: Windows Server 2003 enables the installation of the Internet Explorer Enhanced Security Configuration component that should be installed to provide strong security options for this server operating system.

Q: NFS is a connectionless protocol that runs within UDP.

Q: Port 21 is a control port for FTP commands that controls how data is sent.

Q: HTTPS is used primarily in native HTTP communications and does not encrypt data in IP-level communications.

Q: What seven security techniques does Windows 2000 Professional use to support WNICs?

Q: What two key lengths are used in WEP encryption?

Q: What four general steps are used in the wireless communication authentication process?

Q: List five of the common wireless security measures that can be taken to protect a wireless network.

Q: What two approaches should be considered when planning for wireless communications?

Q: What two things can an attacker do after successfully launching a man-in-the-middle attack?

Q: What four main elements can an attacker use to locate a wireless network?

Q: List the four transmission speeds available when using the 802.11b standard?

Q: List five needs are wireless networks are designed and installed to accommodate? (List five.)

Q: ____________________ software determines the location of a network, but it can also determine whether the network is an IBBS or ESS topology.

Q: ____________________ transmissions can be broadcast in a single direction or in all directions, using a LED to transmit and a photodiode to receive.

Q: The 802.11b standard uses _____________________________________________, which is a method for radiating a data-carrying signal over radio waves.

Q: 802.11a uses _____________________________________________ which functions by dividing the 5-GHz frequency range into a series of 52 subcarriers or subchannels.

Q: In CSMA/CA, a station waiting to transmit determines if the frequency is idle by checking the ___________________________________ level.

Q: In ____________________ access, the access point also functions as a point coordinator.

Q: Because a(n) ____________________ antenna radiates primarily in one direction, the signal goes farther from the source.

Q: A(n) ____________________is a device that sends out (radiates or transmits) and picks up (receives) radio waves.

Q: A limitation of ____________________ transmissions is that they are interrupted by tall land masses, such as hills and mountains.

Q: ____________________ are licensed by the FCC to transmit voice, Morse code, data, satellite, and video signals over radio waves and microwaves.

Q: Does the 802.11a wireless transmission standard operate in the 5-GHz range?

Q: In CSMA/CA, is the backoff time determined by multiplying a predetermined slot-time by a random number?

Q: Is priority-based access also called the distributed coordination function?

Q: Does the signal gain in an indoor network generally need to be as high as for an outdoor network?

Q: Does a directional antenna send radio waves in one main direction and generally amplify the radiated signal to a greater degree than an omnidirectional antenna?

Q: Is an access point usually a router or switch?

Q: Does the 802.11 standard focus on use of the physical and data-link layers (layers 1 and 2) of the OSI model?

Q: Are network signals transmitted over radio waves in a fashion similar to the way your local radio station broadcasts?

Q: Does Red Hat Linux 9.x support Bluetooth and offer the Bluetooth Setup Assistant, the Bluetooth Serial Utility, and the Bluetooth File Exchange tools?

Q: Does Mac OS X and Apples iMac, iBook, Powerbook G4, and Power Mac G4 computers come with built-in compatibility for 3COM WNICs and base stations (access points)?

Q: What type of wireless network topology is being displayed in the figure above?a. ESS b. IBSS c. 802.11Rd. SOS

Q: What type of antenna is being used in the figure above?a. Directional b. Omnidirectional c. Unidirectionald. Bidirectional

Q: What type of antenna is being used in the figure above?a. Directional b. Omnidirectional c. Unidirectionald. Bidirectional

Q: What type of device does an attacker use to determine the location of a target wireless network?a. Antenna b. GPS c. WNICd. War-driving software

Q: What is the distance that most Bluetooth devices can transmit?a. 30 feet b. 60 feet c. 100 feetd. 300 feet

Q: Which wireless roaming protocol generally conforms to the 802.11 standard?a. ESS b. IAPP c. IBSSd. IWAP

Q: What is the name of a wireless topology that uses two or more access points?a. Multiple-cell wireless LAN b. Multi access point LAN c. Multiple-cell wireless WANd. Multi access point WAN

Q: Which wireless network topology uses access points to provide a more extensive area of service?a. BSS b. ESS c. IBSSd. SES

Q: What is the maximum speed of transmission for directional 802.11R?a. 1 Mbps b. 16 Mbps c. 22 Mbpsd. 56 Mbps

Q: In which frequency range does 802.11R operate?a. 1 Ghz to 2 Ghz b. 2 Ghz to 5 Ghz c. 100 Ghz to 1000 Ghzd. 100 Ghz to 1000 Thz

Q: Which is the most expensive wireless standard to implement?a. 802.11b b. 802.11g c. 802.11ad. They are all about the same

Q: What is the maximum operating speed of the 802.11b standard?a. 11 Mbps b. 22 Mbps c. 56 Mbpsd. 54 Mbps

Q: Which wireless standard should be used when there are many individual users in a small area, such as in a computer lab?a. 802.11a b. 802.11g c. 802.11bd. Both a and ce. Both a and b

Q: What is the maximum distance that 802.11a devices can transmit?a. 60 feet b. 100 feet c. 300 feetd. 300 meters

Q: What is the width of each channel in the 802.11b standard?a. 2.4 Ghz b. 5 Ghz c. 22 Mhzd. 11 Mhz

Q: How many channels does the 802.11b standard use in France?a. 4 b. 6 c. 11d. 13

Q: How many channels does the 802.11b standard use in the United States and Canada?a. 4 b. 11 c. 13d. 15

Q: Which wireless standard usesDSSS?a. 802.11a b. 802.11b c. 802.11cd. 802.11g

Q: Which wireless standard uses OFDM?a. 802.11a b. 802.11g c. 802.11bd. Both a and be. Both b and c

Q: At what speed must all devices that conform to the 802.11a standard be able to transmit?a. 6 Mbps b. 12Mbps c. 24Mbpsd. All of the above

Q: Which of the following can interfere with wireless network communications?a. Solar flares b. Physical obstacles c. Weatherd. All of the above

Q: Which access method is incorporated into the 802.11 standard?a. Priority-based b. CSMA/CA c. CSMA/CDd. Both a and be. Both a and c

Q: The _____ certification means the device meets the standard for Wi-Fi.a. WICA b. WLANA c. WECAd. ISO

Q: What is the name of the device that attaches to a cabled network and services wireless communications between WNICs and the cabled network?a. Access hubb. Access switch c. Access pointd. Wireless router

Q: Which specification enables multiple protocols to be carried over a network, and allows the computer and the computer's operating system to interface with the WNIC?a. NDIS b. ODI c. RPCd. Both a and be. Both b and c

Q: On which layers of the OSI model does 802.11 focus?a. Physical and data-linkb. Data-link and network c. Physical onlyd. Data-link only

Q: What is the typical data rate of spread spectrum packet transmission?a. 1-11 Mbps b. 1-22 Mbps c. 1-100 Mbpsd. 1-54 Mbps

Q: Which radio frequency band is primarily used in older, nonstandardized wireless devices?a. 902 MHz b. 2.4 GHz c. 5 GHzd. 11 GHz

Q: Which organization is supported by wireless network device manufacturers and promoters, including Alvarion, Cisco Systems, ELAN, Intermec, Intersil, Raylink, and Wireless Central?a. WINLAB b. WLANA c. IEEEd. WNDMO

1 2 3 … 25 Next »

Subjects

Accounting Anthropology Archaeology Art History Banking Biology & Life Science Business Business Communication Business Development Business Ethics Business Law Chemistry Communication Computer Science Counseling Criminal Law Curriculum & Instruction Design Earth Science Economic Education Engineering Finance History & Theory Humanities Human Resource International Business Investments & Securities Journalism Law Management Marketing Medicine Medicine & Health Science Nursing Philosophy Physic Psychology Real Estate Science Social Science Sociology Special Education Speech Visual Arts
Links
  • Contact Us
  • Privacy
  • Term of Service
  • Copyright Inquiry
  • Sitemap
Business
  • Finance
  • Accounting
  • Marketing
  • Human Resource
  • Marketing
Education
  • Mathematic
  • Engineering
  • Nursing
  • Nursing
  • Tax Law
Social Science
  • Criminal Law
  • Philosophy
  • Psychology
  • Humanities
  • Speech

Copyright 2025 FinalQuiz.com. All Rights Reserved