Netcad exam answer module 13-16
1. What is the purpose of a DMZ?
2. An administrator wants to configure a router so that users on the outside network can only establish HTTP connections to the internal web site. Which feature would the administrator configure to accomplish this?
3. What specialized network device is responsible for permitting or blocking traffic between networks?
4. Why should WEP not be used in wireless networks today?
5. What happens when a wireless access point is configured to stop broadcasting the SSID?
6. Which type of attack involves an attacker using a powerful computer to try a large number of possible passwords in rapid succession to gain access to a system?
7. What is a characteristic of a computer worm?
8. Which three attacks exploit human behavior? (Choose three.)
9. Which type of attack exploits human behavior to gain confidential information?
10. Which statement accurately characterizes the evolution of threats to network security?
11. Which three steps must be completed to manually connect an Android or IOS device to a secured wireless network? (Choose three.)
12. What technology allows users to access data anywhere and at any time?
13. Which cloud computing opportunity would provide the use of network hardware such as routers and switches for a particular company?
14. Which type of device provides an Internet connection through the use of a phone jack?
15. What are two types of wired high-speed Internet connections? (Choose two.)
16. Which feature is characteristic of MAC filtering in wireless networks?
17. What wireless router configuration would stop outsiders from using your home network?
18. What two IEEE 802.11 wireless standards operate only in the 5 GHz range? (Choose two.)
19. Which wireless RF band do IEEE 802.11b/g devices use?
20. What are three advantages of wireless over wired LAN technology? (Choose three.)
21. A student tells a teacher that many junk emails are appearing on a new personal laptop. What is a possible cause of the problem?
22. What is a common countermeasure for Trojan horses?
23. Which two business and technical challenges does implementing virtualization within a data center help businesses to overcome? (Choose two.)
24. What is CSMA/CA on a network?