• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/25

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

25 Cards in this Set

  • Front
  • Back
The function of the NetBT protocol is to allow NetBIOS services to be used over TCP/IP networks.
True
Which of the protocols listed below is used for automated discovery of networked services on Local Area Networks (LANs)?
SLP
Which of the following answers refer(s) to file sharing network protocol(s)? (Select all that apply)

FTP


AFP

A network protocol providing an alternative solution to the manual assignment of IP addresses is called:
DHCP
LDAP is an example of:
Directory access protocol
A protocol used in network management systems for monitoring network-attached devices is known as:
SNMP
Server Message Block (SMB) and Common Internet File System (CIFS) are examples of network protocols used for providing shared access to files, directories, and devices.
True
Examples of secure network protocols offering traffic encryption include: (Select 3 answers)

HTTPS


IPsec


SSH

Which of the following answers refers to a cryptographic network protocol for secure data communication, remote command-line login, remote command execution, and other secure network services between two networked computers?
SSH
Which of the protocols listed below was designed as a secure replacement for Telnet?
SSH
Transmission Control Protocol (TCP) is an example of a connectionless protocol. TCP doesn't support three-way handshake (thus it is also referred to as unreliable or best-effort protocol).
False
User Datagram Protocol (UDP) is a connection-oriented protocol that requires a set of initial steps in order to establish connection (three-way handshake), supports retransmission of lost packets, flow control (managing the amount of data that is being sent), and sequencing (rearranging packets that arrived out of order).
False
Which of the answers listed below refer(s) to the characteristic feature(s) of the IEEE 802.11a wireless standard amendment? (Select all that apply)

Maximum data signaling rate of 54 Mbps


5.0 GHz frequency band


Carrier Sense Multiple Access / Collision Avoidance (CSMA/CA) network access method



Which of the following answers list(s) the feature(s) of the IEEE 802.11b wireless standard amendment? (Select all that apply)

2.4 GHz frequency range


Maximum data signaling rate of 11 Mbps


Carrier Sense Multiple Access / Collision Avoidance (CSMA/CA) network access method



What are the characteristics of the IEEE 802.11g wireless standard amendment? (Select all that apply)

Maximum data signaling rate of 54 Mbps


Carrier Sense Multiple Access / Collision Avoidance (CSMA/CA) network access method


2.4 GHz frequency range

The characteristic features of the IEEE 802.11n wireless standard amendment include: (Select all that apply)

Multiple Input / Multiple Output (MIMO)


2.4 GHz frequency band


5.0 GHz frequency band


Maximum data signaling rate of 600 Mbps


Carrier Sense Multiple Access / Collision Avoidance (CSMA/CA) network access method

Which of the following answers refers(s) to the feature(s) of the IEEE 802.11ac wireless standard amendment? (Select all that apply)

5.0 GHz frequency band


Carrier Sense Multiple Access / Collision Avoidance (CSMA/CA) network access method


Multi-User Multiple Input / Multiple Output (MU-MIMO)

Which of the wireless security standards listed below has been deprecated in favor of newer standards due to known vulnerabilities resulting from implementation flaws?
WEP
Which of the following wireless encryption schemes offers the highest level of protection?
WPA2
A security protocol introduced in order to strengthen existing WEP implementations without requiring the replacement of legacy hardware is known as:
TKIP
AES-based encryption mode is a characteristic feature of:
WPA2
A portion of the available Radio Frequency (RF) band allocated for wireless communication is known as:
Channel
A situation in which multiple channels share the frequency band causing interference and performance degradation for devices operating on channels that are too close to each other is known as:
Channel overlapping
A common example of channel overlapping in wireless networking would be the 2.4 GHz band used in 802.11, 802.11b, 802.11g, and 802.11n networks, where the 2.401 - 2.473 GHz frequency range is used for allocating 11 channels, each taking up a 22-MHz portion of the available spectrum. Setting up a wireless network to operate on a non-overlapping channel (1, 6, and 11 in this case) allows multiple networks to coexist in the same area without causing interference.
True
A server with private IP address has been set up to handle requests from an outside (public) network. Which of the solutions listed below would enable its function?
Port forwarding