Which of the following are characteristics of Bluetooth? (Select two.)
a. 5.75 GHz radio wireless
b. Ad hoc connections
c. 2.4 GHz radio wireless
b. Ad hoc connections
c. 2.4 GHz radio wireless
Which of the following provides security for wireless networks?
a. WAP
b. WPA2
b. WPA2
Multiple computers configured to be able to communicate and share information with each other form a ____________?
a. Network
b. Group
a. Network
A technician is tasked to prepare a conference room so that at least 20 guests will be able to wirelessly connect laptop computers to the company network. Which of the following network devices would be the BEST choice for this connectivity?
a. Access point
b. Switch
a. Access point
Which of the following is the best device to deploy to protect your private network from an untrusted public network?
a. Firewall
b. Router
a. Firewall
Which IEEE wireless standards specify transmission speeds up to 54 Mbps? (Select two.)
c. 802.11b
a. 802.11g
b. 802.11a
A network administrator wants to change the frequency of their wireless network to allow more channels that do not interfere with each other. Which of the following frequencies or protocols would accomplish this?
a. 2.4 GHz
b. 5 GHz
b. 5 GHz
The 5 GHz frequency provides the most channels that do not overlap. 2.4 GHz only has 3 channels that do not overlap
You are an IT technician for your company. Your boss has asked you to set up and configure a wireless network to service all of the conference rooms. Which of the following features lets you allow or reject client connections based on the hardware address?
a. SSID
b. MAC address filtering
b. MAC address filtering
MAC address filtering allows or rejects client connections based on the hardware address
Ben recently subscribed to a cable Internet provider. Which of the following devices is needed to convert the signal received on the coax cable to data that can be understood by a computer?
a. Router
b. Modem
b. Modem
Which of the following is used on a wireless network to identify the network name?
a. SSID
b. MAC address
a. SSID
Gary has finished installing a wireless router for his neighbor's small business. Which wireless standard should Gary use to support up to 150 Mbps on the 5 GHz band?
a. 802.11g
b. 802.11n
b. b. 802.11n
The 802.11n wireless standard supports a maximum transfer rate of 150 Mbps on the 5 GHz band.
Which of the following provides services to hosts on its network?
a. Client
b. Server
b. Server
You need to add security for your wireless network. You would like to use the most secure method. Which method should you implement?
a. WEP
b. WPA2
b. WPA2
A technician is checking a customer's wireless network performance and has determined it was using 802.11g. The technician's recommendation is for the customer to upgrade to 802.11ac. Which of the following is the BEST reason to upgrade?
a. Improved performance
b. Less attenuation
a. Improved performance
You have recently issued new mobile phones to the sales team in your company. Each phone has the ability to store and transmit encrypted information for such things as making payments at a checkout counter. Which of the following is the technology being used in these phones?
a. NFC chips
b. Infrared transmitters
a. NFC chips
Near field communications (NFC) chips are a wireless mobile technology that can be embedded in credit cards and smartphones for transmitting financial information when making payments
Which of the following features is supplied by WPA2 on a wireless network? (Select two.)
a. Identification of the network
b. Centralized access for clients
c. Authentication
d. Encryption
c. Authentication
d. Encryption
Which of the following components is NOT required to create a network?
a. Network interfaces
b. Wireless adapter
b. Wireless adapter
Which of the following is a wired networking method most commonly used today by desktop PCs and other network devices to connect to a local area network?
a. 802.11n
b. Ethernet
b. Ethernet
Which of the following is the best definition for a LAN?
a. An extension of a private network over a shared or public network, such as the Internet.
b. A network in a small geographic area, like in an office.
b. A network in a small geographic area, like in an office.
A small business named Widgets, Inc. has hired you to evaluate their wireless network security practices. As you analyze their facility, you note the following using a wireless network locator device.
Which of the following would you MOST likely recommend your client do to increase their wireless network security? (Select two.)
a. Configure the wireless network to use WPA with TKIP security.
b. Disable SSID broadcast.
c. Change the SSID to something other than the default.
You should recommend the following: