Chapter 6
Wireless Networking

Chapter 8
Subnets and VLANs
Chapter 9
Network Risk Management
Lab
100

A user swipes her smartphone across a tag on a poster to obtain showtimes for a movie she wants to see later that evening. What wireless technology transmitted the data?

NFC

100

The DHCP process starts with a(n) _____ on the network.

Broadcast

100

Unique physical characteristics of an individual, such as the color patterns in his iris or the geometry of his hand.

Biometrics

100

What command is used to show ip address info in command prompt

ipconfig

200

The first 802.11 standard to utilize the 5 GHz band was _____.

802.11a

200

A network with the subnet mask 255.255.255.0 would have a _____ CIDR block.

/24

200

An employee discovers six months after he starts work at a new company that he can still access his old company's servers. He accesses the folders to obtain the client lists to give to his new sales manager. This is a(n) _____ attack.

Insider

200

What type of cable used between a Router and Router

Crossover

300

The 802.11 wireless innovation that allows for the use of multiple antennas on an access point that can issue a signal to one or more receivers is _____.

MIMO

300

_____ allows subnets to be further subdivided into smaller and smaller groupings until each subnet is about the same size as the IP address space that is needed

VLSM

300

A(n) _____ explains to users what they can and cannot do while accessing network resources.

AUP - Acceptable Use Policy

300

What type of connection does a Console cable use?

Serial 

400

A type of attack against Bluetooth connections that hackers use to send unsolicited data, or download data without permission is called _____.

Bluejacking

400

The last four blocks in an IPv6 address can identify the _____

Interface

400

A _____ is a decoy system that is purposely vulnerable for the sake of attracting attackers.

Honeypot

400

When configuring a cisco switch/router, what command enters you into Global Exec Mode

Configure

500

A _____ is a special signal that contains information that a wireless node requires in order to associate itself with an access point.



Beacon Frame

500

The IEEE standard _____ specifies how VLAN information appears in frames and how switches interpret that information.

802.1Q

500

A _____ virus is dormant until a specific condition occurs, such as the changing of a file or a match of the current date.

Logic Bomb

500

In a crossover cable, which pins are crossed?

1,2,3,6

M
e
n
u