Wireless Networking
A user swipes her smartphone across a tag on a poster to obtain showtimes for a movie she wants to see later that evening. What wireless technology transmitted the data?
NFC
The DHCP process starts with a(n) _____ on the network.
Broadcast
Unique physical characteristics of an individual, such as the color patterns in his iris or the geometry of his hand.
Biometrics
What command is used to show ip address info in command prompt
ipconfig
The first 802.11 standard to utilize the 5 GHz band was _____.
802.11a
A network with the subnet mask 255.255.255.0 would have a _____ CIDR block.
/24
An employee discovers six months after he starts work at a new company that he can still access his old company's servers. He accesses the folders to obtain the client lists to give to his new sales manager. This is a(n) _____ attack.
Insider
What type of cable used between a Router and Router
Crossover
The 802.11 wireless innovation that allows for the use of multiple antennas on an access point that can issue a signal to one or more receivers is _____.
MIMO
_____ allows subnets to be further subdivided into smaller and smaller groupings until each subnet is about the same size as the IP address space that is needed
VLSM
A(n) _____ explains to users what they can and cannot do while accessing network resources.
AUP - Acceptable Use Policy
What type of connection does a Console cable use?
Serial
A type of attack against Bluetooth connections that hackers use to send unsolicited data, or download data without permission is called _____.
Bluejacking
The last four blocks in an IPv6 address can identify the _____
Interface
A _____ is a decoy system that is purposely vulnerable for the sake of attracting attackers.
Honeypot
When configuring a cisco switch/router, what command enters you into Global Exec Mode
Configure
A _____ is a special signal that contains information that a wireless node requires in order to associate itself with an access point.
Beacon Frame
The IEEE standard _____ specifies how VLAN information appears in frames and how switches interpret that information.
802.1Q
A _____ virus is dormant until a specific condition occurs, such as the changing of a file or a match of the current date.
Logic Bomb
In a crossover cable, which pins are crossed?
1,2,3,6