Wireless 1
Wireless 2
Security 1
Security 2
Misc.
100

Which wireless standard can stream data at a rate of up to 54 Mbps using a frequency of 5 GHz? 

a. 802.11a

b. 802.11b

c. 802.11n

d. 802.11g

a. 802.11a

100

A user pays for a retail purchase by placing a smart phone next to the merchant's reader. Which of the following mobile device connections is being used?


a. MicroUSB

b. Bluetooth

c. NFC

d. Lightning 


c. NFC

100

What is one major concerns regarding IoT devices?

a. Availability

b. Accessibility

c. Privacy

d. Short lifespan 


 

c. Privacy

100

A small company hires a technician to review their wireless security. The technician discovers that the wireless signal is available outside of the building. Which of the following could the technician recommend to correct this problem? 

a. Disable SSID broadcast.

b. Update firmware.

c. Enable MAC filtering.

d. Implement a directional antennae.


d. Implement a directional antennae.

100

A user can't make an RDP connection from outside the network to a server inside the network. Which network device will a network administrator MOST likely configure to allow this connection?

a. Proxy Server

b. VPN

c. Firewall

d. Anti-Virus Software

c. Firewall

200

Which wireless standard can stream data at a rate of up to 11 Mbps using a frequency of 2.4 GHz? 

a. 802.11a

b. 802.11b

c. 802.11n

d. 802.11g

b. 802.11b

200

Which of the following is a characteristic of Bluetooth?

a. 2.4 GHz radio wireless

b. Line-of-sight transmission

c. 5.75 GHz radio wireless

d. Red spectrum light waves


 

a. 2.4 GHz radio wireless

200

A technician receives notification from a SOHO router manufacturer of a specific vulnerability that allows attackers to exploit SNMP traps to take over the router. Which of the following actions should the technician take NEXT? 

a. Disable DHCP.

b. Check for and apply firmware updates.

c. Enable content filtering.

d. Enable MAC filtering.


b. Check for and apply firmware updates.

200

Which of the following describes a feature of a network-based firewall? 

a. Works with a single network interface.

b. Inspects traffic received by a specific host.

c. Inspects traffic as it flows between networks.

d. Is executed directly on the servers that need to be protected. 


c. Inspects traffic as it flows between networks.

200

You would like to control internet access based on users, time of day, and websites visited. Which of the following actions would BEST meet your criteria?

a. Configure internet zones using Internet Options. 

b. Install a proxy server. Allow internet access only through the proxy server.

c. Configure a packet-filtering firewall. Add rules to allow or deny access based on time of day and content. 

d. Configure the Local Security Policy of each system to add access restrictions based on time of day and content.  

b. Install a proxy server. Allow internet access only through the proxy server.

300

Your client needs the network to support a data rate of at least 150 Mbps.Tthe client already has a wireless telephone system installed that operates 2.4 GHz. Which 802.11 standard will work best in this situation?

a. 802.11a

b. 802.11b

c. 802.11n

d. 802.11g


c. 802.11n

300

What are the two protocols used most often with IoT devices? 

a. Zerg and Z-Wave 

b. Z-Wave and Zigbee

c. Zigbee and Zerg

d. Zensys and Zerg


b. Z-Wave and Zigbee

300

A technician is installing a SOHO router at an after-school community center. The customer would like to keep children from accessing inappropriate while browsing the web. Which of the following actions would help accomplish this goal?

a. Update firmware

b. Disable SSID broadcast

c. Disable DHCP

d. Enable content filtering


d. Enable content filtering

300

Which of the following is a firewall function? 

a. Encrypting 

b. Packet Filtering

c. Packet rearranging 

d. Protocol converting 

b. Packet Filtering

300

You are configuring a network firewall to allow SMTP outbound email traffic and POP3 inbound email traffic. Which of the following IP ports should you open on the firewall? 

a. 80 & 443

b. 25 & 110

c. 67 & 68

d. 21 & 22

b. 25 & 110

400

Which type of configuration would you use if you wanted to deploy 802.11n technology to communicate directly between two computers using a wireless connection?

a. Ad hoc

b. WAP

c. Infrastructure

d. WEP


a. Ad hoc

400

Which of the following features lets you allow or reject client connections by hardware address? 

a.  DHCP

b. MAC address filtering

c. WEP

d. Disable SSID


b. MAC address filtering

400

Which of the following is the FIRST thing the technician should do to secure the router? 

a. Disable SSID broadcast

b. Adjust the radio power levels

c. Change the router's default password

d. Press the WPS button

c. Change the router's default password

400

Which of the following UTM security features is not available with an IDS or IPS? 

a. Intrusion prevention

b. Anomaly logs and alerts

c. Intrusion detection

d. Email and antispam filtering


d. Email and antispam filtering

400

Which of the following protocols provides authentication and encryption services for VPN traffic? 

a. L2TP

b. SSL

c. IPsec

d. SSL

c. IPsec

500

Which of the following options will provide the most secure wireless access?

a. WEP 128

b. WPA and AES

c. WPA2 and AES

d. WPA


 

c. WPA2 and AES

500

Which of the following is used on a wireless network to identify the network name? 

a. Router Name

b. Domain Name

c. Network Name

d. SSID

d. SSID

500

You want to configure your computer so that a password is required before the operating system will load. What should you do?

a. Configure chassis instruction detection.

b. Configure a user password in the BIOS/UEFI.

c. Require complex passwords in the local security policy. 

d. Configure an administrator password in the BIOS/UEFI. 


b. Configure a user password in the BIOS/UEFI.

500

To access your company's internal network from home, you use Secure Shell (SSH). The administrator has recently implemented a new firewall at the network perimeter and disabled as many ports as possible. Which port needs to remain open so you can still work from home?

a. 22

b. 443

c. 23

d. 53

a. 22

500

Which of the following techniques are used in a pharming attack to redirect legitimate web traffic to malicious websites? 

a. Man-in-the-middle attack

b. pop-ups

c. Changing the hosts file of a user's computer

d. Search engine results poisoning  

c. Changing the hosts file of a user's computer