Q1. This question requires that you evaluate the underlined text to determine if it is correct.
WEP wireless encryption is the most susceptible to interception and decryption.
Select the correct answer if the underlined text does not make the statement correct. Select 'No change is needed'' if the underlined text makes the statement correct
A. WPA-AES
B. WPA2
C. WPA-PSK
D. No change is needed
Answer: D
Q2. DRAG DROP
Match each protocol to its description.
To answer, drag the appropriate protocol from the column on the left to its description on the right. Each protocol may be used once, more than once, or not at all. Each correct match is worth one point.
Answer:
Q3. A router's static route is set by the:
A. Adjacent network
B. Next upstream router
C. Network administrator
D. Routing protocol
Answer: C
Q4. One advantage of dynamic routing is that it:
A. Automatically maintains routing tables.
B. Limits traffic derived from routing protocols.
C. Reduces broadcast traffic.
D. Automatically enables DHCP.
Answer: A
Q5. A network device that associates a Media Access Control (MAC) address with a port is a:
A. DSL modem
B. Hub
C. Router
D. Switch
Answer: D
Q6. Which type of port is used to support VLAN traffic between two switches?
A. Virtual port
B. WAN port
C. Trunk port
D. LAN port
Answer: C
Q7. Which metric does Routing Information Protocol (RJP) use to determine the least costly route?
A. Delay
B. Host ID
C. Hop count
D. Interface
Answer: A
Q8. Which two features of a Windows Server 2008 R2 server should you install to use that server as a software router? (Choose two.)
A. Network Policy and Access Services
B. Routing and Remote Access Services
C. Remote Administration
D. DirectAccess
Answer: A,B
Q9. HOTSPOT
For each of the following statements, select Yes if the statement is true. Otherwise, select No. Each correct selection is worth one point.
Answer:
Q10. You work at a coffee shop. Your supervisor asks you to help set up a computer network.
The network needs to have the following items:
A public facing web server
A Wi-Fi network for customers
A private network for the point of sale terminals
An office PC
A file/print server
A network printer
You need to set up a perimeter network to protect the network.
Which two items should you include in the perimeter network? (Choose two.)
A. Network printer
B. Web server
C. File server
D. Wi-Fi network
E. Point of sale terminals
Answer: A,B