Chapter 7 - 8
30 Questions
6 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

A company wants to ensure that its cloud infrastructure is secure as well as fully available. The company also wants to be alerted in the event of a security breach. Which of the following solutions will meet these requirements?

  • HTTP
  • WPAN
  • IDS (correct)
  • DMZ
  • Which of these is formed while sharing files via Bluetooth?

  • IrDA
  • Piconet (correct)
  • RFID
  • NFC
  • Susan, a technician, wants to set up a virtual private network for a small office. She also wants to ensure that the network traffic is routed to the correct machine. Which of these will she use on the router to accomplish this task?

  • Port forwarding (correct)
  • WoL
  • Software patch
  • QoS
  • You are running an 802.11g wireless router in mixed mode. You have three 802.11g wireless NICs using the router. A new user connects using an 802.11b wireless NIC. What will happen?

    <p>All users will access the network at 11 Mbps.</p> Signup and view all the answers

    Which of the following wireless technologies is most commonly used for inventory tracking and identification badges?

    <p>RFID</p> Signup and view all the answers

    When configuring a DNS server, administrators must create which of the following?

    <p>Zone file</p> Signup and view all the answers

    You are setting up a cloud contract with a provider. Your team needs the ability to quickly increase capacity to meet peak demands. What do you request?

    <p>Rapid elasticity</p> Signup and view all the answers

    Under ordinary situations, which of the following wireless standards offers the slowest transfer speed at a frequency of 2.4 GHz?

    <p>802.11b</p> Signup and view all the answers

    You have set up a wireless router on your network and configured it to use AES. What configuration option do you need to choose on the client computers?

    <p>WPA2</p> Signup and view all the answers

    Users in the uCorp organization usually connect to wireless APs and have a speed of 11 Mbps. Which of the following WLAN standards is in use in this organization?

    <p>802.11b</p> Signup and view all the answers

    Which of these is a point-to-point technology that uses directional antennas to send and receive network signals?

    <p>Long-range fixed wireless</p> Signup and view all the answers

    Which of the following server roles will an embedded appliance, such as a home router or network printer, use for its configuration interface?

    <p>Web</p> Signup and view all the answers

    Which of the following is a disadvantage of using DSL?

    <p>It requires more hardware than dial-up.</p> Signup and view all the answers

    Which of the following Internet appliances help protect against malicious email? Choose all that apply.

    <p>Spam gateway, Unified Threat management</p> Signup and view all the answers

    Which of the following technologies can operate in the 125 kHz to 134 kHz range?

    <p>RFID</p> Signup and view all the answers

    Mary, a network administrator, wants to block the availability of nonwork-type websites. Which type of server should she use for this purpose?t!

    <p>Proxy</p> Signup and view all the answers

    You are setting up a small office network for a client. Which Internet service would you recommend to provide the best speed?

    <p>Fiber</p> Signup and view all the answers

    Which Internet appliance is used to manage all security-related hardware and software through a single device or interface?

    <p>UTM</p> Signup and view all the answers

    What is the primary function of an SSID?!

    <p>To serve as a parameter used to identify a network and configure a wireless connection</p> Signup and view all the answers

    Which of these accomplishes communication by breaking the data into subsignals and transmitting them simultaneously?

    <p>OFDM</p> Signup and view all the answers

    Which of the following is a passive monitoring system designed to alert administrators when something suspicious happens but takes no action on its own?

    <p>IDS</p> Signup and view all the answers

    Your manager wants to use the cloud because everyone seems to be talking about it. What should you include when you are listing the benefits of using the cloud? Each correct answer represents a complete solution. Choose all that apply.

    <p>Lower cost, &amp; Improved reliability, &amp; increased scalability</p> Signup and view all the answers

    Which of the following functions are handled by print servers?

    <p>Making printers available on the network, &amp; accepting print requests</p> Signup and view all the answers

    Which of the following statements is true about a DHCP server?

    <p>It is configured with a scope, which contains the information that the server can provide to the clients.</p> Signup and view all the answers

    Which of the following wireless IEEE standards operate on the 2.4 GHz radio frequency and are directly compatible with each other?

    <p>802.11b &amp; 802.11g</p> Signup and view all the answers

    Which of these combines firewall and antivirus into one central management point?

    <p>UTM</p> Signup and view all the answers

    Maria, a network administrator, wants to use a server that can provide name resolution services for users accessing Internet resources. Which of the following servers offers this service?

    <p>DNS</p> Signup and view all the answers

    If a DNS server is unable to resolve a name, what will it do?

    <p>Query the root DNS server</p> Signup and view all the answers

    A technician is tasked to implement a wireless router that will have the fastest data transfer speed at 5 GHz frequency. Which of the following standards will the technician select?

    <p>802.11ac</p> Signup and view all the answers

    Jessie, a network administrator, wants to use a server that automatically assigns IP addresses to client stations logging in to a TCP/IP network. Which of the following servers will she use?

    <p>DHCP</p> Signup and view all the answers

    Study Notes

    Cloud Infrastructure and Security

    • A company can ensure cloud infrastructure security and full availability by implementing a solution that meets both requirements.
    • The company can also be alerted in the event of a security breach.

    Bluetooth and File Sharing

    • A PAN (Personal Area Network) is formed when sharing files via Bluetooth.

    Virtual Private Network (VPN)

    • A VPN is used to set up a virtual private network for a small office.
    • A VPN ensures that network traffic is routed to the correct machine.

    Wireless Network and Router

    • When an 802.11b wireless NIC connects to an 802.11g wireless router in mixed mode, the router will slow down to accommodate the 802.11b device.
    • AES encryption is used on a wireless router, and client computers need to choose the WPA2-PSK (AES) configuration option.

    Wireless Technologies and Standards

    • RFID (Radio Frequency Identification) is commonly used for inventory tracking and identification badges.
    • 802.11b offers the slowest transfer speed at a frequency of 2.4 GHz.
    • 802.11b WLAN standard is used when users connect to wireless APs at a speed of 11 Mbps.

    Wireless Technologies and Point-to-Point

    • Point-to-point technology uses directional antennas to send and receive network signals.
    • This technology is commonly used in satellite communications.

    Server Roles and Internet Appliances

    • An embedded appliance, such as a home router or network printer, uses an HTTP server for its configuration interface.
    • A spam filter is an Internet appliance that helps protect against malicious email.
    • A Unified Threat Management (UTM) appliance combines firewall and antivirus into one central management point.

    Network Administration and Security

    • A DNS server administrator must create a zone file.
    • A DNS server that is unable to resolve a name will forward the request to another DNS server.
    • A proxy server is used to block non-work-related websites.

    Cloud Computing and Benefits

    • The benefits of using the cloud include scalability, on-demand access, and cost savings.

    Internet Services and Speed

    • Fiber-optic Internet service provides the best speed for a small office network.
    • Print servers are responsible for managing printer access and print job queues.

    DHCP Server and Functions

    • A DHCP server dynamically assigns IP addresses to client stations logging in to a TCP/IP network.

    Wireless IEEE Standards and Compatibility

    • 802.11b, 802.11g, and 802.11n wireless IEEE standards operate on the 2.4 GHz radio frequency and are directly compatible with each other.

    Wireless Standards and Data Transfer Speed

    • 802.11a wireless standard operates at a 5 GHz frequency and has the fastest data transfer speed.
    • 802.11ac wireless standard can operate at a 5 GHz frequency and has a high data transfer speed.

    Studying That Suits You

    Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

    Quiz Team

    Description

    Quiz: Cloud Infrastructure Security and Availability Solutions Test your knowledge on cloud infrastructure security and availability solutions with this quiz. Learn about different solutions that can help ensure the security and availability of a company's cloud infrastructure, along with the ability to receive alerts in the event of a security breach. Can you identify the right solution from options such as HTTP, DMZ, IDS, and WPAN? Take the quiz to find out!

    Use Quizgecko on...
    Browser
    Browser