Podcast
Questions and Answers
A company wants to ensure that its cloud infrastructure is secure as well as fully available. The company also wants to be alerted in the event of a security breach. Which of the following solutions will meet these requirements?
A company wants to ensure that its cloud infrastructure is secure as well as fully available. The company also wants to be alerted in the event of a security breach. Which of the following solutions will meet these requirements?
Which of these is formed while sharing files via Bluetooth?
Which of these is formed while sharing files via Bluetooth?
Susan, a technician, wants to set up a virtual private network for a small office. She also wants to ensure that the network traffic is routed to the correct machine. Which of these will she use on the router to accomplish this task?
Susan, a technician, wants to set up a virtual private network for a small office. She also wants to ensure that the network traffic is routed to the correct machine. Which of these will she use on the router to accomplish this task?
You are running an 802.11g wireless router in mixed mode. You have three 802.11g wireless NICs using the router. A new user connects using an 802.11b wireless NIC. What will happen?
You are running an 802.11g wireless router in mixed mode. You have three 802.11g wireless NICs using the router. A new user connects using an 802.11b wireless NIC. What will happen?
Signup and view all the answers
Which of the following wireless technologies is most commonly used for inventory tracking and identification badges?
Which of the following wireless technologies is most commonly used for inventory tracking and identification badges?
Signup and view all the answers
When configuring a DNS server, administrators must create which of the following?
When configuring a DNS server, administrators must create which of the following?
Signup and view all the answers
You are setting up a cloud contract with a provider. Your team needs the ability to quickly increase capacity to meet peak demands. What do you request?
You are setting up a cloud contract with a provider. Your team needs the ability to quickly increase capacity to meet peak demands. What do you request?
Signup and view all the answers
Under ordinary situations, which of the following wireless standards offers the slowest transfer speed at a frequency of 2.4 GHz?
Under ordinary situations, which of the following wireless standards offers the slowest transfer speed at a frequency of 2.4 GHz?
Signup and view all the answers
You have set up a wireless router on your network and configured it to use AES. What configuration option do you need to choose on the client computers?
You have set up a wireless router on your network and configured it to use AES. What configuration option do you need to choose on the client computers?
Signup and view all the answers
Users in the uCorp organization usually connect to wireless APs and have a speed of 11 Mbps. Which of the following WLAN standards is in use in this organization?
Users in the uCorp organization usually connect to wireless APs and have a speed of 11 Mbps. Which of the following WLAN standards is in use in this organization?
Signup and view all the answers
Which of these is a point-to-point technology that uses directional antennas to send and receive network signals?
Which of these is a point-to-point technology that uses directional antennas to send and receive network signals?
Signup and view all the answers
Which of the following server roles will an embedded appliance, such as a home router or network printer, use for its configuration interface?
Which of the following server roles will an embedded appliance, such as a home router or network printer, use for its configuration interface?
Signup and view all the answers
Which of the following is a disadvantage of using DSL?
Which of the following is a disadvantage of using DSL?
Signup and view all the answers
Which of the following Internet appliances help protect against malicious email? Choose all that apply.
Which of the following Internet appliances help protect against malicious email? Choose all that apply.
Signup and view all the answers
Which of the following technologies can operate in the 125 kHz to 134 kHz range?
Which of the following technologies can operate in the 125 kHz to 134 kHz range?
Signup and view all the answers
Mary, a network administrator, wants to block the availability of nonwork-type websites. Which type of server should she use for this purpose?t!
Mary, a network administrator, wants to block the availability of nonwork-type websites. Which type of server should she use for this purpose?t!
Signup and view all the answers
You are setting up a small office network for a client. Which Internet service would you recommend to provide the best speed?
You are setting up a small office network for a client. Which Internet service would you recommend to provide the best speed?
Signup and view all the answers
Which Internet appliance is used to manage all security-related hardware and software through a single device or interface?
Which Internet appliance is used to manage all security-related hardware and software through a single device or interface?
Signup and view all the answers
What is the primary function of an SSID?!
What is the primary function of an SSID?!
Signup and view all the answers
Which of these accomplishes communication by breaking the data into subsignals and transmitting them simultaneously?
Which of these accomplishes communication by breaking the data into subsignals and transmitting them simultaneously?
Signup and view all the answers
Which of the following is a passive monitoring system designed to alert administrators when something suspicious happens but takes no action on its own?
Which of the following is a passive monitoring system designed to alert administrators when something suspicious happens but takes no action on its own?
Signup and view all the answers
Your manager wants to use the cloud because everyone seems to be talking about it. What should you include when you are listing the benefits of using the cloud? Each correct answer represents a complete solution. Choose all that apply.
Your manager wants to use the cloud because everyone seems to be talking about it. What should you include when you are listing the benefits of using the cloud? Each correct answer represents a complete solution. Choose all that apply.
Signup and view all the answers
Which of the following functions are handled by print servers?
Which of the following functions are handled by print servers?
Signup and view all the answers
Which of the following statements is true about a DHCP server?
Which of the following statements is true about a DHCP server?
Signup and view all the answers
Which of the following wireless IEEE standards operate on the 2.4 GHz radio frequency and are directly compatible with each other?
Which of the following wireless IEEE standards operate on the 2.4 GHz radio frequency and are directly compatible with each other?
Signup and view all the answers
Which of these combines firewall and antivirus into one central management point?
Which of these combines firewall and antivirus into one central management point?
Signup and view all the answers
Maria, a network administrator, wants to use a server that can provide name resolution services for users accessing Internet resources. Which of the following servers offers this service?
Maria, a network administrator, wants to use a server that can provide name resolution services for users accessing Internet resources. Which of the following servers offers this service?
Signup and view all the answers
If a DNS server is unable to resolve a name, what will it do?
If a DNS server is unable to resolve a name, what will it do?
Signup and view all the answers
A technician is tasked to implement a wireless router that will have the fastest data transfer speed at 5 GHz frequency. Which of the following standards will the technician select?
A technician is tasked to implement a wireless router that will have the fastest data transfer speed at 5 GHz frequency. Which of the following standards will the technician select?
Signup and view all the answers
Jessie, a network administrator, wants to use a server that automatically assigns IP addresses to client stations logging in to a TCP/IP network. Which of the following servers will she use?
Jessie, a network administrator, wants to use a server that automatically assigns IP addresses to client stations logging in to a TCP/IP network. Which of the following servers will she use?
Signup and view all the answers
Study Notes
Cloud Infrastructure and Security
- A company can ensure cloud infrastructure security and full availability by implementing a solution that meets both requirements.
- The company can also be alerted in the event of a security breach.
Bluetooth and File Sharing
- A PAN (Personal Area Network) is formed when sharing files via Bluetooth.
Virtual Private Network (VPN)
- A VPN is used to set up a virtual private network for a small office.
- A VPN ensures that network traffic is routed to the correct machine.
Wireless Network and Router
- When an 802.11b wireless NIC connects to an 802.11g wireless router in mixed mode, the router will slow down to accommodate the 802.11b device.
- AES encryption is used on a wireless router, and client computers need to choose the WPA2-PSK (AES) configuration option.
Wireless Technologies and Standards
- RFID (Radio Frequency Identification) is commonly used for inventory tracking and identification badges.
- 802.11b offers the slowest transfer speed at a frequency of 2.4 GHz.
- 802.11b WLAN standard is used when users connect to wireless APs at a speed of 11 Mbps.
Wireless Technologies and Point-to-Point
- Point-to-point technology uses directional antennas to send and receive network signals.
- This technology is commonly used in satellite communications.
Server Roles and Internet Appliances
- An embedded appliance, such as a home router or network printer, uses an HTTP server for its configuration interface.
- A spam filter is an Internet appliance that helps protect against malicious email.
- A Unified Threat Management (UTM) appliance combines firewall and antivirus into one central management point.
Network Administration and Security
- A DNS server administrator must create a zone file.
- A DNS server that is unable to resolve a name will forward the request to another DNS server.
- A proxy server is used to block non-work-related websites.
Cloud Computing and Benefits
- The benefits of using the cloud include scalability, on-demand access, and cost savings.
Internet Services and Speed
- Fiber-optic Internet service provides the best speed for a small office network.
Print Servers and Functions
- Print servers are responsible for managing printer access and print job queues.
DHCP Server and Functions
- A DHCP server dynamically assigns IP addresses to client stations logging in to a TCP/IP network.
Wireless IEEE Standards and Compatibility
- 802.11b, 802.11g, and 802.11n wireless IEEE standards operate on the 2.4 GHz radio frequency and are directly compatible with each other.
Wireless Standards and Data Transfer Speed
- 802.11a wireless standard operates at a 5 GHz frequency and has the fastest data transfer speed.
- 802.11ac wireless standard can operate at a 5 GHz frequency and has a high data transfer speed.
Studying That Suits You
Use AI to generate personalized quizzes and flashcards to suit your learning preferences.
Description
Quiz: Cloud Infrastructure Security and Availability Solutions Test your knowledge on cloud infrastructure security and availability solutions with this quiz. Learn about different solutions that can help ensure the security and availability of a company's cloud infrastructure, along with the ability to receive alerts in the event of a security breach. Can you identify the right solution from options such as HTTP, DMZ, IDS, and WPAN? Take the quiz to find out!