Term
Wireless Network, data is transmitted via?
A.WIFI
B.Microwave
C.Smoke signals
D.Radio Waves |
|
Definition
|
|
Term
Wireless Connection Speeds are?
A.10&48Mbps
B.11&54Mbps
C.10&64Mbps
D.11&64Mbps |
|
Definition
|
|
Term
If Two APs reply to the probe, the laptop will use whichever has the___ Signal.
A. Stronger
B. Weaker
C. More Secure
D. None of the above |
|
Definition
|
|
Term
A wireless network begins with an?
a. network point
b. wireless starting point
c. access point
d. both a. and b. |
|
Definition
|
|
Term
Which one is a wireless networks?
a. IEEE 802.10 b/a/g/n
b. IEEE 802.11 b/a/g/n
c. IAEE 802.11 a/b/c/g
d. IEEE 803.11 a/b/c/g |
|
Definition
|
|
Term
true / false
An AP includes a radio transmitter and receiver and long range satellite transmitter and receiver. |
|
Definition
False
An AP includes only radio transmitter and receiver |
|
|
Term
The other wireless nodes in a network are called?
a. customer/wireless AP
b. clients/stations
c. access point/clients
d. can be both a. and b. |
|
Definition
|
|
Term
When a PC or laptop connects to a network, it broadcasts a probe request identifying itself and asking if an other wireless devices are within range That wireless range covers a ________ radius.
a. 25ft to 125ft radius
b. 25ft to 160ft radius
c. 25ft to 54ft radius
d. 25ft to 100ft radius |
|
Definition
|
|
Term
true / false
On a wireless network the range is a factor of frequencies transmitter signal strenghts only. |
|
Definition
false
It also includes the Sensitivity of the receivers. |
|
|
Term
true / false
If a AP within range picks up the probe request, the AP broadcests and acknowledgement and the two go through whatever security or payment arrangements the network has set up. |
|
Definition
|
|
Term
A wireless network can be extend beyond the range of a routers, provided there are occasional _______ that pick up fading ccommunications to and from access points and rebroadcast the signals with renewed strength.
a. flash points
b. hot points
c. rebroadcast points
d. extension points |
|
Definition
|
|
Term
This is a term uses for areas where wireless networks are open the public
a. MAN b. Hotspots c. WAN d. WPA |
|
Definition
|
|
Term
This device contains a transmitter and receiver and operates in either 2.4GHz or 5GHz radio band
a. AP b. switch c. hub d. gateway |
|
Definition
|
|
Term
What is the maximum transfer speed of a wired network?
a. 150 Mbps b. 100 Mbps c. 54 Mbps d. 11 Mbps |
|
Definition
|
|
Term
Refers to how quickly computers on a network can communicate and share information
a. Powerboost b. Operating System c. Network range d. Network speed |
|
Definition
|
|
Term
If you have cust. that's having a problem with their wireless network speeds, what would be the one place you would recommend not putting the router in their house.
a. family room
b. office
c. ensure that the wireless card and router anttenna are pointing toward each other
d. next to a outside wall
|
|
Definition
d. next to a outside wall |
|
|
Term
What wireless technology is backwards compatible to b/a/g, operates in 2.4GHz and 5GHz radio frequency and has a data speed of 160-300+Mbps and distance rating of 160-300+ft?
a. 802.11n b. 802.1x c. 802.11f d. 802.12n |
|
Definition
|
|
Term
What wireless standard operates in 2.4GHz radio frequency, with data rates of up to 54Mbps, and a distance range of 100-150ft range and is compatible with 802.11b?
a. 802.11a b. 802.1x c. 802.11g d. 802.11n |
|
Definition
|
|
Term
What wireless standard uses 5GHz radio band, with data speeds of up to 54Mbps, distance range from 25-75 ft, and is commonly used in offices?
a. 802.11n b. 802.11a c. 802.12a d. 802.11b |
|
Definition
|
|
Term
What wireless standard uses 2.4GHz radio band, with a distance range from 100-150 ft, and data rates of up to 11Mbps?
a. 802.11a b. 802.11g c. 802.12b d. 802.11b |
|
Definition
|
|
Term
What are the eight common network security threats? |
|
Definition
1.Virus 2.Spyware 3.Adware 4.SPAM 5.Hackers 6.Hijacking 7.Phishing 8.Cookies |
|
|
Term
What are the four main types of viruses?
a. executable, email, worms, trojan horse b. Spam, email, worms, trojan horse c. Executable, Pop ups, worms, trojan horse d. Replication, event watching, camouflage, delivery d. executable, email, worms, pop-up
|
|
Definition
a. executable, email, worms, trojan horse |
|
|
Term
What are the four actions of a virus?
a. spyware, popups, spam, trojan horse b. replication, event watching, camouflage, delivery c. executable, email, worms, trojan horse d. none of the above |
|
Definition
b. replication, event watching, camouflage, delivery |
|
|
Term
When a virus inserts itself into other programs and files, this action is known as________?
a. event watching b. delivery c. replication d. camouflage |
|
Definition
|
|
Term
When a virus checks for conditions, usually a specific date. Whenever the triggering condition exists, the
virus delivers its destructive payload, this action is known as______?
a. event watching b. camouflage c. replication d. delivery |
|
Definition
|
|
Term
What is the action called when a virus disguises itself to avoid detection?
a. replication b. delivery c. event watching d. camouflage |
|
Definition
|
|
Term
What is the action called when a triggering condition is met , the virus unleashes its payload?
a. replication b. delivery c. camouflage d. event watching |
|
Definition
|
|
Term
What is the device that filters out intrusions by shutting down non-essential ports?
a. switch b. gateway c. anti-spyware software d. firewall |
|
Definition
|
|
Term
What are the three types of firewall rules?
a. packet filetring, proxy, stateful inspection b. port triggering, port forwarding, port blocking c. packet filtering, port triggering, port blocking d. packet filtering, port forwarding, port triggering |
|
Definition
a. packet filetring, proxy, stateful inspection |
|
|
Term
Looks for sections of the code triggered by(1) time or date events routines to search for (2)files formatted in .exe, .vbs, .bat. as well as, (3)disk writes that bypass the operation system.
a. spam b. virus c. heuristic detectors d. hackers |
|
Definition
|
|
Term
What is a program that sends information about the user and sends the data to marketers and advertisers?
a. virus b. spyware c. spam d. pop ups |
|
Definition
|
|
Term
What are the some ways in preventing spyware?
a. spyware scanner, pop up blocker, and disable Active-X b. spyware scanner, hire a hacker, pop up blocker c. be suspicious of installing new software, and use the "X" to close out new software d. both a. and c.
|
|
Definition
d. both a. and c.
a. spyware scanner, pop up blocker, and disable Active-X
c. be suspicious of installing new software, and use the "X" to close out new software
|
|
|
Term
This type of virus piggybacks on real programs
- a. worms
- b. trojan horse
- c. executable
- d. spyware
|
|
Definition
|
|
Term
This type of virus replicates itself then automatically mails itself to the victim's global address lists
a. spyware b. pop ups c. trojan horse d. email virus |
|
Definition
|
|
Term
This type of virus uses computer networks and security holes to replicate itself
a. spam b. worms c. pop ups d. spyware |
|
Definition
|
|
Term
This type of virus claims to be one thing and unleashes its payload when ran
a. trojan horse b. email virus c. pop ups d. worms |
|
Definition
|
|
Term
This individuals exploit weaknesses in a network or computer then gains unauthorized access for malicious intent
a. IT guy b. person seating next to you c. hackers d. crackers |
|
Definition
|
|
Term
How do you end a continuous ping?
- a. type stop
- b. -t
- c. control+c
- d. control+s
|
|
Definition
|
|
Term
A _______ __ Uses an antenna-equipped expansion card or a USB antenna attachment.
A. LAPTOP PC
B. GATEWAY
C. DESKTOP PC
D. ROUTER
|
|
Definition
|
|
Term
What is one of the reasons why 2.4 GHz is a commonly used frequency?
A. It is unregulated
B. IT'S Regulated by FCC
C. it's the most unused Feq. band
D. because only wireless phone uses it
|
|
Definition
|
|
Term
What is the frequency used by 802.11a to transfer data, and what is the Range?
a. 2.4GHz 25-75feet
b. 2.6GHz 100-150feet
c. 5GHz 25-75feet
d. 5GHz up to 160feet
|
|
Definition
|
|
Term
The range of 802.11b and g?
a. 25-75 feet
b. up to 160 feet
c. 100-150 feet
d. 360 - 390 feet
|
|
Definition
|
|
Term
True or False
Antivirus software and Firewalls
help block spyware installed with a download you ask for
|
|
Definition
|
|
Term
true / false
Wireless 802.11g is compatible with wireless standards on A, B, and G. |
|
Definition
|
|
Term
true or false
In wireless bandwidth 802.11, 2.4GHz is already crowded with cell phone freq. |
|
Definition
false
2.4GHz is croweded with cordless phones freq. |
|
|
Term
Speeds for wireless networks are?
a. 802.11a/b/g is 54Mbps, 802.11n is 100Mbps
b. 802.11a/b is 11Mbps, 802.11g 54Mbps, 802.11n is 100Mps
c. 801.11a/g is 54Mbps, 801.11b is 11Mbps, 801.11n is 100Mbps
d. 802.11a/g is 54Mbps, 802.11b is 11Mbps, 802.11n is 100Mbps |
|
Definition
d. 802.11a/g is 54Mbps, 802.11b is 11Mbps, 802.11n is 100Mbps |
|
|
Term
A virus detector that look of sections of code triggered by a time or date events, file extensions, or disk writes that bypass the operating system.
a. Spyware
b. heuristic detectors
c. adware
d. firewall
|
|
Definition
|
|
Term
What are the three main types of firewall rules?
a. Packet filtering, Packet blocking, hacker blocking
b. MAC filtering, MAC blocking, Packet filtering
c. packet filtering, Proxy, Stateful inspection
d. Packet blocking, MAC blocking, Proxy
|
|
Definition
c. packet filtering, Proxy, Stateful inspection |
|
|
Term
The firewall compares key parts of each packet to database of known safe data. This called what?
a. stateful inspection
b. packet filtering
c.restful inspection
d. proxy
|
|
Definition
|
|
Term
The frewall examines each packet and if the origination address of the data is on a list a of banded Internet locations, and the firewall blocks it.
a. Proxy
b. restful inspection
c. packet filtering
d. IT Proxy |
|
Definition
|
|
Term
The server examines all data based on the filtering rules and only forwards packets that obey the rules. If a dangerous transmission manages to sneak past the filters.
a. stateful inspection
b. Proxy
c. IT Proxy
d. Packet filtering |
|
Definition
|
|
Term
RAM stand for what.
a. Random Access Memory
b. Ram Access Memory
c. Read-only Access Memory
d. Random Acounting Memory |
|
Definition
|
|
Term
ROM stand for what?
a. Random Only Memory
b. Random On Memory
c. Read Only Memory
d. Random Only Memory |
|
Definition
|
|
Term
A Cust. get a blue screen errors that display the words ____ ____ along with a cryptic set of hexadecimal addresses. What just happen to the Cust. Opearating System.
a. Stop errors
b. IRQ errors
c. Memory Dump
d. Memory Errors |
|
Definition
|
|
Term
A Cust. Computer with the XP version of Windows is getting errors on startup and can have numerous causes, which indicate problems with a device or driver. These errors are called what.
a. Stop errors
b. IRQ errors
c. Memory Dump
d. Memory Errors
|
|
Definition
|
|
Term
UDP stands for what
a. Upper Data Protocol
b. Upper datagram Plant
c. User Datagram Protocol
d. Upper Dated Protocol |
|
Definition
|
|
Term
The CHSI minimum requirement for memory
a. 512 MB
b. 1000 MB
c. 256 MB
d. 1 GB
|
|
Definition
|
|
Term
What does USB stand for?
a. Universal Serial Bus
b. User Serial Bus
c. User Server Bus
d. User Side Bar |
|
Definition
|
|
Term
true / false
PCMCIA stand for Personal Computer Memory Card International Association |
|
Definition
|
|
Term
If a cust. gets the following after send an e-mail "SMTP 550" what does it mean?
a. email sent over a non-secure network
b. email doesn't have a addressee
c. addressees not found
d. email sent no problem found |
|
Definition
c. addressees not found
A bad email address that bounces back to the sender
aka: a bounce message |
|
|