
Setting up a Local Networks and Network Infrastructure
Quiz by willie reynolds
Feel free to use or edit a copy
includes Teacher and Student dashboards
Measure skillsfrom any curriculum
Measure skills
from any curriculum
Tag the questions with any skills you have. Your dashboard will track each student's mastery of each skill.
With a free account, teachers can
- edit the questions
- save a copy for later
- start a class game
- automatically assign follow-up activities based on students’ scores
- assign as homework
- share a link with colleagues
- print as a bubble sheet
19 questions
Show answers
- Q1You are tasked with configuring a wireless SOHO router for a customer. Which of the following settings will be the most secure with the least effort and cost to the customer?WPA2-PSK, TKIPWPA-PSK, TKIPWPA2-PSK, AESWPA2-Enterprise30s
- Q2Which of the following is a scenario in which an IT support technician would most likely be required to implement the alternate IP configuration method on a network host?To assign a secondary DNS server IP address to a specific network interface on the workstation.When a workstation requires that more than two different DNS server IP addresses be configured for a specific network interface.In the event a DHCP server is unavailable, the workstation will have a valid IP address on the subnet.To ensure a workstation receives the same IP address from the DHCP server each time the workstation is booted.30s
- Q3A manager in a small office is asking if it is possible to limit network access to a particular website during business hours. Apparently, several users are spending an excessive amount of time on the site preventing them from completing their work-related tasks. Which of the following is the best solution to accomplish the request from the manager while not limiting access to other websites?Configure a firewall with content filtering on the PCs of users who are visiting the site.Implement MAC filtering on the SOHO router for the PCs that are accessing the site.Configure a firewall and add the site the users are visiting to the whitelist.Implement a blacklist on the firewall and add the site the users are visiting.30s
- Q4A technician is configuring a new SOHO multifunction wireless router at a customer’s location to provide network access to several wireless devices. The technician is required to protect the customer’s private network from unauthorized access while performing the initial router setup as well as during normal operation after the configuration is completed. Which of the following is the best step for the technician to take in securing the router to meet this requirement?Disable the router’s radio in the wireless network settings.Configure MAC filtering on the router and allow access to only the technician’s computer.Change the router’s default administrative password.Enable DHCP on the router and configure IP address reservations for the wireless clients.30s
- Q5Which of the following wireless networking protocols uses LTE technology with a maximum speed of up to 1 Gbps?Fifth-generation cellularFifth-generation cellularThird-generation cellularFourth-generation cellular30s
- Q6A remote worker wants to connect his computer to his corporation’s private trusted network over the Internet. Which of the following will need to be configured?VPN tunnelFirewallDHCP serverAddress reservation30s
- Q7A client is requesting an Internet connection type that is not affected by atmospheric conditions and is always on. Which of the following will meet these requirements?Dial-upCableCellular hotspotSatellite30s
- Q8A group of wireless devices are using each other as relays to share a network connection across a large area. Which of the following network categories is being used?WMNWLANMANPAN30s
- Q9A corporate user is attempting to connect to the company’s Windows domain server on the local network with her new laptop through a wired connection. Which of the following is required for the user to successfully sign in to the Windows domain?SSID, authentication and encryption settingsA valid connection to a DHCP server on the LANWindows domain user name and passwordUser name and password supplied by the ISP30s
- Q10Your company received a call from a historical society inquiring about the possibility of networking a two-century-old building with no existing network. In 1924, someone added electrical outlets to the building, but the layout and design of the building prohibits adding any additional copper or fiber cable. You completed a wireless site survey and concluded that wireless networking is out of the question and will not properly function due to environmental interference. Which of the following could be used to network this building?PoENICEoPWAP30s
- Q11A server or service is responsible for sending the contents of cengage.com to your browser when you type cengage.com into the location bar. If this service is malfunctioning, your browser will display a page not found error. What server provides this service?File serverPrint ServerDNS serverWeb server30s
- Q12You are tasked with securing a small network for a client in which the following requirements must be met: • If a user on the private network attempts to send confidential company information to an unauthorized entity, an alert should be triggered. • The private trusted network should not be accessible from the public untrusted network. • If attacks are coming from the external network, the system should detect and prevent malicious activity. • All incoming and outgoing email should be scanned for malware. Which of the following would best meet the requirements of the client?Implement a firewall.Implement a UTM applianceImplement an IPSImplement identity-based ACLs30s
- Q13Which of the following is a function of an endpoint management server appliance?Scanning incoming and outgoing corporate email for spam, malware, and viruses.Restricting a device’s access to the network until security requirements are met.Filtering the web content delivered to users on the local area network.Providing authentication services for all network-connected devices.30s
- Q14A server provides the necessary IP configuration to your network host so the host can communicate on the network. If this service malfunctions, your device will not be able to utilize the network. What server provides this service?Syslog serverDNS ServerDHCP serverProxy server30s
- Q15Consider the following configuration. Computer “A” IP address: 172.16.100.100 Subnet mask: 255.255.0.0 Computer “B” IP address: 172.16.200.200 Subnet mask: /16 What should be done to allow these computers to send and receive data to and from each other?Nothing needs to be changed.A router must be configured and placed between the two computers.Remove the hub between the two computers and replace it with a switchDelete the subnet mask from each computer.30s