placeholder image to represent content

Setting up a Local Networks and Network Infrastructure

Quiz by willie reynolds

Our brand new solo games combine with your quiz, on the same screen

Correct quiz answers unlock more play!

New Quizalize solo game modes
19 questions
Show answers
  • Q1
    You are tasked with configuring a wireless SOHO router for a customer. Which of the following settings will be the most secure with the least effort and cost to the customer?
    WPA2-PSK, TKIP
    WPA-PSK, TKIP
    WPA2-PSK, AES
    WPA2-Enterprise
    30s
  • Q2
    Which of the following is a scenario in which an IT support technician would most likely be required to implement the alternate IP configuration method on a network host?
    To assign a secondary DNS server IP address to a specific network interface on the workstation.
    When a workstation requires that more than two different DNS server IP addresses be configured for a specific network interface.
    In the event a DHCP server is unavailable, the workstation will have a valid IP address on the subnet.
    To ensure a workstation receives the same IP address from the DHCP server each time the workstation is booted.
    30s
  • Q3
    A manager in a small office is asking if it is possible to limit network access to a particular website during business hours. Apparently, several users are spending an excessive amount of time on the site preventing them from completing their work-related tasks. Which of the following is the best solution to accomplish the request from the manager while not limiting access to other websites?
    Configure a firewall with content filtering on the PCs of users who are visiting the site.
    Implement MAC filtering on the SOHO router for the PCs that are accessing the site.
    Configure a firewall and add the site the users are visiting to the whitelist.
    Implement a blacklist on the firewall and add the site the users are visiting.
    30s
  • Q4
    A technician is configuring a new SOHO multifunction wireless router at a customer’s location to provide network access to several wireless devices. The technician is required to protect the customer’s private network from unauthorized access while performing the initial router setup as well as during normal operation after the configuration is completed. Which of the following is the best step for the technician to take in securing the router to meet this requirement?
    Disable the router’s radio in the wireless network settings.
    Configure MAC filtering on the router and allow access to only the technician’s computer.
    Change the router’s default administrative password.
    Enable DHCP on the router and configure IP address reservations for the wireless clients.
    30s
  • Q5
    Which of the following wireless networking protocols uses LTE technology with a maximum speed of up to 1 Gbps?
    Fifth-generation cellular
    Fifth-generation cellular
    Third-generation cellular
    Fourth-generation cellular
    30s
  • Q6
    A remote worker wants to connect his computer to his corporation’s private trusted network over the Internet. Which of the following will need to be configured?
    VPN tunnel
    Firewall
    DHCP server
    Address reservation
    30s
  • Q7
    A client is requesting an Internet connection type that is not affected by atmospheric conditions and is always on. Which of the following will meet these requirements?
    Dial-up
    Cable
    Cellular hotspot
    Satellite
    30s
  • Q8
    A group of wireless devices are using each other as relays to share a network connection across a large area. Which of the following network categories is being used?
    WMN
    WLAN
    MAN
    PAN
    30s
  • Q9
    A corporate user is attempting to connect to the company’s Windows domain server on the local network with her new laptop through a wired connection. Which of the following is required for the user to successfully sign in to the Windows domain?
    SSID, authentication and encryption settings
    A valid connection to a DHCP server on the LAN
    Windows domain user name and password
    User name and password supplied by the ISP
    30s
  • Q10
    Your company received a call from a historical society inquiring about the possibility of networking a two-century-old building with no existing network. In 1924, someone added electrical outlets to the building, but the layout and design of the building prohibits adding any additional copper or fiber cable. You completed a wireless site survey and concluded that wireless networking is out of the question and will not properly function due to environmental interference. Which of the following could be used to network this building?
    PoE
    NIC
    EoP
    WAP
    30s
  • Q11
    A server or service is responsible for sending the contents of cengage.com to your browser when you type cengage.com into the location bar. If this service is malfunctioning, your browser will display a page not found error. What server provides this service?
    File server
    Print Server
    DNS server
    Web server
    30s
  • Q12
    You are tasked with securing a small network for a client in which the following requirements must be met: • If a user on the private network attempts to send confidential company information to an unauthorized entity, an alert should be triggered. • The private trusted network should not be accessible from the public untrusted network. • If attacks are coming from the external network, the system should detect and prevent malicious activity. • All incoming and outgoing email should be scanned for malware. Which of the following would best meet the requirements of the client?
    Implement a firewall.
    Implement a UTM appliance
    Implement an IPS
    Implement identity-based ACLs
    30s
  • Q13
    Which of the following is a function of an endpoint management server appliance?
    Scanning incoming and outgoing corporate email for spam, malware, and viruses.
    Restricting a device’s access to the network until security requirements are met.
    Filtering the web content delivered to users on the local area network.
    Providing authentication services for all network-connected devices.
    30s
  • Q14
    A server provides the necessary IP configuration to your network host so the host can communicate on the network. If this service malfunctions, your device will not be able to utilize the network. What server provides this service?
    Syslog server
    DNS Server
    DHCP server
    Proxy server
    30s
  • Q15
    Consider the following configuration. Computer “A” IP address: 172.16.100.100 Subnet mask: 255.255.0.0 Computer “B” IP address: 172.16.200.200 Subnet mask: /16 What should be done to allow these computers to send and receive data to and from each other?
    Nothing needs to be changed.
    A router must be configured and placed between the two computers.
    Remove the hub between the two computers and replace it with a switch
    Delete the subnet mask from each computer.
    30s

Teachers give this quiz to your class