Accounting
Anthropology
Archaeology
Art History
Banking
Biology & Life Science
Business
Business Communication
Business Development
Business Ethics
Business Law
Chemistry
Communication
Computer Science
Counseling
Criminal Law
Curriculum & Instruction
Design
Earth Science
Economic
Education
Engineering
Finance
History & Theory
Humanities
Human Resource
International Business
Investments & Securities
Journalism
Law
Management
Marketing
Medicine
Medicine & Health Science
Nursing
Philosophy
Physic
Psychology
Real Estate
Science
Social Science
Sociology
Special Education
Speech
Visual Arts
Computer Science
Q:
Mozilla is an open-source Web browser that is installed in Red Hat Linux 9.x by default when the _____ desktop is used.a. GNU b. KDE c. GNOMEd. LINX
Q:
Which of the following options is a preconfigured security setting in the Internet Explorer Enhanced Security Configuration component?a. None b. Medium-high c. Medium-lowd. Maximum
Q:
Which of the following content is disabled in the Internet Explorer Enhanced Security Configuration zone "Internet zone using High security"?a. ActiveX controls b. Scripts c. Executablesd. All of the above
Q:
What must be installed for Windows-based computers to use Samba?a. An NTFS partitionb. File and Printer Sharing c. The SMB protocold. Nothing needs to be installed
Q:
Which security option in Samba is used to designate a different computer to provide access through Samba?a. security = user b. security = share c. security = serverd. None of the above
Q:
Which security option in Samba means that users can log on anonymously?a. security = user b. security = share c. security = defaultd. security = server
Q:
Which security option in Samba means that the current user can access computers through Samba and must supply a user account and password for each computer that is accessed?a. security = userb. security = share c. security = serverd. security = default
Q:
What is the default security option in Samba?a. security = user b. security = server c. security = shared. None of the above
Q:
What protocol does Samba use?a. NFS b. SMB c. RPCd. TCP
Q:
Which protocol is particularly suited to computers that perform high-volume transaction processing involving records stored within data files or databases, and in situations in which data files are distributed among several servers?a. FTP b. SMB c. NFSd. HTTPS
Q:
Which FTP command transmits a file to another computer?a. send b. transmit c. putd. upload
Q:
Which FTP command obtains multiple files from another computer?a. get b. input c. retrieved. mget
Q:
Which FTP command sends a file to another computer?a. push b. send c. transferd. put
Q:
Which FTP command ends the file transfer session and exits the FTP mode?a. bye b. quit c. closed. Both a and be. Both a and c
Q:
Which FTP command transfers files in binary format?a. ASCII b. binary c. based. hex
Q:
Which security method is used to provide encryption for MIME data and to apply a digital signature to MIME data?a. MOSS b. S-HTTP c. SMTPd. FERN
Q:
Which security method is defined in RFP 2630?a. RAS b. S-HTTP c. MOSSd. CMS
Q:
Which of the following protocols provides for both authentication and encryption?a. HTTP b. HTTP-S c. S-HTTPd. HTTPS
Q:
Which protocol is used to exchange information over the World Wide Web?a. HTTP b. FTP c. NFSd. SMB
Q:
PPP supports network protocols, such as IPX/SPX, NetBEUI, and TCP/IP. _________________________
Q:
Remote access protocols are used to carry network packets over a WAN link. _________________________
Q:
X.25 is more commonly used in Europe and other countries than in the United States. _________________________
Q:
ISDN basic rate interface consists of two channels. _________________________
Q:
Mozilla is an open-source Web browser that is installed in Mac OS X by default. _________________________
Q:
In Internet Explorer, the restricted sites zone is used to designate specific sites that are safe to access. _________________________
Q:
The NFS software that was originally developed by Sun Microsystems uses remote procedure calls via TCP port 111. _________________________
Q:
With FTP, Port 20 is a control port for FTP commands that control how data is sent. _________________________
Q:
In SSL, the client makes a secure connection request, and the server replies with a digital certificate accompanied by a public key. _________________________
Q:
When used with S-HTTP, CMS is used to provide encryption for MIME data and to apply a digital signature to MIME data. ______________________________
Q:
A Windows 2000/2003 server can be set up as a VPN server by implementing Routing and Remote Access Services.
Q:
MS-CHAP v2 is used for clients who access RAS through special devices such as smart cards, token cards, and others that use certificate authentication.
Q:
A VPN is a private network that is like a tunnel through a larger network.
Q:
CSLIP supports network connection authentication to prevent someone from intercepting a communication.
Q:
The maximum downstream transmission speed of ADSL is 6.0 Mbps.
Q:
Windows 2000 Professional and Windows XP Professional do not offer RAS services and rely on their server counterparts to provide this service.
Q:
Windows Server 2003 enables the installation of the Internet Explorer Enhanced Security Configuration component that should be installed to provide strong security options for this server operating system.
Q:
NFS is a connectionless protocol that runs within UDP.
Q:
Port 21 is a control port for FTP commands that controls how data is sent.
Q:
HTTPS is used primarily in native HTTP communications and does not encrypt data in IP-level communications.
Q:
What seven security techniques does Windows 2000 Professional use to support WNICs?
Q:
What two key lengths are used in WEP encryption?
Q:
What four general steps are used in the wireless communication authentication process?
Q:
List five of the common wireless security measures that can be taken to protect a wireless network.
Q:
What two approaches should be considered when planning for wireless communications?
Q:
What two things can an attacker do after successfully launching a man-in-the-middle attack?
Q:
What four main elements can an attacker use to locate a wireless network?
Q:
List the four transmission speeds available when using the 802.11b standard?
Q:
List five needs are wireless networks are designed and installed to accommodate? (List five.)
Q:
____________________ software determines the location of a network, but it can also determine whether the network is an IBBS or ESS topology.
Q:
____________________ transmissions can be broadcast in a single direction or in all directions, using a LED to transmit and a photodiode to receive.
Q:
The 802.11b standard uses _____________________________________________, which is a method for radiating a data-carrying signal over radio waves.
Q:
802.11a uses _____________________________________________ which functions by dividing the 5-GHz frequency range into a series of 52 subcarriers or subchannels.
Q:
In CSMA/CA, a station waiting to transmit determines if the frequency is idle by checking the ___________________________________ level.
Q:
In ____________________ access, the access point also functions as a point coordinator.
Q:
Because a(n) ____________________ antenna radiates primarily in one direction, the signal goes farther from the source.
Q:
A(n) ____________________is a device that sends out (radiates or transmits) and picks up (receives) radio waves.
Q:
A limitation of ____________________ transmissions is that they are interrupted by tall land masses, such as hills and mountains.
Q:
____________________ are licensed by the FCC to transmit voice, Morse code, data, satellite, and video signals over radio waves and microwaves.
Q:
Does the 802.11a wireless transmission standard operate in the 5-GHz range?
Q:
In CSMA/CA, is the backoff time determined by multiplying a predetermined slot-time by a random number?
Q:
Is priority-based access also called the distributed coordination function?
Q:
Does the signal gain in an indoor network generally need to be as high as for an outdoor network?
Q:
Does a directional antenna send radio waves in one main direction and generally amplify the radiated signal to a greater degree than an omnidirectional antenna?
Q:
Is an access point usually a router or switch?
Q:
Does the 802.11 standard focus on use of the physical and data-link layers (layers 1 and 2) of the OSI model?
Q:
Are network signals transmitted over radio waves in a fashion similar to the way your local radio station broadcasts?
Q:
Does Red Hat Linux 9.x support Bluetooth and offer the Bluetooth Setup Assistant, the Bluetooth Serial Utility, and the Bluetooth File Exchange tools?
Q:
Does Mac OS X and Apples iMac, iBook, Powerbook G4, and Power Mac G4 computers come with built-in compatibility for 3COM WNICs and base stations (access points)?
Q:
What type of wireless network topology is being displayed in the figure above?a. ESS b. IBSS c. 802.11Rd. SOS
Q:
What type of antenna is being used in the figure above?a. Directional b. Omnidirectional c. Unidirectionald. Bidirectional
Q:
What type of antenna is being used in the figure above?a. Directional b. Omnidirectional c. Unidirectionald. Bidirectional
Q:
What type of device does an attacker use to determine the location of a target wireless network?a. Antenna b. GPS c. WNICd. War-driving software
Q:
What is the distance that most Bluetooth devices can transmit?a. 30 feet b. 60 feet c. 100 feetd. 300 feet
Q:
Which wireless roaming protocol generally conforms to the 802.11 standard?a. ESS b. IAPP c. IBSSd. IWAP
Q:
What is the name of a wireless topology that uses two or more access points?a. Multiple-cell wireless LAN b. Multi access point LAN c. Multiple-cell wireless WANd. Multi access point WAN
Q:
Which wireless network topology uses access points to provide a more extensive area of service?a. BSS b. ESS c. IBSSd. SES
Q:
What is the maximum speed of transmission for directional 802.11R?a. 1 Mbps b. 16 Mbps c. 22 Mbpsd. 56 Mbps
Q:
In which frequency range does 802.11R operate?a. 1 Ghz to 2 Ghz b. 2 Ghz to 5 Ghz c. 100 Ghz to 1000 Ghzd. 100 Ghz to 1000 Thz
Q:
Which is the most expensive wireless standard to implement?a. 802.11b b. 802.11g c. 802.11ad. They are all about the same
Q:
What is the maximum operating speed of the 802.11b standard?a. 11 Mbps b. 22 Mbps c. 56 Mbpsd. 54 Mbps