Which of the following is a function of an endpoint management server appliance quizlet?

You are using a crimper to attach an RJ-45 connector to a Cat 6 UTP cable. Your company requires that all cabling follow the TIA/EIA 568A standard. Starting with pin 1 of the modular plug, which wire color code will you use?

Green/white, green, orange/white, orange, blue/white, blue, brown/white, brown

Green/white, green, orange/white, blue, blue/white, orange, brown/white, brown

Orange/white, orange, green/white, green, blue/white, blue, brown/white, brown

Orange/white, orange, green/white, blue, blue/white, green, brown/white, brown

Upgrade to remove ads

Only ₩37,125/year

  1. Other
  2. Computer Skills

  • Flashcards

  • Learn

  • Test

  • Match

  • Flashcards

  • Learn

  • Test

  • Match

Terms in this set (58)

A company requires an Ethernet connection from the north end of its office building to the south end. The distance between connections is 161 meters and will need to provide speeds of up to 10 Gbps in full duplex mode.

Which of the following cable combinations will meet these requirements?

Multimode fiber cable with MT-RJ connectors

A remote worker wants to connect his computer to his corporation's private trusted network over the Internet.

Which of the following will need to be configured?

VPN tunnel

A manager in a small office is asking if it is possible to limit network access to a particular website during business hours. Apparently, several users are spending an excessive amount of time on the site preventing them from completing their work-related tasks.

Which of the following is the best solution to accomplish the request from the manager while not limiting access to other websites?

implement a blacklist on the firewall and add the site the users are visiting.

Which of the following indicates the most concise abbreviation of the IPv6 address FEFE:0000:0000:0000:0002:0000:0000:0001?

FEFE::2:0:0:1

Examine the exhibit above.

Host B is sending an email intended for the user on Host A to the email server. What protocol is being used to send the message through the router?

SMTP

In which of the following situations should you install an IPS instead of an IDS?

You want to block unauthorized activity on your LAN from the Internet.

A server provides the necessary IP configuration to your network host so the host can communicate on the network. If this service malfunctions, your device will not be able to utilize the network.

What server provides this service?

DHCP server

Jacob wants to set up extra security on his wireless network; he currently uses WPA2. He wants to allow only his devices to connect to the network and reject devices that he does not own.

What extra wireless security should Jacob employ in on his wireless router?

MAC filtering

A technician wants to consolidate and log specific alerts from network devices into a database so maintenance tasks and potential device problems can be addressed in a timely manner.

Which of the following should the technician implement?

syslog server

A corporate user is attempting to connect to the company's Windows domain server on the local network with her new laptop through a wired connection.

Which of the following is required for the user to successfully sign in to the Windows domain?

none of the above

You are troubleshooting a Windows workstation that is having problems communicating with the host at IP address 1.2.3.4.

What utility will you use at the command line to determine where the communication is stopping?

none of the above

Your company is experiencing an increase in malware incidents. Your manager is asking for advice on how best to verify that company-owned workstations are up-to-date with security patches, anti-malware requirements, and software application updates. The manager is also concerned that employee-owned devices connecting to the corporate LAN have the same level of security as the company devices.

Which of the following protections and services should you recommend?

Implement an endpoint management server appliance.

George is concerned that his children might somehow be exposed to things on the Internet that they are not mature enough to handle. He wants a way to limit their ability to view content on the Internet.

What will you recommend to George?

Use parental controls

A client is requesting an Internet connection type that is not affected by atmospheric conditions and is always on. Which of the following will not meet these requirements?

Satellite
Cellular hotspot
Dial-up

Your company is implementing a wireless network and is concerned that someone from a competing company could stand outside the building and collect wireless data. You have assured the company that WPA2 is secure.

What makes WPA2 more secure than WPA?

AES

What is the correct order of network types when categorized by their size or the physical area they cover, from largest to smallest?

WAN, MAN, LAN, PAN

You are tasked with securing a small network for a client in which the following requirements must be met:
• If a user on the private network attempts to send confidential company information to an unauthorized entity, an alert should be triggered.
• The private trusted network should not be accessible from the public untrusted network.
• If attacks are coming from the external network, the system should detect and prevent malicious activity.
• All incoming and outgoing email should be scanned for malware.

Which of the following would best meet the requirements of the client?

Implement a UTM appliance

A server or service is responsible for sending the contents of cengage.com to your browser when you type cengage.com into the location bar. If this service is malfunctioning, your browser will display a page not found error.

What server provides this service?

web server

Which of the following are not secure protocols, ports, services, or applications?

SLP
Ports 161/162
SMTP

Mary, a remote user, connects her Windows 10 laptop to the corporate network by way of the Internet using a VPN tunnel.

Which of the following is often configured as a required step for a user each time she attempts to use the VPN connection?

none of the above

A group of wireless devices are using each other as relays to share a network connection across a large area.

Which of the following network categories is being used?

WMN

Which of the following is a function of an endpoint management server appliance?

restricting a device's access to the network until security requirements are met.

A network host with an IP address of 192.168.10.200 wants to send a message to a destination computer with an assigned IP address of 192.168.10.100.

Which of the following will the sending host use to determine whether the destination computer is on its own network or another network?

subnet mask

While assisting a Windows user over the phone, you need to determine the IP address for the DHCP server along with the MAC address of the Ethernet NIC. The user has successfully opened a command prompt.

What command will you have the user type at the command line to determine these two addresses?

ifconfig/all

Cathy wants to connect to her wireless LAN at home but is not sure where to change the setting so that she can connect.

Where in the Windows Control Panel will Cathy find her computer's network connection settings?

Network and Sharing Center

Henry is troubleshooting a network connection and wants to see if he can connect to the server on his network.

Which Microsoft command-line command should Henry use to check whether he can connect to the server?

ping

A new Cat6 cable run and keystone jack were installed for a workstation that was moved from the sales department to the shipping department. Since the move, the user has been complaining of slow transfer speeds on both Internet and local network communications. The technician ran a test and is viewing the following output on the tester. Which of the following is the most likely reason for the sluggish network speeds?

The cable run exceeds the specifications for Ethernet over twisted pair

A technician has been dispatched to a client's office to diagnose wireless network issues and suspects that channel overlap may be the problem.

Which of the following tools will the technician use to help in determining whether her suspicions are correct?

Wifi analyzer

Consider the following configuration.

Computer "A"
IP address: 172.16.100.100
Subnet mask: 255.255.0.0

Computer "B"
IP address: 172.16.200.200
Subnet mask: /16

What should be done to allow these computers to send and receive data to and from each other?

Nothing needs to be changed.

A technician is troubleshooting a small network with cable Internet service in which a user is receiving a message in her web browser stating a site cannot be found. While interviewing users, it is determined that every host on the network is experiencing the same issue with all websites.

Which of the following is the first step in troubleshooting this issue?

Connect a computer directly to the cable modem and attempt to access the Internet.

You are setting up your Windows computer to connect to the Internet and notice that when you type www.microsoft.com, the browser does not go to the site. Instead, you receive an error message saying that the address cannot be resolved.

What network setting should you check to see the address of the server being used to resolve this address?

DNS

Which of the following wireless networking protocols uses LTE technology with a maximum speed of up to 1 Gbps?

Fourth generation cellular

Which of the following describes an IPv6 link -local address assigned to a node on a network?

A private unicast address used for limited communication with neighboring nodes in the same link.

A small group of travelers is meeting inside an ancient building, and the travelers need access to the Internet using their mobile devices. However, the group is in an area where Wi-Fi Internet is not available and cellular coverage is intermittent. One of the travelers has an unlimited cellular data plan and a strong consistent signal.

Which of the following methods would most likely be implemented to provide Internet service to the group?

Mobile hotspot

Which of the following will use an RJ-45 connector for connectivity?

ethernet

What is the purpose for the twists in twisted pair Ethernet cabling?

Decrease crosstalk that can disrupt signals and reduce electromagnetic induction,

Which of the following devices are not most commonly used to connect a LAN to an ISP for broadband services?

Network interface card
Dial-up modem
Firewall

Which of the following is a wireless Internet connectivity method that utilizes cellular technology?

3G

You received a call from a user who brought her own device to the office but cannot find or connect to the company WLAN. The laptop shows other available wireless networks in the building. This user and the other users in her department are connected to the company WLAN and can browse to multiple websites with no problems from their company-assigned laptops.

Which of the following is the most likely reason the user cannot find the company WLAN from her own device?

The company WAP has SSID broadcast disabled.

A Windows user has been successfully saving documents to the file server all morning. However, the latest attempt resulted in the following message, "Could not find this item. Verify the location of '\\FileServer\Docs' and try again."

Which of the following is the most likely cause for this message?

The share to the file server is disconnected.

You are installing network cabling and require a cable solution that provides the best resistance to EMI.

Which of the following will you choose for this installation?

STP

Which of the following is a scenario in which an IT support technician would most likely be required to implement the alternate IP configuration method on a network host?

In the event a DHCP server is unavailable, the workstation will have a valid IP address on the subnet.

Examine the exhibit above.

Which network tool most likely produced the output?

network multiplier

A technician has verified that a bad Cat6 cable run in the wall is responsible for a workstation's lack of communication on the network.

Which of the following tools can be used to pinpoint the location of the cable inside the wall?

toner probe

While investigating an email issue, a support technician discovers no users can access their email accounts on the company's email server connected to the private LAN. Pinging the email server from several workstations on the LAN results in 0% packet loss.

Which of the following is the next step the technician should take in troubleshooting this issue?

Escalate the problem to a server administrator to check for issues with the server.

You have connected an ADSL Internet connection as shown in the exhibit. The ports at the phone jack are connected to the same single-number POTS line.

At what location should you place the DSL filter?

"B" only

A server provides the services to take you to the correct website domain when you type cengage.com in your web browser. If this service were not functioning, you would have to remember the IP address for cengage.com.

What server performs this service?

DNS server

You have connected a cable Internet connection as shown in the exhibit.

At what location should you place a filter?

No filters are required

You have been tasked with configuring a SOHO network in which all ports on the public untrusted network will be forwarded to one workstation connected to the LAN.

Which of the following features will you configure on the SOHO router to accomplish this task?

demilitarized zone

A technician wants to configure a DHCP server to guarantee that certain printers always receive the same address. Which of the following should the technician configure?

address reservation

A coworker is asking for your advice on a problem with a computer that will not communicate on the network. While assisting the coworker, you suspect that the wired NIC may have failed.

Which of the following will you recommend to your coworker as the best tool to diagnose this issue? (Select TWO.)

network multimeter
loopback plug

What connector is shown in the exhibit?

none of the above

Your company received a call from a historical society inquiring about the possibility of networking a two-century-old building with no existing network. In 1924, someone added electrical outlets to the building, but the layout and design of the building prohibits adding any additional copper or fiber cable. You completed a wireless site survey and concluded that wireless networking is out of the question and will not properly function due to environmental interference.

Which of the following could be used to network this building?

EoP

A technician is configuring a new SOHO multifunction wireless router at a customer's location to provide network access to several wireless devices. The technician is required to protect the customer's private network from unauthorized access while performing the initial router setup as well as during normal operation after the configuration is completed.

Which of the following is the best step for the technician to take in securing the router to meet this requirement?

Change the router's default administrative password.

A client contacted you to request your help in researching and supplying the hardware necessary to implement a SOHO solution at his new home-based business.

Which of the following SOHO router features will simplify IP address configuration on the private network for both wired and wireless clients?

DHCP server

You are tasked with configuring a wireless SOHO router for a customer.

Which of the following settings will be the most secure with the least effort and cost to the customer?

WPA2-PSK, AES

You are using a crimper to attach an RJ-45 connector to a Cat 6 UTP cable. Your company requires that all cabling follow the TIA/EIA 568B standard.

White orange, orange, white green, blue, white blue, green, white brown, brown

You replaced the LCD panel in a laptop computer and verified full system functionality, including wireless connectivity. The customer picked up the laptop and now reports he can no longer access his wireless network regardless of how close the computer is positioned to the WAP. Other users can connect to the WAP without any problem.

none of the above

Students also viewed

Chapter 8

30 terms

smendez36

CompTIA A+: Guide to IT Technical Support (Chapter…

26 terms

Killcross14__

Module 8 Test

10 terms

Mbratz123

Networking Test 1 help

90 terms

moomoocow211

Sets found in the same folder

MIS 350 Chapter 1

33 terms

repittm1

MIS 350 Chapter 2

24 terms

repittm1

MIS 350 Chapter 3

56 terms

repittm1

MIS 350 Quiz 5

32 terms

wilson_shanahan

Other sets by this creator

Econ 305 Quiz 1

20 terms

wilson_shanahan

MIS 350 Quiz 12

24 terms

wilson_shanahan

MIS 350 Quiz 4

23 terms

wilson_shanahan

Fin 351 Quiz 19

10 terms

wilson_shanahan

Verified questions

other

Today, we use a process of heating liquids to prevent spoiling by bacteria and other microorganisms, pioneered by of the three scientists mentioned above. What is that process called and for what food is it used?

Verified answer

other

Determine the overall length, width, and height of the casting in Figure 2-4. All dimensions are in inches.

Verified answer

other

You have a pick up truck and want to haul a load of trash or garbage in the back you must do what

Verified answer

other

Abrasives are used by cabinetmakers to ___ surfaces in preparation for assembly of finishing.

Verified answer

Other Quizlet sets

Shock (Critical Care Test 2)

60 terms

che1sea1

British Literature

35 terms

Tygerty15

MICRO 101 WT4: Listeria, Corynebacterium, and Simi…

27 terms

kunz_bethany

Kaplan QBank--- Hardware

138 terms

ZVanHorn_2023

What is a function of an endpoint management server appliance?

Endpoint security management systems, which can be purchased as software or as a dedicated appliance, discover, manage and control computing devices that request access to the corporate network. Required elements may include an approved operating system, a VPN client and anti-virus software with current updates.

What protocol is being used to send the message through the router?

Internet Control Message Protocol (ICMP) is used to send control messages to network devices and hosts. Routers and other network devices monitor the operation of the network. When an error occurs, these devices can send a message using ICMP.

Which protocol will provide the necessary file services?

FTP (File Transfer Protocol) is a network protocol for transmitting files between computers over Transmission Control Protocol/Internet Protocol (TCP/IP) connections.

What is the purpose for the twists in twisted pair Ethernet cabling quizlet?

What is the purpose for the twists in twisted pair Ethernet cabling? Reduce crosstalk between wire pairs.