C172 - Network and Security Foundations - Post Assessment Study Guide 2024
Site surveys obtain the following information. (Choose all that apply.) Electrical power Supported bandwidth Connection points to the main network. RF coverage - Electrical power Supported bandwidth Connection points to the main network. RF coverage MIMO uses wave division multiplexing. False True - False Which of the following is not a type of dispersion? Modal Polarization mode Light Chromatic - Light Single-mode fibers use high-power, highly directional modulated light sources. False True - True The port number for DNS is ____. 21 23 25 80 53 - 53 NAT translates private MAC addresses to public ones. False True - False Data rates can be much higher in a wired network versus a wireless network. True False - True Routers use the ____ to route packets. None of these Network address Router address IP address - IP address Which of the following is used to send traffic to multiple systems that all possess the same address? unicast All of these are IPv6 addresses anycast multicast - anycast Routers are associated with which layer of the OSI model? Network Application Presentation Transport Data Link - Network With an address of 197.15.22.31 and a subnet mask of 255.255.255.224, how many bits have been borrowed to create a subnet? 3 4 1 2 - 3 You want to secure WAPs of your company's network from unauthorized access. Which of the following is the most secure encryption method? WPA2 WEP WEP2 WPA - WPA2 A bridge is easy to install. False True - True UDP uses acknowledgements. False True - False A router resides at which layer of the OSI Model? Layer 3 Layer 2
Written for
- Institution
- C172 - Network and Security Foundations
- Course
- C172 - Network and Security Foundations
Document information
- Uploaded on
- December 25, 2023
- Number of pages
- 21
- Written in
- 2023/2024
- Type
- Exam (elaborations)
- Contains
- Questions & answers
Subjects
- c172
-
c172 network and security foundations post
-
c172 network and security foundations
-
network and security foundations
Document also available in package deal