C172 - Network And Security Foundations - Post Ass
C172 - Network and Security Foundations - Post Ass
Exam (elaborations)
C172 - Network and Security Foundations - Post Assessment
2 views 0 purchase
Course
C172 - Network and Security Foundations - Post Ass
Institution
C172 - Network And Security Foundations - Post Ass
C172 - Network and Security
Foundations - Post Assessment
Site surveys obtain the following information. (Choose all that apply.)
Electrical power
Supported bandwidth
Connection points to the main network.
RF coverage Ans- Electrical power
Supported bandwidth
Connection points to the main...
c172 network and security foundations post assessment
Written for
C172 - Network and Security Foundations - Post Ass
All documents for this subject (5)
Seller
Follow
CertifiedGrades
Reviews received
Content preview
C172 - Network and Security
Foundations - Post Assessment
Site surveys obtain the following information. (Choose all that apply.)
Electrical power
Supported bandwidth
Connection points to the main network.
RF coverage Ans- Electrical power
Supported bandwidth
Connection points to the main network.
RF coverage
MIMO uses wave division multiplexing.
False
True Ans- False
Which of the following is not a type of dispersion?
Modal
Polarization mode
,Light
Chromatic Ans- Light
Single-mode fibers use high-power, highly directional modulated light sources.
False
True Ans- True
The port number for DNS is ____.
21
23
25
80
53 Ans- 53
NAT translates private MAC addresses to public ones.
False
True Ans- False
,Data rates can be much higher in a wired network versus a wireless network.
True
False Ans- True
Routers use the ____ to route packets.
None of these
Network address
Router address
IP address Ans- IP address
Which of the following is used to send traffic to multiple systems that all possess the same address?
unicast
All of these are IPv6 addresses
anycast
multicast Ans- anycast
Routers are associated with which layer of the OSI model?
Network
Application
, Presentation
Transport
Data Link Ans- Network
With an address of 197.15.22.31 and a subnet mask of 255.255.255.224, how many bits have been
borrowed to create a subnet?
3
4
1
2 Ans- 3
You want to secure WAPs of your company's network from unauthorized access. Which of the following
is the most secure encryption method?
WPA2
WEP
WEP2
WPA Ans- WPA2
A bridge is easy to install.
The benefits of buying summaries with Stuvia:
Guaranteed quality through customer reviews
Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.
Quick and easy check-out
You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.
Focus on what matters
Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!
Frequently asked questions
What do I get when I buy this document?
You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.
Satisfaction guarantee: how does it work?
Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.
Who am I buying these notes from?
Stuvia is a marketplace, so you are not buying this document from us, but from seller CertifiedGrades. Stuvia facilitates payment to the seller.
Will I be stuck with a subscription?
No, you only buy these notes for $9.49. You're not tied to anything after your purchase.