100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached
logo-home
Microsoft 70-698 Windows 10 Certification Chapter 6 fully solved $15.99   Add to cart

Exam (elaborations)

Microsoft 70-698 Windows 10 Certification Chapter 6 fully solved

 4 views  0 purchase
  • Course
  • MCP - Microsoft Certified Professional
  • Institution
  • MCP - Microsoft Certified Professional

Microsoft 70-698 Windows 10 Certification Chapter 6 fully solved

Preview 2 out of 12  pages

  • September 17, 2024
  • 12
  • 2024/2025
  • Exam (elaborations)
  • Questions & answers
  • MCP - Microsoft Certified Professional
  • MCP - Microsoft Certified Professional
avatar-seller
BravelRadon
Microsoft 70-698 Windows 10
Certification Chapter 6

802.1X - correct answer ✔✔Security standard for 802.11 networks that use RADIUS for authentication;
provides key management; RADIUS provides centralized authentication, authorization, and accounting
for remote connections.



802.11a - correct answer ✔✔Supports bandwidth up to 54 Mbps; uses the 5‐GHz frequency; less
interference with common household devices; higher frequency means shorter range compared with
802.11b and also less apt to penetrate walls; incompatible with 802.11b because they use different
frequencies; WEP‐ and WPA‐supported.



802.11b - correct answer ✔✔Supports bandwidth up to 11 Mbps; uses the 2.5‐GHz frequency;
susceptible to interference with cordless phones and microwaves operating in the same frequency;
WEP‐ and WPA‐supported.



802.11g - correct answer ✔✔Supports bandwidth up to 54 Mbps; uses the 2.5‐GHz frequency; backward
compatible with 802.11b; 802.11g was designed to use the best features of both 802.11b and 802.11a;
WEP‐ and WPA‐supported.



802.11n - correct answer ✔✔Supports bandwidth up to approximately 300 Mbps; uses 2.5‐ and 5‐GHz
frequencies; uses four spatial streams to simultaneously transfer data by using a channel width of 40 Hz
designed to replace 802.11a, b, and g; backward compatible with 802.11g; supports Wi‐Fi Protected
Access version 2 (WPA v2), usually referred to as WPA2.



802.11i - correct answer ✔✔Has improved encryption for networks using the 802.11a, 802.11b, and
802.11g standards; introduces new encryption key protocols: Temporal Key Integrity Protocol (TKIP) and
Advanced Encryption Standard (AES).



ad hoc - correct answer ✔✔allows wireless clients to connect to each other without the use of a wireless
access point (AP).

, Authentication Header (AH) - correct answer ✔✔Provides authentication, integrity, and anti‐replay for
the entire packet (both the IP header and the data payload carried in the packet). Because the payload is
not encrypted, it does not provide confidentiality. The data is readable but protected from modification.
AH operates directly on top of IP, using IP protocol number 51.



Challenge Handshake Authentication Protocol (CHAP) - correct answer ✔✔A challenge‐response
authentication that uses the industry standard MD5 hashing scheme to encrypt the response. CHAP was
an industry standard for years and is still quite popular.



classless interdomain routing (CIDR) - correct answer ✔✔this differs from traditional addressing (now
called classful addressing) by allowing the division between the network identifier and the host identifier
to fall anywhere in an IPv4 address; it does not have to fall on one of the 8‐bit boundaries. For example,
a subnet mask of 255.255.240.0 translates into a binary value of 11111111 11111111 11110000
00000000, meaning that the network identifier is 20 bits long and the host identifier is 12 bits. This falls
between a Class B and a Class C address, and enables ISPs to assign clients only the number of addresses
they need, which conserves the IP address space.



Connection Manager (CM) - correct answer ✔✔a client network connection tool that helps
administrators to simplify the management of their remote connections.



Connection Manager Administration Kit (CMAK) - correct answer ✔✔used to create and customize the
profiles for CM and to distribute them to users. The profile, once completed, contains all the settings
necessary for the user to connect, including the IP address of the VPN server.



connection security rules - correct answer ✔✔These rules secure the connection with both
authentication (Kerberos, digital certificates, pre‐shared keys) and encryption protocols. Connection
security rules are used to determine how the traffic between the computer and others is secured. The
process for creating a connection security rule involves setting the type of connection security you want
to create (isolation, authentication exception, server‐to‐server, tunnel), selecting when you want
authentication to occur on inbound/outbound connections (request but don't require it, require it for
inbound but request for outbound, require for both), selecting the authentication method to use,
selecting which profile to apply the rule to (domain, private, public), and then providing a name for the
rule.



default gateway - correct answer ✔✔a device, usually a router, which connects the local network to
other networks. When you need to communicate with a host on another subnet, you forward all packets
to the default gateway.

The benefits of buying summaries with Stuvia:

Guaranteed quality through customer reviews

Guaranteed quality through customer reviews

Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.

Quick and easy check-out

Quick and easy check-out

You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.

Focus on what matters

Focus on what matters

Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!

Frequently asked questions

What do I get when I buy this document?

You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.

Satisfaction guarantee: how does it work?

Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.

Who am I buying these notes from?

Stuvia is a marketplace, so you are not buying this document from us, but from seller BravelRadon. Stuvia facilitates payment to the seller.

Will I be stuck with a subscription?

No, you only buy these notes for $15.99. You're not tied to anything after your purchase.

Can Stuvia be trusted?

4.6 stars on Google & Trustpilot (+1000 reviews)

67096 documents were sold in the last 30 days

Founded in 2010, the go-to place to buy study notes for 14 years now

Start selling
$15.99
  • (0)
  Add to cart