1/62
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced |
---|
No study sessions yet.
What role does a captive portal play in open networks?
It acts as a secondary authentication step
What is a potential vulnerability of the WPA2 system?
Its reliance on a shared encryption key
Which feature of WPA3 significantly improves password protection?
Requiring interaction for each password guess
What is a major security concern with BYOD (Bring Your Own Device) policies?
Risk of unpatched devices and insider threats
What is a deauthentication attack designed to do?
Disrupt communication between a device and its Wi-Fi network
Which of the following best describes the purpose of the IEEE 802.11 standards?
To define how radio waves communicate over distances
What is the primary function of the Media Access Control (MAC) in 802.11 networks?
To control access to the wireless medium and avoid collisions
What technology allows an access point to communicate with multiple devices simultaneously?
Multiuser MIMO
Which wireless standard first introduced MIMO technology?
802.11n
What is the primary purpose of network slicing in 5G networks?
To customize network characteristics for different applications
What is the primary function of a Wireless Local Area Network (WLAN)?
To enable devices to communicate wirelessly
How does signal strength (RSSI) affect user experience in a WLAN?
RSSI impacts the reliability and performance of the connection
What is the purpose of a heat map in wireless networking?
To visualize signal strength and coverage
Which type of antenna is best for broad coverage in a WLAN?
Omnidirectional Antenna
What is an ESA in wireless networking?
Extended Service Area
Which of the following best describes throughput?
The actual data successfully transferred
What does RF attenuation refer to?
Decrease in signal strength over distance
What is a common cause of insufficient wireless coverage?
Signal blockage from physical obstacles
What is the recommended channel spacing in the 2.4 GHz band to avoid overlap?
25 MHz
What role do spectrum analyzers play in wireless troubleshooting?
They identify electromagnetic interference
Which of the following is NOT a standard that facilitates smoother roaming in wireless networks?
802.11n
Which layer of the OSI model specifies the medium and interface for data transmission in WANs?
Physical layer
Which of the following is used for addressing at the Network layer in WANs?
Internet Protocol (IP)
What type of routers link customer and provider sites in a WAN?
Customer edge (CE) and provider edge (PE) routers
Which internet type generally requires the most complex and expensive installation process?*
Fiber
What technology does DSL leverage for internet connectivity?
Existing phone lines
Which internet type uses time-division multiplexing?
DSL
Which feature of IKEv2 is particularly beneficial for mobile workers?
MOBIKE support
Which technology enables real-time interaction with desktops or applications directly in the browser for clientless VPNs?
HTML5 canvas element
In which scenario would a site-to-site VPN be most appropriate?
For connecting multiple office locations of a business
Which of the following protocols is known for secure remote access?
SSH
What is the role of a jump box in network security?
To provide a secure access point to other servers
What is the primary security risk associated with using Telnet?
It transmits data, including passwords, in plain text
What is the default port number for RDP (Remote Desktop Protocol)?
3389
Which of the following is a best practice for using RDP securely?
Use a Secure Administrative Workstation (SAW)
Which of the following is NOT typically a component of a remote access policy?
Employee's favorite color
Which network topology is described as having a two-layer structure with spine switches connecting to all leaf switches but not to each other?
Spine and Leaf topology
What does IaaS stand for in cloud service models?
Infrastructure as a Service
Which of the following is a characteristic of SaaS?
It is user-centric and changes software access
Which of the following best describes the relationship between scalability and elasticity in cloud computing?
Scalability is long-term capacity planning, while elasticity is short-term adaptation
A company experiences sudden spikes in web traffic during flash sales. Which scaling approach would be most appropriate to handle these intermittent surges?
Horizontal scaling
In the context of cloud deployment models, which option would be most suitable for a government agency handling classified information?
Private cloud
How does elasticity contribute to cost-effectiveness in cloud computing?
By allowing users to pay only for the resources they consume
Which cloud service model would be most appropriate for a startup that wants to develop and test a new application without investing in infrastructure?
Platform as a Service (PaaS)
What is the primary advantage of using a Content Delivery Network (CDN) for a global e-commerce website?
Reduced latency and improved performance
A company wants to maintain control over sensitive data while leveraging public cloud resources for less critical operations. Which deployment model best suits this scenario?
Hybrid cloud
Which of the following is NOT a typical characteristic of Software as a Service (SaaS)?
Requires significant customization by the end-user
Which traditional network protocol is eliminated in the Spine and Leaf topology?
Spanning Tree Protocol
Which of the following is NOT a key component of a SAN?
User workstations
Which of the following is a benefit of implementing a SAN?
Improved scalability of storage
What is Fibre Channel primarily used for in network environments?
Enabling high-speed communications in storage area networks
In a Fibre Channel network, what is an 'initiator'?
A server with a Host Bus Adapter
What is the primary purpose of a Virtual Private Cloud (VPC)?
To create a segregated portion of a public cloud for exclusive use
Which component is necessary for a subnet to be considered 'public' in a cloud environment?
Internet Gateway
Which cloud connectivity option is best suited for organizations with high bandwidth and low latency requirements for critical applications?
Direct Connect
Which layer of the OSI model does a cloud firewall operate at when performing stateful inspection of connections?
Layer 4
What is the primary purpose of Infrastructure as Code (IaC)?
To automate the configuration and provisioning of infrastructure
What is the primary difference between SDN and traditional networking?
SDN separates the control and data planes
What is an overlay network?
A virtual network built on top of existing physical network infrastructure
What is the main purpose of Software-Defined WAN (SD-WAN)?
To enhance connectivity and streamline network efficiency between branch offices, datacenters, and cloud services
Which of the following is NOT a core principle of Zero Trust Architecture?
Trust All Internal Users
In a Zero Trust Architecture, what does 'Least Privilege Access' mean?
Users and devices have only the access they need, and no more
What is the main function of a Cloud Access Security Broker (CASB) in a Secure Service Edge (SSE)?
To manage security policies, scan for malware, monitor activity, and prevent data exfiltration