How many bits does an IPv6 address use?
128 bits
While browsing through Facebook, you saw a page that contained disparaging
comments and falsehoods about yourself. Unfortunately, you have become the
victim of:
cyberbullying.
In wireless networking, how does ad-hoc mode differ from infrastructure mode?
Ad-hoc mode systems use only their NICs to connect with one another, whereas
infrastructure mode systems connect via a centralized wireless AP.
A hacker has impersonated an IT department employee in your company and
tricked him into revealing his user name and password. What type of attack is
this?
Social engineering
In the TCP/IP suite of protocols, which protocol is responsible for providing
addresses for each computer?
IP
You are working on a host system with virtualization software. It is configured to
host two guest operating systems: Ubuntu Linux and Porteus Linux. When you
attempt to open the Porteus virtual machine in the virtualization software, you get
an error that states "no bootable operating system can be found." Which of the
following is the most likely cause of this error?
The Porteus operating system has not been installed in the virtual machine.
You are sitting at a workstation that is running a Microsoft operating system.
What must you do to make this workstation a file server?
Share a directory on the local system.
You have received an error after booting an older computer. The error reads "no
operating system." Which troubleshooting step should you perform first with the
older computer?
Check whether a non-bootable floppy disk is in the drive.
You are considering a wireless network for your company. Most of the employees
already have laptop computers and the office is leased in a building that is not
wired for network access. You also know that wireless networks are subject to
electromagnetic interference, as well as to physical objects such as thick walls
and metal used in buildings. Which of the following is a valid issue that you must
still consider before implementing a wireless network?
You will have to provide Internet access to wireless clients.
Which of the following is used in packet-based networks to ensure that a packet
is valid?
The Cyclical Redundancy Check (CRC)
Which of the following is a benefit of a virtual local area network (VLAN)?