Author Topic: SimulationExams.comNetwork+ N10-004 Corrections  (Read 1795 times)

Offline certforumz

  • Cert Exams
  • Administrator
  • Hero Member
  • *****
  • Posts: 849
  • Ask me a question ...
    • CertExams - CCNA, A+, Network+, and Others
SimulationExams.comNetwork+ N10-004 Corrections
« on: December 30, 2010, 07:44:33 AM »
Exam 1:

Question ID: 509 (figure missing)

The figure ipv6.gif is missing, and is given below:

Exam 2:

QID: 468: (Incorrectly given as b and c)
Which of the following are true about 802.11g standard? (Choose 2 best answers)

a. The standard is well established and hardware costs are less compared with 802.11b
b. The protocol uses frequencies in the range of 5 GHz
c. The standard supports data rates up to 54 Mbps
d. It has higher interference risk compared to 802.11b

ans: a,c
Explanation: (Change as below):
The following are the important features of 802.11b standard:
a. The hardware costs are more compared with 802.11g, and the standard is not yet well established.
b. The 802.11g standard supports data rates up to 54 Mbps, whereas 802.11b supports data rates only up to 11 Mbps.
c. The hardware complying to 802.11g operates at 2.4 GHz range
d. The 802.11g equipment is as susceptible to interference as 802.11b.
e. IEEE 802.11g is compatible with 802.11b, but not compatible with 802.11a, or Bluetooth.

Exam No. 3
Question ID:550 (Incorrectly given as Option ?a?)

A MAC address filter works at which layer of OSI model?
a. Physical layer
b. Data link layer
c. Network layer
d. Application layer

Ans: b
A MAC address is an address, which works on the Data Link Layer (Layer 2 of the OSI Model). The Data Link Layer consists of two sublayers, the Media Access Control (MAC) layer and the Logical Link Control (LLC) layer. A MAC address is 48 bits long. A sample MAC address looks like 00-0C-F5-5A-98-AD

Question ID 541: Incorrectly given as Option ?b?
Jacob has secured the internal network using anti virus software, router firewall, and difficult to guess usernames and passwords. He has also disabled unnecessary protocols and services. Which of the following has greater chance of success?

a. Trojan horse
b. Virus
c. Social Engineering
d. Brute force attack

Answer: c
Social engineering is a skill that an attacker uses to trick an innocent person such as an employee of a company into doing a favour. For example, the attacker may hold packages with both the hands and request a person with appropriate permission to enter a building to open the door. Social Engineering is considered to be the most successful tool that hackers use.

Question ID:464 Explanation was incorrectly given.

Which encoding scheme does 802.11a uses?


answer: a

Read explanation as below:
802.11a, and 802.11g use OFDM (short for Orthogonal Frequency Division Multiplexing). IEEE 802.11b uses DSSS (short for Direct Sequence Spread Spectrum) for encoding.

(Previously given explanation was incorrect: 802.11a, and 802.11g use OFDM (short for Orthogonal Frequency Division Multiplexing). IEEE 802.11a uses DSSS (short for Direct Sequence Spread Spectrum) for encoding.)