Название | CompTIA A+ Practice Tests |
---|---|
Автор произведения | Docter Quentin |
Жанр | Зарубежная образовательная литература |
Серия | |
Издательство | Зарубежная образовательная литература |
Год выпуска | 0 |
isbn | 9781119372677 |
A. ICMP
B. IP
C. TCP
D. UDP
191 Which type of IPv6 address identifies a single node on the network?
A. Multicast
B. Anycast
C. Unicast
D. Localcast
192 You are configuring a wireless 802.11n router for a small network. When setting it up, which security option should you choose?
A. WPA2
B. WPA
C. WEP
D. SSID
193 What type of network covers large geographical areas and often supports thousands of users?
A. LAN
B. WAN
C. PAN
D. MAN
194 Which TCP/IP protocol, developed by Microsoft, allows users to connect to remote computers and run programs on them?
A. RDP
B. SMB
C. CIFS
D. Telnet
195 What port number does the SSH protocol use?
A. 21
B. 22
C. 23
D. 25
196 Which of the following IP addresses is not routable on the Internet?
A. 10.1.1.1
B. 11.1.1.1
C. 12.1.1.1
D. 13.1.1.1
197 Which network connectivity device does not forward broadcast messages, thereby creating multiple broadcast domains?
A. Hub
B. Switch
C. Bridge
D. Router
198 You have a desktop computer that is behaving erratically on the network. The wired connection will often disconnect without warning. Which tool should you use to troubleshoot the network adapter?
A. Multimeter
B. Tone generator and probe
C. Loopback plug
D. Cable tester
199 Your company just expanded and is leasing additional space in an adjacent office building. You need to extend the network to the new building. Fortunately, there is a conduit between the two. You estimate that the cable you need to run will be about 300 meters long. What type of cable should you use?
A. CAT5
B. CAT5e
C. CAT7
D. MMF
200 You want to ensure that client computers can download email from external email servers, regardless of the protocol their email client uses. Which ports do you open on the firewall to enable this? (Choose two.)
A. 23
B. 25
C. 110
D. 143
201 You are installing network cabling in a highly secure facility. The cables need to be immune to electronic eavesdropping. What type of cable should you use?
A. Fiber-optic
B. UTP
C. STP
D. Coaxial
202 Which networking device is capable of reading IP addresses and forwarding packets based on the destination IP address?
A. Hub
B. Switch
C. Bridge
D. Router
203 Which network device is designed to be a security guard, blocking malicious data from entering your network?
A. PoE injector
B. Bridge
C. Firewall
D. Router
204 You are manually configuring TCP/IP hosts on the network. What configuration parameter specifies the address of the router that enables Internet access?
A. Subnet mask
B. DHCP server
C. DNS server
D. Default gateway
205 A senior administrator calls you and tells you that she is working from home and trying to use RDP, but it won’t let her. What port do you need to ensure is open on the firewall to grant her access?
A. 143
B. 443
C. 548
D. 3389
206 Identify the cable connector in the picture.
A. F-connector
B. BNC
C. SC
D. ST
207 What type of network is most commonly associated with Bluetooth devices and covers a small area?
A. LAN
B. WAN
C. PAN
D. MAN
208 Identify the type of cable connectors shown here.
A. F-connector
B. BNC
C. SC
D. ST
209 Which TCP/IP Internet layer protocol is responsible for resolving physical MAC addresses to logical IP addresses?
A. IP
B. ICMP
C. ARP
D. RARP
210 Which of the following IPv6 addresses is equivalent to an address in the 169.254.0.0/16 range in IPv4?
A. 2000::/3
B. FC00::/7
C.
191
C. There are three types of addresses in IPv6: unicast, anycast, and multicast. A unicast address identifies a single node on the network. An anycast address refers to one that has been assigned to multiple nodes. A multicast address is one used by multiple hosts.
192
A. Of the wireless encryption methods listed, WPA2 is the newest and most secure. Some routers offer WPA2 Enterprise, which is a great choice as well.
193
B. A wide area network (WAN) covers large geographical areas and often supports thousands of users.
194
A. Developed by Microsoft, the Remote Desktop Protocol (RDP) allows users to connect to remote computers and run programs on them. When you use RDP, you see the desktop of the computer you’ve signed into on your screen. It’s like you’re really there, even though you’re not.
195
B. Secure Shell (SSH) can be used to set up a secure Telnet session for remote logins or for remotely executing programs and transferring files. SSH uses port 22.
196
A. Private IP addresses are not routable on the Internet. The private IP address range for class A networks is 10.0.0.0/8.
197
D. One of the key features of routers is that they break up broadcast domains. Broadcast traffic on one side of the router will not get passed to the other side, which greatly reduces network traffic.
198
C. A loopback plug is for testing the ability of a network adapter to send and receive. The plug gets plugged into the NIC, and then a loopback test is performed using troubleshooting software. You can then tell whether the card is working properly.
199
D. UTP cables are limited to 100 meters, so CAT5 and CAT7 will not work. You need fiber, and multimode fiber (MMF) can span distances of 300 meters.
200
C, D. Simple Mail Transfer Protocol (SMTP, port 25), Post Office Protocol 3 (POP3, port 110), and Internet Message Access Protocol (IMAP, port 143) are all email protocols. SMTP is for sending email. POP3 and IMAP are for downloading email.
201
A. Fiber-optic cabling uses pulses of light instead of electric voltages to transmit data, so it is immune to electrical interference and to wiretapping.
202
D. Routers operate at the Network layer (Layer 3) of the OSI model. Because of this, they make their decisions on what to do with traffic based on logical addresses, such as an IP address.
203
C. A firewall is a hardware or software solution that serves as your network’s security guard. Firewalls can protect you in two ways: they protect your network resources from hackers lurking in the dark corners of the Internet, and they can simultaneously prevent computers on your network from accessing undesirable content on the Internet.
204
D. The default gateway is the address to the network’s router, which will allow the host to communicate with hosts not on the local network.
205
D. The Remote Desktop Protocol (RDP) allows users to connect to remote computers and run programs on them. It uses port 3389.
206
A. F-connectors are threaded and screw into place. The BNC connector locks by twisting one-quarter turn. SC and ST connectors are for fiber-optic cable.
207
C. A personal area network (PAN) is a small-scale network designed around one person within a limited boundary area. The term generally refers to networks that use Bluetooth technology.
208
B. The connectors pictured are BNC connectors. They are identifiable by their groove-and-notch fastening mechanism that locks by twisting one-quarter turn. F-connectors are easily identifiable because they are threaded. SC and ST connectors are for fiber-optic cable.
209
D. At the Internet layer of TCP/IP, Address Resolution Protocol (ARP) resolves logical IP addresses to physical MAC addresses built into network cards. Reverse ARP (RARP) resolves MAC addresses to IP addresses.
210
C. The 169.254.0.0/16 range in IPv4 is the APIPA range, used for automatic configuration if the host can’t locate a DHCP server. The same task in IPv6 is accomplished with a link local address in the FE80::/10 range.