B.2.2 CompTIA A+ 220-1101 (Core 1) Domain 2: Networking

¡Supera tus tareas y exámenes ahora con Quizwiz!

Which of the following proxy server roles stores frequently accesses data so that a user's request never has to leave the network for retrieval? Sharing Internet Connections Caching Firewall VPN

Caching

You want to implement name resolution on the Linux workstations in your company. Which protocol should you use to do this? DNS LMHOSTS file NTP WINS SMTP

DNS

You are in the process of setting up an Ethernet network for a new building at your company's headquarters. You need to connect the wires from the different Ethernet office wall plates to your network rack. Which of the following components on the network rack should you use to connect the wires from the office wall plates? UPS Ethernet switch Ethernet patch panel Ethernet router

Ethernet patch panel

You want to allow your users to download files from a server running the IP protocol. You also want to protect access to the files by requiring user authentication to access specific directories on the server. Which IP protocol should you implement to provide this capability? TFTP SMTP SNMP SSH FTP LDAP

FTP

Which of the following is an example of a logical address? MAC address Gateway address IPv4 address ARP address

IPv4 address

Which of the following network components is responsible for converting digital data into a signal that can be transmitted? Switch Transmission medium Network interface Protocol

Network interface

Which of the following describes the part of the IPv6 address that identifies the subnet address? The first quartet in the IPv6 address interface ID. The last quartet in the IPv6 address interface ID. The last quartet in the IPv6 address prefix. The first quartet in the IPv6 address prefix.

The last quartet in the IPv6 address prefix.

Which of the following are examples of web server platforms? (Select two.) DNS IIS SMTP DHCP Apache

1. IIS 2. Apache

Port number for: Internet Message Access Protocol (IMAP)

143

Your Windows workstation has Automatic Private IP Addressing (APIPA) implemented with default settings. Which of the following TCP/IP addresses could you automatically assign to the system, should your DHCP server go down or become inaccessible? 172.16.1.26 169.254.1.26 10.0.0.65 169.198.1.23 168.254.10.25 192.168.1.22

169.254.1.26

In the IP address 192.168.1.52 with the subnet mask 255.255.255.0, which portion represents the network ID? 192.168 192 192.168.1 52

192.168.1

Port number for: Secure Shell (SSH)

22

Which of the following is the maximum transmission speed for Bluetooth v3 and v4 devices when using High Speed (HS) mode? 48 Mbps 3 Mbps 24 Mbps 1 Mbps

24 Mbps

What is the maximum distance between hops that is allowed by a Z-Wave device on a mesh network? 60 feet 80 feet 250 feet 200 feet

250 feet

Port number for: Service Location Protocol (SLP)

427

Port number for: HyperText Transfer Protocol Secure (HTTPS)

443

Port number for: Server Message Block (SMB/CIFS) directly over TCP

445

Port number for: Apple Filing Protocol (AFP)

548

Port number for: HyperText Transfer Protocol (HTTP)

80

Which of the following types of internet connection services allows you to be truly mobile while maintaining your internet connection? Satellite ISDN BRI Wi-Fi Cellular Mobile hotspot

Cellular

Which TCP/IP configuration parameter identifies the router that is used to reach hosts on remote networks? WINS server address Default gateway Subnet mask Alternate IP address Hostname DNS server address

Default gateway

You are working as a junior network technician for the local hospital system. Part of your duties include adding IT news and updates to the hospital's internal web site. The website is only accessible to employees when they are connected to the hospital network. What is this type of website known as? Intranet Internetwork Extranet Subnet

Intranet

Which of the following all-in-one security appliance (UTM) functions detects intrusions and alerts the network but does not block traffic? Intrusion detection VPN Intrusion protection Anti-spam

Intrusion detection

Which of the following BEST describes the Edge Technology layer of the IoT architecture? It is the main bridge between two endpoints in an IoT system. It includes the processes that happen in the cloud. It includes all the hardware parts in the IoT system. It delivers the analyzed and processed data to the end user.

It includes all the hardware parts in the IoT system.

Which algorithm is used by an Application layer load balancer? Round robin Least pending request Source IP hash Weighted least connections

Least pending request

Which of the following protocols is non-routable and requires another protocol to enable internetwork communications? IPX NetBIOS AppleTalk over IP IP

NetBIOS

What are the standards called that define how data is formatted and transmitted over a network? Networking protocols Network ID Transmission medium Network interface

Networking protocols

Which of the following terms refers to a network resource sharing model that uses access control lists saved on each computer? Extranet Peer-to-peer Client/server Intranet

Peer-to-peer

Which of the following proxy server roles allows users to connect to the internet anonymously with their data encrypted during transmission? VPN Firewall Sharing Internet Connections Caching

VPN

Which of the following load balancer algorithms takes each server's active connections and processing power into consideration? Least connections Weighted round robin Weighted least connections Round robin

Weighted least connections


Conjuntos de estudio relacionados

Organizational Behavior Exam 4 (Ch 9, 10, 15, 16)

View Set

The Origins and Spread of Christianity

View Set

Penny -CH 17 The uterus and vagina End of Ch Questions

View Set

Chapter 5 Tissue Study Questions

View Set