TESTOUT : M02 B.3.2 - CompTIA A+ 220-1101 (Core 1) Domain 2: Networking

¡Supera tus tareas y exámenes ahora con Quizwiz!

Which of the following is the maximum range of the Bluetooth 2.0 specification? Answer 60 meters 30 meters 240 meters 10 meters

30 meters Version 1.0 - 10 meters Versions 2.0 and 3.0 - 30 meters Version 4.0 - 60 meters Version 5.0 - 240 meters

Which IEEE wireless standards specify transmission speeds up to 54 Mbps? (Select two.) Answer 802.1ac 802.11b Bluetooth 802.11a 802.11g

802.11a 802.11g

The router below provides several ports for connecting two or more network segments or subnets. The port circled in red is a small form-factor pluggable (SFP) connector. Which type of network can connect to this port? Answer DHCP Wireless network LAN WAN

WAN uses a sm. form factor pluggable

Which of the following LAN devices receives a signal on one port and forwards that signal only to the port where the destination device is connected? Answer Network adapter Router Hub Switch

Switch A switch offers guaranteed bandwidth to each port, unlike a hub, which shares bandwidth among all the network ports. A router connects two networks together so that a switch can forward data packets to unknown MAC addresses on another network. A network adapter allows a network cable to connect from the computer to another networking device.

A technician determines that an older network hub that connects 24 workstations is performing poorly due to excessive network collisions. Which of the following network devices would be the BEST replacement? Answer: Router Bridge Switch Patch panel

Switch a switch maintains a table of MAC addresses by port and forwards network data packets to only the port that matches the MAC address. This significantly reduces collisions. A router manages IP traffic between networks. A bridge separates two network segments and forwards data packets from one segment to another. A patch panel organizes network cables and connects inbound and outbound cables.

Which of the following load balancer algorithms takes each server's active connections and processing power into consideration? Answer Round robin Least connections Weighted least connections Weighted round robin

Weighted least connections

How do switches and bridges learn where devices are located on a network? Answer When a data packet enters a port, the source IP address is copied from the data packet header. When a data packet enters a port, the destination IP address is copied from the data packet header. When a data packet enters a port, the destination MAC address is copied from the data packet header. When a data packet enters a port, the source MAC address is copied from the data packet header.

When a data packet enters a port, the source MAC address is copied from the data packet header.

Which of the following is the root level in www.testout.com.'s fully qualified domain name? Answer . (period) testout www com

. (period)

You are currently learning about networking devices and have just learned about MAC addresses. You look up your device's MAC address, and it comes back as 00-B0-D0-06-BC-AC. Which portion of this MAC address can tell you who the manufacturer is? Answer 00-B0 06-BC-AC BC-AC 00-B0-D0

00-B0-D0

Which of the following wireless networking standards uses a frequency of 5 GHz and supports data transmission speeds up to 2.6 Gbps? Answer 802.11a 802.11g 802.11n 802.11ac 802.11b

802.11n

Which of the following proxy server roles stores frequently accesses data so that a user's request never has to leave the network for retrieval? Answer Sharing Internet Connections VPN Firewall Caching

Caching

Which of the following protocols do email clients use to download messages from a remote mail server? AnswerCorrect Answer: POP3 SNMP SMTP FTP

POP3

What type of operating system do embedded devices use? Answer Non-deterministic Windows Linux Real-time operating system

Real-time operating system

Which port must be opened on the firewall of a Windows system so that a Remote Desktop connection can be established? Answer: 3389 123 23 22

3389

Which frequencies does Zigbee operate on? Answer 500 MHz 1.4 GHz 2.4 GHz 908.42 MHz

2.4 GHz

Which type of embedded device microprocessor is custom designed to perform a specific function? Answer SoC ARM ASIC FPGA

ASIC

You want to use a wireless keyboard and mouse with your laptop computer. Which method could you utilize for the wireless connection? Answer 802.11g wireless Bluetooth PS/2 IEEE 1394 USB

Bluetooth

Which algorithm is used by an Application layer load balancer? Answer Source IP hash Least pending request Weighted least connections Round robin

Least pending request The source IP hash, weighted least connections, and round robin algorithms are all used by NETWORK LAYER load balancers

Which network protocol do controller systems use to communicate with each other? Answer HTTP ARP ICMP Modbus

Modbus

A user pays for a retail purchase by placing a smartphone next to the merchant's reader. Which of the following wireless mobile device connections is this? Answer Bluetooth MicroUSB NFC Lightning

NFC

Which of the following locations will contribute the greatest amount of interference to a wireless access point? (Select two.) Answer Near backup generators Near cordless phones Near DCHP servers Near exterior walls The top floor of a two-story building

Near backup generators Near cordless phones

Which of the following are technologies that Bluetooth utilizes? (Select two.) Answer: Personal area network (PAN) Red spectrum light waves 5.75 GHz radio wireless 2.4 GHz radio wireless Line-of-sight transmission

Personal area network (PAN) 2.4 GHz radio wireless

Currently, your company is in the process of upgrading security in the company headquarters building by installing biometric sensors to limit access to specific rooms. Your network switches are PoE-enabled, which allows biometric sensors to connect to switches without an external power source. Which of the following PoE standards is designed for use with biometric sensors? Answer PoE++ PoE+ Standard PoE Higher-power PoE

PoE+

Which of the following internet appliances filters specific internet content categories and also keeps internal users anonymous? Answer Content filter Unified Threat Management Proxy server Spam gateway

Proxy server

Which of the following is an inherent vulnerability of embedded devices? Answer Vulnerable to malware Open systems Unknown environments Known environments

Unknown environments

ou are a software developer, and you're creating a multimedia streaming application. Data will be streamed from your streaming server to clients over IP networks. Which transport protocol should your application use to send data between the clients and the server? Answer ICMP UDP SNMP TCP

UDP

You are using a patch panel to connect the computers in your building to the appropriate switches, and you need to connect the Ethernet wires from the building network port cables to the patch panel. Where do you connect the wires on a patch panel? Answer: Yon connect the wires to the backside of the panel. You connect the wires to the frontside of the panel. You connect the incoming wires to the front and the outgoing wires to the back. You connect the outgoing wires to the front and the incoming wires to the back.

Yon connect the wires to the backside of the panel

Match each network type on the left with the appropriate description on the right. Each network type may be used once, more than once, or not at all. A network in a small geographic area that typically uses wires to connect systems together. correct answer: Local Area Network (LAN) A small network used for connecting devices, such as a notebook computer, a wireless headset, a wireless printer, and a smartphone. correct answer: Personal Area Network (PAN) A network that is typically owned and managed by a city as a public utility. correct answer: Metropolitan Area Network (MAN) A group of networks that are geographically isolated, but are connected to form a large internetwork. correct answer: Wide Area Network (WAN) Similar to a standard LAN, but uses radio signals instead of wires to connect systems together. correct answer: Wireless Local Area Network (WLAN) A network that covers an area as small as a few city blocks to as large as an entire city. correct answer: Metropolitan Area Network (MAN) A set of subnets connected to each other, typically by wires, using at least one router. correct answer: Local Area Network (LAN)

-LANa network in a small geographic area that typically uses wire to connect systems together- PAN a small network used for connecting devices, such as a notebook computer, a wireless headset, a wireless printer, and a smartphone- MAN a network that is typically owned and managed by a city as a public utility- WAN a group on networks that are geographically isolated, but are connected to form a large internetwork- WLAN similar to a standard LAN, but uses radio signals instead of wires to connect systems together- MAN a network that covers an area as small as a few city blocks to as large as an entire city- LAN a set of subnets connected to each other, typically by wires, using at least one router

Which of the following represents the valid decimal range of an IPv4 address? Answer 0 to 100 0 to F 0 to 255 1 to 254

0 to 255

Drag each wireless networking technology on the left to its associated transmission distance limitation on the right. Each technology may be used more than once. 1. Up to 100 meters for Class 1 devices. 2. Up to 2 meters with a few obstacles in between. 3. Up to 10 meters for Class 2 devices. 4. A few centimeters. bluetooth, NFC, Infrared

1. Bluetooth ----100 meters; 2. Infrared---- 2 meters 3. bluetooth---10 meters 4. NFC----a few centimeters

You have a small home network that uses 192.168.1.0 with the default subnet mask for the network address. The default gateway address is 192.168.1.254, and the router is providing DHCP on the network. The Wrk2 computer has been assigned the IP address of 192.168.1.55. Which of the following is considered the loopback address for the Wrk2 computer? Answer 192.168.1.55 192.168.1.0 192.168.1.254 127.0.0.1 192.168.1.255

127.0.0.1

Which of the following describes an IPv6 address? (Select two.) Answer 64-bit address 32-bit address Eight hexadecimal quartets Four decimal octets 128-bit address

128-bit address Eight hexadecimal quartets

Which of the following are valid IPv6 addresses? (Select two.) Answer 141:0:0:0:15:0:0:1 343F:1EEE:ACDD:2034:1FF3:5012 6384:1319:7700:7631:446A:5511:8940:2552 165.15.78.53.100.1 A82:5B67:7700:AH0A:446A:779F:FFE3:0091

141:0:0:0:15:0:0:1 6384:1319:7700:7631:446A:5511:8940:2552

Your Windows workstation has Automatic Private IP Addressing (APIPA) implemented with default settings. Which of the following TCP/IP addresses could you automatically assign to the system, should your DHCP server go down or become inaccessible? Answer 169.198.1.23 10.0.0.65 169.254.1.26 172.16.1.26 192.168.1.22 168.254.10.25

169.254.1.26 The default address range used by APIPA is 169.254.0.1 to 169.254.255.254. Of the options presented, only 169.254.1.26 falls within this range.

In the IP address 192.168.1.52 with the subnet mask 255.255.255.0, which portion represents the network ID? Answer 52 192.168 192.168.1 192

192.168.1

An administrator configures a server to run the TCP/IP suite protocol that allows users to download files contained in specific directories on the server and also protects access to those files by requiring user authentication. Which of the following TCP/IP port numbers allow this protocol to work properly? (Select two.) Answer 20 21 53 80 110

20 21 FTP uses ports 20 and 21. DNS uses port 53. HTTP uses port 80. POP3 email clients use port 110.

Which of the following is the maximum transmission speed for Bluetooth v3 and v4 devices when using High Speed (HS) mode? Answer 24 Mbps 48 Mbps 3 Mbps 1 Mbp

24 Mbps

What is the maximum distance between hops that is allowed by a Z-Wave device on a mesh network? Answer 250 feet 80 feet 200 feet 60 feet

250 feet z waves Zigbee devices have a maximum distance of 60 feet between each hop.

Which of the following correctly describe the most common format for expressing IPv6 addresses? (Select two.) Answer 32 numbers, grouped using colons Hexadecimal numbers Decimal numbers Binary numbers 128 numbers, grouped using colons

32 numbers, grouped using colons Hexadecimal numbers

You are a junior network technician for a small consulting firm. You have recently learned about IP addressing and run the ipconfig command on your local computer. The output from the command is: IPv4 Address..... 192.168.0.52 Subnet Mask..255.255.255.0 Default Gateway..192.168.0.1 Which of the following is the host ID? Answer 192.168.0.1 52 255.255.255 192.168.0

52

You are currently using a cellular network plan that provides maximum speeds of up to 10 Gbps for your smart phone. Which of the following cellular network types are you using? Answer 4G 5G 3G 2G

5G

You have recently purchased a toll pass for a bridge that you cross each day on your way to work. Which of the following wireless technologies is MOST likely being used for this pass? Answer Bluetooth Near Field Communication (NFC) Passive RFID Active RFID

Active RFID

A group of workers attend a team-building retreat at a remote cabin. They can place calls on their mobile smartphones, but the cabin has no wired phone, television, or wired internet connectivity. The workers need to access an internet web page through their laptop computers. Which of the following internet connection types might be available to the workers? Answer Dial-up DSL Cellular Cable

Cellular

Which of the following types of internet connection services allows you to be truly mobile while maintaining your internet connection? Answer Satellite ISDN BRI Cellular Mobile hotspot Wi-Fi

Cellular Mobile hotspots are devices that can be used to connect to a cellular network. ISDN is a landline-based technology. Wi-Fi is a technology that provides wireless access to a computer network, but is limited to the range of the wireless access point.

As the IT technician for your company, you need to ensure that IP addresses are automatically assigned to hosts, while at the same time preventing the same address from being assigned twice. Which of the following services would be BEST to use? Answer ICMP TCP DHCP IGMP

DHCP

You want to implement name resolution on the Linux workstations in your company. Which protocol should you use to do this? Answer: DNS WINS LMHOSTS file NTP SMTP

DNS

Which of the following are IoT systems that work together to make communication between two endpoints possible? (Select two.) Answer Wi-Fi Data storage Middleware Gateway system Access gateway

Data storage & Gateway system

What is a base-10 numbering system also known as? Answer ARP Binary Hexadecimal Decimal

Decimal

Which TCP/IP configuration parameter identifies the router that is used to reach hosts on remote networks? Answer Default gateway DNS server address Alternate IP address Hostname WINS server address Subnet mask

Default gateway The default gateway identifies the router that packets for remote networks are sent to. The subnet mask identifies which portion of the IP address is the network address. The WINS server address identifies the WINS server that is used to resolve NetBIOS hostnames to IP addresses. The DNS server address identifies the DNS server that is used to resolve hostnames to IP addresses. The alternate IP address identifies IP addressing information to be used in the event that the DHCP server cannot be reached. The hostname identifies the local system's logical nam

A technician has configured a client computer's network interface to request an IP address. Which of the following TCP/IP suite protocols does the client computer use to perform the request and receive an IP address from a server? Answer Domain Name System (DNS) Dynamic Host Configuration Protocol (DHCP) Simple Network Management Protocol (SNMP) Lightweight Directory Access Protocol (LDAP)

Dynamic Host Configuration Protocol (DHCP)

The following is an example of an IPv6 address: FEC0:1319:7700:F631:446A:5511:CC40:25AB Which part of the example IPv6 address is the prefix? Which quartet in the example IPv6 prefix is used to identify the subnet? Which part of the example IPv6 address is the interface ID?

FEC0:1319:7700:F631 first 4 quartets 25AB----the last quartet 446A:5511:CC40:25AB---last 4 quartets

Which of the following is a valid IPv6 address? Answer FEC0:9087:AB04:9900:7GA2:7788:CEDF:349A FEC0:AB98::A7::9845:4567 FEC0:AB04:899A FEC0::AB:9007 199.12.254.11

FEC0::AB:9007

You want to allow your users to download files from a server running the IP protocol. You also want to protect access to the files by requiring user authentication to access specific directories on the server. Which IP protocol should you implement to provide this capability? Answer SSH LDAP SNMP SMTP FTP TFTP

FTP

You are configuring an ADSL connection. Which of the following will be part of the configuration? Answer F-type connectors Filters or splitters Analog modem An RG6 cable

Filters or splitters

Which of the following UTM appliances monitors all network traffic and blocks malicious traffic while notifying the network security team? Answer Anti-malware Firewall Firewall NAT

Firewall

As a network administrator for your company, you want to set up a network device that manages traffic leaving and entering your network from the outside. Which of the following would BEST meet your requirements? Answer VPN Reverse proxy server Content filter Forward proxy server

Forward proxy server

You have subscribed to a satellite radio service that you use in your car to access music and news on long trips through areas where cellular service is not available. However, when going through long tunnels and heavily forested canyons, you sometimes lose your signal for a short period of time. Which of the following satellite technologies is your service provider using? Answer GEO LEO ADSL SDSL

GEO

Which of the following components of a IPv4 address will be unique for each network device? Answer Host ID Subnet mask Network protocol Network ID

Host ID

Which of the following protocols is often combined with TCP to send data across the internet? Answer IP ICMP FTP UDP

IP IP is responsible for determining how to deliver the data between two hosts, and TCP is responsible for the segmenting and sequencing of the data packets.

A technician is configuring the static TCP/IP settings on a client computer. Which of the following configurations are needed for internet communications? (Select three.) Answer IP address with a subnet mask (IPv4) or subnet prefix length (IPv6) Alternate IP address WINS address Default gateway address DNS server address APIPA address DHCP server address

IP address with a subnet mask (IPv4) or subnet prefix length (IPv6 Default gateway address DNS server address

Which of the following actions would allow you to access the internet on your laptop via a cellular network? Answer Connect your wireless access point to the cellular network with a USB dongle and then connect the laptop to the access point using an 802.11b/g/n connection. Install a cellular USB adapter in a open port on your laptop. Connect the laptop to the RJ11 jack in your office. Connect the cell phone to the PHONE port on the dial-up modem in your office and connect the laptop to the LINE port on the modem.

Install a cellular USB adapter in a open port on your laptop.

You are setting up a small network in your office with one Windows server and 50 Windows workstations. You want to spend as little time as possible configuring the workstations with IP addressing information. What is the BEST solution to reduce the time required to configure the workstations with IP addressing information? Answer Install the DHCP service on each workstation. Install and configure the DHCP service on your server. Install the WINS service on your server. Assign each user an IP address and instruct the user to enter the IP address in his or her computer.

Install and configure the DHCP service on your server.

Which of the following is a network that uses internet technologies, but the data and services are only available to the hosts connected to the private network? Answer Subnet Internetwork Extranet Intranet

Intranet

You are working as a junior network technician for the local hospital system. Part of your duties include adding IT news and updates to the hospital's internal web site. The website is only accessible to employees when they are connected to the hospital network. What is this type of website known as? Answer Intranet Internetwork Subnet Extranet

Intranet

Which of the following all-in-one security appliance (UTM) functions detects intrusions and alerts the network but does not block traffic? Answer Intrusion detection VPN Anti-spam Intrusion protection

Intrusion detection

Which of the following statements about Dynamic Host Configuration Protocol (DHCP) are true? (Select two.) Answer The DHCP server detects workstations when they attach to the network and automatically delivers IP addressing information to them. It can deliver a DNS server address in addition to the host IP address. It can only deliver IP addresses to hosts. A workstation must request addressing information from a DHCP server. It cannot be configured to assign the same IP address to the same host each time it boots.

It can deliver a DNS server address in addition to the host IP address. A workstation must request addressing information from a DHCP server.

Which of the following BEST describes how a switch functions? Answer It connects multiple cable segments or devices and broadcasts data packets to all of its connected hosts. It connects multiple cable segments for different architectures and translates data packets to forward them to the appropriate host. It connects multiple cable segments or hosts and forwards data packets to the appropriate host. It connects multiple cable segments for different architectures and translates data packets to broadcast them to all connected hosts.

It connects multiple cable segments or hosts and forwards data packets to the appropriate host.

A printer is behaving erratically; you suspect a faulty parallel port. Which tool can you use to test the parallel port? Answer Cable tester Loopback plug Ammeter Multimeter

Loopback plug

Your workstation is unable to communicate with any other computer on the network. Which of the following tools should you use to test the network card's abilities to send and receive signals? Answer Loopback plug Multimeter ping command Cable tester

Loopback plug

Which of the following are characteristics of the 802.11g wireless standard? (Select three.) Answer Backwards compatible with 802.11a devices. Operates in the 5.75 GHz range. Maximum bandwidth of 54 Mbps. Operates in the 2.4 GHz range. Backwards compatible with 802.11b devices. Maximum bandwidth of 11 Mbps.

Maximum bandwidth of 54 Mbps Operates in the 2.4 GHz range. Backwards compatible with 802.11b devices.

What are the standards called that define how data is formatted and transmitted over a network? Answer Network ID: Networking protocols Transmission medium Network interface

Networking protocols

Which of the following terms refers to a network resource sharing model that uses access control lists saved on each computer? Answer Client/server Peer-to-peer Extranet Intranet

Peer-to-peer

A group of workers in an office space communicate with each other on their smartphones and tablet devices through an ad hoc network linked using Bluetooth technology protocols. Which of the following network types is in use? Answer Local Area Network (LAN) Personal Area Network (PAN) Wide Area Network (WAN) Metropolitan Area Network (MAN)

Personal Area Network (PAN) A piconet is an ad hoc network that connects personal devices and runs over Bluetooth technology. A piconet is an example of a PAN.

Which of the following DHCP scope options will assign a static IP configuration to a device using the device's MAC address? Answer Default gateway Reservation Exclusion IP range

Reservation

A homeowner's connection to the internet is through an always-on modem that connects to existing telephone wiring and has the same upload and download speeds. The homeowner is able to make analog phone calls over the same wiring at the same time. Which of the following internet connection types are they using? Answer ISDN SDSL Cable ADSL Dial-up

SDSL

A healthcare organization provides mobile clinics throughout the world and needs to transfer patients' statistical data to a central database via the internet. Which network technology would be BEST to use to ensure network connectivity for any clinic located anywhere in the world, even remote areas? Answer Dial-up Satellite ISDN Cable modem DSL

Satellite

Which of the following items of information does a packet header contain? (Select three.) Answer Sender ACK data How to deliver the packet TFTP data Receiver SYN data Data chunk order

Sender Receiver Data chunk order

While setting up a home office, a technician disables the DHCP service on the office router, but does not want to rely on link-local addressing. Which of the following IP addressing methods should they use? Answer APIPA Dynamic Alternate Static

Static Without DCHP, many network hosts assign their own non-routable link-local IP address. To avoid link-local addresses when DHCP addressing is unavailable, you can assign static addresses to all devices that communicate on the local network.

A host on your network provides a service that requires the server to always use the same IP address. Which IP addressing method can you use to manually assign the specific IP address? Answer Static IP addressing APIPA IP addressing Dynamic IP addressing Link-local addressing Alternate IP configuration

Static IP addressing

which of the following network types uses special hardware to provide high-speed access to storage across the network? Answer Local area network Storage area network Client-server network Peer-to-peer network

Storage area network

Which of the following BEST describes the purpose for which loopback plugs are used? Answer Testing ports by returning output signals as input. Connecting computers together without using network cards or modems. Removing broken pins within sockets. Grabbing and lifting small object

Testing ports by returning output signals as input.

Which of the following identify an IPv6 address's prefix component? (Select two.) Answer The last 64 bits of an IPv6 address. The first four quartets of an IPv6 address. The first 64 bits of an IPv6 address. The last quartet of an IPv6 address. The last four quartets of an IPv6 address. The first quartet of an IPv6 address.

The first four quartets of an IPv6 address. The first 64 bits of an IPv6 address.

Which of the following identifies the interface ID component of an IPv6 address? (Select two.) Answer The fourth quartet of an IPv6 address. The last four quartets of an IPv6 address. The last 64 bits of an IPv6 address. The first quartet of an IPv6 address. The first four quartets of an IPv6 address. The last quartet of an IPv6 address.

The last four quartets of an IPv6 address. The last 64 bits of an IPv6 address.

Which of the following describes the part of the IPv6 address that identifies the subnet address? Answer The last quartet in the IPv6 address prefix. The last quartet in the IPv6 address interface ID. The first quartet in the IPv6 address interface ID. The first quartet in the IPv6 address prefix.

The last quartet in the IPv6 address prefix.

You are installing a satellite connection so that your home office can connect to the internet. Which of the following statements is true? Answer The connection to your computer from the satellite modem uses an RJ11 or F-type connector. The connection between the satellite modem and dish uses a USB cable and connector. You must have at the least one available phone line for data uploads. The satellite dish must be pointed in the correct direction to communicate properly.

The satellite dish must be pointed in the correct direction to communicate properly.

You need to trace the route that a Cat 6 UTP cable takes through the ceiling and walls of your building. Which tool should you use? Answer Loopback plug Multimeter Cable tester Tone generator

Tone generator cable tester tests UTP cables for continuity and resistance. A multimeter is used to measure electrical voltage and resistance. A loopback plug is used to test network communications by redirecting a signal from the transmit port on a device to the receive port on the same device

A maintenance worker accidently nicks a bundle of network cables routed to multiple wall jacks in a conference room. Only one of the cable's wires are severed. A technician is tasked with replacing the cable. Which of the following tools would the technician MOST likely use to identify which wall jack connects to the severed cable? Answer Loopback plug A maintenance worker accidently nicks a bundle of network cables routed to multiple wall jacks in a conference room. Only one of the cable's wires are severed. A technician is tasked with replacing the cable. Which of the following tools would the technician MOST likely use to identify which wall jack connects to the severed cable? Answer Loopback plug Tone generator and probe Cable stripper Multimetere Cable stripper Multimeter

Tone generator and probe A tone generator and probe can be used to identify the wall jack connected to the severed wire. The tone generator can be attached to the severed wire, and the probe will sound when it is brought close to the connected wall jack.

Which of the following are options for connecting a computing device, such as a notebook computer or tablet, to a cellular network? (Select four.) Answer Use an integrated transmitter to connect the device directly to the cellular network through a satellite. Use the device's Wi-Fi to connect to the network through a cellular Wi-Fi hot spot. Use a USB cellular adapter to connect the device directly to the cellular network. Use an integrated cellular antenna to connect the device directly to the cellular network. Use a USB cable to connect the device to the network through a smartphone. Use the device's Wi-Fi to connect to the cellular network through a cable modem's Wi-Fi antenna. Use a USB transmitter to connect the device directly to the cellular network through a satellite. Use a USB cable to connect the device to the cellular network through a cable modem.

Use the device's Wi-Fi to connect to the network through a cellular Wi-Fi hot spot. Use a USB cellular adapter to connect the device directly to the cellular network. Use an integrated cellular antenna to connect the device directly to the cellular network. Use a USB cable to connect the device to the network through a smartphone.

A SOHO's connection to the internet is through an antenna that sends and receives a microwave signal to the ISP's antenna. There can be no obstacles on the direct path between the two antennae. Which of the following internet connection types is this? Answer Satellite DSL Fiber WISP

WISP wireless internet service provider (WISP) uses microwave or radio frequency signals between two antennae. The direct patch between the antennae cannot be blocked.

A Windows workstation is configured to receive its IP configuration information from a DHCP server on the company network. The user at the workstation reports that she cannot use email and is unable to reach the internet. Using the ipconfig command, you see that the workstation has been assigned the following special IP configuration: IP address: 169.254.0.1 Subnet mask: 255.255.0.0 What is this special IP configuration called? Why did the workstation receive this type of configuration?

What is this special IP configuration called? Automatic Private IP Addressing (APIPA) Why did the workstation receive this type of configuration? The workstation was unable to contact the DHCP server.

What are the two mesh protocols that are used most often with IoT devices? (Select two.) Answer Zbot Zerg Z-Wave Zensys Zigbee

Zigbee & Z-Wave

You want to connect your internal network to an external network in order to provide internet access to your employees. Which of the following network components is designed to make this type of connection? Answer Switch PoE Router Hub

router

You've just installed the DNS service on a Windows server. Which port must be opened on the server's firewall to allow clients to access the service? Answer 53 143 110 123

53 DNS 143 pop3 110 http 123 NTP

Which data transmission rate is defined by the IEEE 802.11b wireless standard? Answer 54 Mbps 150 Mbps 10 Mbps 11 Mbps 2 Mbps

11 Mbps IEEE 802.11a and 802.11g defines wireless transmission rates up to 54 Mbps. The IEEE 802.3 standard defines Ethernet 10baseT cable-based transmissions of 10 Mbps. IEEE 802.11n defines wireless transmission rates of up to 600 Mbps.

Which of the following IP addresses belong to the 114.0.0.0 Class A network? Assume that the network is indicated by the default Class A portion of the IP address. (Select three.) Answer 114.0.0.15 115.88.0.55 114.58.12.0 114.122.66.12 115.77.89.4 115.0.0.66

114.0.0.15 114.58.12.0 114.122.66.12 a Class A network, the first octet indicates the network address. All hosts on the network must have the same value in the first octet (114).

A user is configuring an email client application and decides to use a TCP/IP suite protocol that stores all messages on the email server so that they can be synchronized across a laptop, a smartphone, and a web email client. In addition, this protocol stores the email messages on the email server until the user explicitly deletes them. Which of the following TCP/IP port numbers will the client application typically access while using this protocol to contact the email server? 21 80 110 143

143 The TCP/IP suite protocol that stores email messages on a server so that they can be synchronized across multiple devices is Internet Message Access Protocol (IMAP). IMAP typically uses port 143. FTP uses port 21. HTTP uses port 80. POP3 uses port 110.

Which wireless standard can stream data at a rate of up to 54 Mbps using a frequency of 5 GHz? Answer 802.11b 802.11n 802.11g 802.11a

802.11a 802.11a can stream data at a rate of up to 54 Mbps using a frequency of 5 GHz. 802.11b can stream data at a rate of up to 11 Mbps using a frequency of 2.4 GHz. 802.11g can stream data at a rate of up to 54 Mbps using a frequency of 2.4 GHz. 802.11n can stream data at a rate of up to 600 Mbps using a frequency of 2.4 GHz or 5 GHz.

A customer is experiencing a sporadic interruption of their Wi-Fi network in one area of their building. A technician investigates and discovers signal interference caused by a microwave oven. The customer approves replacing the wireless access point that covers the area, but asks that the wireless speed also be increased. Which of the following Wi-Fi standards should the replacement device support to BEST fulfill the customer's needs? Answer 802.11g 802.11b 802.11ac 802.11a

802.11ac The microwave oven interferes with wireless signals that operate at 2.4 GHz. The 802.11ac standard is the best choice. It operates at 5.0 GHz and has a maximum speed of 2.6 Gbps

You are designing a wireless network for a client. Your client needs the network to support a data rate of at least 150 Mbps. In addition, the client already has a wireless telephone system installed that operates 2.4 GHz. Which 802.11 standard works BEST in this situation? Answer 802.11n 802.11a 802.11b 802.11g

802.11n

Which of the following are examples of web server platforms? (Select two.) Answer Apache IIS SMTP DNS DHCP

Apache & IIS Apache and Internet Information Services (IIS) are both examples of web server platforms. Windows servers use IIS and Linux uses Apache.

Which of the following technologies does the 802.11ac wireless networking standard use to provide increased bandwidth and communication speeds? (Select two.) Answer Peer-to-peer mode to allow each host to communicate directly with other hosts. MU-MIMO to allow multiple users to access the same channel. Channel bonding to combine more channels in the 5 GHz band to allow more than double the bandwidth. Dual-band transmission to allow data to be transmitted at two frequencies at the same time. OFDM modulation to allow several parallel data channels to stream data.

Channel bonding to combine more channels in the 5 GHz band to allow more than double the bandwidth. MU-MIMO to allow multiple users to access the same channel.

You want to configure a Windows workstation with your network proxy server's IP address from Control Panel using the Internet Properties window. Click on the tab in the Internet Properties window that you would use to do this.

Click the Connections tab To configure the proxy server's IP address, go to Control Panel > Network and Internet > Internet Options. Click the Connections tab and then select LAN settings. In the dialog displayed, you can enable a proxy server for the LAN and then enter the proxy server's IP address and port number.

Employees complain to the company IT division that they are spending considerable time and effort discarding unwanted junk email. Which of the following should the IT division implement? Answer Email filtering Antivirus Firewall Multi-factor authentication

Email filtering

You are assembling components in a network rack and need a device that connects three network segments. Which of the following devices will meet your networking needs? Answer Wireless controller Ethernet patch panel Ethernet router Ethernet switch

Ethernet router Ethernet switch lets you connect multiple devices to the same network segment, but does not connect the network segments. A wireless controller monitors and manages wireless access points in a wireless network architecture. An Ethernet patch panel provides an easy way to connect devices and accommodate different types of cabling, such as twisted-pair and fiber optic cables.

You are the network administrator for a small consulting firm. The firm has recently rolled out a new intranet site, and you are responsible for configuring the DNS. You are able to connect to the intranet site by using the IP address, but you cannot connect by using the hostname. Which of the following do you need to configure to access the site with the hostname? Answer Forward lookup zone Dynamic DNS Reverse lookup zone CNAME record

Forward lookup zone

A local dentist has contracted with you to implement a network in her new office. Because of security concerns related to patient privacy laws, she has asked that the new network meet the following criteria and be cost effective: No one from the internet should be able to access her internal network. Email messages should be scanned for spam, phishing attacks, and malware before they reach users' workstations. Employees access to non-work-related websites, especially sites that contain inappropriate content, should be blocked. A system should be put in place to detect and prevent external attacks on her network. Which of the following would BEST meet your client's criteria? Answer Implement a firewall. Implement an email security appliance. Implement a content filter. Implement an intrusion prevention system (IPS). Implement an all-in-one UTM security appliance.

Implement an all-in-one UTM security appliance.

One of your customers has a long range wireless network that connects two company office buildings together. The buildings are several hundred yards apart. You have licensed a frequency range of 3.65 GHz to transmit signals between the buildings. However, the wireless connection is not performing ideally, and it sometimes drops connections. Which of the following is the BEST immediate solution to try to resolve this issue? Answer Try using an unlicensed 801.11 frequency standard. . License a different frequency range. Increase the power to the access points.

Increase the power to the access points.

You would like to control internet access based on user, time of day, and websites visited. Which of the following actions would BEST meet your criteria? Answer Configure internet zones using Internet Options. Configure each system's Local Security Policy to add access restrictions based on time of day and content. Configure a packet-filtering firewall. Add rules to allow or deny access based on time of day and content. Enable Windows Firewall on each system. Add or remove exceptions to control access based on time of day and content. Install a proxy server. Allow internet access only through the proxy server.

Install a proxy server. Allow internet access only through the proxy server.

Which of the following BEST describes the Edge Technology layer of the IoT architecture? Answer It includes all the hardware parts in the IoT system. It includes the processes that happen in the cloud. It is the main bridge between two endpoints in an IoT system. It delivers the analyzed and processed data to the end user.

It includes all the hardware parts in the IoT system.

Which of the following wireless communication technologies can be described as follows? It has a limited transmission range of less than two inches. It is used with credit cards and passports. It is slower than other wireless technologies. It constantly emits a signal. Answer Infrared in diffuse mode NFC Bluetooth Infrared in line-of-sight mode IEEE 1394

NFC

Which of the following protocols is non-routable and requires another protocol to enable internetwork communications? AnswerCorrect Answer: NetBIOS AppleTalk over IP IPX Incorrect answer: IP

NetBIOS NetBIOS is a non-routable protocol. It is often combined with IPX or IP to enable internetwork communications. NetBIOS was used in earlier versions of Windows but is rarely used today because nearly every operating system supports IP. IP is the protocol suite used on the internet and is supported by all major operating systems. IPX is the protocol suite used by legacy NetWare servers. AppleTalk over IP is the protocol used to allow older AppleTalk computers to use IP for internetwork communication.

Which of the following network components is responsible for converting digital data into a signal that can be transmitted? Answer: Network interface Transmission medium Switch Protocol

Network interface network interface (NIC) converts the digital data into a signal that can be transmitted along the transmission medium. Devices are connected together using a transmission medium. Examples include twisted pair cabling, fiber optics, or wireless radio signals. They do not convert the data into a digital signal. Switches are used to connect multiple computers inside of a network together

As a network administrator for your company, you want to set up a network device that manages internal traffic between servers and clients. Which of the following would BEST meet your requirements? Answer VPN Content filter Reverse proxy server Forward proxy server

Reverse proxy server A reverse proxy server is placed between the servers and client machines "INTERNALLY" to monitor traffic between them. A forward proxy server manages traffic that is leaving and entering the network from the outside. A content filter is a role of a proxy server that is designed to block traffic by regulating incoming and outgoing connection requests. This prevents users from accessing websites they shouldn't have access to.

Which device is responsible for forwarding traffic in between networks? Answer Network interface Access point Switch Router

Router Switches are used to connect multiple computers inside of a network together. They do not forward data to other networks. Access points are used to connect wireless network hosts. They do not forward data to other networks. The network interface (NIC) converts the digital data into a signal that can be transmitted along the transmission medium. They do not forward data to other networks.

A company has built a video streaming service that supplies training videos. Quickly transmitting video data to customers is more important than guaranteed delivery. Which of the following Transport layer IP suite protocols is MOST likely used for this service? Answer Internet Control Message Protocol (ICMP) File Transfer Protocol (FTP) User Datagram Protocol (UDP) Transport Layer Protocol (TCP

User Datagram Protocol (UDP)

To assist a user, a help desk technician is able to take advantage of a Windows proprietary network protocol that allows the technician to open a graphical interface to connect with the user's Windows computer. Which of the following TCP/IP port numbers is the default port used by this protocol? Answer 80 143 443 3389

3389

While working on a Windows workstation, you enable Remote Desktop. Which of the following ports MUST be open on the server's firewall to allow remote clients to access the desktop through Remote Desktop? Answer 123 389 3389 110

3389

You need a type of wireless connection that can transfer data between your phone, PDA, and laptop. You are transferring sensitive information. Which of the following is the BEST choice for this wireless connection? Answer Bluetooth Infrared Wireless Ethernet Cellular WAN

Bluetooth Bluetooth connection is the best choice because it automatically detects Bluetooth-enabled devices and creates a wireless PAN between them. Bluetooth can be used for both voice and data signals, and it also provides 128-bit encryption to protect sensitive information in transit.

Which email authentication technology performs all of the tasks listed below? Verifies the email sender. Tells the recipient what to do if no authentication method passes. Allows the recipient to tell the sender about messages that pass or fail authentication. Answer ICMP DKIM DMARC SPF

DMARC combines the protections of both DKIM and SPF to protect users from malicious emails. DMARC: Verifies the email sender. Tells the recipient what to do if no authentication method passes. Allows the recipient to tell the sender about messages that pass or fail authentication.

Which of the following is a specialized controller that you can use to remotely manage all your network devices? Answer SDN PoE VLAN SSH

SDN Software-defined networking (SDN) consists of a specialized controller that can remotely manage all network devices.

You have been contacted by OsCorp to recommend a wireless internet solution. The wireless strategy must support a transmission range of 150 feet, use a frequency range of 2.4 GHz, and provide the highest possible transmission speeds. Which of the following wireless solutions should you recommend? Answer 802.11ac 802.11g 802.11b 802.11a

802.11g

Which type of wireless technology increases bandwidth for a home wireless network by using multiple antennae for both the transmitter and receiver? Answer Channel bonding Radio waves Long-range MIMO

MIMO (multiple-input, multiple-output) increases bandwidth by using multiple antennae for both the transmitter and receiver. Channel bonding combines two non-overlapping 20 MHz channels into a single 40 MHz channel, long-range wireless network is typically set up to connect two buildings together on the same network. Radio waves are the basic technology for all wireless networks

An after-school care center allows children to browse the internet. They want to limit the websites that the children can access. Which of the following network hosts would MOST likely provide this service? Answer Print server Proxy server Web server DHCP server

Proxy server One function of a proxy server is to intercept requests from a client browser and either forward them on to the internet or deny access to that request

While making an online bank transaction, a customer checks to see that the web browser is displaying a lock icon that indicates that an encrypted TCP/IP suite protocol is being used. Which of the following TCP/IP port numbers does this protocol typically use when the browser encrypts its communications with the bank's web server? Answer 25 80 143 443

443 HTTPS TCP/IP suite protocol web browsers use for encrypted communications is HTTPS.

Which of the following are not valid IPv4 addresses? (Select three.) Answer 45.22.156.256 116.0.0.116 1.55.254.3 122.0.0.0 257.0.122.55 145.8.260.7 132.64.32.8

45.22.156.256 257.0.122.55 145.8.260.7 IP addresses have a value between 0 and 255 within each octet. In this list, 45.22.156.256, 145.8.260.7, and 257.0.122.55 are not valid IP addresses.

Based on the back view of the network rack below, match each component on the left to the label displayed on the network rack image. A Ethernet switch, Ethernet Patch Panel, Ethernet Router B Server, fiber Patch Panel C D E

A - Ethernet router B - Ethernet switch C - Ethernet patch panel D - Fiber patch panel E - Server

Match each smart device with its description. Drag Learns from your habits and schedule, allows you to control the climate in your home remotely, shows you energy consumption in real time, and adjusts itself depending on ambient conditions. Allows you to control hardwired lights, ceiling fans, fireplaces, small appliances, and garbage disposals. Can change colors, track motion, stream audio over Bluetooth, and double as a connected camera, but it's only smart when turned on. It doesn't work when turned off. Easy solution for making small appliances (such as lamps, coffee makers, and toasters) smart. Uses an RF transmitter. May include such features as motion detection, scheduled recording, remote viewing, and automatic cloud storage. Uses a wireless protocol and a cryptographic key to execute the authorization process. It can also monitor access and send alerts related to the status of the device. Uses voice recognition software and activates through a Wake Word or Hot Word. Drop Thermostat Switch Bulb Plug Security camera

A smart thermostat learns from your habits and schedule, allows you to control the climate in your home remotely, shows you energy consumption in real time, and adjusts itself depending on ambient conditions. A smart switch allows you to control hardwired lights, ceiling fans, fireplaces, small appliances, and garbage disposals. A smart bulb can change colors, track motion, stream audio over Bluetooth, and double as a connected camera, but it's only smart when turned on. A smart plug is an easy solution for making appliances such as lamps, coffee makers, and toasters smart. A smart security camera uses an RF transmitter and may include such features as motion detection, scheduled recording, remote viewing, and automatic cloud storage. A smart door lock uses a wireless protocol and a cryptographic key to execute the authorization process. A smart door can also monitor access and send alerts related to a device's status. A smart speaker/digital assistant uses voice recognition software and activates through a Wake Word or Hot Word.

You are working as a junior technician for a small consulting firm. You have been tasked with installing a new computer on the network. You have performed this task and connected the computer to the network. To verify network connectivity, you decide to ping the network server. Before this can happen, the new device needs to know the MAC address of the network server so it can match it to the IP address. The computer sends a broadcast message, asking who has the IP address. The network server responds with its MAC address, and now the computer can communicate with the server. Which protocol is being used when sending the broadcast message to match the MAC address to the IP address? Answer IP ICMP ARP HTTP

ARP ARP is used to match a device's IP address to its MAC address. Some network devices, such as switches, will build tables to match MAC addresses with IP addresses in order to always know where to send packets to. When a host wants to send some data, it uses ARP to send a broadcast message out on the network, requesting that the host with a specific IP address respond with its MAC address. When the sending host gets the response, it can then match up the MAC address and IP address.

Which of the following functions are performed by proxy servers? (Select two.) Answer Cache web pages. Filter unwanted email. Block unwanted packets from entering your private network. Store client files. Block employees from accessing certain websites.

Block employees from accessing certain websites. Cache web pages. ( save) When a proxy receives a request from the client, the proxy checks to verify that the client is allowed access to the website. If they are, the proxy then checks its cache to see if the requested page is there.(saved) If the page is already cached, the proxy server fulfills the request by displaying the requested page from the cache rather than retrieving it from the internet. Receiving a web page from a local proxy server is much faster than downloading the page from the internet.

Your employer wants a system that guarantees that all components will work together with minimal configuration and setup. Time is of the essence in getting this new system ready. Which of the following would BEST meet your emoloyer's needs? Answer SCADA DCS HMI PLC

DCS distributed control system (DCS) would be the best option. A DCS is a customized, all-in-one package that contains the needed PLCs, SCADA controller, and HMI. DCSs are typically custom-designed for specific needs. PLC is a specialized controller that can be programmed to perform specific tasks SCADA) controllers are used to monitor and control PLC systems human-machine interface (HMI) can be either a touchscreen control panel or software running on a typical computer system.

A technician has configured a client computer's network interface with server addresses to which the client will send requests for translating fully qualified domain names (FQDNs) to IP addresses and IP addresses to FQDNs. Which of the following TCP/IP suite protocols is used by the client to perform the request and also used by a server to respond to those requests? Answer Server Message Block (SMB) Dynamic Host Configuration Protocol (DHCP) Secure Shell (SSH) Domain Name System (DNS)

DNS DNS associates readily recognizable domain names to numerical IP addresses. DHCP is used by clients to request an IP address and by a server to offer an IP address. SMB is used for shared access to files and miscellaneous communications between hosts on a network. This protocol also provides an authenticated inter-process communication mechanism. SSH allows network services to communicate securely over an unsecure network (for example, secure remote login to computer systems by users).

Which of the following keeps track of various network devices while ensuring that the software is secure? Answer Syslog server All-in-one security appliance Endpoint management server Firewall

Endpoint management server

You are in the process of setting up an Ethernet network for a new building at your company's headquarters. You need to connect the wires from the different Ethernet office wall plates to your network rack. Which of the following components on the network rack should you use to connect the wires from the office wall plates? Answer UPS Ethernet patch panel Ethernet switch Ethernet router

Ethernet patch panel Ethernet patch panel typically terminates wires that run from different Ethernet office wall plates Once you have terminated the wires on the patch panel, you can then use patch cables (Ethernet cables with RJ-45 connectors) to connect these ports to the Ethernet switch.

Which protocols are used on the internet to transmit web pages from web servers to web browsers running on client workstations? (Select two.) AnswerCorrect Answer: HTTPS HTML NNTP Correct Answer: HTTP SMTP XML

HTTPS and HTTP

Which of the following hardware devices regenerates a signal out to all connected ports without examining the frame or packet contents? Answer Bridge Router Switch Gateway Hub

HUB A hub and a repeater send received signals out all other ports. These devices do not examine the frame or packet contents. A switch and/or bridge use a frame's MAC address for forwarding decisions. A router uses a packet's IP address for forwarding decisions.

What are two major concerns regarding IoT devices? (Select two.) Answer Privacy Short lifespan Availability Hacking Accessibility

Hacking & Privacy

Which of the following is a disadvantage of using a UTM? Answer Requires a separate endpoint management server. Has a single point of failure. Is more expensive than using separate security appliances. Does not include a spam filter.

Has a single point of failure.

Which of the following protocols is used by an email client to retrieve messages from an email server, giving users the option to keep mail messages on the server? Answer NTP SMTP IMAP POP3

IMAP SMTP allows a user to send email to a server, POP3 server is also used by a mail client to retrieve messages from a mail server, but it requires that the messages be deleted from the server after they've been downloaded. NTP synchronizes all network computer clocks.

Which of the following is an example of a logical address? Answer ARP address MAC address IPv4 address Gateway address

IPv4 address Logical addresses are assigned by software, which means that they can be easily changed or assigned (unlike a physical address)(MAC). Logical addresses can be used by many different protocols, but the most common are IPv4 addresses.

A user is configuring an email client application and plans to use a standard TCP/IP suite protocol to retrieve email messages from an email server. Which of the following TCP/IP suite protocols can be used to retrieve email messages? (Select two.) Answer Lightweight Directory Access Protocol (LDAP) Internet Message Access Protocol (IMAP) Simple Mail Transfer Protocol (SMTP) Post Office Protocol (POP3) Simple Network Management Protocol (SNMP)

Post Office Protocol (POP3) Internet Message Access Protocol (IMAP)

You've used your Windows workstation to map a drive to a shared folder on a Windows server. Which protocol was used to access the share? AnswerIncorrect answer: SFTP LDAP RDP SMB

SMB Server Message Block (SMB) is used by Windows systems to access shared resources over the network. Lightweight Directory Access Protocol (LDAP) is used to access information stored in a server's directory service. Remote Desktop Protocol (RDP) is used to access remote systems' desktops. Secure File Transfer Protocol (SFTP) is used to securely transfer files between hosts.

Which protocol is used to send email messages from a mail client to a mail server? Answer IMAP SMTP FTP SNMP POP3

SMTP SMTP sends email from a mail client to a mail server. FTP provides a generic method for transferring files SNMP is used in network management systems to monitor network-attached devices POP3 and IMAP are both email protocols used by mail clients to retrieve email from a mail serve

You are working as a junior security technician for a consulting firm. One of your clients is upgrading their network infrastructure. The client needs a new firewall and intrusion prevention system installed. They also want to be able to block employees from visiting certain types of websites. The client also needs a VPN. Which of the following internet appliances should you install? Answer Load balancer Proxy server Unified Threat Management Spam gateway

Unified Threat Management

Which of the following proxy server roles allows users to connect to the internet anonymously with their data encrypted during transmission? Answer Firewall Caching Sharing Internet Connections VPN

VPN


Conjuntos de estudio relacionados

Chapter 4: Stress, Exercise & Mobility

View Set

Spanish Speaking Countries and what they are know for!!! Dillon

View Set

Chapter 14, 15, 16 Manufacturing Test Quizlet

View Set

A+P II Lab: Ex. 5: Digestive System

View Set

Additional TB Health Assessment Questions chapters

View Set

HS 354 Sources of Retirement Income

View Set