CompTIA A+ - Networking
A symmetric digital subscriber line (SDSL) uses a modem that connects to copper telephone lines, allows the use of the internet and phone calls at the same time, and provides the same upload and download speeds. Dial-up internet is an older technology that converts digital signals to analog signals that are sent and received over telephone wiring. Consequently, the modem and a phone cannot be used at the same time. ISDN is an older technology that uses telephone lines. Its maximum bandwidth is 128 Kbps. Cable internet connections use a modem that connects to coaxial cables that are traditionally used to provide cable television. An asymmetric digital subscriber line (ADSL) uses the same type of hardware as SDSL, but has different upload and download speeds.
A homeowner's connection to the internet is through an always-on modem that connects to existing telephone wiring and has the same upload and download speeds. The homeowner is able to make analog phone calls over the same wiring at the same time. Which of the following internet connection types are they using?
The default ports match with the following protocols: Port 22: Secure Shell (SSH) Port 80: HyperText Transfer Protocol (HTTP) Port 443: HyperText Transfer Protocol Secure (HTTPS) Port 445: Server Message Block (SMB/CIFS) directly over TCP Port 143: Internet Message Access Protocol (IMAP) Port 427: Service Location Protocol (SLP) Port 548: Apple Filing Protocol (AFP)
Match each port number on the left with its associated protocol on the right.
Some wireless access points allow the power to be increased. Increasing the power allows the access point to transmit a longer distance and possibly resolve transmission issues. However, doing so can lead to overheating and instability. Licensing a different frequency range can be expensive, take time, and may not resolve the issue. An unlicensed 801.11 frequency standard does not provide the transmission distance to cover several hundred yards (maximum range is up to 300 feet). A dual-band access point only provides transmissions at 2.4 GHz and 5 GHz, which does not provide sufficient transmission distance.
One of your customers has a long range wireless network that connects two company office buildings together. The buildings are several hundred yards apart. You have licensed a frequency range of 3.65 GHz to transmit signals between the buildings. However, the wireless connection is not performing ideally, and it sometimes drops connections. Which of the following is the BEST immediate solution to try to resolve this issue?
In this example of an IPv6 address, FEC0:1319:7700:F631:446A:5511:CC40:25AB FEC0:1319:7700:F631 is the prefix. The quartet used to identify the subnet is F631 (the last quartet in the prefix). 446A:5511:CC40:25AB is the interface ID.
The following is an example of an IPv6 address: FEC0:1319:7700:F631:446A:5511:CC40:25AB
A wide area network (WAN) is connected to the router using a small form-factor pluggable (SFP) connector. A local area network (LAN) is connected to the router using an RJ45 cable. A wireless network uses a wireless controller on the network rack to monitor and manages wireless access points. DHCP (Dynamic Host Configuration Protocol) is a network management protocol used to automate the process of configuring devices on IP networks. It is not a type of network.
The router below provides several ports for connecting two or more network segments or subnets. The port circled in red is a small form-factor pluggable (SFP) connector. Which type of network can connect to this port?
Hackers and privacy are two majors concerns for IoT users. Because IoT devices are closely connected, all a hacker has to do is exploit one vulnerability to manipulate all the data, rendering it unusable. Additionally, companies that make and distribute consumer IoT devices could use those devices to obtain and sell users' personal data. Short lifespan, availability, and accessibility are not concerns with IoT devices, as they last a relatively long time and are available worldwide.
What are two major concerns regarding IoT devices? (Select two.)
Z-Wave devices allow up to 250 feet between hops on a mesh network. Zigbee devices have a maximum distance of 60 feet between each hop.
What is the maximum distance between hops that is allowed by a Z-Wave device on a mesh network?
An Application layer load balancer most commonly uses the least pending request (LPR) algorithm. This algorithm monitors all pending requests and routes them to the most available server. This algorithm allows the load balancer to instantly make adjustments in case there's a sudden surge of incoming connections while still monitoring all server loads. The source IP hash, weighted least connections, and round robin algorithms are all used by Network layer load balancers.
Which algorithm is used by an Application layer load balancer?
The IEEE 802.11b standard defines wireless transmission rates up to 11 Mbps. 802.11b wireless network interface cards and wireless access points (also called wireless hubs or wireless routers)automatically negotiate the best transmission speed. The speed is up to 11 Mbps, based on current network traffic load and the quality of the wireless connection between the client and access point. The wireless communications are affected by distance, dense physical obstructions, and electromagnetic interference. IEEE 802.11a and 802.11g defines wireless transmission rates up to 54 Mbps. The IEEE 802.3 standard defines Ethernet 10baseT cable-based transmissions of 10 Mbps. IEEE 802.11n defines wireless transmission rates of up to 600 Mbps.
Which data transmission rate is defined by the IEEE 802.11b wireless standard?
The Edge Technology layer of the IoT architecture includes all the hardware parts in the IoT system, such as sensors and RFID tags. The Internet layer is the main bridge between two endpoints in an IoT system. The Middleware layer includes the processes that happen in the cloud, such as in-depth processing, data management, and data filtering. The Application layer is the top layer in the IoT architecture. Its primary responsibility is to deliver the analyzed and processed data to the end user.
Which of the following BEST describes the Edge Technology layer of the IoT architecture?
An IPv6 IP address is a 128-bit address listed as eight 16-bit hexadecimal sections. Leading 0s can be omitted in each section. 6384:1319:7700:7631:446A:5511:8940:2552 is a valid IPv6 IP address. A single set of all-zero sections can be abbreviated with two colons (::). 141::15:0:0:1 would also be a valid way of writing that address. Digits in a hexadecimal system range from 0 to 9 and A to F. H is not a valid hexadecimal number. 343F:1EEE:ACDD:2034:1FF3:5012 is too short, having only six sections instead of eight.
Which of the following are valid IPv6 addresses? (Select two.)
Embedded devices are sealed systems, which means that they are typically unknown environments. This means that the security administrator will not always know which hardware is in the device. Embedded devices are not inherently more vulnerable to malware. Because they are usually custom devices, malware would most likely have to be custom-built to effect the device. Embedded devices are not considered known environments or open systems, so they would not be inherent vulnerabilities.
Which of the following is an inherent vulnerability of embedded devices?
Bluetooth v3 and v4 devices have a maximum transmission speed of 24 Mbps when using High Speed (HS) mode. Bluetooth v1 devices have a maximum transmission speed of 1 Mbps. Bluetooth v2 devices have a maximum transmission speed of 3 Mbps. Bluetooth v5 devices have a maximum transmission speed of 48 Mbps when using High Speed (HS) transmission mode.
Which of the following is the maximum transmission speed for Bluetooth v3 and v4 devices when using High Speed (HS) mode?
The .(period) at the end of the FQDN (fully qualified domain name) is the root level. The root level is the highest level in the DNS hierarchy. When typing the FQDN into a web browser, the period is typically not included. The period is mainly used when defining DNS records on the server. In this example, com is the top-level domain (TLD). The TLD is the second level in the DNS hierarchy. TLDs have extensions such as com, edu, org, and many others. www is the FQDN's hostname. testout is the FQDN's domain name.
Which of the following is the root level in www.testout.com.'s fully qualified domain name?
An endpoint management server is a way to keep track of various devices while ensuring that software is secure. Many companies that need small IT department overhead use this option. An all-in-one security appliance (UTM) combines several security functions into a single hardware device. However, it is not designed to help you keep track of various network devices. A firewall is a hardware device or software that allows you to filter incoming and outgoing network traffic. A syslog server stores event messages, but is not designed to help you keep track of various network devices.
Which of the following keeps track of various network devices while ensuring that the software is secure?
IMAP allows a mail server to keep a copy of a user's messages on the server after they're downloaded to the mail client. SMTP allows a user to send email to a server, but it can't be used to retrieve messages from the server. A POP3 server is also used by a mail client to retrieve messages from a mail server, but it requires that the messages be deleted from the server after they've been downloaded. NTP synchronizes all network computer clocks.
Which of the following protocols is used by an email client to retrieve messages from an email server, giving users the option to keep mail messages on the server?
DHCP servers deliver IP addresses as well as other host configuration information to network hosts. DHCP can be configured to assign any available address to a host, or it can assign a specific address to a specific host. DHCP clients, typically workstations, must send a request to a DHCP server before the server sends IP addressing information to them.
Which of the following statements about Dynamic Host Configuration Protocol (DHCP) are true? (Select two.)
The application-specific integrated circuit (ASIC) chip is created to perform a specific function. These chips are typically custom-designed and used by a company in a single product. The process to develop these chips is very expensive, time-consuming, and resource-intensive, but they offer high performance with low power consumption. A system-on-chip (SoC) includes the processor, memory, peripheral functions, and other components all on one board. A Field Programmable Gate Array (FPGA) is physically set up like a ASIC or SoC, but the programming is configured by the end user. ARM microprocessors are typically used in mobile devices, not embedded devices.
Which type of embedded device microprocessor is custom designed to perform a specific function?
802.11a can stream data at a rate of up to 54 Mbps using a frequency of 5 GHz. 802.11b can stream data at a rate of up to 11 Mbps using a frequency of 2.4 GHz. 802.11g can stream data at a rate of up to 54 Mbps using a frequency of 2.4 GHz. 802.11n can stream data at a rate of up to 600 Mbps using a frequency of 2.4 GHz or 5 GHz.
Which wireless standard can stream data at a rate of up to 54 Mbps using a frequency of 5 GHz?
An Ethernet router is a device that connects two or more network segments or subnets. This would meet your networking needs. An Ethernet switch lets you connect multiple devices to the same network segment, but does not connect the network segments. A wireless controller monitors and manages wireless access points in a wireless network architecture. An Ethernet patch panel provides an easy way to connect devices and accommodate different types of cabling, such as twisted-pair and fiber optic cables.
You are assembling components in a network rack and need a device that connects three network segments. Which of the following devices will meet your networking needs?
At speeds of up to 10 Gbps, you are using a 5G cellular network type. The other listed cellular network types provide the following maximum speeds: 2G - 14.4 Kbps 3G - 42 Mbps 4G - 300 Mbps
You are currently using a cellular network plan that provides maximum speeds of up to 10 Gbps for your smart phone. Which of the following cellular network types are you using?
You should use a proxy server to control internet access based on user, time of day, and websites visited. You would configure these rules on the proxy server, and all internet access requests would be routed through the proxy server using these rules. You use a packet-filtering firewall, such as Windows Firewall, to allow or deny individual packets based on characteristics such as source or destination address and port number. You configure internet zones to identify trusted or restricted websites and to control the types of actions that can be performed when going to those sites.
You would like to control internet access based on user, time of day, and websites visited. Which of the following actions would BEST meet your criteria?
The DNS service runs on port 53 by default. POP3 uses port 110. IMAP uses port 143. NTP uses port 123.
You've just installed the DNS service on a Windows server. Which port must be opened on the server's firewall to allow clients to access the service?
An IPv6 address is a 128-bit binary number that uses the first 64 bits as the address prefix and the last 64 bits of the address as the interface ID. The 128-bit binary number is organized into 32 hexadecimal numbers that are organized further into eight quartets. The first four quartets correspond with the first 64 bits of the IPv6 address.
Which of the following identify an IPv6 address's prefix component? (Select two.)
Address Resolution Protocol (ARP) is used to match a device's IP address to its MAC address. Some network devices, such as switches, will build tables to match MAC addresses with IP addresses in order to always know where to send packets to. When a host wants to send some data, it uses ARP to send a broadcast message out on the network, requesting that the host with a specific IP address respond with its MAC address. When the sending host gets the response, it can then match up the MAC address and IP address. Internet Control Message Protocol (ICMP) is used when sending ping packets, but it is not used to match a MAC address to an IP address. HyperText Transfer Protocol (HTTP) defines how pages with hyperlinks (web pages) are designed. It is not used to match a MAC address to an IP address. Internet Protocol (IP) defines how data moves across a network. IP is not used to match the MAC address to an IP address.
You are working as a junior technician for a small consulting firm. You have been tasked with installing a new computer on the network. You have performed this task and connected the computer to the network. To verify network connectivity, you decide to ping the network server. Before this can happen, the new device needs to know the MAC address of the network server so it can match it to the IP address. The computer sends a broadcast message, asking who has the IP address. The network server responds with its MAC address, and now the computer can communicate with the server. Which protocol is being used when sending the broadcast message to match the MAC address to the IP address?
A tone generator and probe can be used to identify the wall jack connected to the severed wire. The tone generator can be attached to the severed wire, and the probe will sound when it is brought close to the connected wall jack. A multimeter measures voltage, current, and resistance on a wire. A loopback plug can be plugged into a network adapter to test whether the NIC can send and receive properly. A cable stripper is used to cut away the plastic jacket or coating from a network cable.
A maintenance worker accidently nicks a bundle of network cables routed to multiple wall jacks in a conference room. Only one of the cable's wires are severed. A technician is tasked with replacing the cable. Which of the following tools would the technician MOST likely use to identify which wall jack connects to the severed cable?
Embedded devices use a real-time operating system (RTOS). This operating system handles processes in a deterministic manner. Windows and Linux handle tasks in a non-deterministic way. This basically means that there is no guarantee when a task will be completed, but the system will do its best to stay responsive. These operating systems are not used in embedded devices.
What type of operating system do embedded devices use?
DMARC combines the protections of both DKIM and SPF to protect users from malicious emails. DMARC: Verifies the email sender. Tells the recipient what to do if no authentication method passes. Allows the recipient to tell the sender about messages that pass or fail authentication. DomainKeys Identified Mail (DKIM) does protect against spoofed emails by verifying the sender's domain address. However, DKIM does not meet all of the listed requirements. Sender Policy Framework (SPF) creates a record in the sender's DNS server. Email recipients can check this record and verify the sender's IP address. However, SPF does not meet all of the listed requirements. Internet Message Access Protocol (IMAP) is used for incoming email and operates on port 143. Emails are kept on the email server, allowing users to access their email from multiple devices. ICMP is not a email authentication technology.
Which email authentication technology performs all of the tasks listed below? Verifies the email sender. Tells the recipient what to do if no authentication method passes. Allows the recipient to tell the sender about messages that pass or fail authentication. AnswerIncorrect answer:
Zigbee is a specification based on IEEE 802.15.4 that operates on the 2.4 GHz frequency. This means that ZigBee signals can clash with wireless networks and other devices that run at the commonly used 2.4 GHz range. Z-Wave operates at 908.42 MHz, which means that Z-Wave users don't really have to worry about conflicting with other devices.
Which frequencies does Zigbee operate on?
Modbus is a special network protocol that controller systems use to communicate with each other. Modbus originally ran through a serial interface, but has evolved to work over Ethernet and TCP/IP. Internet Control Message Protocol (ICMP) is used when sending ping packets. It is not used by controller systems to communicate. HyperText Transfer Protocol (HTTP) defines how pages with hyperlinks (web pages) are designed. It is not used by controller systems to communicate. Address Resolution Protocol (ARP) is used to match a device's IP address to its MAC address. ARP is not used by controller systems to communicate.
Which network protocol do controller systems use to communicate with each other?
To access content on your computer (laptop): Install a cellular adapter in a PCMCIA, ExpressCard, or USB slot. Install and configure the software to use the card. An RJ11 connection is typically for analog phones and is used for DSL, ISDN, and dial-up internet connections. Dial-up internet connections use two ports on the modem: The LINE port connects the modem to the wall jack. The PHONE port connects the modem to the analog phone. Typically, you cannot connect a USB device, such as a cellular adapter, to a wireless access point.
Which of the following actions would allow you to access the internet on your laptop via a cellular network?
Two of the four IoT systems that work together for endpoint communication include the gateway system and data storage. The gateway system connects an IoT device to the cloud, while data storage is the system in the cloud that stores, processes, and analyzes the data. The access gateway is the layer of the IoT architecture that compresses the gathered data to an optimal size for analysis. Middleware is another layer of the IoT architecture that includes cloud processes, such as device information discovery and access control. Wi-Fi is one of the IoT's communication protocols.
Which of the following are IoT systems that work together to make communication between two endpoints possible? (Select two.)
Bluetooth is a wireless networking standard that uses 2.4 GHz radio waves. These are the same type of radio waves used with 802.11 wireless networking, so the radio transmission can go through walls (it is not limited to line-of-sight connections). Bluetooth devices communicate using what is called a personal area network (PAN), which is similar to an ad hoc wireless network. Infrared uses red spectrum light waves and is limited to line-of-sight transmissions.
Which of the following are technologies that Bluetooth utilizes? (Select two.)
IP version 6 addresses are made up of 32 hexadecimal numbers organized into eight quartets. The quartets are separated by colons. An IPv6 address is a 128-bit number (128 binary digits). IP version 4 addresses use decimal numbers organized into four octets and separated by periods.
Which of the following correctly describe the most common format for expressing IPv6 addresses? (Select two.)
A proxy, or proxy server, stands between client computers and web servers. You can use a proxy server to prevent access to specific websites or to cache (save) frequently used web pages. When a proxy receives a request from the client, the proxy checks to verify that the client is allowed access to the website. If they are, the proxy then checks its cache to see if the requested page is there. If the page is already cached, the proxy server fulfills the request by displaying the requested page from the cache rather than retrieving it from the internet. Receiving a web page from a local proxy server is much faster than downloading the page from the internet.
Which of the following functions are performed by proxy servers? (Select two.)
Logical addresses are assigned by software, which means that they can be easily changed or assigned (unlike a physical address). Logical addresses can be used by many different protocols, but the most common are IPv4 addresses. A MAC address is an example of a physical address A gateway address is an IP address that is typically assigned to the router ARP is a protocol used to match a device's IP address to its MAC address
Which of the following is an example of a logical address?
The maximum ranges for Bluetooth versions include the following: Version 1.0 - 10 meters Versions 2.0 and 3.0 - 30 meters Version 4.0 - 60 meters Version 5.0 - 240 meters
Which of the following is the maximum range of the Bluetooth 2.0 specification?
NetBIOS is a non-routable protocol. It is often combined with IPX or IP to enable internetwork communications. NetBIOS was used in earlier versions of Windows but is rarely used today because nearly every operating system supports IP. IP is the protocol suite used on the internet and is supported by all major operating systems. IPX is the protocol suite used by legacy NetWare servers. AppleTalk over IP is the protocol used to allow older AppleTalk computers to use IP for internetwork communication.
Which of the following protocols is non-routable and requires another protocol to enable internetwork communications?
The 802.11ac wireless network standard increases bandwidth and communication speeds using the following technologies: MU-MIMO is an enhancement to MIMO that allows multiple users to use the same channel. In addition to adding MU-MIMO, 802.11ac doubled the number of MIMO radio streams from four to eight. Channel bonding combines two non-overlapping 20 MHz channels into a single 40 MHz channel, resulting in slightly more than double the bandwidth. All the other technologies are not used to increase the bandwidth and communication speeds for 801.11ac.
Which of the following technologies does the 802.11ac wireless networking standard use to provide increased bandwidth and communication speeds? (Select two.)
Cellular networking uses the cellular phone infrastructure for internet access. The computing device, such as a notebook or tablet, must have a cellular antenna to connect directly to the cellular network. You can travel anywhere and stay connected to the network, as long as you are within the cellular service provider's coverage area. You can also connect a computing device to a cellular network by tethering it to a smartphone or by using a smartphone as a Wi-Fi hotspot. Mobile hotspots are devices that can be used to connect to a cellular network. Wi-Fi is a technology that provides wireless access to a computer network, but is limited to the range of the wireless access point. Satellite networking requires a satellite dish, which is not truly mobile. ISDN is a landline-based technology.
Which of the following types of internet connection services allows you to be truly mobile while maintaining your internet connection?
To connect to the internet through an ADSL connection, you need to install an internal DSL card in a single computer or connect a DSL router to the phone line. You then use filters (splitters) on the line everywhere that an analog phone is used. Analog modems are used for dial-up internet access. F-type connectors and RG-6 cable are used for cable internet access.
You are configuring an ADSL connection. Which of the following will be part of the configuration?
All network ports in a building terminate at a patch panel. The Ethernet cables are punched down and terminate on the backside of the patch panel. The front of the patch panel consists of RJ-45 ports. An Ethernet cable runs from the patch panel to the network switch to provide the connection between a device that is connected to the network port and the switch. There are no specified incoming or outgoing wires on an Ethernet cable.
You are using a patch panel to connect the computers in your building to the appropriate switches, and you need to connect the Ethernet wires from the building network port cables to the patch panel. Where do you connect the wires on a patch panel?