CompTIA Server + SK0-004 Chap 8

Pataasin ang iyong marka sa homework at exams ngayon gamit ang Quizwiz!

Which of the following is a standard method of implementing NIC teaming? A. 802.1ax-2008 B. 802.3 C. 802.1x D. 802.3g

A. Combining physical links can be done using proprietary methods, and there is also an IEEE standard for the process called 802.3ad, later replaced by 802.1ax-2008.

Which of the following is not a FQDN? A. tmcmillan B. tmcmillan.acme.com C. ws5.ajax.com D. smitht.smithcorp.com

A. Fully qualified domain names (FQDN) identify the host and the location of the hostname in the DNS namespace of the organization. It consists of at least two parts and perhaps more. All FQDNs will have a hostname and a domain name.

Which of the following is an example of a link local IPv6 address? A. FE80::2237:06FF:FECF:67E4/64 B. FE80::1/64 C. ::1 D. FEC0: 2237:06FF:FECF:67E4/64

A. In IPv6, there is a type of address called a link local address that in many ways is like an APIPA address in that the device will generate one of these addresses for each interface with no intervention from a human, as is done with APIPA. The devices always generate the address using the same IPv6 prefix (the equivalent of a network ID in IPv4), which is FE80::/64. The reminder of the address is created by spreading the 48-bit MAC address across the last 64 bits.

Which of the following do you edit to affect a DNS suffix search list in Linux? A. resolv.conf B. suffix.lst C. search.lst D. resolv.sfx

A. In a Linux environment, creating a DNS suffix search list can be done by editing a file called resolv.conf, which is located at /etc/resolv.conf.

Which of the following services uses port number 22? A. SFTP B. NTP C. HTTP D. HTTPS

A. Secure File Transfer Protocol over SSH, or SFTP, is a version of FTP that is encrypted by SSH. Since it operates over an SSH session and SSH uses port 22, SFTP uses port 22.

When does a device use a DNS suffix search list? A. At all times B. When an unqualified hostname is encountered C. When an FQDN is encountered D. When the users select to use the list

B. In many instances, users make references to unqualified hostnames when accessing resources. When this occurs, DNS needs to know how to handle these unqualified domain names. It is possible to configure a list of domain names called "suffixes" for the DNS to append to unqualified hostnames and the order in which they should be tried.

Which of the following has lost favor to SSH because it sends data—including passwords— in plain-text format? A. POP3 B. Telnet C. RDP D. IMAP

B. Telnet is a protocol that functions at the Application layer of the OSI model, providing terminal-emulation capabilities. Telnet runs on port 23, but has lost favor to SSH because Telnet sends data—including passwords—in plain-text format.

When implementing CIDR, what configuration setting is manipulated to size the subnet as desired? A. IP address B. Subnet mask C. Default gateway D. Duplex

B. Using CIDR, administrators can create smaller networks called subnets by manipulating the subnet mask of a larger classless or major network ID. This allows you to create a subnet that is much closer in size to what you need, thus wasting fewer IP addresses and increasing performance in each subnet.

Which statement is false with regard to WINS? A. It is an alternate method of locating devices that is based on the use of NetBIOS names. B. It performs hostname name resolution on behalf of WINS clients. C. It is mostly used in Windows environments. D. In the absence of a WINS server, clients requiring NetBIOS name resolution will resort to other methods that create much more network traffic.

B. WINS servers perform NETBIOS name resolution on behalf of WINS clients.

Which of the following is a method of spreading the 48-bit MAC across 64 bits so that it can be used as the last 64 bits of the 128-bit IPv6 address? A. TACACS B. EIU-64 format C. TACACS+ D. MAC-48 format

B. When EUI-64 is used, it doesn't actually change the format of the physical 48-bit MAC address. It is a method of spreading the 48-bit MAC across 64 bits so that it can be used as the last 64 bits of the 128-bit IPv6 address.

Which of the following is the IPv6 prefix of an auto-configured address? A. 127.0.0.1 B. FE80:: C. ::1 D. FEC0:

B. When auto-configuration is used, the first hextet will always be FE80::. The rest of the address will be derived from the MAC address of the device.

Which of the following tools is used to set the speed and duplex of an interface in Windows? A. Network and Sharing B. Device Manager C. Server Manager D. Devices and Printers

B. You set the speed and duplex of an interface by using the Configuration button found in the Properties window of the network card in Device Manager.

12. Which of the following parts of a MAC address identify the manufacturer of the interface? A. UAA B. BAA C. OUI D. EUI-64

C. Each part of this address communicates information. The left half of the address is called the organizationally unique identifier (OUI). The right half is called the universally administered address (UAA). Together they make a globally unique MAC address.

Using which pair of configurations will result in a crossover cable? A. T568A and T568A B. T568B and T658B C. T568A and T568B D. T568A and a completely reversed wiring pattern

C. If the same standard is used on each end, the cable will be a straight-through cable, and if a different standard is used on either end, it will be a crossover cable. If one end is completely reversed, it results in a rollover cable.

1. Which of the following is the loopback address in IPV6? A. 127.0.0.1 B. FE80:: C. ::1 D. FEC0:

C. In IPv6 the loopback address is all zeroes in every hextet except the last. Closing up the first seven hextets with a double colon results in ::, and the one in the last hextet results in ::1 after omitting the leading zeroes in the last hextet.

Which of the following is the port number for SMTP? A. 21 B. 161 C. 25 D. 20

C. Simple Mail Transfer Protocol (SMTP) is a protocol for sending email. SMTP uses port 25 by default.

What file do you edit in Linux to configure the Ethernet 6 interface to be used in a NIC team? A. ifcfg-eth1 B. ifcfg-bond0 C. ifcfg-eth6 D. ifcfg-bond6

C. To configure Ethernet 6 to be used as a slave by a NIC team, open the ifcfg-eth6 file and edit it as follows. In this case, the NIC team will be created and identified as bond0. # vi /etc/sysconfig/network-scripts/ifcfg-eth1 DEVICE="eth1" TYPE=Ethernet ONBOOT="yes" BOOTPROTO="none" USERCTL=no MASTER=bond0 SLAVE=yes

Which of the following is an APIPA address? A. 168.254.3.3 B. 172.16.5.9 C. 192.168.5.9 D. 169.254.5.6

D. Automatic Private IP Addressing (APIPA) is a TCP/IP feature Microsoft added to their operating systems. If a DHCP server cannot be found and the clients are configured to obtain IP addresses automatically, the clients automatically assign themselves an IP address, somewhat randomly, in the 169.254.x.x range with a subnet mask of 255.255.0.0.

Which is the category of cable required for 10 Gbps transmissions? A. CAT 3 B. CAT 5 C. CAT 5e D. CAT 6

D. CAT6 transmits data at speed up to 10 Gbps, has a minimum of 250 MHz of bandwidth, and specifies cable lengths up to 100 meters (using CAT6a).

Which of the following is not a private IP address? A. 10.0.0.5 B. 172.16.5.9 C. 192.168.5.9 D. 172.32.63

D. The Class B range of private IP addresses is from 172.16.0.0 to 172.31.255.255.


Kaugnay na mga set ng pag-aaral

Pamahalaan at Programa Para sa Kababaihan sa Silangan at Timog-Silangang Asya

View Set

Hinkle 56 Health Promotion and Maintenance

View Set

Semistructured and Structured Interviews - Ch.3

View Set

Practice Exam 1 - Part 1 - Question 1 - 30

View Set