A+ Domain 2 Networking
Which of the following is the root level in www.testout.com.'s fully qualified domain name?
. (period)
When using TCP, two hosts first establish a connection through a three-way handshake. From the items on the left, drag the three valid steps in the three-way handshake process to the right in the appropriate order.
1. The first host sends a SYN packet asking to create a new session. 2. The receiving host replies with a SYN-ACK packet acknowledging that the session can be created. 3. The first host replies with the ACK packet, which then opens the session.
Which data transmission rate is defined by the IEEE 802.11b wireless standard?
11 Mbps
Internet Message Access Protocol (IMAP)
143
A user is configuring an email client application and decides to use a TCP/IP suite protocol that stores all messages on the email server so that they can be synchronized across a laptop, a smartphone, and a web email client. In addition, this protocol stores the email messages on the email server until the user explicitly deletes them. Which of the following TCP/IP port numbers will the client application typically access while using this protocol to contact the email server?
143 (IMAP)
An administrator configures a server to run the TCP/IP suite protocol that allows users to download files contained in specific directories on the server and also protects access to those files by requiring user authentication. Which of the following TCP/IP port numbers allow this protocol to work properly? (Select two.)
20 and 21 (FTP)
Secure Shell (SSH)
22
Which of the following is the maximum transmission speed for Bluetooth v3 and v4 devices when using High Speed (HS) mode?
24 Mbps
Which of the following is the maximum range of the Bluetooth 2.0 specification?
30 meters
To assist a user, a help desk technician is able to take advantage of a Windows proprietary network protocol that allows the technician to open a graphical interface to connect with the user's Windows computer. Which of the following TCP/IP port numbers is the default port used by this protocol?
3389 (remote desktop)
Which port must be opened on the firewall of a Windows system so that a Remote Desktop connection can be established?
3389 (remote desktop)
While working on a Windows workstation, you enable Remote Desktop. Which of the following ports MUST be open on the server's firewall to allow remote clients to access the desktop through Remote Desktop?
3389 (remote desktop)
Service Location Protocol (SLP)
427
HyperText Transfer Protocol Secure (HTTPS)
443
While making an online bank transaction, a customer checks to see that the web browser is displaying a lock icon that indicates that an encrypted TCP/IP suite protocol is being used. Which of the following TCP/IP port numbers does this protocol typically use when the browser encrypts its communications with the bank's web server?
443 (HTTPS)
Server Message Block (SMB/CIFS) directly over TCP
445
You've just installed the DNS service on a Windows server. Which port must be opened on the server's firewall to allow clients to access the service?
53 (DNS)
Apple Filing Protocol (AFP)
548
HyperText Transfer Protocol (HTTP)
80
Which wireless standard can stream data at a rate of up to 54 Mbps using a frequency of 5 GHz?
802.11a (The Bluetooth variants Imo are a pain to study so get ready there's a few of em)
Which IEEE wireless standards specify transmission speeds up to 54 Mbps? (Select two.)
802.11a, 802.11g
You have been contacted by OsCorp to recommend a wireless internet solution. The wireless strategy must support a transmission range of 150 feet, use a frequency range of 2.4 GHz, and provide the highest possible transmission speeds. Which of the following wireless solutions should you recommend?
802.11g
You are designing a wireless network for a client. Your client needs the network to support a data rate of at least 150 Mbps. In addition, the client already has a wireless telephone system installed that operates 2.4 GHz. Which 802.11 standard works BEST in this situation?
802.11n
Based on the back view of the network rack below, match each component on the left to the label displayed on the network rack image.
A. Ethernet router B. Ethernet switch C. Ethernet patch panel D. Fiber patch panel E. Server
Which type of embedded device microprocessor is custom designed to perform a specific function?
ASIC (Application specific integrated circuit)
You have recently purchased a toll pass for a bridge that you cross each day on your way to work. Which of the following wireless technologies is MOST likely being used for this pass?
Active RFID
Up to 10 meters for Class 2 devices.
Bluetooth
Up to 100 meters for Class 1 devices.
Bluetooth
You need a type of wireless connection that can transfer data between your phone, PDA, and laptop. You are transferring sensitive information. Which of the following is the BEST choice for this wireless connection?
Bluetooth
You want to use a wireless keyboard and mouse with your laptop computer. Which method could you utilize for the wireless connection?
Bluetooth
Which of the following functions are performed by proxy servers? (Select two.)
Cache web pages and Block employees from accessing certain websites
Which of the following proxy server roles stores frequently accesses data so that a user's request never has to leave the network for retrieval?
Caching
Which of the following technologies does the 802.11ac wireless networking standard use to provide increased bandwidth and communication speeds? (Select two.)
Channel bonding to combine more channels in the 5 GHz band to allow more than double the bandwidth and MU-MIMO to allow multiple users to access the same channel.
You want to configure a Windows workstation with your network proxy server's IP address from Control Panel using the Internet Properties window. Click on the tab in the Internet Properties window that you would use to do this.
Connections ( go to Control Panel > Network and Internet > Internet Options > Connection's)
Your employer wants a system that guarantees that all components will work together with minimal configuration and setup. Time is of the essence in getting this new system ready. Which of the following would BEST meet your employer's needs?
DCS (Distributed control system)
Which email authentication technology performs all of the tasks listed below? Verifies the email sender. Tells the recipient what to do if no authentication method passes. Allows the recipient to tell the sender about messages that pass or fail authentication.
DMARC
You want to implement name resolution on the Linux workstations in your company. Which protocol should you use to do this?
DNS
A technician has configured a client computer's network interface with server addresses to which the client will send requests for translating fully qualified domain names (FQDNs) to IP addresses and IP addresses to FQDNs. Which of the following TCP/IP suite protocols is used by the client to perform the request and also used by a server to respond to those requests?
Domain Name System (DNS)
A technician has configured a client computer's network interface to request an IP address. Which of the following TCP/IP suite protocols does the client computer use to perform the request and receive an IP address from a server?
Dynamic Host Configuration Protocol (DHCP)
Employees complain to the company IT division that they are spending considerable time and effort discarding unwanted junk email. Which of the following should the IT division implement?
Email filtering
Which of the following keeps track of various network devices while ensuring that the software is secure?
Endpoint management server
You are in the process of setting up an Ethernet network for a new building at your company's headquarters. You need to connect the wires from the different Ethernet office wall plates to your network rack. Which of the following components on the network rack should you use to connect the wires from the office wall plates?
Ethernet patch panel
You are assembling components in a network rack and need a device that connects three network segments. Which of the following devices will meet your networking needs?
Ethernet router
You want to allow your users to download files from a server running the IP protocol. You also want to protect access to the files by requiring user authentication to access specific directories on the server. Which IP protocol should you implement to provide this capability?
FTP (TFTP doesn't support user authentication)
You are the network administrator for a small consulting firm. The firm has recently rolled out a new intranet site, and you are responsible for configuring the DNS. You are able to connect to the intranet site by using the IP address, but you cannot connect by using the hostname. Which of the following do you need to configure to access the site with the hostname?
Forward lookup zone
As a network administrator for your company, you want to set up a network device that manages traffic leaving and entering your network from the outside. Which of the following would BEST meet your requirements?
Forward proxy server
Which protocols are used on the internet to transmit web pages from web servers to web browsers running on client workstations? (Select two.)
HTTP and HTTPS
Which of the following is a disadvantage of using a UTM?
Has a single point of failure.
Which of the following hardware devices regenerates a signal out to all connected ports without examining the frame or packet contents?
Hub
Which of the following are examples of web server platforms? (Select two.)
IIS and Apache
Which of the following protocols is used by an email client to retrieve messages from an email server, giving users the option to keep mail messages on the server?
IMAP
A user is configuring an email client application and plans to use a standard TCP/IP suite protocol to retrieve email messages from an email server. Which of the following TCP/IP suite protocols can be used to retrieve email messages? (Select two.)
IMAP and POP3
Which of the following protocols is often combined with TCP to send data across the internet?
IP
Which of the following UTM appliances monitors all network traffic and blocks malicious traffic while notifying the network security team?
IPS
A local dentist has contracted with you to implement a network in her new office. Because of security concerns related to patient privacy laws, she has asked that the new network meet the following criteria and be cost effective: No one from the internet should be able to access her internal network. Email messages should be scanned for spam, phishing attacks, and malware before they reach users' workstations. Employees access to non-work-related websites, especially sites that contain inappropriate content, should be blocked. A system should be put in place to detect and prevent external attacks on her network. Which of the following would BEST meet your client's criteria?
Implement an all-in-one UTM security appliance.
One of your customers has a long range wireless network that connects two company office buildings together. The buildings are several hundred yards apart. You have licensed a frequency range of 3.65 GHz to transmit signals between the buildings. However, the wireless connection is not performing ideally, and it sometimes drops connections. Which of the following is the BEST immediate solution to try to resolve this issue?
Increase the power to the access points.
Up to 2 meters with a few obstacles in between.
Infrared
You would like to control internet access based on user, time of day, and websites visited. Which of the following actions would BEST meet your criteria?
Install a proxy server. Allow internet access only through the proxy server.
Which of the following all-in-one security appliance (UTM) functions detects intrusions and alerts the network but does not block traffic?
Intrusion detection
Which of the following BEST describes how a switch functions?
It connects multiple cable segments or hosts and forwards data packets to the appropriate host.
Which algorithm is used by an Application layer load balancer?
Least pending request
Which type of wireless technology increases bandwidth for a home wireless network by using multiple antennae for both the transmitter and receiver?
MIMO (Multiple input, Multiple output)
Which network protocol do controller systems use to communicate with each other?
Modbus
A user pays for a retail purchase by placing a smartphone next to the merchant's reader. Which of the following wireless mobile device connections is this?
NFC
Which of the following wireless communication technologies can be described as follows? It has a limited transmission range of less than two inches. It is used with credit cards and passports. It is slower than other wireless technologies. It constantly emits a signal.
NFC
A few centimeters.
Near Field Communication
Which of the following locations will contribute the greatest amount of interference to a wireless access point? (Select two.)
Near cordless phones and Near backup generators
Which of the following protocols is non-routable and requires another protocol to enable internetwork communications?
NetBIOS
Which of the following network components is responsible for converting digital data into a signal that can be transmitted?
Network interface
What are the standards called that define how data is formatted and transmitted over a network?
Networking protocols
Which of the following are characteristics of the 802.11g wireless standard? (Select three.)
Operates in the 2.4 GHz range, Backwards compatible with 802.11b devices, Maximum bandwidth of 54 Mbps
Which of the following protocols do email clients use to download messages from a remote mail server?
POP3
Which of the following are technologies that Bluetooth utilizes? (Select two.)
Personal area network (PAN) and 2.4 GHz radio wireless
Currently, your company is in the process of upgrading security in the company headquarters building by installing biometric sensors to limit access to specific rooms. Your network switches are PoE-enabled, which allows biometric sensors to connect to switches without an external power source. Which of the following PoE standards is designed for use with biometric sensors?
PoE+
What are two major concerns regarding IoT devices? (Select two.)
Privacy and Hacking
An after-school care center allows children to browse the internet. They want to limit the websites that the children can access. Which of the following network hosts would MOST likely provide this service?
Proxy server
Which of the following internet appliances filters specific internet content categories and also keeps internal users anonymous?
Proxy server
What type of operating system do embedded devices use?
Real-time operating system
Which of the following DHCP scope options will assign a static IP configuration to a device using the device's MAC address?
Reservation
As a network administrator for your company, you want to set up a network device that manages internal traffic between servers and clients. Which of the following would BEST meet your requirements?
Reverse proxy server
Which device is responsible for forwarding traffic in between networks?
Router
You want to connect your internal network to an external network in order to provide internet access to your employees. Which of the following network components is designed to make this type of connection?
Router
Which of the following is a specialized controller that you can use to remotely manage all your network devices?
SDN
You've used your Windows workstation to map a drive to a shared folder on a Windows server. Which protocol was used to access the share?
SMB
Which protocol is used to send email messages from a mail client to a mail server?
SMTP
Which of the following items of information does a packet header contain? (Select three.)
Sender, Receiver, Data chunk order
A technician determines that an older network hub that connects 24 workstations is performing poorly due to excessive network collisions. Which of the following network devices would be the BEST replacement?
Switch
Which of the following LAN devices receives a signal on one port and forwards that signal only to the port where the destination device is connected?
Switch
You are a software developer, and you're creating a multimedia streaming application. Data will be streamed from your streaming server to clients over IP networks. Which transport protocol should your application use to send data between the clients and the server?
UDP
You are working as a junior security technician for a consulting firm. One of your clients is upgrading their network infrastructure. The client needs a new firewall and intrusion prevention system installed. They also want to be able to block employees from visiting certain types of websites. The client also needs a VPN. Which of the following internet appliances should you install?
Unified Threat Management
Which of the following is an inherent vulnerability of embedded devices?
Unknown environments
A company has built a video streaming service that supplies training videos. Quickly transmitting video data to customers is more important than guaranteed delivery. Which of the following Transport layer IP suite protocols is MOST likely used for this service?
User Datagram Protocol (UDP)
Which of the following proxy server roles allows users to connect to the internet anonymously with their data encrypted during transmission?
VPN
The router below provides several ports for connecting two or more network segments or subnets. The port circled in red is a small form-factor pluggable (SFP) connector. Which type of network can connect to this port?
WAN (cant put actual image because i have to pay just know that this is an SFP port and it is used for WAN connections)
Which of the following load balancer algorithms takes each server's active connections and processing power into consideration?
Weighted least connections
How do switches and bridges learn where devices are located on a network?
When a data packet enters a port, the (((SOURCE))) MAC address is copied from the data packet header.
You are using a patch panel to connect the computers in your building to the appropriate switches, and you need to connect the Ethernet wires from the building network port cables to the patch panel. Where do you connect the wires on a patch panel?
You connect the wires to the backside of the panel. (you learn this when you do the punch down on patch panels)
What are the two mesh protocols that are used most often with IoT devices? (Select two.)
Z-Wave and Zigbee
A customer is experiencing a sporadic interruption of their Wi-Fi network in one area of their building. A technician investigates and discovers signal interference caused by a microwave oven. The customer approves replacing the wireless access point that covers the area, but asks that the wireless speed also be increased. Which of the following Wi-Fi standards should the replacement device support to BEST fulfill the customer's needs?
802.11ac
Which of the following wireless networking standards uses a frequency of 5 GHz and supports data transmission speeds up to 2.6 Gbps?
802.11ac