Comptia A+ Chapter 8

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

Network multimeter

Correct. An electrical multimeter is used to test for voltage, amperage, resistance, and continuity. A network multimeter is used to test cables, ports, and network adapters. When you connect a network multimeter to your network, it can also detect the Ethernet speed, duplex status, default router on the network, lengths of cables, voltage levels of PoE, and other network statistics and details.

A technician wants to consolidate and log specific alerts from network devices into a database so maintenance tasks and potential device problems can be addressed in a timely manner. Which of the following should the technician implement?

[] Syslog server Correct. A Syslog server collects events, such as errors, failures, maintenance tasks, and security events, from network-connected devices and organizes these events into a database for sorting and viewing. Many Syslog servers can also be used to notify network administrators of problems that may require their attention.

You are troubleshooting a Windows workstation that is having problems communicating with the host at IP address 1.2.3.4. What utility will you use at the command line to determine where the communication is stopping?

[] tracert 1.2.3.4 Correct. The tracert command will test communications between hosts and will also show the route the message takes. Each router, beginning with the local default gateway router, is shown. For the scenario, the router where the communication stops is likely the problem.

SMTP

Correct. SMTP (Simple Mail Transfer Protocol) is used to send email to its destination. The email server listens on port 25 to receive email from a client. An email server using secure SMTPS listens on port 465 and utilizes SSL/TLS (Secure Sockets Layer/Transport Layer Security).

Which of the following are valid IPv4 private IP addresses? (Select TWO.)

[] 10.20.30.40 Correct. This is a valid IPv4 private IP address in the range of 10.0.0.0-10.255.255.255. [] 172.29.29.254 Correct. This is a valid IPv4 private IP address in the range of 172.16.0.0-172.31.255.255.

Which of the following describes an IPv6 link -local address assigned to a node on a network?

[] A private unicast address used for limited communication with neighboring nodes in the same link.

You require a protocol in order for your Windows network hosts to have access to shared files and folders. Which of the following protocols will provide the necessary file services? (Select TWO.)

[] CIFS Correct. CIFS (Common Internet File System) is a dialect of SMB (Server Message Block), meaning it is closely related to SMB. SMB (as well as CIFS) allows computers to access and save files to a shared file or folder over the network. Most modern networks utilize SMB 2 or SMB 3 in place of CIFS. CIFS (as well as SMB 2 and SMB 3) uses UDP and TCP port 445. [] SMB

A technician is working at a client's office after hours and needs two cables to finish the work but does not have immediate access to prebuilt cables. One cable needed is for a dial-up connection from the dial-up modem to the existing analog POTS jack on the wall. The other cable is for an Ethernet connection from the computer to the existing keystone jack on the wall. The technician has the necessary wire and connectors to make the cables. Which of the following tools will the technician use to make the cables and then verify that they both work properly? (Select THREE.)

[] Cable stripper Correct. A cable stripper is used to remove the outer sheath from a cable, thus exposing the individual wires or conductors. A cable stripper will be required for this scenario for both cables. [] Cable tester Correct. A cable tester is used to determine whether a cable is good. A good cable is wired correctly (based on the type of cable desired) and provides a complete circuit from end to end for all wires. This question will require the use of a cable tester after each cable is made. [] Crimper Correct. A crimper tool is used to attach connectors onto the ends of a cable. The crimper must be compatible with the crimp (or connector). Common network and telephone connectors that are attached using a crimper are RJ-45, RJ-11, F-type, and BNC. This question will require RJ-11 crimps as well as RJ-45 crimps

A technician is troubleshooting a small network with cable Internet service in which a user is receiving a message in her web browser stating a site cannot be found. While interviewing users, it is determined that every host on the network is experiencing the same issue with all websites. Which of the following is the first step in troubleshooting this issue?

[] Connect a computer directly to the cable modem and attempt to access the Internet. Correct. The first step is to eliminate all devices except the cable modem and ISP connection. Connecting a PC directly to the RJ-45 port on the cable modem eliminates all other devices. An alternative first step could be to reboot the cable modem and reattempt Internet access.

A server provides the necessary IP configuration to your network host so the host can communicate on the network. If this service malfunctions, your device will not be able to utilize the network. What server provides this service?

[] DHCP server Correct. A Dynamic Host Configuration Protocol (DHCP) server is configured to pull an IP address from a range of addresses when a network host first initiates a connection to the network and asks for an IP address.

A server provides the services to take you to the correct website domain when you type cengage.com in your web browser. If this service were not functioning, you would have to remember the IP address for cengage.com. What server performs this service?

[] DNS server Correct. DNS servers are responsible for name resolution by translating a FQDN (fully qualified domain name) such as cengage.com into the appropriate public IP address. If DNS were not functioning, you would have to remember the IP address for cenagge.com to access the website.

What methods are used to assign TCP/IP parameters to network hosts? (Select TWO.)

[] Dynamic Correct. DHCP (Dynamic Host Configuration Protocol) is the protocol used to automatically (or dynamically) assign TCP/IP parameters to a host. A DHCP server must be configured on the same network as the host, and the host must be configured to obtain an IP address automatically. [] Static Correct. Manually configured TCP/IP parameters are statically assigned and do not change unless explicitly configured by a technician or user. Typical hosts that utilize static assignment are printers, servers, and other devices where the IP address must remain constant.

Your company received a call from a historical society inquiring about the possibility of networking a two-century-old building with no existing network. In 1924, someone added electrical outlets to the building, but the layout and design of the building prohibits adding any additional copper or fiber cable. You completed a wireless site survey and concluded that wireless networking is out of the question and will not properly function due to environmental interference. Which of the following could be used to network this building?

[] EoP Correct. EoP (Ethernet over Power) or powerline networking is a valid solution. EoP provides a method of using existing power lines to transmit data through adapters plugged into the electrical outlets.

While investigating an email issue, a support technician discovers no users can access their email accounts on the company's email server connected to the private LAN. Pinging the email server from several workstations on the LAN results in 0% packet loss. Which of the following is the next step the technician should take in troubleshooting this issue?

[] Escalate the problem to a server administrator to check for issues with the server. Correct. The scenario indicates a problem at a higher TCP/IP layer and will require that the server be checked for issues other than basic network connectivity. Typically, issues of this kind are outside the responsibility of a computer support technician and escalation is required.

Which of the following indicates the most concise abbreviation of the IPv6 address FEFE:0000:0000:0000:0002:0000:0000:0001?

[] FEFE::2:0:0:1 Correct. This is the most concise abbreviation of the example IP address.

You are tasked with securing a small network for a client in which the following requirements must be met: • If a user on the private network attempts to send confidential company information to an unauthorized entity, an alert should be triggered. • The private trusted network should not be accessible from the public untrusted network. • If attacks are coming from the external network, the system should detect and prevent malicious activity. • All incoming and outgoing email should be scanned for malware. Which of the following would best meet the requirements of the client?

[] Implement a UTM appliance. Correct. A UTM (unified threat management) appliance can perform the services required by the client in a single network-attached device. The client's requirements can be met by purchasing a UTM appliance with identity-based access control lists (to mitigate data leaks), a firewall (to protect access to the internal network from the Internet), an IPS (to detect and prevent malicious activity from entering the network), and antivirus and anti-malware protection (to scan all email).

Your company is experiencing an increase in malware incidents. Your manager is asking for advice on how best to verify that company-owned workstations are up-to-date with security patches, anti-malware requirements, and software application updates. The manager is also concerned that employee-owned devices connecting to the corporate LAN have the same level of security as the company devices. Which of the following protections and services should you recommend?

[] Implement an endpoint management server appliance. Correct. An endpoint management server will monitor endpoint devices on the network to ensure they meet the most current security requirements. If security requirements are met, the device is granted access to the network. The user or device will still be required to authenticate on the network. If the endpoint management server determines a device does not meet the minimum security requirements, the device's access to the network is blocked.

A company requires an Ethernet connection from the north end of its office building to the south end. The distance between connections is 161 meters and will need to provide speeds of up to 10 Gbps in full duplex mode. Which of the following cable combinations will meet these requirements?

[] Multimode fiber cable with MT-RJ connectors Correct. Multimode fiber is the best option for 10 Gbps speeds at distances over 100 meters.

A coworker is asking for your advice on a problem with a computer that will not communicate on the network. While assisting the coworker, you suspect that the wired NIC may have failed. Which of the following will you recommend to your coworker as the best tool to diagnose this issue? (Select TWO.)

[] Network multimeter Correct. An electrical multimeter is used to test for voltage, amperage, resistance, and continuity. A network multimeter is used to test cables, ports, and network adapters. When you connect a network multimeter to your network, it can also detect the Ethernet speed, duplex status, default router on the network, lengths of cables, voltage levels of PoE, and other network statistics and details. [] Loopback plug Correct. A loopback plug is used to reroute a network port's output signal back to the same port's input pins. Performing a loopback test will verify whether the port on the NIC is functioning.

Consider the following configuration. ​ Computer "A" IP address: 172.16.100.100 Subnet mask: 255.255.0.0 ​ Computer "B" IP address: 172.16.200.200 Subnet mask: /16 What should be done to allow these computers to send and receive data to and from each other?

[] Nothing needs to be changed.

You are using a crimper to attach an RJ-45 connector to a Cat 6 UTP cable. Your company requires that all cabling follow the TIA/EIA 568B standard. Which wire color code will you use starting with pin 1 of the modular plug?

[] Orange/white, orange, green/white, blue, blue/white, green, brown/white, brown Correct. This is the correct color code for the T568B standard starting with pin 1.

A technician is installing UTP cable and needs to terminate the connections on the patch panel shown in the following image. ​ What tool should be used to terminate and complete this installation?

[] Punchdown tool Correct. A punchdown tool is used to terminate twisted pair cabling into a keystone jack (at the workstation end) and the patch panel (at the network closet end). The punchdown tool must be compatible with the type of termination desired, that is, 110-block for Cat5 and higher data and 66-block for telephone. The image in this question is a patch panel with 110 punchdowns.

What is the purpose for the twists in twisted pair Ethernet cabling?

[] Reduce crosstalk between wire pairs. Correct. The twists in a twisted pair cable reduce crosstalk between pairs. Crosstalk is interference induced by a wire that interferes with neighboring wires.

Which of the following are secure protocols, ports, services, or applications? (Select TWO.)

[] SSH Correct. SSH (Secure Shell) protocol is assigned port 22 and is used in various situations for encryption, making SSH secure. One application for SSH is as a secure alternative for Telnet. [] Port 443 Correct. Port 443 is used for secure HTTP (Hypertext Transfer Protocol) web transmissions. HTTPS refers to HTTP working with a security protocol such as SSL (Secure Sockets Layer) or TLS (Transport Layer Security).

A network host with an IP address of 192.168.10.200 wants to send a message to a destination computer with an assigned IP address of 192.168.10.100. Which of the following will the sending host use to determine whether the destination computer is on its own network or another network?

[] Subnet mask

A new Cat6 cable run and keystone jack were installed for a workstation that was moved from the sales department to the shipping department. Since the move, the user has been complaining of slow transfer speeds on both Internet and local network communications. The technician ran a test and is viewing the following output on the tester. Which of the following is the most likely reason for the sluggish network speeds?

[] The cable run exceeds the specifications for Ethernet over twisted pair. Correct. The length of the cable run exceeds the specifications for Ethernet causing the NIC and switch to auto-negotiate to 10 Mbps and half-duplex. The distance limitation for Cat6 UTP is 100 meters (328 feet).

You received a call from a user who brought her own device to the office but cannot find or connect to the company WLAN. The laptop shows other available wireless networks in the building. This user and the other users in her department are connected to the company WLAN and can browse to multiple websites with no problems from their company-assigned laptops. Which of the following is the most likely reason the user cannot find the company WLAN from her own device?

[] The company WAP has SSID broadcast disabled. Correct. The most likely reason for this issue is that the SSID is hidden and is not being broadcast. The user can still connect to the WLAN by knowing the SSID and manually connecting to the wireless network.

You replaced the LCD panel in a laptop computer and verified full system functionality, including wireless connectivity. The customer picked up the laptop and now reports he can no longer access his wireless network regardless of how close the computer is positioned to the WAP. Other users can connect to the WAP without any problem. Which of the following is the most likely reason for this problem?

[] The laptop's wireless radio is toggled to the off position. Correct. Laptop computers and mobile devices provide a method of turning off the wireless network and Bluetooth radios independently of each other. Many devices also have an airplane mode in which all radios can be turned off simultaneously. This is the most likely reason for the problem given that the laptop wireless was tested and the other users on the client's WLAN are functioning properly.

The accounting department moved its network-attached printer from one side of the office to a more centralized location, making the printer much more accessible to all accounting users. Since the move, the users have not been able to print to the printer. The printer powers on and shows it is ready to accept print jobs. The printer configuration page shows the following output. You disconnect the patch cable from the keystone jack at the new location and move the printer and cable to reconnect it at the original location. The printer begins printing the jobs that failed to print earlier. Which of the following are the most likely reasons for the printer failing to print at the new location? (Select TWO.)

[] The patch panel connector for the new location's cable run is not connected to a switch. Correct. The printer is set for DHCP configuration and is assigning itself APIPA parameters at the new location. Because the printer will function properly at the original location, the printer does not have layer 1 network connectivity at the new location. There is an issue with the keystone jack, cable run, patch panel, patch cable at the patch panel, or switch. [] The cable run connecting the new keystone jack to the patch panel is bad. Correct. The printer is set for DHCP configuration and is assigning itself APIPA parameters at the new location. Because the printer will function properly at the original location, the printer does not have layer 1 network connectivity at the new location. There is an issue with the keystone jack, cable run, patch panel, patch cable at the patch panel, or switch.

A Windows user has been successfully saving documents to the file server all morning. However, the latest attempt resulted in the following message, "Could not find this item. Verify the location of '\\FileServer\Docs' and try again." Which of the following is the most likely cause for this message?

[] The share to the file server is disconnected. Correct. The most likely reason for this error is that the share is currently not available either on just the user's computer or server-wide. The next step would be to check for the scope of the problem.

A technician has verified that a bad Cat6 cable run in the wall is responsible for a workstation's lack of communication on the network. Which of the following tools can be used to pinpoint the location of the cable inside the wall?

[] Toner probe Correct. The toner probe (also called tone generator and probe) is used to locate copper cable runs in walls and at their termination points.

A server or service is responsible for sending the contents of cengage.com to your browser when you type cengage.com into the location bar. If this service is malfunctioning, your browser will display a page not found error. What server provides this service?

[] Web server Correct. A web server serves up web pages to clients. The web server can be on a private or public network.

A technician has been dispatched to a client's office to diagnose wireless network issues and suspects that channel overlap may be the problem. Which of the following tools will the technician use to help in determining whether her suspicions are correct?

[] Wi-Fi analyzer Correct. The Wi-Fi analyzer is used to find wireless networks, determine wireless signal strength and channels in use, and much more. Channel overlap is when multiple devices have wireless channels that are interfering with each other. Determining which channels are in use by the devices will assist the technician in configuring the wireless devices with non-overlapping channels.

In which of the following situations should you install an IPS instead of an IDS?

[] You want to block unauthorized activity on your LAN from the Internet. Correct. An intrusion prevention system will monitor, detect, log, issue alerts, and prevent malicious activity.

While assisting a Windows user over the phone, you need to determine the IP address for the DHCP server along with the MAC address of the Ethernet NIC. The user has successfully opened a command prompt. What command will you have the user type at the command line to determine these two addresses?

[] ipconfig /all Correct. The ipconfig command will display IP configuration information such as IPv4 and IPv6 addresses, subnet masks, and default gateways for your installed network interface controllers. Appending the "/all" switch to the command gives much more information for each NIC, including the MAC address, the DHCP server, and the DNS servers.

The network icon in the notification area of a Windows 7 machine is displaying a yellow triangle with a black exclamation point indicating limited connectivity. Checking the computer's network connection properties will most likely indicate which of the following single-assigned host IP addresses? (Select TWO.)

[]169.254.1.1 []FE80::feba:123:8:9343 Correct. An IPv6 address starting with the prefix FE80 is a link local address that functions in the same way as an IPv4 APIPA address. If this is the only assigned IP address, the host will most likely indicate limited connectivity with no Internet connectivity.

Which of the following is a function of an endpoint management server appliance?

[]Restricting a device's access to the network until security requirements are met. Correct. An endpoint management server will monitor endpoint devices on the network to ensure they meet the most current security requirements. If security requirements are met, the device is granted access to the network. The user or device will still be required to authenticate on the network. If the endpoint management server determines a device does not meet the minimum security requirements, the device's access to the network is blocked.

You are installing network cabling and require a cable solution that provides the best resistance to EMI. Which of the following will you choose for this installation?

[]STP Correct. Shielded twisted pair (STP) cabling, as its name implies, is shielded and uses a covering or shield around all wires and may also have shielding around each pair of wires. The shielding is used to minimize EMI (electromagnetic interference) caused by electrical motors, transmitters, high-voltage lines, and fluorescent light fixtures.


संबंधित स्टडी सेट्स

Sociology Lecture 18: Racism and White Privilege

View Set

Atomic Theory Practice test answers review

View Set

CYSA Dion Training Practice Exams

View Set

Fundamentals Nursing Prep U Chapter 15 Evaluating

View Set

Chapter 6: Federal Statutes, State Enactments and Subsidiary Legislation

View Set

Chapter 9: Externalities and Public Goods

View Set

Chapter 6: The Skin, Hair, and Nails

View Set

HOSPITALITY CUSTOMER RELATIONS PERFORMANCE INDICATORS

View Set