Comptia A+ Practice Exam - Networking

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

Which frequencies does Zigbee operate on? 500 MHz 1.4 GHz 2.4 GHz 908.42 MHz

2.4 GHz

Which algorithm is used by an Application layer load balancer? Weighted least connections Source IP hash Round robin Least pending request

Least pending request

You are currently learning about networking devices and have just learned about MAC addresses. You look up your device's MAC address, and it comes back as 00-B0-D0-06-BC-AC. Which portion of this MAC address can tell you who the manufacturer is? BC-AC 00-B0-D0 00-B0 06-BC-AC

00-B0-D0

The following is an example of an IPv6 address: FEC0:1319:7700:F631:446A:5511:CC40:25AB 1. Which part of the example IPv6 address is the prefix? 2. Which quartet in the example IPv6 prefix is used to identify the subnet? 3. Which part of the example IPv6 address is the interface ID?

1. FEC0:1319:7700:F631 (1st half) 2. F631 (last quartet of the prefix) 3. 446A:5511:CC40:25AB (2nd half)

You have a small home network that uses 192.168.1.0 with the default subnet mask for the network address. The default gateway address is 192.168.1.254, and the router is providing DHCP on the network. The Wrk2 computer has been assigned the IP address of 192.168.1.55. Which of the following is considered the loopback address for the Wrk2 computer? 192.168.1.0 192.168.1.254 192.168.1.255 127.0.0.1 192.168.1.55

127.0.0.1

Which of the following is the maximum transmission speed for Bluetooth v3 and v4 devices when using High Speed (HS) mode? 1 Mbps 3 Mbps 48 Mbps 24 Mbps

24 Mbps

Which of the following are valid IPv6 addresses? (Select two.) 343F:1EEE:ACDD:2034:1FF3:5012 165.15.78.53.100.1 6384:1319:7700:7631:446A:5511:8940:2552 A82:5B67:7700:AH0A:446A:779F:FFE3:0091 141:0:0:0:15:0:0:1

6384:1319:7700:7631:446A:5511:8940:2552 141:0:0:0:15:0:0:1

You have recently purchased a toll pass for a bridge that you cross each day on your way to work. Which of the following wireless technologies is MOST likely being used for this pass? Active RFID Bluetooth Near Field Communication (NFC) Passive RFID

Active RFID

Which of the following keeps track of various network devices while ensuring that the software is secure? All-in-one security appliance Syslog server Endpoint management server Firewall

Endpoint management server

Which of the following UTM appliances monitors all network traffic and blocks malicious traffic while notifying the network security team? Firewall Anti-malware IPS NAT

IPS

Which type of wireless technology increases bandwidth for a home wireless network by using multiple antennae for both the transmitter and receiver? Channel bonding Long-range MIMO Radio waves

MIMO

A group of workers in an office space communicate with each other on their smartphones and tablet devices through an ad hoc network linked using Bluetooth technology protocols. Which of the following network types is in use? Wide Area Network (WAN) Metropolitan Area Network (MAN) Personal Area Network (PAN) Local Area Network (LAN)

Personal Area Network (PAN)

What type of operating system do embedded devices use? Non-deterministic Windows Real-time operating system Linux

Real-time operating system

Which of the following items of information does a packet header contain? (Select three.) How to deliver the packet Sender TFTP data Receiver ACK data SYN data Data chunk order

Sender Receiver Data chunk order

You are working as a junior security technician for a consulting firm. One of your clients is upgrading their network infrastructure. The client needs a new firewall and intrusion prevention system installed. They also want to be able to block employees from visiting certain types of websites. The client also needs a VPN. Which of the following internet appliances should you install? Spam gateway Unified Threat Management Load balancer Proxy server

Unified Threat Management

Which of the following is the root level in www.testout.com.'s fully qualified domain name? www testout . (period) com

.(period)

Match each port number on the left with its associated protocol on the right. Drag: 22 80 143 427 443 445 548 Drop 1. Secure Shell (SSH) 2. Apple Filing Protocol (AFP) 3. HyperText Transfer Protocol Secure (HTTPS) 4. HyperText Transfer Protocol (HTTP) 5. Server Message Block (SMB/CIFS) directly over TCP 6. Service Location Protocol (SLP) 7. Internet Message Access Protocol (IMAP)

1. 22 2. 548 3. 443 4. 80 5. 445 6. 427 7. 143

What is the maximum distance between hops that is allowed by a Z-Wave device on a mesh network? 80 feet 60 feet 250 feet 200 feet

250 feet

Which type of embedded device microprocessor is custom designed to perform a specific function? SoC ARM FPGA ASIC

ASIC

Which of the following types of internet connection services allows you to be truly mobile while maintaining your internet connection? ISDN BRI Satellite Wi-Fi Mobile hotspot Cellular

Cellular

You are assembling components in a network rack and need a device that connects three network segments. Which of the following devices will meet your networking needs? Ethernet switch Ethernet router Wireless controller Ethernet patch panel

Ethernet router

Which of the following is a valid IPv6 address? 199.12.254.11 FEC0:AB04:899A FEC0:AB98::A7::9845:4567 FEC0:9087:AB04:9900:7GA2:7788:CEDF:349A FEC0::AB:9007

FEC0::AB:9007

You want to allow your users to download files from a server running the IP protocol. You also want to protect access to the files by requiring user authentication to access specific directories on the server. Which IP protocol should you implement to provide this capability? SMTP LDAP SSH TFTP SNMP FTP

FTP

You are configuring an ADSL connection. Which of the following will be part of the configuration? Filters or splitters Analog modem F-type connectors An RG6 cable

Filters or splitters

Which of the following are IoT systems that work together to make communication between two endpoints possible? (Select two.) Gateway system Wi-Fi Data storage Middleware Access gateway

Gateway system Data storage

Which of the following correctly describe the most common format for expressing IPv6 addresses? (Select two.) Hexadecimal numbers Decimal numbers 32 numbers, grouped using colons Binary numbers 128 numbers, grouped using colons

Hexadecimal numbers 32 numbers, grouped using colons

Which of the following hardware devices regenerates a signal out to all connected ports without examining the frame or packet contents? Hub Bridge Gateway Switch Router

Hub

Which of the following is an example of a logical address? ARP address Gateway address IPv4 address MAC address

IPv4 address

Which network protocol do controller systems use to communicate with each other? ARP Modbus HTTP ICMP

Modbus

Which of the following locations will contribute the greatest amount of interference to a wireless access point? (Select two.) Near exterior walls Near DCHP servers Incorrect answer: The top floor of a two-story building Near cordless phones Near backup generators

Near cordless phones Near backup generators

What are the standards called that define how data is formatted and transmitted over a network? Network ID Network interface Transmission medium Networking protocols

Networking protocols

Which of the following are characteristics of the 802.11g wireless standard? (Select three.) Operates in the 2.4 GHz range. Backwards compatible with 802.11a devices. Operates in the 5.75 GHz range. Maximum bandwidth of 54 Mbps. Backwards compatible with 802.11b devices. Maximum bandwidth of 11 Mbps.

Operates in the 2.4 GHz range. Maximum bandwidth of 54 Mbps. Backwards compatible with 802.11b devices.

Which of the following terms refers to a network resource sharing model that uses access control lists saved on each computer? Peer-to-peer Intranet Extranet Client/server

Peer-to-peer

Which protocol is used to send email messages from a mail client to a mail server? SNMP SMTP IMAP FTP POP3

SMTP

While setting up a home office, a technician disables the DHCP service on the office router, but does not want to rely on link-local addressing. Which of the following IP addressing methods should they use? APIPA Alternate Dynamic Static

Static

A host on your network provides a service that requires the server to always use the same IP address. Which IP addressing method can you use to manually assign the specific IP address? Link-local addressing Dynamic IP addressing APIPA IP addressing Alternate IP configuration Static IP addressing

Static IP addressing

A technician determines that an older network hub that connects 24 workstations is performing poorly due to excessive network collisions. Which of the following network devices would be the BEST replacement? Switch Router Bridge Patch panel

Switch

You need to trace the route that a Cat 6 UTP cable takes through the ceiling and walls of your building. Which tool should you use? Cable tester Multimeter Tone generator Loopback plug

Tone generator

Drag each wireless networking technology on the left to its associated transmission distance limitation on the right. Each technology may be used more than once. Drag: Infrared Bluetooth Near Field Communication Drop: 1. Up to 100 meters for Class 1 devices. 2. Up to 2 meters with a few obstacles in between. 3. Up to 10 meters for Class 2 devices. 4. A few centimeters.

1. Bluetooth 2. Infrared 3. Bluetooth 4. NFC

Which port must be opened on the firewall of a Windows system so that a Remote Desktop connection can be established? 3389 23 123 22

3389

A customer is experiencing a sporadic interruption of their Wi-Fi network in one area of their building. A technician investigates and discovers signal interference caused by a microwave oven. The customer approves replacing the wireless access point that covers the area, but asks that the wireless speed also be increased. Which of the following Wi-Fi standards should the replacement device support to BEST fulfill the customer's needs? 802.11b 802.11a 802.11g 802.11ac

802.11ac

You have been contacted by OsCorp to recommend a wireless internet solution. The wireless strategy must support a transmission range of 150 feet, use a frequency range of 2.4 GHz, and provide the highest possible transmission speeds. Which of the following wireless solutions should you recommend? 802.11a 802.11ac 802.11b 802.11g

802.11g

You are working as a junior technician for a small consulting firm. You have been tasked with installing a new computer on the network. You have performed this task and connected the computer to the network. To verify network connectivity, you decide to ping the network server. Before this can happen, the new device needs to know the MAC address of the network server so it can match it to the IP address. The computer sends a broadcast message, asking who has the IP address. The network server responds with its MAC address, and now the computer can communicate with the server. Which protocol is being used when sending the broadcast message to match the MAC address to the IP address? ARP ICMP HTTP IP

ARP

Which of the following functions are performed by proxy servers? (Select two.) Filter unwanted email. Block employees from accessing certain websites. Block unwanted packets from entering your private network. Cache web pages. Store client files.

Block employees from accessing certain websites. Cache web pages.

Your employer wants a system that guarantees that all components will work together with minimal configuration and setup. Time is of the essence in getting this new system ready. Which of the following would BEST meet your employer's needs? DCS SCADA PLC HMI

DCS

You are the network administrator for a small consulting firm. The firm has recently rolled out a new intranet site, and you are responsible for configuring the DNS. You are able to connect to the intranet site by using the IP address, but you cannot connect by using the hostname. Which of the following do you need to configure to access the site with the hostname? Reverse lookup zone Dynamic DNS CNAME record Forward lookup zone

Forward lookup zone

Which of the following BEST describes the Edge Technology layer of the IoT architecture? It includes all the hardware parts in the IoT system. It is the main bridge between two endpoints in an IoT system. It delivers the analyzed and processed data to the end user. It includes the processes that happen in the cloud.

It includes all the hardware parts in the IoT system.

Which of the following internet appliances filters specific internet content categories and also keeps internal users anonymous? Proxy server Spam gateway Content filter Unified Threat Management

Proxy server

Which of the following is an inherent vulnerability of embedded devices? Unknown environments Vulnerable to malware Known environments Open systems

Unknown environments

Which of the following are options for connecting a computing device, such as a notebook computer or tablet, to a cellular network? (Select four.) Use a USB cellular adapter to connect the device directly to the cellular network. Use the device's Wi-Fi to connect to the network through a cellular Wi-Fi hot spot. Use a USB cable to connect the device to the cellular network through a cable modem. Use an integrated transmitter to connect the device directly to the cellular network through a satellite. Use an integrated cellular antenna to connect the device directly to the cellular network. Use a USB cable to connect the device to the network through a smartphone. Use a USB transmitter to connect the device directly to the cellular network through a satellite. Use the device's Wi-Fi to connect to the cellular network through a cable modem's Wi-Fi antenna.

Use a USB cellular adapter to connect the device directly to the cellular network. Use the device's Wi-Fi to connect to the network through a cellular Wi-Fi hot spot. Use an integrated cellular antenna to connect the device directly to the cellular network. Use a USB cable to connect the device to the network through a smartphone.

A Windows workstation is configured to receive its IP configuration information from a DHCP server on the company network. The user at the workstation reports that she cannot use email and is unable to reach the internet. Using the ipconfig command, you see that the workstation has been assigned the following special IP configuration: IP address: 169.254.0.1 Subnet mask: 255.255.0.0 1. What is this special IP configuration called? 2. Why did the workstation receive this type of configuration?

1. Automatic Private IP Addressing (APIPA) 2. The workstation was unable to contact the DHCP server.

https://cdn.testout.com/_version_7032/pcpro2022v7-en-us/en-us/resources/text/t_network_rack_pp7/rack_question_front.png Based on the back view of the network rack below, match each component on the left to the label displayed on the network rack image. Drag: Ethernet switch Ethernet router Ethernet patch panel Fiber patch panel Server Drop: 1. A 2. B 3. C 4. D 5. E

1. Ethernet router 2. Ethernet switch 3. Ethernet patch panel 4. Fiber patch panel 5. Server

Match each network type on the left with the appropriate description on the right. Each network type may be used once, more than once, or not at all. A network in a small geographic area that typically uses wires to connect systems together. Drag: Local Area Network (LAN) Personal Area Network (PAN) Metropolitan Area Network (MAN) Wide Area Network (WAN) Wireless Local Area Network (WLAN) Drop: 1. A small network used for connecting devices, such as a notebook computer, a wireless headset, a wireless printer, and a smartphone. 2. A network that is typically owned and managed by a city as a public utility. 3. A group of networks that are geographically isolated, but are connected to form a large internetwork. 4. Similar to a standard LAN, but uses radio signals instead of wires to connect systems together. 5. A network that covers an area as small as a few city blocks to as large as an entire city. 6. A set of subnets connected to each other, typically by wires, using at least one router.

1. LAN 2. PAN 3. MAN 4. WAN 5. WLAN 6. MAN 7. LAN

When using TCP, two hosts first establish a connection through a three-way handshake. From the items on the left, drag the three valid steps in the three-way handshake process to the right in the appropriate order. Drag: The first host sends a SYN packet asking to create a new session. The receiving host replies with an ACK packet that the session can be created. The receiving host replies with a SYN-ACK packet acknowledging that the session can be created. The receiving host replies with a SYN-ACK packet acknowledging that the session can be created. The first host replies with the ACK packet, which then opens the session. Drop: 1. First step 2. Second step 3. Third step

1. The first host sends a SYN packet asking to create a new session. 2. The receiving host replies with a SYN-ACK packet acknowledging that the session can be created. 3. The first host replies with the ACK packet, which then opens the session.

Which data transmission rate is defined by the IEEE 802.11b wireless standard? 54 Mbps 10 Mbps 11 Mbps 2 Mbps 150 Mbps

11 Mbps

A user is configuring an email client application and decides to use a TCP/IP suite protocol that stores all messages on the email server so that they can be synchronized across a laptop, a smartphone, and a web email client. In addition, this protocol stores the email messages on the email server until the user explicitly deletes them. Which of the following TCP/IP port numbers will the client application typically access while using this protocol to contact the email server? 21 80 110 143

143

Your Windows workstation has Automatic Private IP Addressing (APIPA) implemented with default settings. Which of the following TCP/IP addresses could you automatically assign to the system, should your DHCP server go down or become inaccessible? 169.198.1.23 169.254.1.26 168.254.10.25 10.0.0.65 192.168.1.22 172.16.1.26

169.254.1.26

Which of the following are technologies that Bluetooth utilizes? (Select two.) Red spectrum light waves 2.4 GHz radio wireless 5.75 GHz radio wireless Line-of-sight transmission Personal area network (PAN)

2.4 GHz radio wireless Personal area network (PAN)

An administrator configures a server to run the TCP/IP suite protocol that allows users to download files contained in specific directories on the server and also protects access to those files by requiring user authentication. Which of the following TCP/IP port numbers allow this protocol to work properly? (Select two.) 20 21 53 80 110

20 21

You are currently using a cellular network plan that provides maximum speeds of up to 10 Gbps for your smart phone. Which of the following cellular network types are you using? 4G 3G 2G 5G

5G

You are designing a wireless network for a client. Your client needs the network to support a data rate of at least 150 Mbps. In addition, the client already has a wireless telephone system installed that operates 2.4 GHz. Which 802.11 standard works BEST in this situation? 802.11b 802.11a 802.11g 802.11n

802.11n

Which of the following technologies does the 802.11ac wireless networking standard use to provide increased bandwidth and communication speeds? (Select two.) Dual-band transmission to allow data to be transmitted at two frequencies at the same time. OFDM modulation to allow several parallel data channels to stream data. Channel bonding to combine more channels in the 5 GHz band to allow more than double the bandwidth. Peer-to-peer mode to allow each host to communicate directly with other hosts. MU-MIMO to allow multiple users to access the same channel.

Channel bonding to combine more channels in the 5 GHz band to allow more than double the bandwidth. MU-MIMO to allow multiple users to access the same channel.

Which TCP/IP configuration parameter identifies the router that is used to reach hosts on remote networks? WINS server address DNS server address Hostname Default gateway Alternate IP address Subnet mask

Default gateway

A technician is configuring the static TCP/IP settings on a client computer. Which of the following configurations are needed for internet communications? (Select three.) Default gateway address WINS address DHCP server address Alternate IP address APIPA address IP address with a subnet mask (IPv4) or subnet prefix length (IPv6) DNS server address

Default gateway address IP address with a subnet mask (IPv4) or subnet prefix length (IPv6) DNS server address

A technician has configured a client computer's network interface with server addresses to which the client will send requests for translating fully qualified domain names (FQDNs) to IP addresses and IP addresses to FQDNs. Which of the following TCP/IP suite protocols is used by the client to perform the request and also used by a server to respond to those requests? Secure Shell (SSH) Server Message Block (SMB) Domain Name System (DNS) Dynamic Host Configuration Protocol (DHCP)

Domain Name System (DNS)

A technician has configured a client computer's network interface to request an IP address. Which of the following TCP/IP suite protocols does the client computer use to perform the request and receive an IP address from a server? Simple Network Management Protocol (SNMP) Domain Name System (DNS) Dynamic Host Configuration Protocol (DHCP) Lightweight Directory Access Protocol (LDAP)

Dynamic Host Configuration Protocol (DHCP)

You have subscribed to a satellite radio service that you use in your car to access music and news on long trips through areas where cellular service is not available. However, when going through long tunnels and heavily forested canyons, you sometimes lose your signal for a short period of time. Which of the following satellite technologies is your service provider using? LEO SDSL GEO ADSL

GEO

A local dentist has contracted with you to implement a network in her new office. Because of security concerns related to patient privacy laws, she has asked that the new network meet the following criteria and be cost effective: No one from the internet should be able to access her internal network. Email messages should be scanned for spam, phishing attacks, and malware before they reach users' workstations. Employees access to non-work-related websites, especially sites that contain inappropriate content, should be blocked. A system should be put in place to detect and prevent external attacks on her network. Which of the following would BEST meet your client's criteria? Implement a firewall. Implement an all-in-one UTM security appliance. Implement a content filter. Implement an email security appliance. Implement an intrusion prevention system (IPS).

Implement an all-in-one UTM security appliance

One of your customers has a long range wireless network that connects two company office buildings together. The buildings are several hundred yards apart. You have licensed a frequency range of 3.65 GHz to transmit signals between the buildings. However, the wireless connection is not performing ideally, and it sometimes drops connections. Which of the following is the BEST immediate solution to try to resolve this issue? Try using a dual-band access point. Increase the power to the access points. Try using an unlicensed 801.11 frequency standard. License a different frequency range.

Increase the power to the access points.

You would like to control internet access based on user, time of day, and websites visited. Which of the following actions would BEST meet your criteria? Configure internet zones using Internet Options. Configure a packet-filtering firewall. Add rules to allow or deny access based on time of day and content. Install a proxy server. Allow internet access only through the proxy server. Enable Windows Firewall on each system. Add or remove exceptions to control access based on time of day and content. Configure each system's Local Security Policy to add access restrictions based on time of day and content.

Install a proxy server. Allow internet access only through the proxy server.

You are working as a junior network technician for the local hospital system. Part of your duties include adding IT news and updates to the hospital's internal web site. The website is only accessible to employees when they are connected to the hospital network. What is this type of website known as? Extranet Internetwork Subnet Intranet

Intranet

Which of the following is a disadvantage of using a UTM? Has a single point of failure. Does not include a spam filter. Requires a separate endpoint management server. Is more expensive than using separate security appliances

Is more expensive than using separate security appliances

Which of the following statements about Dynamic Host Configuration Protocol (DHCP) are true? (Select two.) It cannot be configured to assign the same IP address to the same host each time it boots. It can deliver a DNS server address in addition to the host IP address. The DHCP server detects workstations when they attach to the network and automatically delivers IP addressing information to them. It can only deliver IP addresses to hosts. A workstation must request addressing information from a DHCP server.

It can deliver a DNS server address in addition to the host IP address. A workstation must request addressing information from a DHCP server.

Which of the following BEST describes how a switch functions? It connects multiple cable segments or hosts and forwards data packets to the appropriate host. It connects multiple cable segments for different architectures and translates data packets to broadcast them to all connected hosts. It connects multiple cable segments for different architectures and translates data packets to forward them to the appropriate host. It connects multiple cable segments or devices and broadcasts data packets to all of its connected hosts.

It connects multiple cable segments or hosts and forwards data packets to the appropriate host.

Currently, your company is in the process of upgrading security in the company headquarters building by installing biometric sensors to limit access to specific rooms. Your network switches are PoE-enabled, which allows biometric sensors to connect to switches without an external power source. Which of the following PoE standards is designed for use with biometric sensors? PoE+ PoE++ Standard PoE Higher-power PoE

PoE+

Which of the following DHCP scope options will assign a static IP configuration to a device using the device's MAC address? Default gateway IP range Reservation Exclusion

Reservation

As a network administrator for your company, you want to set up a network device that manages internal traffic between servers and clients. Which of the following would BEST meet your requirements? Reverse proxy server Forward proxy server VPN Content filter

Reverse proxy server

A homeowner's connection to the internet is through an always-on modem that connects to existing telephone wiring and has the same upload and download speeds. The homeowner is able to make analog phone calls over the same wiring at the same time. Which of the following internet connection types are they using? Dial-up ADSL SDSL Cable ISDN

SDSL

Which of the following identify an IPv6 address's prefix component? (Select two.) The last four quartets of an IPv6 address. The last quartet of an IPv6 address. The first 64 bits of an IPv6 address. The last 64 bits of an IPv6 address. The first four quartets of an IPv6 address. The first quartet of an IPv6 address.

The first 64 bits of an IPv6 address. The first four quartets of an IPv6 address.

Which of the following identifies the interface ID component of an IPv6 address? (Select two.) The fourth quartet of an IPv6 address. The first quartet of an IPv6 address. The last quartet of an IPv6 address. The last four quartets of an IPv6 address. The first four quartets of an IPv6 address. The last 64 bits of an IPv6 address.

The last four quartets of an IPv6 address. The last 64 bits of an IPv6 address.

A company has built a video streaming service that supplies training videos. Quickly transmitting video data to customers is more important than guaranteed delivery. Which of the following Transport layer IP suite protocols is MOST likely used for this service? File Transfer Protocol (FTP) Internet Control Message Protocol (ICMP) User Datagram Protocol (UDP) Transport Layer Protocol (TCP)

User Datagram Protocol (UDP)

A SOHO's connection to the internet is through an antenna that sends and receives a microwave signal to the ISP's antenna. There can be no obstacles on the direct path between the two antennae. Which of the following internet connection types is this? WISP Fiber Satellite DSL

WISP

Which of the following load balancer algorithms takes each server's active connections and processing power into consideration? Round robin Weighted least connections Weighted round robin Least connections

Weighted least connections

How do switches and bridges learn where devices are located on a network? When a data packet enters a port, the source IP address is copied from the data packet header. When a data packet enters a port, the destination MAC address is copied from the data packet header. When a data packet enters a port, the destination IP address is copied from the data packet header. When a data packet enters a port, the source MAC address is copied from the data packet header.

When a data packet enters a port, the source MAC address is copied from the data packet header.


संबंधित स्टडी सेट्स

Chapter 7 Course Points, Chapter 11 Course Points, Chapter 6 Course Points

View Set

Accounting 2- chapter 8, 9, 10, 11, 12

View Set