A+ Networking

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

A technician is configuring the static TCP/IP settings on a client computer. Which of the following configurations are needed for internet communications? (Select THREE.)

-DNS server address -Default gateway address -IP address including a subnet mask (IPv4) or subnet prefix length (IPv6)

Which of the following describes an IPv6 address? (Select TWO.)

1) 128-bit address 2) Eight hexadecimal quartets

Which data transmission rate is defined by the IEEE 802.11b wireless standard?

11 Mbps

You are configuring a network firewall to allow SMTP outbound email traffic and POP3 inbound email traffic. Which of the following IP ports should you open on the firewall? (Select TWO).

110; 2.5

A user is configuring an email client application and decides to use the TCP/IP suite protocol that will store all messages on the email server so that they can be synchronized across a laptop, a smartphone, and a web email client. This protocol will store the email messages on the email server until the user explicitly deletes them. Which of the following TCP/IP port numbers will the client application typically use while using this protocol to contact the email server?

143

Which of the following IP address ranges is reserved for Automatic Private IP Addressing?

169.254.0.1 - 169.254.255.254

Given that your Windows workstation has Automatic Private IP Addressing (APIPA) implemented using default settings, which of the following TCP/IP addresses could be automatically assigned to the system should your DHCP server go down or become inaccessible?

169.254.1.26

Which frequencies does Zigbee operate on?

2.4 GHz, 900 MHz, and 868 MHz

Which port does Telnet use?

23

To increase security on your company's internal network, the administrator has disabled as many ports as possible. Now, however, you can browse the internet, but you are unable to perform secure credit card transactions when making purchases from e-commerce websites. Which port needs to be enabled to allow secure transactions?

443

While making an online bank transaction, a customer checks to see that the web browser is displaying a lock icon that indicates that an encrypted TCP/IP suite protocol is being used. Which of the following TCP/IP port numbers does this protocol typically use when the browser encrypts its communications with the bank's web server?

443

Which of the following are valid IPv6 addresses? (Select TWO.)

6384:1319:7700:7631:446A:5511:8940:2552 141:0:0:0:15:0:0:1

A technician is tasked with preparing a conference room so that at least 20 guests will be able to wirelessly connect laptop computers to the company network. Which of the following network devices would be the BEST choice for this connectivity?

Access Point

You need a type of wireless connection that can transfer data between your phone, PDA, and laptop. You are transferring sensitive information. Which of the following would be the BEST choice?

Bluetooth

An administrator is asked to configure all network file sharing devices so that both Windows and Mac OS computers can access files. Which of the following network protocols should the administrator enable? (Select THREE).

Common Internet FIle System (CIFS) Apple file protocol (AFP) Server message block (SMB)

One of your customers wants to configure a small network in his home. The home has three floors, and there are computers on each floor. This customer needs to share files between computers, print to a centrally located printer, and have access to the internet. Which of the following print solutions would BEST meet this client's needs?

Configure a Wi-Fi infrastructure network.

A technician has configured a client computer's network interface to request an IP address. Which of the following TCP/IP suite protocols does the client use to perform the request and a server use to offer an IP address?

Dynamic Host Configuration Protocol (DHCP)

A company has chosen a UTM instead of an IDS or IPS appliance to protect their network. Which of the following UTM security features is not available with an IDS or IPS?

Email and antispam filtering

A technician is installing a new SOHO wireless router in a home office. The customer wants to secure the wireless network so only a smartphone, tablet, and laptop can connect. Which of the following router settings should the technician change?

Enable MAC filtering

A customer is upgrading the routers and switches in their network. The signal source in these network devices is a light-pulse. Which of the following network cabling options is MOST likely being used in this upgrade?

Fiber optic

Which of the following protocols is used by an email client to retrieve messages from an email server and gives users the option to keep mail messages on the server?

IMAP

You want to use your Windows workstation to browse the websites on the internet. You use a broadband DSL connection to access the internet. Which network protocol must be installed on your workstation to do this?

IP

You are setting up a small network in your office with one Windows server and 50 Windows workstations. You want to spend as little time as possible configuring the workstations with IP addressing information. What should you do?

Install and configure the DHCP service on your server.

Which of the following best describes how a switch functions?

It connects multiple cable segments (or devices), and forwards frames to the appropriate segment

Which of the following protocols is non-routable and requires another protocol to enable internetwork communications?

NetBIOS

Which network component connects a device to the transmission media and allows it to send and receive messages?

Network Interface Card

Which of the following protocols do email clients use to download messages from a remote mail server?

POP3

A technician is installing a network-enabled smart home control system in a SOHO. To access the system from the internet, which of the following configurations is MOST likely required on the SOHO router?

Port forwarding

You've used your Windows workstation to map a drive to a shared folder on a Windows server. Which protocol was used to access the share?

SMB

Which protocol is used to send email messages from a mail client to a mail server?

SMTP

Which of the following can be used to create a secure connection to a remote server?

SSH

Which of the following network services or protocols uses TCP/IP port 22?

SSH

A host on your network that provides a service that requires the server to always use the same IP address. Which IP addressing method can you use to manually assign the specific IP address?

Static IP addressing

Which of the following identifies the prefix component of an IPv6 address? (Select TWO.)

The first 4 quartets of an IPv6 address The first 64 bits of an IPv6 address

Which of the following identifies the Interface ID component of an IPv6 address? (Select TWO.)

The last 64 bits of an IPv6 address The last 4 quartets of an IPv6 address

Which of the following describes the part of the IPv6 address that identifies the subnet address?

The last quartet in the IPv6 address prefix

You are a software developer, and you are creating a multimedia streaming application. Data will be streamed from your streaming server to streaming clients over IP networks. Which transport protocol should your application use to send data between the clients and the server?

UDP

Which of the following protocols carry phone calls over an IP-based network?

VoIP

You are configuring a firewall to allow access to a server hosted in the demilitarized zone of your network. You open IP ports 80, 25, 110, and 143. Assuming that no other ports on the firewall need to be configured to provide access, which applications are most likely to be hosted on the server?

Web server, email server

Which of the following hardware devices regenerates a signal out all connected ports without examining the frame or packet contents?

hub

What device is used to create a physical star topology?

switch

Which of the following are not valid IP addresses? (Select THREE.)

1) 145.8.260.7 2) 257.0.122.55 3) 45.22.156.256

Which IEEE wireless standards specify transmission speeds up to 54 Mbps? (Select TWO.)

1) 802.11g 2) 802.11a

Which of the following functions are performed by proxy servers? (Select TWO).

1) Cache Web pages 2) Block employees from accessing certain Web sites

Which of the following are features of Basic Rate ISDN (BRI)? (Select THREE.)

1) Dial-up connection 2) Two data channels 3) One control channel

Which of the following correctly describe the most common format for expressing IPv6 addresses? (Select TWO.)

1) Hexadecimal numbers 2) 32 numbers, grouped using colons

Which of the following statements about the Dynamic Host Configuration Protocol (DHCP) are true? (Select TWO.)

1) It can deliver a DNS server address in addition to the host IP address 2) A workstation must request addressing information from a DHCP server

Which of the following statements accurately describes how a modem works? (Select TWO.)

1) It demodulates analog data from a telephone network into digital PC data 2) It modulates digital data from the PC into analog data and transmits it on a telephone network

Which of the following are characteristics of the 802.11g wireless standard? (Select THREE.)

1) Operates in the 2.4 GHz range 2) Maximum bandwidth of 54 Mbps 3) Backwards compatible with 802.11b devices

Which of the following are valid IP addresses? (Select TWO.)

172.16.1.26 2.2.2.2

An administrator configures a server to run the TCP/IP suite protocol that allows users to download files contained in specific directories on the server and also protects access to those files by requiring user authentication. Which of the following TCP/IP port numbers allow this protocol to work properly? (Select TWO).

20, 21

To access your company's internal network from home, you use Secure Shell (SSH). The administrator has recently implemented a new firewall at the network perimeter and disabled as many ports as possible. Which port needs to remain open so you can still work from home?

22

What is the maximum number of nodes Z-Wave allows on its mesh network?

232

To assist a user, a help desk technician is able to take advantage of a Windows proprietary network protocol that allows the technician to open a graphical interface to connect with the user's Windows computer. Which of the following TCP/IP port numbers is the default port used by this protocol?

3389

Which port must be opened in the firewall of a Windows system so that a Remote Desktop connection can be established?

3389

While working on a Windows workstation, you've enabled Remote Desktop. Which of the following ports MUST be opened in the server's firewall to allow remote clients to access the desktop?

3389

Which wireless standard can stream data at a rate of up to 54 Mbps using a frequency of 5 GHz?

802.11a

A customer is experiencing a sporadic interruption of their Wi-Fi network in one area of their building. A technician investigates and discovers signal interference caused by a microwave oven. The customer approves replacing the wireless access point that covers the area, but asks that the wireless speed also be increased. Which of the following Wi-Fi standards should the replacement device support to BEST fulfill the customer's needs?

802.11ac

Which of the following wireless networking standards uses a frequency of 5 GHz and supports transmission speeds up to 1.3 Gbps?

802.11ac

You are designing a wireless network for a client. Your client needs the network to support a data rate of at least 150 Mbps. In addition, the client already has a wireless telephone system installed that operates 2.4 GHz. Which 802.11 standard will work best in this situation?

802.11n

You have been contacted by OsCorp to recommend a wireless internet solution. The wireless strategy must support a transmission range of 150 feet, use a frequency range of 2.4 GHz, and provide the highest possible transmission speeds. Which of the following wireless solutions would you recommend?

802.11n

Which of the following is the best definition for a LAN?

A network in a small geographic area, like in an office

A technician is tasked with installing a network-enabled camera that runs on power that is supplied through its network connection. The network device that connects to the camera does not have the capability to supply this power. There is a power outlet close to the camera. Which of the following devices can be used to supply power?

A power over Ethernet injector

You connect your computer to a wireless network available at the local library. You find that you can't access several websites you need to on the internet. Which of the following is the MOST likely cause of this problem?

A proxy server is filtering access to websites.

You have a user who takes his laptop home every day after work. When he's working in the office, the laptop must get an IP address from the DHCP server so you configure it to obtain IP and DNS information automatically. When he's working from home, the laptop must use IP and DNS information that connects with his home network. Which IP addressing method can you use to make sure he gets a network connection at home?

Alternate IP configuration

Which of the following tools can help prevent damage when working with computer components?

Antistatic pad and wrist strap

A Windows workstation is configured to receive its IP configuration information from a DHCP server on the company network. The user at the workstation reports that she cannot use email and is unable to reach the internet. Using the ipconfig command, you see that the workstation has been assigned the following special IP configuration: IP address: 169.254.0.1 Subnet mask: 255.255.0.0 What is this special IP configuration called? Why did the workstation receive this type of configuration?

Automatic Private IP Addressing (APIPA) The workstation was unable to contact the DHCP server

You want to use a wireless keyboard and mouse with your laptop computer. Which method should you choose?

Bluetooth

While investigating a network connectivity issue, a technician finds that the link light on a workstation is not lit, and there is no connectivity after replacing the patch cable both between the workstation and the wall jack and between the patch panel and the switch with cables that are known to be good. If the wall jack and patch panel ports are labeled correctly, which of the following tools would the technician MOST likely use next?

Cable tester

A SOHO customer finds that their VoIP conversations frequently break up and become unintelligible. This happens most often when one person in the office streams video from the internet. Which of the following configuration changes on the SOHO router is MOST likely to improve VoIP performance?

Change QoS settings to give VoIP traffic more priority.

A technician is replacing a SOHO router and has configured DHCP to assign private IP addresses to hosts on the local network. These hosts can communicate with each other, but users can't browse the internet. Which of the following changes to the SOHO router is MOST likely to restore internet connectivity?

Configure the SOHO router for NAT

A salesperson in your organization spends most of her time traveling between customer sites. After a customer visit, she must complete various managerial tasks, such as updating your organization's order database. Because she rarely comes back to your home office, she usually accesses the network from her notebook computer using Wi-Fi access provided by hotels, restaurants, and airports. Many of these locations provide unencrypted public Wi-Fi access, and you are concerned that sensitive data could be exposed. To remedy this situation, you decide to configure her notebook to use a VPN when accessing the home network over an open wireless connection. Which of the following key steps should you take when implementing this configuration? (Select TWO. Each option is part of the complete solution.)

Configure the browsers to send HTTPS requests through the VPN connection Configure the VPN connection to use IPsec

Which type of network medium is used by an Integrated Services Digital Network (ISDN) adapter?

Copper telephone wire

You suspect that the power supply in your desktop PC is failing. You want to use a multimeter to test the power supply. Which multimeter setting should you use?

DC volts

As the IT technician for your company, you need to ensure that IP addresses are automatically assigned to hosts while at the same time preventing the same address from being assigned twice. Which of the following services would be BEST to use?

DHCP

Currently, the users in your company are required to use their IP addresses when connecting to other hosts. Since IP addresses are difficult to remember, you want to implement a protocol on your network that allows computers to automatically find another host's IP address using a logical name. Which of the following protocols would be the BEST to implement?

DNS

You want to implement name resolution on the Linux workstations in your company. Which protocol will you use to do this?

DNS

You are the IT technician for your company. Which of the following mechanisms would BEST allow you to resolve a hostname into its associated IP address? (Select TWO).

DNS and HOSTS file

A technician has configured a client computer's network interface with addresses of servers where the client will send requests for translating Fully Qualified Domain Names (FQDNs) to IP addresses and IP addresses to FQDNs. Which of the following TCP/IP suite protocols is used by the client to perform the request and also used by a server to respond to these requests?

DNS protocol

A homeowner's connection to the internet is through an always-on modem that connects to existing telephone wiring and has a download speed of over 3 Mbps. The homeowner is able to make analog phone calls over the same wiring at the same time. Which of the following internet connection types is being used?

DSL

Which of the following is not an example of wireless networking communications?

DSL

Which TCP/IP configuration parameter identifies the router that is used to reach hosts on remote networks?

Default gateway

You have just connected a new computer to your network. The network uses static IP addressing. You find that the computer can communicate with hosts on the same subnet, but not with hosts on a different subnet. No other computers are having a problem. Which of the configuration values would you most likely need to change?

Default gateway

You provide desktop support for a small company. The company has two locations in the same city, but they are several miles away. You get a call from a user who is having problems installing a new device. You try to tell the user how to update the driver for the device over the phone, but he is having a hard time understanding your directions and is becoming frustrated. What should you do?

Establish a Remote Desktop connection and update the driver

Which of the following devices allows network communications to be transmitted over existing AC power lines?

Ethernet over Power

Which of the following techniques are used in a pharming attack to redirect legitimate web traffic to malicious websites? (Select TWO).

Exploiting DHCP servers to deliver the IP address of poisoned DNS servers Changing the hosts file of a user's computer

Which of the following is a valid IPv6 address?

FEC0::AB:9007

You want to allow your users to download files from a server running the IP protocol. You want to protect access to the files by requiring user authentication to access specific directories on the server. Which IP protocol should you implement to provide this capability?

FTP

Which protocols are used on the internet to transmit webpages from web servers to web browsers running on client workstations? (Select TWO.)

HTTP HTTPS

Which of the following protocols provides authentication and encryption services for VPN traffic?

IPSec

Which of the following network technologies is packaged as part of a BRI plan?

ISDN

Your organization is frequently visited by sales reps. While on-site, they frequently plug their notebook systems into any available wall jack, hoping to get internet connectivity. You are concerned that allowing them to do this could result in the spread of malware throughout your network. Which of the following would BEST protect you from guest malware infection? (Select TWO).

Implement MAC address filtering -Implement static IP addressing

A local dentist has contracted with you to implement a network in her new office. Because of security concerns related to patient privacy laws, she has asked that the new network meet the following criteria: No one from the internet should be able to access her internal network. Email messages should be scanned for spam, phishing attacks, and malware before they reach users' workstations. Employees access to non-work-related websites, especially sites that contain inappropriate content, should be blocked. A system should be put in place to detect and prevent external attacks on her network. Which of the following would BEST meet your client's criteria?

Implement an all-in-one security appliance.

You manage a network that has multiple internal subnets. You connect a workstation to the 192.168.1.0 subnet using the default subnet mask. This workstation can communicate with some hosts on the private network, but not with other hosts. You run ipconfig /all and see the following: Ethernet adapter Local Area Connection: Connection-specific DNS Suffix . : mydomain.local Description . . . . . . . : Broadcom network adapter Physical Address. . . . . . : 00-AA-BB-CC-74-EF DHCP Enabled . . . . . . . : No Autoconfiguration Enabled. . . : Yes IPv4 Address . . . . . . . : 192.168.1.102(Preferred) Subnet Mask . . . . . . . : 255.255.255.0 Default Gateway. . . . . . . . . : 192.168.2.1 DNS Servers. . . . . . . . . . . : 192.168.2.20 Which of the following is the MOST likely cause of the problem?

Incorrect default gateway

You manage a network that has multiple internal subnets. You connect a workstation to the 192.168.1.0 subnet, which uses the default subnet mask. This workstation can communicate with some hosts on the private network, but not with other hosts. You run ipconfig /all and see the following: Ethernet adapter Local Area Connection: Connection-specific DNS Suffix . : mydomain.local Description . . . . . . . : Broadcom network adapter Physical Address. . . . . . : 00-AA-BB-CC-74-EF DHCP Enabled . . . . . . . : No Autoconfiguration Enabled. . . : Yes IPv4 Address . . . . . . . : 192.168.1.102(Preferred) Subnet Mask. . . . . . . . : 255.255.0.0 Default Gateway . . . . . . : 192.168.1.1 DNS Servers . . . . . . . : 192.168.1.20 192.168.1.27 Which of the following is the MOST likely cause of the problem?

Incorrect subnet mask

Which actions allow you to access the internet on your laptop via a cellular network?

Install a cellular USB adapter in a open port on the laptop

You would like to control internet access based on users, time of day, and websites visited. Which of the following actions would BEST meet your criteria?

Install a proxy server. Allow Internet access only through the proxy server

Which of the following protocols can your portable computer use to connect to your company's network via a virtual tunnel through the internet? (Select TWO).

L2TP PPTP

A SOHO's connection to the internet is through an antenna that sends and receives a microwave signal to the ISP's antenna. There can be no obstacles on the direct path between the two antennae. Which of the following internet connection types is being used?

Line-of-sight wireless

A printer is behaving erratically, and you suspect a faulty parallel port. Which tool can you use to test the parallel port?

Loopback plug

Your workstation is unable to communicate with any other computer on the network. Which of the following tools should you use to test the network card's abilities to send and receive signals?

Loopback plug

You are an IT technician for your company. Your boss has asked you to set up and configure a wireless network to service all of the conference rooms. Which of the following features lets you allow or reject client connections by hardware address?

MAC address filtering

The 802.11ac wireless networking standard provides increased bandwidth and communication speeds by using which of the following technologies? (Select TWO).

MU-MIMO to allow multiple users to use the same channel. Channel bonding to combine more channels in the 5 GHz band to allow for up to 160-MHz-wide channels.

Recently, your laptop won't power on, and the battery is not charging. You suspect the block on the power cord (also known as a brick) no longer works. Which tool will help you troubleshoot this problem?

Multimeter

Which tool would you use to measure electrical properties such as voltage, amps, and resistance?

Multimeter

Which of the following networking devices or services is LEAST likely to be compatible with VPN connections?

NAT

You want to use a protocol that can encapsulate other LAN protocols and carry the data securely over an IP network. Which of the following protocols is suitable for this task?

PPTP

A group of workers in an office space communicate with each other on their smartphones and tablet devices through an ad hoc network linked using Bluetooth technology protocols. Which of the following network types is in use?

Personal Area Network (PAN)

A user is configuring an email client application and plans to use a standard TCP/IP suite protocol to retrieve email messages from an email server. Which of the following TCP/IP suite protocols can be used to retrieve email messages? (Select TWO).

Post Office Protocol (POP3) Internet Message Access Protocol (IMAP)

Which of the following devices can be used to distribute electrical power along with network data on twisted-pair Ethernet cabling (CAT 5 or higher)?

Power over Ethernet

Which printer management components would you use to view the port a printer uses? (Select TWO.)

Printer properties Print server properties

What are two major concerns regarding IoT devices? (Select TWO.)

Privacy Hacking

You are configuring an ADSL connection. Which of the following will be part of the configuration? (Select TWO.)

RJ11 connectors Filters or splitters

Occasionally, Rachel works from another Mac in her office, rather than her own, and needs to be able to access her Mac while she is away from her desk. Which option can Rachel use to access her MAC?

Screen Sharing

Which of the following BEST describes the purpose for which loopback plugs are used?

Testing ports by returning output signals as input

You are installing a satellite connection so your home office can connect to the internet. Which of the following statements is true?

The satellite dish must be pointed in the correct direction for communicating with the satellite

While investigating a network connectivity issue, a technician finds that the link light on a workstation is not lit, and there is no connectivity after replacing the patch cable with one that is known to be good. The wall jack is not labeled, and within the switch room, none of the cables or patch panel ports are labeled. Which of the following tools would the technician MOST likely use next?

Tone generator

You need to trace the route that a Cat 6 UTP cable takes through the ceiling and walls of your building. Which tool should you use?

Tone generator

A maintenance worker accidently nicks a bundle of network cables routed to multiple wall jacks in a conference room. Only one of the cable's wires are severed. A technician is tasked with replacing the cable. Which of the following tools would the technician MOST likely use to identify which wall jack connects to the severed cable?

Tone generator and probe

You are an IT technician for your company. One of your employees has a computer that continually reboots when it is powered on. He has asked you to fix it. You suspect that the power supply may be failing. Which of the following is the BEST way to determine whether the power supply is causing the reboots?

Use a multimeter to test the power supply.

Which of the following are options for connecting a computing device, such as a notebook computer or a tablet, to a cellular network? (Select FOUR.)

Use the device's Wi-Fi to connect to the network through a cellular Wi-Fi hot spot. Use an integrated cellular antennae to connect the device directly to the cellular network. Use a USB cellular antennae to connect the device directly to the cellular network. Use a USB cable to connect the device to the network through a smartphone.

A company has built a video streaming service that supplies training videos. Quickly transmitting video data to customers is more important than guaranteed delivery. Which of the following transport layer TCP/IP suite protocols is MOST likely used for this service?

User Datagram Protocol (UDP)

Which of the following statements about an SSL VPN are true? (Select TWO).

Uses port 443 Encrypts the entire communication session

The servers for the company are all virtual machines and hosted on the same hypervisor. You need to keep users in all other departments from accessing the virtual servers used by the finance department. Which of the following technologies should you use to logically isolate the network?

VLANs

Your organization employs a group of traveling salespeople who need to access the corporate home network through the internet while they are on the road. You want to funnel remote access to the internal network through a single server. Which of the following solutions would be BEST to implement?

VPN concentrator

Which of the following is true when the DHCP setting is disabled in a wireless network?

Wireless clients must use a static IP address within the correct IP address range to connect to the network

What are the two protocols used most often with IoT devices? (Select TWO.)

Zigbee and Z-Wave

Which type of configuration would you use if you wanted to deploy 802.11n technology to communicate directly between two computers using a wireless connection?

ad hoc

A group of workers attend a team-building retreat at a remote cabin. They can place calls on their mobile smartphones, but the cabin has no wired phone, television, or wired internet connectivity. The workers need to access an internet webpage using their laptop computers. Which of the following internet connection types might be available to the workers?

cellular

Which of the following types of internet connection services can allow you to be truly mobile while maintaining your internet connection?

cellular

An after-school care center allows children to browse the internet. They want to limit the websites that the children can access. Which of the following network hosts would MOST likely provide this service?

proxy server

A healthcare organization provides mobile clinics throughout the world and needs to transfer patients' statistical data to a central database via the internet. Which network technology should you select to ensure network connectivity for any clinic located anywhere in the world, even remote areas?

satellite

While setting up a home office, a technician disables the DHCP service on the office router, but does not want to rely on link-local addressing. Which of the following IP addressing methods should be used?

static

A technician determines that an older network hub that connects 24 workstations is performing poorly due to excessive network collisions. Which of the following network devices would be the BEST replacement?

switch

Which of the following LAN devices receives a signal on one port and forwards that signal only to the port where the destination device is connected?

switch


Set pelajaran terkait

Northouse, Ch. 9: Authentic Leadership

View Set

OS and Device Foundation 9.2 Quiz

View Set

Live Virtual Machine Lab 12.1: Module 12 Networking Device Monitoring

View Set