B.2.2 CompTIA A+ 220-1101 (Core 1) Domain 2: Networking

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

Which of the following is the root level in www.testout.com.'s fully qualified domain name?

> . (period) Explanation: The .(period) at the end of the FQDN (fully qualified domain name) is the root level. The root level is the highest level in the DNS hierarchy. When typing the FQDN into a web browser, the period is typically not included. The period is mainly used when defining DNS records on the server. In this example, com is the top-level domain (TLD). The TLD is the second level in the DNS hierarchy. TLDs have extensions such as com, edu, org, and many others. www is the FQDN's hostname. testout is the FQDN's domain name.

While working on a Windows workstation, you enable Remote Desktop. Which of the following ports MUST be open on the server's firewall to allow remote clients to access the desktop through Remote Desktop?

> 3389 Explanation: Remote Desk Protocol (RDP) runs on port 3389 by default. POP3 uses port 110. LDAP uses port 389. NTP uses port 123.

A user is configuring an email client application and plans to use a standard TCP/IP suite protocol to retrieve email messages from an email server. Which of the following TCP/IP suite protocols can be used to retrieve email messages? (Select two.)

> Post Office Protocol (POP3) > Internet Message Access Protocol (IMAP) Explanation: Both POP3 and IMAP can be used to retrieve email messages from an email server. While SMTP is used to send and retrieve email messages between email servers, client email applications typically use SMTP to send email messages to an email server. SNMP is used to collect information about managed devices on IP networks. SNMP also modifies settings to change network devices' behavior. LDAP is used to access and maintain distributed directory information services.

An after-school care center allows children to browse the internet. They want to limit the websites that the children can access. Which of the following network hosts would MOST likely provide this service?

> Proxy server Explanation: One function of a proxy server is to intercept requests from a client browser and either forward them on to the internet or deny access to that request. A print server manages network printers and makes them available to computers throughout the network. Print jobs are sent to the print server instead of directly to the printer. A web server offers web pages to clients. Many organizations have their own web server that is accessible from the internet or from the internal network. A DHCP server leases IP addresses to client computers when they first connect to the network.

A healthcare organization provides mobile clinics throughout the world and needs to transfer patients' statistical data to a central database via the internet. Which network technology would be BEST to use to ensure network connectivity for any clinic located anywhere in the world, even remote areas?

> Satellite Explanation: Satellite capability is available even in areas that do not have a local network infrastructure. This requires a local portable transmitter with an antenna directed skyward (to a satellite). Satellite service providers offer nearly 100% global network coverage by maintaining a series of satellites that circle the earth in geosynchronous orbit. Dial-up, ISDN, cable modem, and DSL require a local network infrastructure that is provided by either a telephone company or cable television company.

Drag each wireless networking technology on the left to its associated transmission distance limitation on the right. Each technology may be used more than once.

Up to 100 meters for Class 1 devices. > Bluetooth Up to 2 meters with a few obstacles in between. > Infrared Up to 10 meters for Class 2 devices. > Bluetooth A few centimeters. > Near Field Communcation Explanation: Infrared wireless transmissions work best for devices within 1 meter, but can operate up to 2 meters in areas with a few obstacles in between. The maximum Bluetooth transmission distance depends on the device class. The following rules apply: Class 3 devices transmit up to 1 meter. Class 2 devices transmit up to 10 meters. Class 1 devices transmit up to 100 meters. NFC allows two-way communication between two devices, but they must be within a few centimeters of each other.

The following is an example of an IPv6 address: FEC0:1319:7700:F631:446A:5511:CC40:25AB

Which part of the example IPv6 address is the prefix? > FEC0:1319:7700:F631 Which quartet in the example IPv6 prefix is used to identify the subnet? > F631 Which part of the example IPv6 address is the interface ID? > 446A:5511:CC40:25AB Explanation: In this example of an IPv6 address, FEC0:1319:7700:F631:446A:5511:CC40:25AB FEC0:1319:7700:F631 is the prefix. The quartet used to identify the subnet is F631 (the last quartet in the prefix). 446A:5511:CC40:25AB is the interface ID.

A user is configuring an email client application and decides to use a TCP/IP suite protocol that stores all messages on the email server so that they can be synchronized across a laptop, a smartphone, and a web email client. In addition, this protocol stores the email messages on the email server until the user explicitly deletes them. Which of the following TCP/IP port numbers will the client application typically access while using this protocol to contact the email server?

> 143 Explanation: The TCP/IP suite protocol that stores email messages on a server so that they can be synchronized across multiple devices is Internet Message Access Protocol (IMAP). IMAP typically uses port 143. FTP uses port 21. HTTP uses port 80. POP3 uses port 110.

You've just installed the DNS service on a Windows server. Which port must be opened on the server's firewall to allow clients to access the service?

> 53 Explanation: The DNS service runs on port 53 by default. POP3 uses port 110. IMAP uses port 143. NTP uses port 123.

You have recently purchased a toll pass for a bridge that you cross each day on your way to work. Which of the following wireless technologies is MOST likely being used for this pass?

> Active RFID Explanation: Active RFID tags have on-board batteries and can send signals over a long distance. Toll passes in vehicles use active RFID. Passive RFID tags are not powered and rely on the energy transferred by the scanner to transmit data. These tags are seen in ID badges, credit cards, and other similar devices. Near Field Communication (NFC) is a newer technology that is built on RFID. NFC requires devices to be within 2 inches of each other. Bluetooth is designed to allow devices to communicate within a personal area network (PAN) of close proximity. However, the devices must be paired, which would make a Bluetooth connection difficult to use as a toll pass for a bridge.

A group of workers attend a team-building retreat at a remote cabin. They can place calls on their mobile smartphones, but the cabin has no wired phone, television, or wired internet connectivity. The workers need to access an internet web page through their laptop computers. Which of the following internet connection types might be available to the workers?

> Cellular Explanation: A cellular internet connection might be available. A worker may have an embedded cellular adapter or a USB broadband modem (air card). A laptop could be tethered to a mobile phone with a USB cable or Bluetooth, or the mobile phone might be able to create a mobile hotspot. A cable internet connection is not possible because there are no television cables in the cabin. A dial-up internet connection is not possible because there are not wired phone lines in the cabin. A DSL internet connection is not possible because there are no wired phone lines in the cabin.

You want to configure a Windows workstation with your network proxy server's IP address from Control Panel using the Internet Properties window. Click on the tab in the Internet Properties window that you would use to do this.

> Connections Explanation: To configure the proxy server's IP address, go to Control Panel > Network and Internet > Internet Options. Click the Connections tab and then select LAN settings. In the dialog displayed, you can enable a proxy server for the LAN and then enter the proxy server's IP address and port number.

A local dentist has contracted with you to implement a network in her new office. Because of security concerns related to patient privacy laws, she has asked that the new network meet the following criteria and be cost effective: > No one from the internet should be able to access her internal network. > Email messages should be scanned for spam, phishing attacks, and malware before they reach users' workstations. > Employees access to non-work-related websites, especially sites that contain inappropriate content, should be blocked. > A system should be put in place to detect and prevent external attacks on her network. Which of the following would BEST meet your client's criteria?

> Implement an all-in-one UTM security appliance. Explanation: The network criteria specified by your client requires several different network devices to be implemented, including a firewall, an email scanner, a content filter, and an intrusion prevention system. The most cost-effective way to best meet your client's criteria would be an all-in-one UTM security appliance. While you could purchase each device separately, the cost of doing so would probably be quite high. Because you are working with a small business, an all-in-one security appliance that includes all of these functions in a single device would be more cost-effective and easier for you to manage.

One of your customers has a long range wireless network that connects two company office buildings together. The buildings are several hundred yards apart. You have licensed a frequency range of 3.65 GHz to transmit signals between the buildings. However, the wireless connection is not performing ideally, and it sometimes drops connections. Which of the following is the BEST immediate solution to try to resolve this issue?

> Increase the power to the access points. Explanation: Some wireless access points allow the power to be increased. Increasing the power allows the access point to transmit a longer distance and possibly resolve transmission issues. However, doing so can lead to overheating and instability. Licensing a different frequency range can be expensive, take time, and may not resolve the issue. An unlicensed 801.11 frequency standard does not provide the transmission distance to cover several hundred yards (maximum range is up to 300 feet). A dual-band access point only provides transmissions at 2.4 GHz and 5 GHz, which does not provide sufficient transmission distance.

You are working as a junior network technician for the local hospital system. Part of your duties include adding IT news and updates to the hospital's internal web site. The website is only accessible to employees when they are connected to the hospital network. What is this type of website known as?

> Intranet Explanation: This internal website is an example of an intranet. An intranet is a private network that uses internet technologies. Services on an intranet are only available to hosts that are connected to the private network. An extranet is a private network that uses internet technologies, but its resources are made available to external trusted users. Because this website is only available to internal users that are connected to the private network, this would not be an example of a extranet A network with geographically dispersed WAN connections that connect multiple LANs is often called an internetwork. A website that is only accessible to internal users is not an internetwork A subnet is a portion of a network with a common network address. A website that is only accessible to internal users is not a subnet

Which of the following technologies does the 802.11ac wireless networking standard use to provide increased bandwidth and communication speeds? (Select two.)

> MU-MIMO to allow multiple users to access the same channel. > Channel bonding to combine more channels in the 5 GHz band to allow more than double the bandwidth. Explanation: The 802.11ac wireless network standard increases bandwidth and communication speeds using the following technologies: MU-MIMO is an enhancement to MIMO that allows multiple users to use the same channel. In addition to adding MU-MIMO, 802.11ac doubled the number of MIMO radio streams from four to eight. Channel bonding combines two non-overlapping 20 MHz channels into a single 40 MHz channel, resulting in slightly more than double the bandwidth. All the other technologies are not used to increase the bandwidth and communication speeds for 801.11ac.

Which of the following terms refers to a network resource sharing model that uses access control lists saved on each computer?

> Peer-to-peer Explanation: Access to shared resources are controlled separately on each computer in the peer-to-peer model (a Windows peer-to-peer network is called a workgroup. For example, each computer in a peer-to-peer network maintains its own set of user accounts. An intranet is a private network that uses internet technologies. Services on an intranet are only available to hosts that are connected to the private network. An extranet is a private network that uses internet technologies, but its resources are made available to external (but trusted) users. The client/server model places shared resources on a server. Resources are accessed by clients.

Which of the following identify an IPv6 address's prefix component? (Select two.)

> The first 64 bits of an IPv6 address. > The first four quartets of an IPv6 address. Explanation: An IPv6 address is a 128-bit binary number that uses the first 64 bits as the address prefix and the last 64 bits of the address as the interface ID. The 128-bit binary number is organized into 32 hexadecimal numbers that are organized further into eight quartets. The first four quartets correspond with the first 64 bits of the IPv6 address.

You are working as a junior security technician for a consulting firm. One of your clients is upgrading their network infrastructure. The client needs a new firewall and intrusion prevention system installed. They also want to be able to block employees from visiting certain types of websites. The client also needs a VPN. Which of the following internet appliances should you install?

> Unified Threat Management Explanation: In this scenario, the best option would be to install a Unified Threat Management (UTM) appliance. A UTM combines multiple functions into one single device, including the firewall, IPS, content filtering, VPN support, and much more. A proxy server, load balancer, or spam gateway would not be able to provide all of the functionality that your client is looking for.

What are the two mesh protocols that are used most often with IoT devices? (Select two.)

> Zigbee > Z-Wave Explanation: Zigbee and Z-Wave are two radio protocols that many IoT devices work with because they are designed for low-data rate, low-power applications. These protocols link all IoT devices to form a mesh network. Zensys is the developer of the Z-Wave wireless mesh networking technology. Zerg is a fictitious alien species that inhabits the Milky Way. Zbot is a Trojan virus that targets Windows computers to extract sensitive financial information.


Set pelajaran terkait

Module 13 TEST - Wellness - Regular Psychology - PRE-test

View Set

System analysis and design chapter 5

View Set

Legal Studies possible questions

View Set

Direct Variation write equation and evaluate

View Set

Accounts Receivable (Vet Mngment)

View Set

Business Strategy Exam 2 Study Guide

View Set

psy chap stress, Psychology 150 Chapter 10, Chapter 10 psych quiz questions, Lesson 25-28, Psychology Chapter 11, Chapter 11 psychology- quiz questions, PSY 100 Final study guide CH. 9, 10, 11, & 12, Psychology: Chapter 11

View Set