CompTIA Network questions

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

Which of the following uses MIMO? (Multiple Input Multiple Output) A) 802.11ac B) 802.11n C) 802.11a D) 802.11g

B) 802.11n

What is the network prefix that is used to denote an unsubnetted Class C IP address? A) /24 B) /8 C) /16 D) /32

A) /24

Of the IEEE specifications listed, which is/are capable of operating at 11mbps? (Choose all that apply.) A) 802.11a B) 802.11b C) 802.11g D) 802.11

A) 802.11a B) 802.11b C) 802.11g

You want to set up a wireless network with data throughput of 54 Mbps. Which two wireless specifications will provide a date throughput of 54 Mbps? (Choose two.) A) 802.11g B) 802.11a C) 802.11b D) 802.11

A) 802.11g B) 802.11a /Both 802.11a and 802.11g provide data throughput of 54 megabits per second (Mbps). The 802.11g wireless network standard provides backward compatibility with the 802.11b wireless network specification, but the 802.11a network specification does not provide backwards compatibility to any other wireless network because it operates in the 5 GHz frequency range rather than the 2.4 range that 802.11b and 802.11g operate in. You should not use the 802.11b wireless network specification. The 802.11b network specification provides data throughput of only 11 Mbps. You should not use the 802.11 wireless network specification. The 802.11 provides data throughput of only 2 Mbps.

All of the employees in a lawyer's office communicate with the internet and each other through the same appliance. What kind of network is the office using? A) SOHO B) Zigbee C) PAN D) MAN

A) SOHO

A small company hired a network technician to upgrade its network. Surprisingly the company was still using a legacy hardware device that configures a network into a star topology. What device was this? A) Managed switch B) Unmanaged switch C) Hub D) Patch panel

C) Hub

You are troubleshooting a throughput problem on an 802.11b wireless network. A user complains that as she moves about the office, her client device loses connections to network resources. The client still shows a signal received from the access point. How might you best resolve this problem? A) Connect the network to 802.11a B) Increase the client radio power C) Move the access point closer to the user D) Increase the access point radio power

B) Increase the client radio power /The output power of the transmitting radio has an effect on the range of the link. A higher output power causes the signal to be transmitted at a greater distance, resulting in a greater range.

Microsoft's VMM (Virtual Machine Manager) can be used to configure conventional data centers while delivering unified management capabilities using Application Program Interfaces (API's). Which of the choices best identifies this type of deployment? A) SPFF B) SDN C) VA D) None of these

B) SDN /Software defined networks use APIs to create a flexible architecture to deliver centralized control of the network, along with the capability to run test configurations without impacting the actual network.

Which radio frequency band does the 802.11b standard use? A) 2.4 GHz B) 4.3 GHz C) 1.9 GHz D) 5.0 GHz

A) 2.4 GHz

The customer wonders whether costs could be reduced by using a hub for the network in place of a switch. Which of the following factors are limitations of using hub-based Ethernet? (Select all that apply). A) Hubs do not support PoE B) Hubs do not support Gigabit Ethernet C) Hubs do not support more than 4 ports D) Hubs require different cabling E) Hub performance is reduced by collisions

A) Hubs do not support PoE B) Hubs do not support Gigabit Ethernet E) Hub performance is reduced by collisions

You are asked to install a device located on the data link layer (layer2) of the OSI model. What network component is contained at layer 2? A) Router B) Hub C) Switch D) Firewall

C) Switch /Layer 2 of the OSI model contains switches and NICs

Which type of transmission uses a modem to divide the cable into multiple channels? A) Broadband B) Baseband C) Both broadband and baseband D) None of these

A) Broadband /Analog is the transmission of a waveform that changes constantly over a wide range of values. This is a form of signaling called broadband signaling.

You have implemented a hardware firewall on a small office network. You need to ensure that all HTTP packets are automatically sent to the web server. What should you do? A) Enable port forwarding. B) Enable NAT. C) Enable QoS. D) Enable port triggering.

A) Enable port forwarding. /Port forwarding allows you to enable a specific port in the firewall and direct traffic that comes from outside your network to a specific IP address. For example, in this scenario, you would open port 80 on the firewall and configure port forwarding to all incoming traffic to the web server. You should not enable QoS. QoS allows you to limit the bandwidth available for data based on the protocol used, the IP address, or other parameters. It is usually configured on routers.

A user complains that his internal wireless network card in his laptop is no longer functioning. After troubleshooting, you decide to replace the wireless network card. You replace the wireless network card with the same model as the old card. You connect the internal antenna cables. You then reboot the computer. What should you do next? A) Install the latest drivers for the wireless card. B) Flash the BIOS. C) Configure the wireless network settings. D) Connect to the wireless network.

A) Install the latest drivers for the wireless card. /This will ensure that the computer has the most up-to-date drivers to ensure that all functions are supported. Make sure to attach the internal antenna cables. If they are not attached properly, the functionality of the wireless card will be limited. Internal wireless adapters in a laptop use the mini-PCI-technology

Which protocol is used by Active Directory? A) LDAP B) SSH C) SFTP D) SMB

A) LDAP/ Lightweight Directory Access Protocol (LDAP) is used by Active Directory. It is used by applications to access directories. By default, it uses port 389. Secure File Transfer Protocol (SFTP) is a secure version of File Transfer Protocol (FTP) that uses an SSH tunnel. While FTP uses port 20 and 21, SFTP uses port 22. 20, 21 - FTP 22 - SSH 23 - Telnet 25 - SMTP 53 - DNS 80 - HTTP 110 - POP3 143 - IMAP 443 - HTTPS 3389 - RDP 137-139 - NetBIOS 445 - SMB/CIFS 427 - SLP 548 - AFP 67/68 - DHCP 389 - LDAP 161/162 - SNMP

A network technician troubleshoots an issue where the video conferencing system keeps freezing up and dropping out. The technician determines that the router is not processing the signal fast enough. What is this type of issue known as? A) Latency B) VoIP C) QoS D) Jitter

A) Latency /If the entire signal is not fast enough for the Real Time Connection, it's a latency issue. If it just happens every once in a while, that's a jitter issue. Latency is when the whole connection is not good enough.

Ethernet and Ring NICs are hard-coded by the manufacturer with a(n) _______ address A) MAC B) IPX C) Router D) IP

A) MAC /Short for Media Access Control, a hardware address that uniquely identifies each node on a network.

You want to set up a wireless network with data throughput of 54 Mbps. Which two wireless specifications will provide a data throughput of 54 Mbps? (Choose two.) A) 802.11b B) 802.11g C) 802.11 D) 802.11a

B) 802.11g D) 802.11a

Two networks in different offices have been using DHCP set up for 192.168.1.0/24. After consolidating networks, IP addresses have run out. Which of the following is the MOST cost-effective solution? A) Request another class C IP scope from the ISP B) Switch to static IP addressing C) Change the subnet mask to 255.255.254.0 D) Add a router to connect to both networks

C) Change the subnet mask to 255.255.254.0

What piece of equipment would help transmit an ethernet signal to the far end of a hotel that is 400 meters (m) long? A) Patch panel B) Ethernet patch cable C) Repeaters D) Cloud-based network controller

C) Repeaters /A repeater takes a weak signal, amplifies it, and transmits the amplified signal. In wired networks, repeaters can be used to extend the segment distance beyond the 100-m limitation of twisted-pair cable, or to extend a wireless signal beyond the normal range of the wireless access point. An Ethernet patch cable is not the correct answer. Patch cables have a maximum cable length per segment of 100 meters.

A network technician is trying to locate the Cat 6A cable in a closet full of unmarked boxes with different types of cabling in them. How will the technician be able to tell which cable is Cat 6A? (Select all that apply.) A) The words "twisted pair cable" is on the cable jacket B) The TIA/EIA standard is on the cable jacket C) The Cat specification is on the cable jacket D) The cable type is on the cable jacket

C) The Cat specification is on the cable jacket D) The cable type is on the cable jacket

A networking student is learning about IP addressing and discovers which of the following facts are NOT true regarding IPv6? A) Divided into two main parts B) Will replace IPv4 C) Expressed in hexadecimal notation D) Expressed is dotted decimal notation

D) Expressed is dotted decimal notation /IPv4 is expressed in dotted decimal notation

A network technician is setting static IPv4 addresses on servers. Which address will they need to change for every device? (Select all that apply.) A) The gateway B) The last octet C) The first octet D) The alternate DNS

A) The gateway B) The last octet /The alternate DNS is out because if we're using an alternate DNS it's going to be the same for every device. Every time we're on a different server with a different router, we've got to set up a different gateway. Most often the last octet is going to be the host ID. The first octet is the network ID which is unlikely to change.

What is the maximum transmission speed for Bluetooth technology? A) 11 Mbps B) 100 Mbps C) 3 Mbps D) 54 Mbps

C) 3 Mbps /The maximum transmission speed for Bluetooth is 3 Mbps. Bluetooth is used for short-range wireless connections. For example, Bluetooth will be used to connect wireless devices, such as the keyboard and mouse, to the computer.

You have just purchased a new color laser printer to be used on your 10 Mbps Ethernet network. When the printer arrives, however, you discover that it does not have an Ethernet connection. The printer has the following built-in connections: Bluetooth 2.1, Infrared, and 802.11g. You need to connect this printer to the network via the print server. Your solution should expend the least amount of additional money while providing the fastest connection as possible. Assuming that all of these connections are available in your office or on the print server, what should you do? A) Purchase a NIC for the printer, and connect the printer to the print server on the network. B) Connect the printer to the print server using Bluetooth 2.1. C) Connect the printer to the print server using 802.11g. D) Connect the printer to the print server using Infrared.

C) Connect the printer to the print server using 802.11g. /This will provide a connection that operates at 54 megabits per second (Mbps). Other wireless network options include 802.11a, 802.11b, 802.11g, 802.11n, and 802.11 ac. - 802.11a operates in the 5 GHz radio spectrum and up to 54 Mbps (actual throughput is closer to 22Mbps). - 802.11b operates in the 2.4 GHz radio spectrum and up to 11 Mbps. - 802.11g operates in the 2.4 GHz radio spectrum and up to 54 Mbps.

You need to install a new switch on your network. The new switch should be plug and play with default QoS settings. Which switch type do you choose? A) LAN switch B) Managed switch C) Unmanaged switch D) Any of these

C) Unmanaged switch /An unmanaged switch will offer plug and play capability along with default configurations for QoS. A managed switch has more features but requires more configuration and maintenance. A LAN switch, aka an active hub, simply reduces congestion on a local LAN.

You have a single switch, and you need to separate the network traffic for the Marketing and Accounting departments. What would be the easiest way to accomplish this? A) Reservation B) Link-local address C) VLAN D) NAT

C) VLAN / A virtual LAN (VLAN) allows you to segregate network traffic based on the switch port connections. As an example, if computers in the Marketing department are connected to ports 3, 6, 12, and 14, those ports can be assigned to VLAN100. If computers in the Accounting department are connected to ports 4, 15, 17, and 20, they can be assigned to VLAN200. In this configuration, computers on VLAN100 would be segregated from computers on VLAN200. VLAN assignments can span multiple switches, but each switch port can only belong to one VLAN. By default, all switch ports are assigned to VLAN1.

A network technician must allow employee computers to securely connect to the corporate network from alternate locations. What is the best method for the technician to use? A) DMARC B) DHCP scope C) VPN D) VLAN

C) VPN

Which address is a MAC address? A) 124.24.0.2 B) 00120193:06F1A345CA11 C) 1234:EF14:45:ADD1:EA23:222:1290:A D) ACA1:1345:1::123.23.0.1 E) 122A::ABCA:0:0:2100 F) AD-4F-C1-A9-12-CB

F) AD-4F-C1-A9-12-CB /A MAC address is assigned to each NIC. A MAC address is a 12-digit hexadecimal number. Each pair of hexadecimal numbers is referred to as an octet, and the octects are usually seperated by dash (-) characters when a MAC address is represented in text. The first three octets in a MAC address identify the NIC manufacturer, and the last three octets act as a serial number to identify the individual NIC.

Which well-known UDP port does DNS use? A) 53 B) 161 C) 110 D) 80

A) 53 /Ports allow more than one service or application to communicate at the same time between computers. The DNS service uses port 53 to communicate information between name servers. DNS uses both TCP port 53 and UDP port 53. Administrators can assign additional ports for communication on an intranet and through the Internet. There are a total of 65, 536 ports from which to choose. Of these, only 1,024 ports are considered well known and, therefore, reserved for a particular service.

Your 100BaseT network uses the TCP/IP protocol suite exclusively, and workstations on your network obtain addresses dynamically from a server. From your computer, you can contact all servers and workstations on your own network segment, but you are unable to gain access to network resources on other segments. Which factors should you investigate? (Choose two.) A the routers B the frame types C the default gateway D IP address conflicts

A) the routers C) the default gateway

A network administrator configures an authentication, authorization, and accounting (AAA) server. Which component in the AAA server setup does not store authentication credentials, but acts as a transit to forward data between devices? A) Supplicant B) (N)AP C) RADIUS D) AAA

B) (N)AP /Network Access Point

Which of the following uses MIMO? (Multiple Input Multiple Output) NOT MU-MIMO A) 802.11ac B) 802.11n C) 802.11a D) 802.11g

B) 802.11n

You have a network that uses single-mode fiber optic cable. What is the transmission distance supported by this network? A) Approximately 74 miles B) Approximately 3,000 feet C) Approximately 50 feet D) Approximately 20 miles

D) Approximately 20 miles /Single-mode fiber has an advantage over the multi-mode fiver and all other transmission mediums in terms of transmission distance.

When designing a network, which network configuration concept would you use to easily configure the IP address of printers, projectors, routers, or wireless access points? A) NAT (Network Address Translation) B) Link-local addresses C) VLAN (Virtual LAN) domain D) DHCP reservations

D) DHCP reservations / DHCP reservations allow you to assign a relatively permanent IP address to a specific device. When the reservation is created, the IP address is assigned to the device's MAC address. When the device sends out a DHCP query, the reservation is assigned based on the information in its record. It is often advantageous to assign a permanent IP address to devices like wireless access points, printers, servers, and routers. You can also create a pool of reserved addresses, such as 192.168.1.200 through 192.168.250, to allow for future static assignments.

A network technician is purchasing a digital subscriber line (DSL) service for a business that transfers large amounts of data back and forth between branches. What is the best connection type for the business? A) ADSL (Asymmetric DSL) B) ISP C) PSTN D) Symmetric DSL

D) Symmetric DSL /Symmetric DSL has faster uplink speeds than Asymmetric. Asymmetric has faster download speeds.

Which of the following is a valid Automatic Private IP Adressing (APIPA) address? A) 172.16.4.36 B) 10.1.1.131 C) 169.254.2.120 D) 192.168.16.45

C) 169.254.2.120 /The 169.254.2.120 address is a valid APIPA address. By default, Windows XP and Windows 7 client computers are configured to use an APIPA address if the DHCP server goes down. The addresses in the APIPA range are 169.254.0.0 through 169.254.255.255. These addresses are not routable and are therefore only useable on the local subnet.

You are setting up an 802.11a wireless network in a small office environment that includes three wireless access points. The wireless access points are at least 15 meters apart and are configured for automatic channel setting. Each time you turn the wireless access points on, they choose the same channel. You need to ensure that the access points choose separate channels to prevent interference, using the least amount of administrative effort. What should you do? A) Increase the distance between the wireless access points to at least 20 meters. B) Reduce the signal strength on each access point. C) Manually configure each of the access points to use channels 1, 6, and 11, respectively D) Start each wireless access point at a separate time.

D) Start each wireless access point at a separate time. /This will allow each access point to select a channel. Then, when the next access point is booted, it will detect the other access points' channels and use another channel besides the ones detected.

You are troubleshooting a connectivity problem on an Ethernet network that contains both Linux and Windows servers. A Windows client cannot connect to the Internet or any network resources. However, other computers on the same subnet as the client can access network resources and the Internet. You issue the ipconfig command at the workstation and find that the IP address assigned to the system's network adapter is 169.254.184.25 and its subnet mask 255.255.0.0. This IP network and subnet are different from the IP network and subnet that other computers on the same segment are using. Which option is the most likely problem? A) The client obtained its IP address from a DHCP server it found on the Internet. B) The client obtained its IP address from a Linux server instead of a Windows server. C) The local network topology changed due to port flapping on the switch. D) The client selected its IP address using APIPA. E) The client has IP address contention with another host on the subnet.

D) The client selected its IP address using APIPA. /Automatic Private IP Addressing (APIPA) is a Windows feature that enables a system to automatically self-assign an IP address when a DHCP server is not available. APIPA acts as a DHCP fallover mechanism, making support easier for small local area networks. APIPA uses the Address Resolution Protocol (ARP) to select a unique IP address in the reserved address range of 169.254.0.0 to 169.254.255.255 and a subnet mask of 255.255.0..0 when no DHCP server is available.

You work for a company whose network contains several subnets. You move your computer from the Development subnet to the Research subnet, which resides in a different building. You turn on the computer and attempt to connect to a computer named COMP5 on the Development subnet, but you are unable to do so. However, you can connect to all of the other computers on the Research subnet, and other Research computers can connect to COMP5 on the Development subnet. What would explain your computer's communications problem? A) An incorrect default gateway B) A loose network Interface card (NIC) C) An incompatible network protocol listed first in the binding order D) An incorrect IP address

A) An incorrect default gateway

You work as a network technician for an accredited university that has recently decided to upgrade its wireless network capabilities for its campus. The current configuration has many dead zones. The campus stretches several kilometers and experiences significant foot traffic from students, staff, and visitors. The upgraded network must cover the campus without sacrificing performance. The university has given your team a large budget to implement these upgrades. Which factors should you consider when implementing a long-rang wireless network? (Choose all that apply.) A) Antenna type B) Power considerations C) Regulatory requirements D) Unlicensed or licensed frequencies

A) Antenna type B) Power considerations C) Regulatory requirements D) Unlicensed or licensed frequencies

Which of these has helped reduce wiring, weight, and cost in industrial applications? A) CAN B) PAN C) SAN D) MAN

A) CAN /A controller area network is used in industrial applications, originally in automotive systems. It replaces bulky wiring systems, reducing weight and cost. A CAN builds a network between controllers, allowing them to share information. A railway application, for example, might be a sensor that detects wheter or not a door is closed, and locks the brakes until the sensor indicates the door is closed. CAN can also mean campus area network. This type of network encompasses a large campus that is usually located within a several-block radius. This type of CAN connects several LANS into a single CAN. Then multiple CANs can also be connected using a MAN (metropolitan area network) or WAN.

You are an IT technician at your company. The company has two small offices in different cities. The company's head office contains a DNS server and a DHCP server. The branch office does not contain a DHCP server. A user travels frequently between the head office and the branch office. You are configuring the IP address on this user's laptop. You must ensure that the user is able to connect to the Internet from both offices. How should you configure the Internet Protocol (TCP/IP) Properties dialog box on the user's laptop while expending the least administrative effort? A) Configure the General tab to use the DHCP server at the head office. Configure a static IP address from the branch office network range on the Alternate Configuration tab. B) Configure a static IP address from the head office network range on the General tab. Configure a static IP address from the branch office network range on the Alternate Configuration tab. C) Configure the General tab and the Alternate Configuration tab to use a static IP address from the branch office network range. D) Configure the General tab and the Alternate Configuration tab to use the DHCP server.

A) Configure the General tab to use the DHCP server at the head office. Configure a static IP address from the branch office network range on the Alternate Configuration tab. / Dynamic Host Configuration Protocol (DHCP) is used to assign IP addresses automatically to the hosts on the network. DHCP provides unique IP address to all the hosts. You should configure DHCP to assign IP addresses automatically. In this scenario, the head office contains a DHCP server. Therefore, configuring the General tab to use the DHCP server will ensure that the user's laptop automatically receives the IP address settings from the DHCP server when the user is in the head office. To ensure that the user is able to connect to the Internet from the branch office, you should configure the Alternate Configuration tab on the user's laptop to use a static IP address from the IP address range of the branch office network. This will ensure that the user's laptop uses the branch office's IP address settings when the user is in the branch office.

You are nearing the completion of an upgrade that involves implementing a new network infrastructure and upgrading the operating systems running on your network servers. Currently, static IP addresses and HOSTS files are used. The upgrade has included implementing DNS, implementing DHCP, and moving servers and other resources to a new location with new IP addresses. However, you cannot access the resources that were moved using their host names from any of the client workstations. You can access them by their IP addresses. What should you do first? A) Delete the HOSTS file on each workstation. B) Configure DHCP to supply a different range of IP addresses to the workstations. C) Import the workstations' names and address mapping to DNS. D) Enable NetBIOS over TCP/IP

A) Delete the HOSTS file on each workstation. /Workstations read entries in ther HOSTS files before making requests to DNS. In this scenario, this behavior would cause the workstation to use the incorrect IP address when attempting to access a server by its host name. For example, suppose an FTP server with an original IP address of 172.35.2.100 and the host name ftp.domain.com was moved and its address changed to 172.25.2.300. When a user typed in the URL for the server in a browser, the client would search its HOSTS file and find an entry for ftp.domain.com at IP address 172.35.2.100, which is the wrong IP address. However, if you delete the HOSTS file, or remove the entry for the server, the workstation will search DNS to resolve the server's host name when it does not find an entry for the server the local HOSTS file. If you have trouble resolving DNS names, but can locate resources using their IP addresses, the DNS server is probably down

You administer your company's 100BaseTX Ethernet network. TCP/IP is the networking protocol used on the network. You want the routers on the network to send you notices when they have exceeded specified performance thresholds. Which protocol should you use to enable the routers to send the notices? A) SNMP B) Telnet C) SMTP D) ARP

A) SNMP /Simple Network Management Protocol is a protocol in the Transmission Control Protocol/Internet Protocol (TCP/IP) suite that enables the collection of data about various devices connected to a TCP/IP network, including bridges, hubs, and routers. Each SNMP-compatible device has a Management Information Base (MIB) database that defines the type of information that can be collected about the device. You can also configure SNMP traps to analyze network performance and network problems. A trap is a message that an SNMP-compatible device sends when the device has exceeded a performance threshold. You can configure SNMP to send traps to the network management software that you are using, to your email address, or to another destination.

Which TCP/IP configuration information must a computer on a network have before it can communicate with the Internet? (Choose three.) A) Subnet mask B) Default gateway C) Public key D) FTP server address E) TCP/IP address F) MAC address of router G) Proxy server address

A) Subnet mask B) Default gateway E) TCP/IP address /Before any computer on a network can communicate with the Internet, it will need an IP address, a default gateway, and a subnet mask. You can supply this information manually (often referred to as a static IP address), or you can use a DHCP server to supply this information automatically (often referred to as a dynamic IP address). If a computer is configured to obtain an IP address automatically, it will contact a DHCP for all client-side DHCP information.

You use a computer named Wkst1 on a TCP/IP network, which is installed with an application that uses UDP to send a file from your computer to a computer named Wkst2. Data collisions occur, and several data packets are lost during transmission. What will most likely occur as a result of losing the packets during transmission? (Choose two.) A) The application will automatically retransmit the packets. B) The protocol will automatically retransmit the packets. C) The application will drop the packets. D) The protocol will drop the packets.

A) The application will automatically retransmit the packets. D) The protocol will drop the packets /User Datagram Protocol (UDP) is a connectionless protocol; thus, it will drop the packets and will not automatically retransmit them. Because an application is not typically responsible for transmitting data packets across a network, the application in this scenario cannot drop the packets. Instead, an application that uses UDP will usually detect that UDP has dropped the packets, and the application will retransmit any dropped packets.

A newly hired user with minimal computer skills calls the help desk. The manual for a new mobile device tells the user to enter the SSID information and a password that are given. Your organization does not broadcast SSID's, so you can understand why the new hire is confused about where to enter this information. Where can the user go to enter this information? A) Wireless settings B) Touchscreen configuration C) Account setup/settings D) Application installation/configuration

A) Wireless settings /The System Set Identifier (SSID) is the name used to identify a wireless network to which you wish to connect. SSID configuration is found in wireless settings. Configuring the SSID is one of the areas where users require the most assistance whit their laptops and common mobile devices.

Andrew works for a local law firm's help desk and is getting complaints that employees cannot access the company's intranet site. What is the first tool he should use? A) ping B) dir /w C) ipconfig D) Cable tester

A) ping /Ping is a tool that can be used to test the connection between two computers. For example, Andrew can sit down at his computer and ping the company's intranet site to see if he can reach it. If all the pings fail from client computers, then the problem is most likely with the intranet site. However, if only one or a few computers experience the problem, then the issue is more likely to be with internal computer components or network components.

Of the terms below, which is the term for the cloud computing concept that allows the provider to share services with multiple subscribers, as opposed to the subscriber having a dedicated cloud service? A) resource pooling B) rapid elasticity C) community cloud D) measured service

A) resource pooling /Resource pooling is the term for cloud computing that allows the provider to share services with multiple subscribers, as opposed to the subscriber having a dedicated cloud service.

On a network that you administer, you cannot use a Windows computer named Wkst11 to connect to an Internet host with the fully qualified domain name (FQDN) www.transoft.com. You want to determine whether a WAN link between Wkst1 and www.transoft.com is down. You know that data normally passes through 10 hops in transit from Wkst1 to www.transoft.com. Which command should you use to test connectivity? A) tracert www.transoft.com B) ipconfig www.transoft.com C) nbstat www.transoft.com D) arp www.transoft.com

A) tracert www.transoft.com

Which improvements does IPv6 provide over the current IP addressing scheme? (Choose two.) A) The IP address size increased from 128 bits to 156 bits with simpler auto-configuration of addresses. B) Some header fields have been dropped or made optional. C) A new type of address is used to deliver a packet to a specific address node. D) The IP header options allow more efficient forwarding and less rigid length limits. E) Header fields have been made mandatory to reduce processing requirements. F) The IP address size is increased from 64 bits to 128 bits with simp

B) Some header fields have been dropped or made optional. D) The IP header options allow more efficient forwarding and less rigid length limits./ IPv6 (version 6) or IPng (next generation offers the following improvements over IPv4: - IP address size will increase from 32 bits to 128 bits - Some of the header fields have been dropped. - Version 6 has less rigid length limits and the ability to introduce new options. - Packets will indicate particular traffic type. - Support will be provided for data integrity and confidentiality. - The IPv6 header is 40 fixed bytes and has eight fields of information.

Jane is responsible for making sure her team has all the items it needs when traveling for business. One of her users has a laptop with no active Ethernet port. Which accessory should she purchase for that team member? A) USB-to-WiFi dongle B) USB-to-RJ-45 dongle C) USB 3.0 cable D) USB-to-Thunderbolt cable

B) USB-to-RJ-45 dongle /The dongle is an accessory or adapter that allows users to convert a USB port on a laptop to an Ethernet port. It will allow her to plug a standard RJ-45 cable into the port. It can also be useful to have as a backup if the onboard connector becomes inoperable.

You are the network administrator for Nutex Corporation. You have configured a wireless network for a group of users to provide Internet access. However, users complain that they are facing intermittent loss of wireless connection. You have verified the hardware and software configuration of both your Asymmetric Digital Subscriber Line (ADSL) modem and wireless router and your DSL line from the Internet Service Provider (ISP). What could be causing your problems? A) DSL filters B) Wireless router C) Cordless phones D) Televison set

C) Cordless phones /Cordless phones and other types of physical obstructions can cause intermittent loss in wireless connectivity. Wireless devices use a 2.4 GHz range, which is also used by devices such as cordless phones and microwaves. These devices can interfere with wireless devices. For example, if you are experiencing wireless connectivity problems every day around noon, a microwave being used to heat lunches could be causing the problem. You can reduce the radio frequency interference (RFI) by relocating the interfering devices. You could also reduce the range of the wireless network. Different wireless frequencies experience different RFI problems. You should always research the frequency that you plan to deploy to determine which devices will cause you problems.

A user contacts you stating that he can no longer print to a network printer. While troubleshooting the issue, you suspect that the printer's IP address has changed and is causing the printing problems. While troubleshooting the issue, you suspect that the printer's IP address has changed and is causing the printing problems. What should you do to test your theory? A) Pause the printer's print queue. B) Run the ipconfig command on the user's computer. C) Ping the printer from the user's computer. D) Install the latest device drivers for the printer on the user's computer.

C) Ping the printer from the user's computer. /You should ping the printer from the user's computer. If successful, the message will display the new IP address for the printer. If the IP address has changed, the user will need to remap the printer to the current IP address. If you ping the printer's name and the ping is unsuccessful, the printer name may have changed or the printer may be offline.

Wireless users who are using a 5 GHz wireless access point are experiencing issues when conferencing through Skype for Business. You need to improve their connectivity. What wireless settings should you configure? A) Encryption B) Channels C) QoS D) Admin password

C) QoS /You should configure the Quality of Service settings, which allows you to prioritize different types of traffic. QoS essentially allocates bandwidth based on a priority number assigned to the type of traffic. In this instance, Skype traffic would be given a higher priority over other types of traffic, such as general Internet browsing. QoS is typically configured on the router or wireless access point.

Which of these wireless networking protocols would most likely be employed in an anti-theft alarm system in a retail store? A) Zigbee B) NFC C) RFID D) Z-Wave

C) RFID /Radio Frequency Identification would most likely be employed in an anti-theft alarm system in a retail store. RFID uses a small chip attached to or embedded in an item and radio waves monitor the location of the chip and therefore the device. Common applications for RFID include tracking the movement of products through a warehouse, retail theft prevention, and tracking runners during marathon races with RFID chips embedded in their bibs.

Which IP address is used by a Class A private network? A) 172.16.0.0 B) 192.168.0.0 C) 127.0.0.1 D) 10.0.0.0

D) 10.0.0.0 /The 10.0.0.0 address is a Class A IP address for private networks. Private network IP addresses are those addresses that are reserved for use on private networks and cannot be used on the Internet. The 172.16.0.0 address is a Class B IP address for private networks. The 192.168.0.0 address is a Class C IP address for private networks. The 127.0.0.1 address is not reserved for private networks. This IP address is the software loopback address.

A user is not able to access shared folders on the network. While troubleshooting the problem, the technician first checks for the link lights on the Network Interface Card (NIC). The technician observes that the link lights are not on or blinking on the NIC. Which actions should the technician perform to resolve the problem by using the least amount of administrative effort? (Choose two) A) Run the ipconfig/ release command B) Replace the NIC. C) Run the ipconfig/ flushdns command. D) Check that the swtich is on and the other end of the cable is connected to the switch. E) Replace the network cable.

D) Check that the switch is on and the other end of the cable is connected to the switch. E) Replace the network cable. /To resolve the problem by using the least amount of administrative effort, the technician should check that the switch is on and the other end of the cable is not connected to the switch. If the switch is not on, or if the other end of the network cable is not connected to the switch, the user's computer will not be connected to the network. Therefore, the technician should check these areas first. If the problem persists, the technician must try replacing the network cable to resolve the problem because faulty cables can cause network problems. Therefore, while troubleshooting network problems, you should check if the network cable is properly functioning. The number one A+ rule for connectivity issues is always check the connection.

Which statement is TRUE concerning DHCP? A) DHCP is used to resolve NetBIOS names to IP addresses. B) DHCP is used to resolve host names to IP addresses. C) DHCP is used to verify the IP address on a Windows-based computer. D) DHCP is used to automate IP address assignment.

D) DHCP is used to automate IP address assignment. /Dynamic Host Configuration Protocol (DHCP) is a standards-based networking protocol that is used to automate the assignment of IP addresses to DHCP client devices. DHCP is a client/server protocol that uses two components, one on the server and one on the client. The server-side component stores a pool of available IP addresses. The client-side component requests a TCP/IP configuration from an available DHCP server. Several server operating systems support the DHCP server service, including Windows, UNIX, and Linux. Most desktop operating systems support the DHCP client service.

Your company has a wireless network for its small office network. The wireless network does not broadcast its service set identifier (SSID). You configure a user's Windows 10 computer to connect to the wireless network by manually setting the SSID. You need to ensure that the user's computer does not send probe requests to discover if the wireless network is in range. What should you do? A) Ensure the Connect automatically when this network is in range option on the Connections tab of the Wireless Network Properties page is selected. B) Ensure the Connect even if the network is broadcasting option on the Connections tab of the Wireless Network Properties page is selected. C) Ensure the Connect automatically when this network is in range option on the Connections tab of the Wireless Network Properties page is cleared. D) Ensure the Connect even if the network is not broadcasting option on the Connections tab of the Wireless Network Properties page is cleared.

D) Ensure the Connect even if the network is not broadcasting option on the Connections tab of the Wireless Network Properties page is cleared. /If this option is enabled, probe requests are sent to discover if a non-broadcast network is in range. You should not change the configuration of the Connect automatically when this network is in range option. This option ensures that the connection is reestablished when the wireless network is detected. When you disable automatic configuration of an SSID, the SSID is not automatically transmitted to all computers within the wireless network range. This provides a low level of security. The only way to connect to the wireless network is to enter the SSID manually.

What would allow you to install a wired network without running additional network cables? A) Firewall B) Router C) Cloud-based network controller D) Ethernet over Power

D) Ethernet over Power /Ethernet over Power (EoP) uses the existing electrical wiring in a house to transmit the network signal. A special adapter plugs into your existing electrical outlet. The adapter will have one or more Ethernet ports. To deploy Ethernet over Power, you would need at least two adapters. The advantage to Ethernet over Power is that you would obtain wired network speeds (up to 1 gigabit, as of this writing: without the need to run Ethernet cables. The disadvantage is that the adapters can cost $50 each. PoE is the direct opposite, where power is transmitted via the Ethernet cabling. There are several PoE components you will need to understand for the A+ exam. A PoE injector is a device that adds power to an Ethernet cable by converting AC to DC to power the low-voltage PoE devices. PoE injectors usually have two RJ45 ports: Data In and PoE/Data Out. Additionally, there are PoE switches that were designed to minimize cable usage and reduce the amount of infrastructure equipment needed and installation time for equipment. Depending on your network needs, you may need to use PoE switches that have ports that enable greater power usage.

For what purpose have IP addresses in the 192.168.0.0 through 192.168.255.255 range have been reserved? A) Military installations only B) Government organizations other than the military. C) Multicasting D) Private networks

D) Private networks /There are three blocks of IP addresses that have been reserved by the Internet Assigned Numbers Authority (IANA) for private networks. These addresses can be used for IP addressing on a private network that does not need to be connected to the Internet. The three blocks of IP addresses are listed as follows: 10.0.0.0 to 10.225.255.255 172.16.0.0 to 172.31.255.255 192.168.0.0 to 192.168.255.255 A computer using a private IP address cannot directly communicate with the Internet. The only way Internet communication can occur with a computer that uses an IP address in the private network range is through a proxy server. An Automatic Private IP Addressing (APIPA) address is an automatic IP address that is assigned when computers that are configured for DHCP cannot contact a DHCP server. Addresses in this range are 169.254.0.1 to 169.254.255.254. They can also be referred to as link-local addresses and start with the fe80::/10 prefix.

You are the network administrator for your company. A user reports that he cannot access network resources from his computer. He was able to access the resources yesterday. While troubleshooting his computer, you find that his computer is issued an Automatic Private IP Addressing (APIPA) address. All the network equipment in the user's computer is functioning properly because you are able to access the user's computer from a remote computer. What is most likely the problem? A) The computer is configured with an alternate IP address. B) The DNS server is down. C) The computer is configured with a static IP address. D) The DHCP server is down.

D) The DHCP server is down.

You are designing a new computer system for a group of doctors. The group has a central office, where all the medical records will be stored electronically, and several satellite offices around the city. Storage procedures must follow HIPAA guidelines. The satellite offices will have computers in the administrative areas as well as the examination rooms. Which type of system should you install in the examination rooms? A) Server B) Tablet C) Thick client D) Thin client

D) Thin client /You should install thin clients in the examination rooms. The computers there will not store any data, but rather serve as a means to collect patient data. The data will be stored on the server at the central office. Because the exam-room computers do not need extensive functionality or an array of productivity applications, thin clients would be sufficient. Thin client computers typically have limited functionality, and they may not even have an operating system. Thick client computers can have an extensive set of applications, and would allow the user to perform operations that a thin client would not.

You administer a TCP/IP network. You want to enable the hosts on your network to be automatically configured with IP configurations such as an IP address, subnet mask, and default gateway address. The IP configurations should be leased to the clients for a limited time period. Which protocol should you use to accomplish this task? A) IPP B) BOOTP C) SMTP D) HTTP E) DHCP

E) DHCP /You should use Dynamic Host Configuration Protocol to automatically configure the hosts on your network with IP configurations. DHCP was designed to automatically configure frequently moved, fully boot-capable computers, such as laptop computers, with IP configurations. You can use DHCP to configure such IP settings as IP address, subnet mask, and default gateway address. Typically, DHCP information is leased to a client for a limited period. DHCP clients usually release DHCP information when they are shut down. When a DHCP client retrieves IP configurations from a DHCP server, the DHCP client does not necessarily have the same IP configurations that it was configured with on previous occasions.

What is the purpose of a pointer (PTR) DNS record? A) It maps a domain name to an e-mail server. B) It helps filter spam email. C) It maps a hostname to an IPv6 address. D) It maps a hostname to an IPv4 address. E) It contains information regarding a particular DNS zone's start of authority. F) It contains an alias for an existing A record. G) It maps an IP address to a hostname.

G) It maps an IP address to a hostname.

A network technician troubleshoots a computer on the wired network that is experiencing slow network speeds. Which of the following would NOT be a possible cause for the technician to troubleshoot? A) Improperly terminated patch cords B) Improper speed/ duplex configuration C) Another radio source broadcasting at the same frequency D) External interference on the cable

C) Another radio source broadcasting at the same frequency /Radio signaling matters in a wireless network but not a wired network.

Which of the following is an example of an IPv6 address? A) 127.0.0.1 B) 192.1.0.1 C) fe80::200:f8ff:fe21:67cf D) 00-0C-F1-56-98-AD

C) fe80::200:f8ff:fe21:67cf /An example of an IPv6 address is fe80::200:f8ff:fe21:67cf. /An example of an IPv4 address is 127.0.0.1 and 192.1.0.1. An example of a MAC address, which is hard-coded into the NIC by the manufacturer, is 00-0C-F1-56-98-AD.

You suspect that a hacker has compromised a computer using one of its open ports. Which command would allow you to view the open ports on the computer? A) ssh B) tracert C) netstat D) net use

C) netstat /The netstat command would allow you to view the open ports on the computer. You should not use the tracert command. This command displays the route a packet takes to a remote host. Its output is similar to the output of the ping command. You should also not use the ssh command. Secure shell is a command that allows you to remotely connect to a host in a secure fashion. It is similar to Telnet. However, Telent does not provide the same security as ssh.

Your company has a wired 1000BaseT small office network that connects to the internet via a DSL connection. You need to set up a wireless network that wil give your users access to the internal network and the Internet through their laptops. While configuring the wireless access point, you can change the administrative username and password and change the SSID from its default setting. Then you disable SSID broadcasts. Finally, you enable MAC filtering and configure the list of MAC addresses that are allowed to connect via the wireless network. Now you need to connect the wireless access point to your local network. To which device should it be connected? A) A router B) A hub C) A firewall D) The DSL modem

A) A router/You should connect the wireless access point to a router. This will ensure that the wireless clients can connect to the internal network and to the internet.

You have deployed several 802.11b wireless networks at your company's location. Recently, users complained that they were having trouble connecting to the wireless networks. After troubleshooting, you determine that each wireless network is using different non-overlapping channels. You suspect that the problem is being caused by interference. Which device can cause interference with the WLANs A) Microwave ovens B) Cable TV cabling C) Electrical wiring D) Cell phones

A) Microwave ovens /Microwave ovens operate at the 2.45-GHz frequency band and can cause interference when used in areas where 802.11b WLANs are deployed.

A user named Brad calls and reports that he is unable to connect to a file server on your 100BaseT network, although he is able to connect to folders on other computers. A single hub exists on the network. Which hardware problems should you investigate? A) An improper termination B) A defective NIC in the file server C) A defective NIC in Brad's computer D) A defective hub port

B) A defective NIC in the file server D) A defective hub port/ In either situation, users would be able to connect to each other. A defective cable between the hub and the file server would also prevent communications between users and the server. To verify that the problem is a hardware issue, you should investigate the hub connection. To do so, simply connect the cable from the server into another port on the hub that you know is functioning properly. If the server connectivity is restored, then the hub is most likely the source of the problem. Note that a hub is sometimes called a concentrator.

Which properties are true regarding IPv6? (Choose two.) A) It has 4 billion available addresses. B) It has 340 undecillion available addresses. C) It has 32-bit addresses. D) It has 128-bit addresses.

B) It has 340 undecillion available addresses. D) It uses 128-bit addresses. /IPv6 uses 128-bit addresses and allows for the use of 340 undecillion addresses. IPv4 uses 32-bit addresses and allows for the use of 4 billion addresses.

Your company has both a wired and a wireless network. You have been asked to increase the security of the wireless network. Which of the following options should you implement? A) Rogue access points B) MAC filtering C) SSID broadcast D) War driving

B) MAC filtering /Media Access Control filtering is a way to increase security in a wireless network. With this filtering, the MAC address of each NIC that attempts to connect to the network is checked. Only MAC addresses that are specifically allowed to connect are granted connection. When configuring MAC filtering, you should set up an access control list (ACL). MAC filtering is configured on the wireless access point or wireless router. Rogue access points are wireless access points that have been connected to your network without authorization. This decreases the security of your network.

You are setting up a network segment in the Research and Development department. Due to the sensitive and proprietary nature of work in this department, you want to ensure that only computers belonging to that department can access that network segment. Which option would you use? A) DMZ B) MAC filtering C) QoS D) NAT

B) MAC filtering/ Media Access Control filtiering

Which of these Would a hospital group use to connect its various neighborhood offices to the main facility when all are located within the same city or region? A) WLAN B) MAN C) LAN D) WAN

B) MAN /A metropolitan area network would be used by the hospital to connect its various neighborhood offices to the main facility when all are located within the same city or region. MANs connect several LANs together in an area roughly the size of a city.

A technician is installing Hyper-V and is getting an error that the software is not able to be installed. Which of the following processor characteristics should be checked? A) Cache size B) Virtualization support C) Number of cores D) Hyperthreading

B) Virtualization support /Make sure the CPU can support it.

What is the operating range for Class 2 Bluetooth devices at the maximum transmission speed? A) 200 meters or 656 feet B) 100 meters or 328 feet C) 10 meters or 33 feet D) 1 meter or 3 feet

C) 10 meters or 33 feet /The operating range for Class 2 Bluetooth devices is up to 10 meters or 33 feet at the maximum transmission speed.

Which IP address is used by Class B private networks? A) 10.0.0.0 B) 192.168.0.0 C) 127.0.0.1 D) 172.16.0.0

D) 172.16.0.0 /The 172.16.0.0 address is used by Class B private networks. The following are five valid IPv4 address classes Class A - 1.0.0.0 to 126.0.0.0 Class B - 128.0.0.0 to 191.255.0.0 Class C - 192.0.1.0 to 223.255.255.0 Class D - 224.0.0.0 to 239.255.255.255 Class E - 240.0.0.0 to 255.255.255.255 Classes A, B, and C are valid addresses used on IP networks. Class D address are reserved for multicasting. Class E addresses are considered experimental or research addresses and should never be used. All of the ranges that are not part of the private reserved IP addresses are public addresses.

You administer computers on a Microsoft Windows TCP/IP network. On the network, you want to use a domain name-to-Internet Protocol (IP) address name resolution system that provides a central database on a server to resolve domain names to IP addresses. Which options should you implement on you network? A) The LMHOSTS file B) The HOSTS file C) The Windows Internet Name Service (WINS) D) The Domain Name System (DNS)

D) The Domain Name System (DNS) /Of the choices presented, you should use DNS for domain name-to-IP address resolution on the network that you administer. DNS provides a centralized database of domain name-to-IP address resolutions on a server or servers that other computers on a network can use for name resolution. On a TCP/IP network that uses DNS, only the database files on the DNS servers must be updated to reflect changes that are made to domain name-to-IP address resolutions.

Which of these devices is primarily associated with wireless networks? A) Ethernet over Power B) Patch panels C) Switches D) Repeaters E) Access points

E) Access points /Access points (or more appropriately, wireless access points [WAPs]) create wireless local area networks (WLANS). They provide connectivity to the network for devices with wireless functionality (Wi-Fi). Access points have a Service Set Identifier (SSID), which is often equated to the name of the network, and various levels of security. The portion of the network that is wireless is the connection between the access point and end device; the access point itself is often wired into the physical network.

What are the characteristics of IEEE 802.11b wireless standard? (Select all that apply) A) Maximum data signaling rate of 54 Mbps B) 5 GHz frequency band C) Carrier Sense Multiple Access/Collison Avoidance (CSMA/CA) D) 2.4 GHz frequency band E) Maximum data signaling rate of 11 Mbps

D) 2.4 GHz frequency band E) Maximum data signaling rate of 11 Mbps /The IEEE 802.11b standard was one of the first Wi-Fi standards featuring a low throughput rate of only 11 Mbps over the 2.4 GHz frequency. It was released in the 90's and was considered relatively fast internet speed.

A company hires a network technician who is reviewing the network setup documentation. The technician sees that the company has fiber optic cable running all the way up the building. This represents what type of connection? A) FTTC (Fiber to the Curb) B) VDSL C) ONT D) FTTP (Fiber to the Premises)

D) FTTP (Fiber to the Premises)

Which standard is designed to provide voice, video, and data transmissions over a digital telephone network? A) X.25 B) X.400 C) X.500 D) ISDN

D) ISDN /Integrated Services Digital Network provides telephone based end-to-end digital connectivity, and a framework for the deployment of a new generation of integrated services for voice, fax, video, and data communications.

What piece of equipment would help transmit an Ethernet signal to the far end of a hotel that is 400 meters (m) long? A) Ethernet patch cable B) Patch panel C) Cloud D) Repeaters

D) Repeaters /A repeater takes a weak signal, amplifies it, and transmits the amplified signal. In wired networks, repeaters can be used to extend the segment distance beyond the 100-m limitation of twisted-pair cable, or to extend a wireless signal beyond the normal range of the wireless access point.

While performing routine maintenance on your company's firewall, you discover that port 3389 is open. Which service uses this port? A) Hypertext Transfer Protocol B) Secure Hypertext Transfer Protocol C) Remote Assistance D) File Transfer Protocol

C) Remote Assistance /Port 3389 is used by the Remote Desktop Protocol (RDP). RDP is the protocol used by Remote Assistance and Remote Desktop in Windows. If this port is closed on your firewall, you will not be able to give remote assistance to remote users.

Your company has decided to implement a wireless network. The wireless network users must be able to connect to resources on your internal network, including file, print, and DHCP services. Which options should you implement? (Choose all that apply.) A) Ad hoc mode B) Infrastructure mode C) APIPA D) Static IP addresses E) A wireless access point

B) Infrastructure mode E) A wireless access point /Infrastructure mode allows wireless components to connect to a LAN, a WAN, or the Internet. This means that infrastructure mode wireless computers can access all computers on the LAN, WAN, and Internet. Infrastructure mode is much more expensive to implement than ad hoc mode because you must configure wireless access points. While infrastructure mode is harder to set up and configure, its management is much easier than with ad hoc mode. To view the strength of the wireless network, open the properties dialog box for the wireless network interface card (NIC).

You are responsible for managing your research department's network. This network uses RG6 coaxial cabling. Which of the following statements is TRUE regarding this network? A) It should be used in situations that require lower frequencies than 50 MHz. B) It is thicker than RG59 coaxial cable. C) It does not have a foil shield. D) Its signal quality is not as good as that of a RG59 coaxial cable.

B) It is thicker than RG59 coaxial cable.

You plan to uninstall an unshielded twisted pair (UTP) network that supports data transfer speeds up to 100 Mbps. Which cable should you use? A) Cat2 B) Cat5 C) Cat4 D) Cat3

B) Cat5 /The Cat5e and Cat6 UTP standards support up to 1,000 Mbps at 100-meter segments or 10 Gbps at 55-meter segments. Cat6a supports up to 10 Gbps and 250 MHz at 100-meter segments, Cat7, known as F type cabling, supports the same speed and length but up to 600 MHz. If you try to use a splitter on Ethernet networks, it would dramatically reduce the signal, and therefore is not reommended. This splitter effect applies to the coaxial cable types as well. Cat4 UTP cable supports a data transfer rate of only 20 Mbps. Cat3 UTP cable supports a data transfer rate of only 10 Mbps. Cat2 UTP cable supports a data transfer rate of only 4 Mbps.

An energy company is upgrading its systems. The company would like to control the systems with software that communicates with the current programmable logic controllers (PLCs) and new RTUs. What kind of system is the company upgrading to? A) OT B) SCADA C) Embedded System D) ICS

B) SCADA /Supervisory Control and Data Acquisition. It is a control system that comprises of programmable logic controllers and graphical user interfaces for manufacturing.


Set pelajaran terkait

Small Test - Economics EOC (GSE) UPDATED Domain: Macroeconomic Concepts

View Set

chapter 14 vision and perception

View Set

NURS 3270 Fundamentals Evolve -- Mod 9

View Set

Micro Chapter 3 Demand Launchpad Questions

View Set

Systems of Equations with 3 Variables

View Set

Chapter 4: The Economy & Family Life

View Set

Ch 11: Exploring Earth's Interior

View Set