TESTOUT A+ B.2.2 CompTIA A+ 220-1101 (Core 1) Domain 2: Networking

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

You are currently learning about networking devices and have just learned about MAC addresses. You look up your device's MAC address, and it comes back as 00-B0-D0-06-BC-AC. Which portion of this MAC address can tell you who the manufacturer is? Answer 00-B0 06-BC-AC BC-AC 00-B0-D0

00-B0-D0

Which frequencies does Zigbee operate on? Answer 2.4 GHz 500 MHz 1.4 GHz 908.42 MHz

2.4 GHz Zigbee is a specification based on IEEE 802.15.4 that operates on the 2.4 GHz frequency. This means that ZigBee signals can clash with wireless networks and other devices that run at the commonly used 2.4 GHz range. Z-Wave operates at 908.42 MHz, which means that Z-Wave users don't really have to worry about conflicting with other devices.

Which port must be opened on the firewall of a Windows system so that a Remote Desktop connection can be established? Answer 23 3389 22 123

3389

While working on a Windows workstation, you enable Remote Desktop. Which of the following ports MUST be open on the server's firewall to allow remote clients to access the desktop through Remote Desktop? Answer 123 3389 110 389

3389 POP3 uses port 110. LDAP uses port 389. NTP uses port 123.

Match each port number on the left with its associated protocol on the right. Drag 80 443 143 22 445 427 548 Drop Secure Shell (SSH) Apple Filing Protocol (AFP) HyperText Transfer Protocol Secure (HTTPS) HyperText Transfer Protocol (HTTP) Server Message Block (SMB/CIFS) directly over TCP Service Location Protocol (SLP) Internet Message Access Protocol (IMAP)

80--- - HTTP 443----HTTPS 143 ---IMAP 22-----SSH 445---Server Message Block (SMB/CIFS) directly over TCP 427---- SLP 548---Apple Filing Protocol (AFP)

Which type of embedded device microprocessor is custom designed to perform a specific function? Answer FPGA ARM ASIC SoC

ASIC ASIC chip is created to perform a specific function. These chips are typically custom-designed and used by a company in a single product. The process to develop these chips is very expensive, time-consuming, and resource-intensive, but they offer high performance with low power consumption. A system-on-chip (SoC) includes the processor, memory, peripheral functions, and other components all on one board. A Field Programmable Gate Array (FPGA) is physically set up like a ASIC or SoC, but the programming is configured by the end user. ARM microprocessors are typically used in mobile devices, not embedded devices.

A Windows workstation is configured to receive its IP configuration information from a DHCP server on the company network. The user at the workstation reports that she cannot use email and is unable to reach the internet. Using the ipconfig command, you see that the workstation has been assigned the following special IP configuration: IP address: 169.254.0.1 Subnet mask: 255.255.0.0 What is this special IP configuration called? Why did the workstation receive this type of configuration?

Automatic Private IP Addressing (APIPA) The workstation was unable to contact the DHCP server.

You want to allow your users to download files from a server running the IP protocol. You also want to protect access to the files by requiring user authentication to access specific directories on the server. Which IP protocol should you implement to provide this capability? Answer SMTP FTP SSH SNMP LDAP TFTP

FTP FTP. It enables file transfers and supports user authentication. Simple Network Management Protocol (SNMP) is used to remotely monitor and manage network devices and hosts. Simple Mail Transfer Protocol (SMTP) is used to transfer email message from email clients to email servers. Trivial File Transfer Protocol (TFTP) also enables file transfer but does not support user authentication. Lightweight Directory Access Protocol (LDAP) allows access to information about network resources stored in a directory server. Secure Shell (SSH) allows users to securely access a remote computer system's console prompt.

Which protocols are used on the internet to transmit web pages from web servers to web browsers running on client workstations? (Select two.) Answer: HTTP SMTP NNTP HTTPS XML HTML

HTTP HTTPS

You are setting up a small network in your office with one Windows server and 50 Windows workstations. You want to spend as little time as possible configuring the workstations with IP addressing information. What is the BEST solution to reduce the time required to configure the workstations with IP addressing information? Answer Install the WINS service on your server. Install the DHCP service on each workstation. Install and configure the DHCP service on your server. Assign each user an IP address and instruct the user to enter the IP address in his or her computer.

Install and configure the DHCP service on your server.

A user is configuring an email client application and plans to use a standard TCP/IP suite protocol to retrieve email messages from an email server. Which of the following TCP/IP suite protocols can be used to retrieve email messages? (Select two.) Answer Lightweight Directory Access Protocol (LDAP) Simple Mail Transfer Protocol (SMTP) Post Office Protocol (POP3) Internet Message Access Protocol (IMAP) Simple Network Management Protocol (SNMP)

Internet Message Access Protocol (IMAP) Post Office Protocol (POP3) use SMTP to send email messages to an email server. SNMP is used to collect information about managed devices on IP networks. LDAP is used to access and maintain distributed directory information services.

Which of the following is a network that uses internet technologies, but the data and services are only available to the hosts connected to the private network? Answer Subnet Intranet Internetwork Extranet

Intranet

Which of the following all-in-one security appliance (UTM) functions detects intrusions and alerts the network but does not block traffic? Answer Anti-spam Intrusion protection VPN Intrusion detection

Intrusion detection

Which of the following BEST describes how a switch functions? Answer It connects multiple cable segments for different architectures and translates data packets to forward them to the appropriate host. It connects multiple cable segments or devices and broadcasts data packets to all of its connected hosts. It connects multiple cable segments for different architectures and translates data packets to broadcast them to all connected hosts. It connects multiple cable segments or hosts and forwards data packets to the appropriate host.

It connects multiple cable segments or hosts and forwards data packets to the appropriate host. Switches function similarly to hubs, except that instead of sending data packets to all ports, switches send packets only to the destination computer's port.

Which network protocol do controller systems use to communicate with each other? Answer HTTP ARP ICMP Modbus

Modbus Modbus is a special network protocol that controller systems use to communicate with each other. Modbus originally ran through a serial interface, but has evolved to work over Ethernet and TCP/IP. Internet Control Message Protocol (ICMP) is used when sending ping packets. It is not used by controller systems to communicate. HyperText Transfer Protocol (HTTP) defines how pages with hyperlinks (web pages) are designed. It is not used by controller systems to communicate. Address Resolution Protocol (ARP) is used to match a device's IP address to its MAC address. ARP is not used by controller systems to communicate.

What are two major concerns regarding IoT devices? (Select two.) Answer Availability Short lifespan Privacy Accessibility Hacking

Privacy Hacking

Which of the following internet appliances filters specific internet content categories and also keeps internal users anonymous? Answer Proxy server Spam gateway Content filter Unified Threat Management

Proxy server

A host on your network provides a service that requires the server to always use the same IP address. Which IP addressing method can you use to manually assign the specific IP address? Answer: Static IP addressing Dynamic IP addressing APIPA IP addressing Link-local addressing Alternate IP configuration

Static IP addressing

Which of the following BEST describes the purpose for which loopback plugs are used? Answer Grabbing and lifting small objects. Connecting computers together without using network cards or modems. Removing broken pins within sockets. Testing ports by returning output signals as input.

Testing ports by returning output signals as input.


Set pelajaran terkait

JavaScript - Level 1 - All Operator Types

View Set

AP PSYCH: Unit 4-Sensation and Perception

View Set

PHAR 253: Medications for Depression:

View Set

Chapter 1 Questions: Basic insurance concepts and principals

View Set