TESTOUT : M02 B.3.2 - CompTIA A+ 220-1101 (Core 1) Domain 2: Networking

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

Which of the following is the maximum range of the Bluetooth 2.0 specification? Answer 60 meters 30 meters 240 meters 10 meters

30 meters Version 1.0 - 10 meters Versions 2.0 and 3.0 - 30 meters Version 4.0 - 60 meters Version 5.0 - 240 meters

Which IEEE wireless standards specify transmission speeds up to 54 Mbps? (Select two.) Answer 802.1ac 802.11b Bluetooth 802.11a 802.11g

802.11a 802.11g

The router below provides several ports for connecting two or more network segments or subnets. The port circled in red is a small form-factor pluggable (SFP) connector. Which type of network can connect to this port? Answer DHCP Wireless network LAN WAN

WAN uses a sm. form factor pluggable

Which protocol is used to send email messages from a mail client to a mail server? Answer IMAP SMTP FTP SNMP POP3

SMTP SMTP sends email from a mail client to a mail server. FTP provides a generic method for transferring files SNMP is used in network management systems to monitor network-attached devices POP3 and IMAP are both email protocols used by mail clients to retrieve email from a mail serve

Your employer wants a system that guarantees that all components will work together with minimal configuration and setup. Time is of the essence in getting this new system ready. Which of the following would BEST meet your emoloyer's needs? Answer SCADA DCS HMI PLC

DCS distributed control system (DCS) would be the best option. A DCS is a customized, all-in-one package that contains the needed PLCs, SCADA controller, and HMI. DCSs are typically custom-designed for specific needs. PLC is a specialized controller that can be programmed to perform specific tasks SCADA) controllers are used to monitor and control PLC systems human-machine interface (HMI) can be either a touchscreen control panel or software running on a typical computer system.

Which email authentication technology performs all of the tasks listed below? Verifies the email sender. Tells the recipient what to do if no authentication method passes. Allows the recipient to tell the sender about messages that pass or fail authentication. Answer ICMP DKIM DMARC SPF

DMARC combines the protections of both DKIM and SPF to protect users from malicious emails. DMARC: Verifies the email sender. Tells the recipient what to do if no authentication method passes. Allows the recipient to tell the sender about messages that pass or fail authentication.

You want to implement name resolution on the Linux workstations in your company. Which protocol should you use to do this? Answer: DNS WINS LMHOSTS file NTP SMTP

DNS

You want to allow your users to download files from a server running the IP protocol. You also want to protect access to the files by requiring user authentication to access specific directories on the server. Which IP protocol should you implement to provide this capability? Answer SSH LDAP SNMP SMTP FTP TFTP

FTP

Which of the following UTM appliances monitors all network traffic and blocks malicious traffic while notifying the network security team? Answer Anti-malware Firewall Firewall NAT

Firewall

Which of the following BEST describes how a switch functions? Answer It connects multiple cable segments or devices and broadcasts data packets to all of its connected hosts. It connects multiple cable segments for different architectures and translates data packets to forward them to the appropriate host. It connects multiple cable segments or hosts and forwards data packets to the appropriate host. It connects multiple cable segments for different architectures and translates data packets to broadcast them to all connected hosts.

It connects multiple cable segments or hosts and forwards data packets to the appropriate host.

Which of the following BEST describes the Edge Technology layer of the IoT architecture? Answer It includes all the hardware parts in the IoT system. It includes the processes that happen in the cloud. It is the main bridge between two endpoints in an IoT system. It delivers the analyzed and processed data to the end user.

It includes all the hardware parts in the IoT system.

Which of the following are characteristics of the 802.11g wireless standard? (Select three.) Answer Backwards compatible with 802.11a devices. Operates in the 5.75 GHz range. Maximum bandwidth of 54 Mbps. Operates in the 2.4 GHz range. Backwards compatible with 802.11b devices. Maximum bandwidth of 11 Mbps.

Maximum bandwidth of 54 Mbps Operates in the 2.4 GHz range. Backwards compatible with 802.11b devices.

Which of the following is a specialized controller that you can use to remotely manage all your network devices? Answer SDN PoE VLAN SSH

SDN Software-defined networking (SDN) consists of a specialized controller that can remotely manage all network devices.

You've used your Windows workstation to map a drive to a shared folder on a Windows server. Which protocol was used to access the share? AnswerIncorrect answer: SFTP LDAP RDP SMB

SMB Server Message Block (SMB) is used by Windows systems to access shared resources over the network. Lightweight Directory Access Protocol (LDAP) is used to access information stored in a server's directory service. Remote Desktop Protocol (RDP) is used to access remote systems' desktops. Secure File Transfer Protocol (SFTP) is used to securely transfer files between hosts.

Which of the following items of information does a packet header contain? (Select three.) Answer Sender ACK data How to deliver the packet TFTP data Receiver SYN data Data chunk order

Sender Receiver Data chunk order

Which of the following LAN devices receives a signal on one port and forwards that signal only to the port where the destination device is connected? Answer Network adapter Router Hub Switch

Switch A switch offers guaranteed bandwidth to each port, unlike a hub, which shares bandwidth among all the network ports. A router connects two networks together so that a switch can forward data packets to unknown MAC addresses on another network. A network adapter allows a network cable to connect from the computer to another networking device.

A technician determines that an older network hub that connects 24 workstations is performing poorly due to excessive network collisions. Which of the following network devices would be the BEST replacement? Answer: Router Bridge Switch Patch panel

Switch a switch maintains a table of MAC addresses by port and forwards network data packets to only the port that matches the MAC address. This significantly reduces collisions. A router manages IP traffic between networks. A bridge separates two network segments and forwards data packets from one segment to another. A patch panel organizes network cables and connects inbound and outbound cables.

Which of the following load balancer algorithms takes each server's active connections and processing power into consideration? Answer Round robin Least connections Weighted least connections Weighted round robin

Weighted least connections

How do switches and bridges learn where devices are located on a network? Answer When a data packet enters a port, the source IP address is copied from the data packet header. When a data packet enters a port, the destination IP address is copied from the data packet header. When a data packet enters a port, the destination MAC address is copied from the data packet header. When a data packet enters a port, the source MAC address is copied from the data packet header.

When a data packet enters a port, the source MAC address is copied from the data packet header.

Which of the following is the root level in www.testout.com.'s fully qualified domain name? Answer . (period) testout www com

. (period)

Which of the following represents the valid decimal range of an IPv4 address? Answer 0 to 100 0 to F 0 to 255 1 to 254

0 to 255

You are currently learning about networking devices and have just learned about MAC addresses. You look up your device's MAC address, and it comes back as 00-B0-D0-06-BC-AC. Which portion of this MAC address can tell you who the manufacturer is? Answer 00-B0 06-BC-AC BC-AC 00-B0-D0

00-B0-D0

Drag each wireless networking technology on the left to its associated transmission distance limitation on the right. Each technology may be used more than once. 1. Up to 100 meters for Class 1 devices. 2. Up to 2 meters with a few obstacles in between. 3. Up to 10 meters for Class 2 devices. 4. A few centimeters. bluetooth, NFC, Infrared

1. Bluetooth ----100 meters; 2. Infrared---- 2 meters 3. bluetooth---10 meters 4. NFC----a few centimeters

A customer is experiencing a sporadic interruption of their Wi-Fi network in one area of their building. A technician investigates and discovers signal interference caused by a microwave oven. The customer approves replacing the wireless access point that covers the area, but asks that the wireless speed also be increased. Which of the following Wi-Fi standards should the replacement device support to BEST fulfill the customer's needs? Answer 802.11g 802.11b 802.11ac 802.11a

802.11ac The microwave oven interferes with wireless signals that operate at 2.4 GHz. The 802.11ac standard is the best choice. It operates at 5.0 GHz and has a maximum speed of 2.6 Gbps

You have been contacted by OsCorp to recommend a wireless internet solution. The wireless strategy must support a transmission range of 150 feet, use a frequency range of 2.4 GHz, and provide the highest possible transmission speeds. Which of the following wireless solutions should you recommend? Answer 802.11ac 802.11g 802.11b 802.11a

802.11g

Which of the following wireless networking standards uses a frequency of 5 GHz and supports data transmission speeds up to 2.6 Gbps? Answer 802.11a 802.11g 802.11n 802.11ac 802.11b

802.11n

You are designing a wireless network for a client. Your client needs the network to support a data rate of at least 150 Mbps. In addition, the client already has a wireless telephone system installed that operates 2.4 GHz. Which 802.11 standard works BEST in this situation? Answer 802.11n 802.11a 802.11b 802.11g

802.11n

Which of the following proxy server roles stores frequently accesses data so that a user's request never has to leave the network for retrieval? Answer Sharing Internet Connections VPN Firewall Caching

Caching

Which of the following technologies does the 802.11ac wireless networking standard use to provide increased bandwidth and communication speeds? (Select two.) Answer Peer-to-peer mode to allow each host to communicate directly with other hosts. MU-MIMO to allow multiple users to access the same channel. Channel bonding to combine more channels in the 5 GHz band to allow more than double the bandwidth. Dual-band transmission to allow data to be transmitted at two frequencies at the same time. OFDM modulation to allow several parallel data channels to stream data.

Channel bonding to combine more channels in the 5 GHz band to allow more than double the bandwidth. MU-MIMO to allow multiple users to access the same channel.

You want to configure a Windows workstation with your network proxy server's IP address from Control Panel using the Internet Properties window. Click on the tab in the Internet Properties window that you would use to do this.

Click the Connections tab To configure the proxy server's IP address, go to Control Panel > Network and Internet > Internet Options. Click the Connections tab and then select LAN settings. In the dialog displayed, you can enable a proxy server for the LAN and then enter the proxy server's IP address and port number.

While making an online bank transaction, a customer checks to see that the web browser is displaying a lock icon that indicates that an encrypted TCP/IP suite protocol is being used. Which of the following TCP/IP port numbers does this protocol typically use when the browser encrypts its communications with the bank's web server? Answer 25 80 143 443

443 HTTPS TCP/IP suite protocol web browsers use for encrypted communications is HTTPS.

Which of the following are not valid IPv4 addresses? (Select three.) Answer 45.22.156.256 116.0.0.116 1.55.254.3 122.0.0.0 257.0.122.55 145.8.260.7 132.64.32.8

45.22.156.256 257.0.122.55 145.8.260.7 IP addresses have a value between 0 and 255 within each octet. In this list, 45.22.156.256, 145.8.260.7, and 257.0.122.55 are not valid IP addresses.

You've just installed the DNS service on a Windows server. Which port must be opened on the server's firewall to allow clients to access the service? Answer 53 143 110 123

53 DNS 143 pop3 110 http 123 NTP

Which of the following protocols do email clients use to download messages from a remote mail server? AnswerCorrect Answer: POP3 SNMP SMTP FTP

POP3

What type of operating system do embedded devices use? Answer Non-deterministic Windows Linux Real-time operating system

Real-time operating system

Which wireless standard can stream data at a rate of up to 54 Mbps using a frequency of 5 GHz? Answer 802.11b 802.11n 802.11g 802.11a

802.11a 802.11a can stream data at a rate of up to 54 Mbps using a frequency of 5 GHz. 802.11b can stream data at a rate of up to 11 Mbps using a frequency of 2.4 GHz. 802.11g can stream data at a rate of up to 54 Mbps using a frequency of 2.4 GHz. 802.11n can stream data at a rate of up to 600 Mbps using a frequency of 2.4 GHz or 5 GHz.

To assist a user, a help desk technician is able to take advantage of a Windows proprietary network protocol that allows the technician to open a graphical interface to connect with the user's Windows computer. Which of the following TCP/IP port numbers is the default port used by this protocol? Answer 80 143 443 3389

3389

Which port must be opened on the firewall of a Windows system so that a Remote Desktop connection can be established? Answer: 3389 123 23 22

3389

Which data transmission rate is defined by the IEEE 802.11b wireless standard? Answer 54 Mbps 150 Mbps 10 Mbps 11 Mbps 2 Mbps

11 Mbps IEEE 802.11a and 802.11g defines wireless transmission rates up to 54 Mbps. The IEEE 802.3 standard defines Ethernet 10baseT cable-based transmissions of 10 Mbps. IEEE 802.11n defines wireless transmission rates of up to 600 Mbps.

Which of the following IP addresses belong to the 114.0.0.0 Class A network? Assume that the network is indicated by the default Class A portion of the IP address. (Select three.) Answer 114.0.0.15 115.88.0.55 114.58.12.0 114.122.66.12 115.77.89.4 115.0.0.66

114.0.0.15 114.58.12.0 114.122.66.12 a Class A network, the first octet indicates the network address. All hosts on the network must have the same value in the first octet (114).

A user is configuring an email client application and decides to use a TCP/IP suite protocol that stores all messages on the email server so that they can be synchronized across a laptop, a smartphone, and a web email client. In addition, this protocol stores the email messages on the email server until the user explicitly deletes them. Which of the following TCP/IP port numbers will the client application typically access while using this protocol to contact the email server? 21 80 110 143

143 The TCP/IP suite protocol that stores email messages on a server so that they can be synchronized across multiple devices is Internet Message Access Protocol (IMAP). IMAP typically uses port 143. FTP uses port 21. HTTP uses port 80. POP3 uses port 110.

Which frequencies does Zigbee operate on? Answer 500 MHz 1.4 GHz 2.4 GHz 908.42 MHz

2.4 GHz

An administrator configures a server to run the TCP/IP suite protocol that allows users to download files contained in specific directories on the server and also protects access to those files by requiring user authentication. Which of the following TCP/IP port numbers allow this protocol to work properly? (Select two.) Answer 20 21 53 80 110

20 21 FTP uses ports 20 and 21. DNS uses port 53. HTTP uses port 80. POP3 email clients use port 110.

Which of the following is the maximum transmission speed for Bluetooth v3 and v4 devices when using High Speed (HS) mode? Answer 24 Mbps 48 Mbps 3 Mbps 1 Mbp

24 Mbps

What is the maximum distance between hops that is allowed by a Z-Wave device on a mesh network? Answer 250 feet 80 feet 200 feet 60 feet

250 feet z waves Zigbee devices have a maximum distance of 60 feet between each hop.

While working on a Windows workstation, you enable Remote Desktop. Which of the following ports MUST be open on the server's firewall to allow remote clients to access the desktop through Remote Desktop? Answer 123 389 3389 110

3389

Based on the back view of the network rack below, match each component on the left to the label displayed on the network rack image. A Ethernet switch, Ethernet Patch Panel, Ethernet Router B Server, fiber Patch Panel C D E

A - Ethernet router B - Ethernet switch C - Ethernet patch panel D - Fiber patch panel E - Server

Match each smart device with its description. Drag Learns from your habits and schedule, allows you to control the climate in your home remotely, shows you energy consumption in real time, and adjusts itself depending on ambient conditions. Allows you to control hardwired lights, ceiling fans, fireplaces, small appliances, and garbage disposals. Can change colors, track motion, stream audio over Bluetooth, and double as a connected camera, but it's only smart when turned on. It doesn't work when turned off. Easy solution for making small appliances (such as lamps, coffee makers, and toasters) smart. Uses an RF transmitter. May include such features as motion detection, scheduled recording, remote viewing, and automatic cloud storage. Uses a wireless protocol and a cryptographic key to execute the authorization process. It can also monitor access and send alerts related to the status of the device. Uses voice recognition software and activates through a Wake Word or Hot Word. Drop Thermostat Switch Bulb Plug Security camera

A smart thermostat learns from your habits and schedule, allows you to control the climate in your home remotely, shows you energy consumption in real time, and adjusts itself depending on ambient conditions. A smart switch allows you to control hardwired lights, ceiling fans, fireplaces, small appliances, and garbage disposals. A smart bulb can change colors, track motion, stream audio over Bluetooth, and double as a connected camera, but it's only smart when turned on. A smart plug is an easy solution for making appliances such as lamps, coffee makers, and toasters smart. A smart security camera uses an RF transmitter and may include such features as motion detection, scheduled recording, remote viewing, and automatic cloud storage. A smart door lock uses a wireless protocol and a cryptographic key to execute the authorization process. A smart door can also monitor access and send alerts related to a device's status. A smart speaker/digital assistant uses voice recognition software and activates through a Wake Word or Hot Word.

You are working as a junior technician for a small consulting firm. You have been tasked with installing a new computer on the network. You have performed this task and connected the computer to the network. To verify network connectivity, you decide to ping the network server. Before this can happen, the new device needs to know the MAC address of the network server so it can match it to the IP address. The computer sends a broadcast message, asking who has the IP address. The network server responds with its MAC address, and now the computer can communicate with the server. Which protocol is being used when sending the broadcast message to match the MAC address to the IP address? Answer IP ICMP ARP HTTP

ARP ARP is used to match a device's IP address to its MAC address. Some network devices, such as switches, will build tables to match MAC addresses with IP addresses in order to always know where to send packets to. When a host wants to send some data, it uses ARP to send a broadcast message out on the network, requesting that the host with a specific IP address respond with its MAC address. When the sending host gets the response, it can then match up the MAC address and IP address.

Which type of embedded device microprocessor is custom designed to perform a specific function? Answer SoC ARM ASIC FPGA

ASIC

You have recently purchased a toll pass for a bridge that you cross each day on your way to work. Which of the following wireless technologies is MOST likely being used for this pass? Answer Bluetooth Near Field Communication (NFC) Passive RFID Active RFID

Active RFID

Which of the following are examples of web server platforms? (Select two.) Answer Apache IIS SMTP DNS DHCP

Apache & IIS Apache and Internet Information Services (IIS) are both examples of web server platforms. Windows servers use IIS and Linux uses Apache.

Which of the following functions are performed by proxy servers? (Select two.) Answer Cache web pages. Filter unwanted email. Block unwanted packets from entering your private network. Store client files. Block employees from accessing certain websites.

Block employees from accessing certain websites. Cache web pages. ( save) When a proxy receives a request from the client, the proxy checks to verify that the client is allowed access to the website. If they are, the proxy then checks its cache to see if the requested page is there.(saved) If the page is already cached, the proxy server fulfills the request by displaying the requested page from the cache rather than retrieving it from the internet. Receiving a web page from a local proxy server is much faster than downloading the page from the internet.

You want to use a wireless keyboard and mouse with your laptop computer. Which method could you utilize for the wireless connection? Answer 802.11g wireless Bluetooth PS/2 IEEE 1394 USB

Bluetooth

You need a type of wireless connection that can transfer data between your phone, PDA, and laptop. You are transferring sensitive information. Which of the following is the BEST choice for this wireless connection? Answer Bluetooth Infrared Wireless Ethernet Cellular WAN

Bluetooth Bluetooth connection is the best choice because it automatically detects Bluetooth-enabled devices and creates a wireless PAN between them. Bluetooth can be used for both voice and data signals, and it also provides 128-bit encryption to protect sensitive information in transit.

A technician has configured a client computer's network interface to request an IP address. Which of the following TCP/IP suite protocols does the client computer use to perform the request and receive an IP address from a server? Answer Domain Name System (DNS) Dynamic Host Configuration Protocol (DHCP) Simple Network Management Protocol (SNMP) Lightweight Directory Access Protocol (LDAP)

Dynamic Host Configuration Protocol (DHCP)

A technician has configured a client computer's network interface with server addresses to which the client will send requests for translating fully qualified domain names (FQDNs) to IP addresses and IP addresses to FQDNs. Which of the following TCP/IP suite protocols is used by the client to perform the request and also used by a server to respond to those requests? Answer Server Message Block (SMB) Dynamic Host Configuration Protocol (DHCP) Secure Shell (SSH) Domain Name System (DNS)

DNS DNS associates readily recognizable domain names to numerical IP addresses. DHCP is used by clients to request an IP address and by a server to offer an IP address. SMB is used for shared access to files and miscellaneous communications between hosts on a network. This protocol also provides an authenticated inter-process communication mechanism. SSH allows network services to communicate securely over an unsecure network (for example, secure remote login to computer systems by users).

Which of the following are IoT systems that work together to make communication between two endpoints possible? (Select two.) Answer Wi-Fi Data storage Middleware Gateway system Access gateway

Data storage & Gateway system

Employees complain to the company IT division that they are spending considerable time and effort discarding unwanted junk email. Which of the following should the IT division implement? Answer Email filtering Antivirus Firewall Multi-factor authentication

Email filtering

Which of the following keeps track of various network devices while ensuring that the software is secure? Answer Syslog server All-in-one security appliance Endpoint management server Firewall

Endpoint management server

You are in the process of setting up an Ethernet network for a new building at your company's headquarters. You need to connect the wires from the different Ethernet office wall plates to your network rack. Which of the following components on the network rack should you use to connect the wires from the office wall plates? Answer UPS Ethernet patch panel Ethernet switch Ethernet router

Ethernet patch panel Ethernet patch panel typically terminates wires that run from different Ethernet office wall plates Once you have terminated the wires on the patch panel, you can then use patch cables (Ethernet cables with RJ-45 connectors) to connect these ports to the Ethernet switch.

You are assembling components in a network rack and need a device that connects three network segments. Which of the following devices will meet your networking needs? Answer Wireless controller Ethernet patch panel Ethernet router Ethernet switch

Ethernet router Ethernet switch lets you connect multiple devices to the same network segment, but does not connect the network segments. A wireless controller monitors and manages wireless access points in a wireless network architecture. An Ethernet patch panel provides an easy way to connect devices and accommodate different types of cabling, such as twisted-pair and fiber optic cables.

You are the network administrator for a small consulting firm. The firm has recently rolled out a new intranet site, and you are responsible for configuring the DNS. You are able to connect to the intranet site by using the IP address, but you cannot connect by using the hostname. Which of the following do you need to configure to access the site with the hostname? Answer Forward lookup zone Dynamic DNS Reverse lookup zone CNAME record

Forward lookup zone

As a network administrator for your company, you want to set up a network device that manages traffic leaving and entering your network from the outside. Which of the following would BEST meet your requirements? Answer VPN Reverse proxy server Content filter Forward proxy server

Forward proxy server

Which protocols are used on the internet to transmit web pages from web servers to web browsers running on client workstations? (Select two.) AnswerCorrect Answer: HTTPS HTML NNTP Correct Answer: HTTP SMTP XML

HTTPS and HTTP

Which of the following hardware devices regenerates a signal out to all connected ports without examining the frame or packet contents? Answer Bridge Router Switch Gateway Hub

HUB A hub and a repeater send received signals out all other ports. These devices do not examine the frame or packet contents. A switch and/or bridge use a frame's MAC address for forwarding decisions. A router uses a packet's IP address for forwarding decisions.

What are two major concerns regarding IoT devices? (Select two.) Answer Privacy Short lifespan Availability Hacking Accessibility

Hacking & Privacy

Which of the following is a disadvantage of using a UTM? Answer Requires a separate endpoint management server. Has a single point of failure. Is more expensive than using separate security appliances. Does not include a spam filter.

Has a single point of failure.

Which of the following protocols is used by an email client to retrieve messages from an email server, giving users the option to keep mail messages on the server? Answer NTP SMTP IMAP POP3

IMAP SMTP allows a user to send email to a server, POP3 server is also used by a mail client to retrieve messages from a mail server, but it requires that the messages be deleted from the server after they've been downloaded. NTP synchronizes all network computer clocks.

Which of the following protocols is often combined with TCP to send data across the internet? Answer IP ICMP FTP UDP

IP IP is responsible for determining how to deliver the data between two hosts, and TCP is responsible for the segmenting and sequencing of the data packets.

Which of the following is an example of a logical address? Answer ARP address MAC address IPv4 address Gateway address

IPv4 address Logical addresses are assigned by software, which means that they can be easily changed or assigned (unlike a physical address)(MAC). Logical addresses can be used by many different protocols, but the most common are IPv4 addresses.

Which type of wireless technology increases bandwidth for a home wireless network by using multiple antennae for both the transmitter and receiver? Answer Channel bonding Radio waves Long-range MIMO

MIMO (multiple-input, multiple-output) increases bandwidth by using multiple antennae for both the transmitter and receiver. Channel bonding combines two non-overlapping 20 MHz channels into a single 40 MHz channel, long-range wireless network is typically set up to connect two buildings together on the same network. Radio waves are the basic technology for all wireless networks

A local dentist has contracted with you to implement a network in her new office. Because of security concerns related to patient privacy laws, she has asked that the new network meet the following criteria and be cost effective: No one from the internet should be able to access her internal network. Email messages should be scanned for spam, phishing attacks, and malware before they reach users' workstations. Employees access to non-work-related websites, especially sites that contain inappropriate content, should be blocked. A system should be put in place to detect and prevent external attacks on her network. Which of the following would BEST meet your client's criteria? Answer Implement a firewall. Implement an email security appliance. Implement a content filter. Implement an intrusion prevention system (IPS). Implement an all-in-one UTM security appliance.

Implement an all-in-one UTM security appliance.

One of your customers has a long range wireless network that connects two company office buildings together. The buildings are several hundred yards apart. You have licensed a frequency range of 3.65 GHz to transmit signals between the buildings. However, the wireless connection is not performing ideally, and it sometimes drops connections. Which of the following is the BEST immediate solution to try to resolve this issue? Answer Try using an unlicensed 801.11 frequency standard. . License a different frequency range. Increase the power to the access points.

Increase the power to the access points.

You would like to control internet access based on user, time of day, and websites visited. Which of the following actions would BEST meet your criteria? Answer Configure internet zones using Internet Options. Configure each system's Local Security Policy to add access restrictions based on time of day and content. Configure a packet-filtering firewall. Add rules to allow or deny access based on time of day and content. Enable Windows Firewall on each system. Add or remove exceptions to control access based on time of day and content. Install a proxy server. Allow internet access only through the proxy server.

Install a proxy server. Allow internet access only through the proxy server.

Which of the following all-in-one security appliance (UTM) functions detects intrusions and alerts the network but does not block traffic? Answer Intrusion detection VPN Anti-spam Intrusion protection

Intrusion detection

A user is configuring an email client application and plans to use a standard TCP/IP suite protocol to retrieve email messages from an email server. Which of the following TCP/IP suite protocols can be used to retrieve email messages? (Select two.) Answer Lightweight Directory Access Protocol (LDAP) Internet Message Access Protocol (IMAP) Simple Mail Transfer Protocol (SMTP) Post Office Protocol (POP3) Simple Network Management Protocol (SNMP)

Post Office Protocol (POP3) Internet Message Access Protocol (IMAP)

Which algorithm is used by an Application layer load balancer? Answer Source IP hash Least pending request Weighted least connections Round robin

Least pending request The source IP hash, weighted least connections, and round robin algorithms are all used by NETWORK LAYER load balancers

Which device is responsible for forwarding traffic in between networks? Answer Network interface Access point Switch Router

Router Switches are used to connect multiple computers inside of a network together. They do not forward data to other networks. Access points are used to connect wireless network hosts. They do not forward data to other networks. The network interface (NIC) converts the digital data into a signal that can be transmitted along the transmission medium. They do not forward data to other networks.

Which network protocol do controller systems use to communicate with each other? Answer HTTP ARP ICMP Modbus

Modbus

A user pays for a retail purchase by placing a smartphone next to the merchant's reader. Which of the following wireless mobile device connections is this? Answer Bluetooth MicroUSB NFC Lightning

NFC

Which of the following wireless communication technologies can be described as follows? It has a limited transmission range of less than two inches. It is used with credit cards and passports. It is slower than other wireless technologies. It constantly emits a signal. Answer Infrared in diffuse mode NFC Bluetooth Infrared in line-of-sight mode IEEE 1394

NFC

Which of the following locations will contribute the greatest amount of interference to a wireless access point? (Select two.) Answer Near backup generators Near cordless phones Near DCHP servers Near exterior walls The top floor of a two-story building

Near backup generators Near cordless phones

Which of the following protocols is non-routable and requires another protocol to enable internetwork communications? AnswerCorrect Answer: NetBIOS AppleTalk over IP IPX Incorrect answer: IP

NetBIOS NetBIOS is a non-routable protocol. It is often combined with IPX or IP to enable internetwork communications. NetBIOS was used in earlier versions of Windows but is rarely used today because nearly every operating system supports IP. IP is the protocol suite used on the internet and is supported by all major operating systems. IPX is the protocol suite used by legacy NetWare servers. AppleTalk over IP is the protocol used to allow older AppleTalk computers to use IP for internetwork communication.

Which of the following network components is responsible for converting digital data into a signal that can be transmitted? Answer: Network interface Transmission medium Switch Protocol

Network interface network interface (NIC) converts the digital data into a signal that can be transmitted along the transmission medium. Devices are connected together using a transmission medium. Examples include twisted pair cabling, fiber optics, or wireless radio signals. They do not convert the data into a digital signal. Switches are used to connect multiple computers inside of a network together

What are the standards called that define how data is formatted and transmitted over a network? Answer Network ID: Networking protocols Transmission medium Network interface

Networking protocols

Which of the following are technologies that Bluetooth utilizes? (Select two.) Answer: Personal area network (PAN) Red spectrum light waves 5.75 GHz radio wireless 2.4 GHz radio wireless Line-of-sight transmission

Personal area network (PAN) 2.4 GHz radio wireless

Currently, your company is in the process of upgrading security in the company headquarters building by installing biometric sensors to limit access to specific rooms. Your network switches are PoE-enabled, which allows biometric sensors to connect to switches without an external power source. Which of the following PoE standards is designed for use with biometric sensors? Answer PoE++ PoE+ Standard PoE Higher-power PoE

PoE+

Which of the following internet appliances filters specific internet content categories and also keeps internal users anonymous? Answer Content filter Unified Threat Management Proxy server Spam gateway

Proxy server

An after-school care center allows children to browse the internet. They want to limit the websites that the children can access. Which of the following network hosts would MOST likely provide this service? Answer Print server Proxy server Web server DHCP server

Proxy server One function of a proxy server is to intercept requests from a client browser and either forward them on to the internet or deny access to that request

Which of the following DHCP scope options will assign a static IP configuration to a device using the device's MAC address? Answer Default gateway Reservation Exclusion IP range

Reservation

As a network administrator for your company, you want to set up a network device that manages internal traffic between servers and clients. Which of the following would BEST meet your requirements? Answer VPN Content filter Reverse proxy server Forward proxy server

Reverse proxy server A reverse proxy server is placed between the servers and client machines "INTERNALLY" to monitor traffic between them. A forward proxy server manages traffic that is leaving and entering the network from the outside. A content filter is a role of a proxy server that is designed to block traffic by regulating incoming and outgoing connection requests. This prevents users from accessing websites they shouldn't have access to.

You are working as a junior security technician for a consulting firm. One of your clients is upgrading their network infrastructure. The client needs a new firewall and intrusion prevention system installed. They also want to be able to block employees from visiting certain types of websites. The client also needs a VPN. Which of the following internet appliances should you install? Answer Load balancer Proxy server Unified Threat Management Spam gateway

Unified Threat Management

Which of the following is an inherent vulnerability of embedded devices? Answer Vulnerable to malware Open systems Unknown environments Known environments

Unknown environments

A company has built a video streaming service that supplies training videos. Quickly transmitting video data to customers is more important than guaranteed delivery. Which of the following Transport layer IP suite protocols is MOST likely used for this service? Answer Internet Control Message Protocol (ICMP) File Transfer Protocol (FTP) User Datagram Protocol (UDP) Transport Layer Protocol (TCP

User Datagram Protocol (UDP)

Which of the following proxy server roles allows users to connect to the internet anonymously with their data encrypted during transmission? Answer Firewall Caching Sharing Internet Connections VPN

VPN

ou are a software developer, and you're creating a multimedia streaming application. Data will be streamed from your streaming server to clients over IP networks. Which transport protocol should your application use to send data between the clients and the server? Answer ICMP UDP SNMP TCP

UDP

You are using a patch panel to connect the computers in your building to the appropriate switches, and you need to connect the Ethernet wires from the building network port cables to the patch panel. Where do you connect the wires on a patch panel? Answer: Yon connect the wires to the backside of the panel. You connect the wires to the frontside of the panel. You connect the incoming wires to the front and the outgoing wires to the back. You connect the outgoing wires to the front and the incoming wires to the back.

Yon connect the wires to the backside of the panel

What are the two mesh protocols that are used most often with IoT devices? (Select two.) Answer Zbot Zerg Z-Wave Zensys Zigbee

Zigbee & Z-Wave

You want to connect your internal network to an external network in order to provide internet access to your employees. Which of the following network components is designed to make this type of connection? Answer Switch PoE Router Hub

router


Set pelajaran terkait

Chapter 4: Stress, Exercise & Mobility

View Set

Spanish Speaking Countries and what they are know for!!! Dillon

View Set

Chapter 14, 15, 16 Manufacturing Test Quizlet

View Set

A+P II Lab: Ex. 5: Digestive System

View Set

Additional TB Health Assessment Questions chapters

View Set

HS 354 Sources of Retirement Income

View Set

Comptia Security+ - Chapter 1 Quiz -Mastering Security Basics

View Set