CompTIA A+ 220-1101 (Core 1) Review: Networking
Which IEEE wireless standards specify transmission speeds up to 54 Mbps? (Select two.) A. 802.11a B. Bluetooth C. 802.1ac D. 802.11b E. 802.11g
A. 802.11a E. 802.11g
Which of the following protocols is often combined with TCP to send data across the internet? A. IP B. FTP C. ICMP D. UDP
A. IP
Which of the following hardware devices regenerates a signal out to all connected ports without examining the frame or packet contents? A. Switch B. Hub C. Gateway D. Bridge E. Router
B. Hub
Which of the following locations will contribute the greatest amount of interference to a wireless access point? (Select two.) A. Near exterior walls B. Near cordless phones C. Near backup generators D. The top floor of a two-story building E. Near DCHP servers
B. Near cordless phones C. Near backup generators
Which wireless standard can stream data at a rate of up to 54 Mbps using a frequency of 5 GHz? A. 802.11b B. 802.11n C. 802.11a D. 802.11g
C. 802.11a
One of your customers has a long range wireless network that connects two company office buildings together. The buildings are several hundred yards apart. You have licensed a frequency range of 3.65 GHz to transmit signals between the buildings. However, the wireless connection is not performing ideally, and it sometimes drops connections. Which of the following is the BEST immediate solution to try to resolve this issue? A. Try using a dual-band access point. B. Try using an unlicensed 801.11 frequency standard. C. License a different frequency range. D. Increase the power to the access points.
D. Increase the power to the access points.
An after-school care center allows children to browse the internet. They want to limit the websites that the children can access. Which of the following network hosts would MOST likely provide this service? A. DHCP server B. Print server C. Web server D. Proxy server
D. Proxy server
Which of the following proxy server roles allows users to connect to the internet anonymously with their data encrypted during transmission? A. Firewall B. Sharing Internet Connections C. Caching D. VPN
D. VPN
Which of the following proxy server roles stores frequently accesses data so that a user's request never has to leave the network for retrieval? A. Caching B. Firewall C. VPN D. Sharing Internet Connections
A. Caching
Which of the following internet appliances filters specific internet content categories and also keeps internal users anonymous? A. Content filter B. Proxy server C. Unified Threat Management D. Spam gateway
B. Proxy server
Your employer wants a system that guarantees that all components will work together with minimal configuration and setup. Time is of the essence in getting this new system ready. Which of the following would BEST meet your employer's needs? A. PLC B. HMI C. DCS D. SCADA
C. DCS
Which of the following is the maximum transmission speed for Bluetooth v3 and v4 devices when using High Speed (HS) mode? A. 3 Mbps B. 1 Mbps C. 48 Mbps D. 24 Mbps
D. 24 Mbps
A technician determines that an older network hub that connects 24 workstations is performing poorly due to excessive network collisions. Which of the following network devices would be the BEST replacement? A. Router B. Bridge C. Patch panel D. Switch
D. Switch
Employees complain to the company IT division that they are spending considerable time and effort discarding unwanted junk email. Which of the following should the IT division implement? A. Email filtering B. Multi-factor authentication C. Firewall D Antivirus
A. Email filtering
You would like to control internet access based on user, time of day, and websites visited. Which of the following actions would BEST meet your criteria? A. Install a proxy server. Allow internet access only through the proxy server. B. Configure each system's Local Security Policy to add access restrictions based on time of day and content. C. Enable Windows Firewall on each system. Add or remove exceptions to control access based on time of day and content. D. Configure internet zones using Internet Options. E. Configure a packet-filtering firewall. Add rules to allow or deny access based on time of day and content.
A. Install a proxy server. Allow internet access only through the proxy server.
Which of the following is the maximum range of the Bluetooth 2.0 specification? A. 60 meters B. 30 meters C. 10 meters D. 240 meters
B. 30 meters
You have recently purchased a toll pass for a bridge that you cross each day on your way to work. Which of the following wireless technologies is MOST likely being used for this pass? A. Near Field Communication (NFC) B. Active RFID C. Bluetooth D. Passive RFID
B. Active RFID
You are assembling components in a network rack and need a device that connects three network segments. Which of the following devices will meet your networking needs? A. Wireless controller B. Ethernet router C. Ethernet patch panel D. Ethernet switch
B. Ethernet router
Which algorithm is used by an Application layer load balancer? A. Source IP hash B. Least pending request C. Weighted least connections D. Round robin
B. Least pending request
Which of the following network components is responsible for converting digital data into a signal that can be transmitted? A. Protocol B. Network interface C. Transmission medium D. Switch
B. Network interface
What are the standards called that define how data is formatted and transmitted over a network? A. Network interface B. Networking protocols C. Transmission medium D. Network ID
B. Networking protocols
Which of the following are technologies that Bluetooth utilizes? (Select two.) A. 5.75 GHz radio wireless B. Personal area network (PAN) C. Line-of-sight transmission D. 2.4 GHz radio wireless E. Red spectrum light waves
B. Personal area network (PAN) D. 2.4 GHz radio wireless
A user is configuring an email client application and plans to use a standard TCP/IP suite protocol to retrieve email messages from an email server. Which of the following TCP/IP suite protocols can be used to retrieve email messages? (Select two.) A. Lightweight Directory Access Protocol (LDAP) B. Post Office Protocol (POP3) C. Internet Message Access Protocol (IMAP) D. Simple Mail Transfer Protocol (SMTP) E. Simple Network Management Protocol (SNMP)
B. Post Office Protocol (POP3) C. Internet Message Access Protocol (IMAP)
What are two major concerns regarding IoT devices? (Select two.) A. Availability B. Privacy C. Short lifespan D. Hacking E. Accessibility
B. Privacy D. Hacking
Which of the following DHCP scope options will assign a static IP configuration to a device using the device's MAC address? A. IP range B. Reservation C. Default gateway D. Exclusion
B. Reservation
Which protocol is used to send email messages from a mail client to a mail server? A. SNMP B. SMTP C. POP3 D. IMAP E. FTP
B. SMTP
Which of the following LAN devices receives a signal on one port and forwards that signal only to the port where the destination device is connected? A. Router B. Switch C. Network adapter D. Hub
B. Switch
Which type of wireless technology increases bandwidth for a home wireless network by using multiple antennae for both the transmitter and receiver? A. Radio waves B. Long-range C. MIMO D, Channel bonding
C. MIMO
Which of the following protocols do email clients use to download messages from a remote mail server? A. SMTP B. FTP C. POP3 D. SNMP
C. POP3
Which of the following is a specialized controller that you can use to remotely manage all your network devices? A. PoE B. SSH C. SDN D. VLAN
C. SDN
Which port must be opened on the firewall of a Windows system so that a Remote Desktop connection can be established? A. 80 B. 143 C. 443 D. 3389
D. 3389 (by default)
A technician has configured a client computer's network interface to request an IP address. Which of the following TCP/IP suite protocols does the client computer use to perform the request and receive an IP address from a server? A. Lightweight Directory Access Protocol (LDAP) B, Domain Name System (DNS) C. Simple Network Management Protocol (SNMP) D. Dynamic Host Configuration Protocol (DHCP)
D. Dynamic Host Configuration Protocol (DHCP)
Which of the following keeps track of various network devices while ensuring that the software is secure? A. Firewall B. Syslog server C. All-in-one security appliance D. Endpoint management server
D. Endpoint management server
Which device is responsible for forwarding traffic in between networks? A. Access point B. Network interface C. Switch D. Router
D. Router
You've used your Windows workstation to map a drive to a shared folder on a Windows server. Which protocol was used to access the share? A. SFTP B LDAP C. RDP D. SMB
D. SMB(Server Message Block)