CompTIA Network+ Practice Tests. Craig Zacker. Читать онлайн. Newlib. NEWLIB.NET

Автор: Craig Zacker
Издательство: John Wiley & Sons Limited
Серия:
Жанр произведения: Зарубежная компьютерная литература
Год издания: 0
isbn: 9781119807315
Скачать книгу
default mask for a IPv4 Class B network is 255.255.0.0. How many subnet bits do you need to create 600 subnets with 55 hosts per subnet, and what is the new subnet mask for the network?10 subnet bits with a subnet mask of 255.255.255.1929 subnet bits with a subnet mask of 255.255.255.12810 subnet bits with a subnet mask of 255.255.224.011 subnet bits with a subnet mask of 255.255.255.192

      167 What is the greatest number of host addresses you can create on a single subnet of a network with the following address: 172.16.0.0/20?1421444,0944,096

      168 Ralph has an IPv4 Class B network with a subnet mask of 255.255.248.0. How many subnets can he create, and how many hosts can he create per subnet?64 subnets and 2046 hosts32 subnets and 2046 hosts30 subnets and 1022 hosts62 subnets and 1022 hosts

      169 Convert the binary mask 11111111.11111111.11100000.00000000 into its equivalent decimal value. What is the decimal representation of this mask?255.255.224.0255.255.240.0255.255.248.0255.255.252.0

      170 If you have an IPv4 network address of 192.168.1.32/27, what is the valid range of host addresses you can use for your workstations?192.168.1.33 through 192.168.1.63192.168.1.33 through 192.168.1.62192.168.1.34 through 192.168.1.62192.168.1.34 through 192.168.1.63

      171 Alice has been assigned the IPv4 network address 172.21.0.0/22 for the creation of a new department network in her company. How many host addresses does she have available to her?51051210221024

      172 Automatic Private IP Addressing (APIPA) assigns IPv4 addresses from which of the following classes to Dynamic Host Configuration Protocol (DHCP) clients that cannot contact a DHCP server?Class AClass BClass CClass D

      173 Which of the following Internet Protocol (IPv4) address classes identifies multicast addresses?Class AClass BClass CClass DClass E

      174 Which of the following is an address that you can assign to a host on a private IPv4 network?192.167.9.46172.16.255.25510.1.0.253225.87.34.1

      175 Which of the following is the correct subnet mask for an IPv4 network with the address 172.16.0.0/20?255.255.224.0255.255.240.0255.255.248.0255.255.255.224255.255.255.240

      176 Ed has been assigned the IPv4 network address 192.168.2.32/28 for the computers in his department. Which of the following ranges of addresses can Ed use to configure the TCP/IP clients on his computers?192.168.2.32 to 192.168.2.55192.168.2.33 to 192.168.2.46192.168.2.33 to 192.168.2.40192.168.2.1 to 192.168.2.254

      177 Which of the following IPv4 addresses is available for use on a network device?1.0.0.1127.98.127.0234.9.76.32240.65.8.124

      178 Which of the following IPv6 address types is the functional equivalent of an IPv4 APIPA address?Link localGlobal unicastSite localAnycast

      179 When two workstations access the Internet using the same Port Address Translation (PAT) router, which of the following does the router assign to each workstation? (Choose all that apply.)A unique port numberA common public IPv4 addressA common port numberA unique public IPv4 address

      180 Which of the following is the IPv6 equivalent of Automatic Private IP Addressing (APIPA)?EUI-64SLAACAPIPAv6DHCPv6

      181 Which of the following are mechanisms by which IPv6 traffic can be transmitted on an IPv4 network through the use of tunneling? (Choose all that apply.)TeredoIPsecICMPv66to4

      182 Which of the following best describes why IPv6 hosts exchange ICMPv6 Router Solicitation and Router Advertisement messages with routers?To obtain the prefix needed to generate a link-local addressTo learn the IPv6 address of the nearest routerTo perform address conflict detection for its link-local addressTo encapsulate IPv4 packets and transmit them over the router

      183 Which of the following are examples of Virtual IP (VIP) addresses? (Select all that apply.)An IP address assigned to a host workstation by a DHCP serverA public IP address substituted for a host's own private IP address by a NAT routerAn IP address assigned to a host workstation by APIPAAn IP address assigned to a virtual NIC

      184 Which of the following is the best definition of a subinterface?A logical network interface created from a physical network interfaceOne of the ports on a physical network interface adapter with multiple portsA physical network interface connected to a subnetOne of the IP addresses associated with a network interface that has multiple IP addresses

      185 Which of the following pairs of well-known ports are the default values you would use to configure a POP3 email client?110 and 25143 and 25110 and 14380 and 11025 and 80

      186 Which of the following server applications use two well-known port numbers during a typical transaction?NTPSNMPHTTPFTP

      187 Which of the following protocols does the Ping utility use to exchange messages with another system?UDPTCPICMPIGMP

      188 Which of the following components does the port number in a transport layer protocol header identify?A transport layer protocolAn applicationA gatewayA proxy server

      189 Which of the following organizations is responsible for assigning the well-known port numbers used in transport layer protocol headers?Institute for Electronic and Electrical Engineers (IEEE)Internet Assigned Numbers Authority (IANA)Internet Engineering Task Force (IETF)International Organization for Standardization (ISO)

      190 Which of the following is the default well-known port number for the Hypertext Transfer Protocol (HTTP) used for web client/server communications?222080443

      191 The secured version of the Hypertext Transfer Protocol (HTTPS) uses a different well-known port from the unsecured version. Which of the following ports is used by HTTPS by default?2580110443

      192 What field in the Transmission Control Protocol (TCP) Option subheader specifies the size of the largest segment a system can receive?MSSWindowMMSWinMS

      193 What is the term for the combination of an IPv4 address and a port number, as in the following example: 192.168.1.3:23?SocketOUIWell-known portNetwork addressDomain

      194 Which of the following protocols generate messages that are carried directly within Internet Protocol (IPv4) datagrams, with no intervening transport layer protocol? (Choose all that apply.)ICMPIGMPSMTPSNMP

      195 Which of the following protocols is used to exchange directory service information?RDPLDAPSNMPSMB

      196 Ralph is configuring a new email client on a workstation to use the Simple Mail Transfer Protocol (SMTP) and Post Office Protocol (POP3) email protocols. He wants both protocols to use encryption when communicating with the email server. Which of the following port numbers should Ralph use to secure the SMTP connection with Transport Layer Security (TLS) and the POP3 connection with Secure Sockets Layer (SSL) encryption? (Choose all that apply.)11025587993995

      197 Which of the following is not a port number used for Structured Query Language (SQL) communications?1433152133063389

      198 Which of the following port numbers is assigned to a Unix logging services program?389514636993

      199 Which of the following is the primary application layer protocol used by web browsers to communicate with web servers?HTTPHTMLSMTPFTP

      200 Which of the following protocols appears on the network as a service that client computers use to resolve names into IP addresses?DHCPBOOTPDNSSNMP

      201 Which of the following protocols use(s) the term datagram to describe the data transfer unit it creates? (Choose all that apply.)EthernetIPTCPUDP

      202 What is the native file sharing protocol used on all Microsoft Windows operating systems?Hypertext Transfer Protocol (HTTP)Network File System (NFS)File Transfer Protocol (FTP)Server Message Block (SMB)Lightweight Directory Access Protocol (LDAP)

      203 When analyzing captured TCP/IP packets, which of the following control bits must you look for in the Transmission Control Protocol (TCP) header to determine whether the receiving host has successfully received the sending host's data?ACKFINPSHSYNURG

      204 Which of the following terms describes the Transmission Control Protocol (TCP) exchange that establishes a connection prior to the transmission of any data?SynchronizationInitialization exchangeConnection establishmentThree-way handshake

      205 Alice