CompTIA A+ Practice Tests. Docter Quentin. Читать онлайн. Newlib. NEWLIB.NET

Автор: Docter Quentin
Издательство: John Wiley & Sons Limited
Серия:
Жанр произведения: Зарубежная образовательная литература
Год издания: 0
isbn: 9781119372677
Скачать книгу
Crimper

      ■ Cable stripper

      ■ Multimeter

      ■ Tone generator and probe

      ■ Cable tester

      ■ Loopback plug

      ■ Punchdown tool

      ■ WiFi analyzer

      172 Which of the following network devices receives network traffic and makes a decision on whether to send it on based on the destination hardware address?

      A. Hub

      B. Bridge

      C. Access point

      D. Repeater

      173 A technician installed a UTP splitter on one of your network segments that has CAT6e cable. What is the maximum speed supported by this connection?

      A. 10Mbps

      B. 100Mbps

      C. 1Gbps

      D. 10Gbps

      174 You are installing a fiber-optic cable between two buildings. To install the cable, you must run it through a conduit between the buildings, and access to the conduit is not easy. Before you run the cable, you want to ensure it’s working properly. Which tool should you use?

      A. Cable tester

      B. Multimeter

      C. Loopback plug

      D. Tone generator and probe

      175 Which TCP/IP protocol, designed to download email, allows for multiple clients to be simultaneously connected to the same mailbox?

      A. SMTP

      B. POP3

      C. IMAP

      D. SMB

      176 You are using your laptop on the company network. In your web browser, you type in www.google.com and press Enter. The computer will not find Google. You open the browser on your phone, and using your cellular connection, you can open Google without a problem. Your laptop finds internal servers and can print without any issues. What is the most likely reason you can’t open Google?

      A. DNS server problem

      B. DHCP server problem

      C. Missing subnet mask

      D. Duplicate IP address

      177 A technician needs to run a network cable to a remote building, which is approximately 15 kilometers from his base station. He’s not sure if any cable will span that distance. What is the maximum distance of SMF cable?

      A. 300 meters

      B. 550 meters

      C. 40 kilometers

      D. 100 kilometers

      178 You have been asked to install a run of RG-59 cable from one end of a building to the other. What is the maximum distance for this type of cable run?

      A. 100 meters (328 feet)

      B. 228 meters (750 feet)

      C. 304 meters (1,000 feet)

      D. 500 meters (1,645 feet)

      179 Which one of the following TCP/IP protocols was designed as a replacement for Telnet?

      A. SMB

      B. SSH

      C. SFTP

      D. FTPS

      180 Which of the following network connectivity devices operate at Layer 2 of the OSI model? (Choose two.)

      A. Hub

      B. Switch

      C. Bridge

      D. Router

      181 In IPv4, what is the function of the subnet mask?

      A. It tells hosts where to route packets.

      B. It differentiates between the network ID and host ID.

      C. It determines which subnet the host is on.

      D. It masks external networks from the host.

      182 Which of the following TCP/IP protocols is connection oriented and attempts to guarantee packet delivery?

      A. IP

      B. TCP

      C. UDP

      D. ICMP

      183 Which TCP/IP protocol allows a user to log into a remote computer and manage files as if they were logged in locally?

      A. FTP

      B. SFTP

      C. SMB

      D. Telnet

      184 You are given a network configuration of 155.100.63.0/26 from your ISP. When you configure your network hosts, what subnet mask should you assign them?

      A. 255.255.0.0

      B. 255.255.255.0

      C. 255.255.255.192

      D. 255.255.255.240

      185 Which Wi-Fi standard specifies a maximum of 54Mbps transmissions in the 2.4GHz frequency range?

      A. 802.11a

      B. 802.11b

      C. 802.11g

      D. 802.11n

      186 Which TCP/IP protocol is used to provide shared access to files and printers on the network?

      A. FTP

      B. SSH

      C. SMB

      D. SNMP

      187 What port number does the Telnet protocol use?

      A. 21

      B. 22

      C. 23

      D. 25

      188 You have just installed a wireless 802.11ac network for a client. The IT manager is concerned about competitors intercepting the wireless signal from outside the building. Which tool is designed to test how far your wireless signal travels?

      A. Tone generator and probe

      B. Protocol analyzer

      C. Packet sniffer

      D. Wi-Fi analyzer

      189 Some of your network users are concerned about submitting confidential information to an online website. What should you tell them?

      A. It’s fine, because all Internet traffic is encrypted.

      B. If the website address starts with TLS://, it should be OK to submit confidential information to a trusted site.

      C. If the website address starts with HTTPS://, it should be OK to submit confidential information to a trusted site.

      D. Don’t ever submit confidential information to any online website.

       Скачать книгу


<p>172</p>

B. Because bridges work at the Data Link layer, they are aware of only hardware (MAC) addresses. They are not aware of and do not deal with IP addresses. Bridges are more intelligent than repeaters, but they are unable to move data across multiple networks simultaneously.

<p>173</p>

B. An Ethernet splitter will take the incoming signal on two pairs and then split it, so on the output end it produces two sets of signals using two pairs each. Because of this, Ethernet splitters are limited to 100Mbps connections. It is not recommended that you use Ethernet splitters on a network. If you need to connect multiple computers using UTP, use a hub or a switch.

<p>174</p>

A. Cable testers are indispensable tools for any network technician. Usually you would use a cable tester before you install a cable to make sure it works. Of course, you can test them after they’ve been run as well.

<p>175</p>

C. Internet Message Access Protocol (IMAP) is a secure protocol designed to download email. It has several advantages over the older Post Office Protocol 3 (POP3). First, IMAP4 works in connected and disconnected modes. Second, it lets you store the email on the server, as opposed to POP3, which requires you to download it. Third, IMAP4 allows multiple clients to be simultaneously connected to the same inbox.

<p>176</p>

A. The Domain Name System (DNS) server is responsible for resolving host names, such as www.google.com, to IP addresses to enable communication. If it’s not working properly or you can’t connect to it, you won’t be able to browse the Internet using friendly website names.

<p>178</p>

B. RG-59 network cable can run for about 228 meters (750 feet). The slightly thicker RG-6 can run for about 304 meters (1,000 feet).

<p>179</p>

B. Secure Shell (SSH) can be used to set up a secure Telnet session for remote logins or for remotely executing programs and transferring files. Because it’s secure, it was originally designed to be a replacement for the unsecure telnet command.

<p>180</p>

B, C. Switches and bridges work at Layer 2. Switches are multiport bridges.

<p>181</p>

B. Computers are able to differentiate where the network ID ends and the host address begins through the use of a subnet mask.

<p>182</p>

B. Transmission Control Protocol (TCP) guarantees packet delivery through the use of a virtual circuit and data acknowledgments, and User Datagram Protocol (UDP) does not. Because of this, TCP is often referred to as connection oriented, whereas UDP is connectionless.

<p>183</p>

D. Telnet lets users log into another machine and “see” the remote computer in a window on their screen. Although this vision is text only, the user can manage files on that remote machine just as if they were logged in locally.

<p>184</p>

C. A CIDR shorthand notation of /26 corresponds to the subnet mask 255.255.255.192.

<p>185</p>

C. 802.11g specifies a maximum of 54Mbps transmissions in the 2.4GHz frequency range.

<p>186</p>

C. Server Message Block (SMB) is a protocol used to provide shared access to files, printers, and other network resources. In a way, it functions a bit like FTP only with a few more options, such as the ability to connect to printers, and more management commands.

<p>187</p>

C. Telnet lets users log into another machine and “see” the remote computer in a window on their screen. Although this vision is text only, the user can manage files on that remote machine just as if they were logged in locally. Telnet uses port 23.

<p>188</p>

D. A wireless locator or a Wi-Fi analyzer can be either a handheld hardware device or specialized software that is installed on a laptop and whose purpose is to detect and analyze Wi-Fi signals. It can detect where signals are strong or weak to determine whether there are potential security issues.

<p>189</p>

C. Internet traffic is not encrypted by default. Websites that are secure and encrypt their transmissions will start with HTTPS://rather than HTTP://. These sites can be trusted to encrypt the data, and their identity is verified.