CompTIA A+ Practice Tests. Docter Quentin. Читать онлайн. Newlib. NEWLIB.NET

Автор: Docter Quentin
Издательство: John Wiley & Sons Limited
Серия:
Жанр произведения: Зарубежная образовательная литература
Год издания: 0
isbn: 9781119372677
Скачать книгу
through the firewall. Which option does he need to configure to manage these settings?

      A. Port forwarding

      B. Port triggering

      C. NAT

      D. QoS

      230 You are asked to perform consulting work for a medium-sized company that is having network connectivity issues. When you examine the patch panel, you notice that none of the dozens of UTP cables are labeled. Which tool can you use to identify which cable goes to which workstation?

      A. Cable tester

      B. Loopback plug

      C. Punchdown tool

      D. Tone generator and probe

      231 Which TCP/IP protocol is responsible for dynamically assigning IP addresses to client computers?

      A. DNS

      B. DHCP

      C. RDP

      D. LDAP

      232 What characteristic differentiates STP from UTP?

      A. It uses RJ-45s connectors instead of RJ-45.

      B. It follows the T568A wiring standard.

      C. It does not produce poisonous gas when burned.

      D. It has a layer of foil shielding.

      233 You are investigating remnants of an old network setup in an unused building. At the end of a conduit, all you see are the connectors shown here. What type of cable do you expect these connectors to be attached to?

Photograph shows cord with two connectors and a cable wire at one end and fiber pin pointing at the other end, metal screws is in between them anchoring pin points and cable wires.

      A. Coaxial

      B. STP

      C. UTP

      D. Fiber-optic

      234 Which networking device works at Layer 2 of the OSI model, has multiple ports in which each is its own collision domain, and examines the header of the incoming packet to determine which port it gets sent to?

      A. Hub

      B. Switch

      C. Bridge

      D. Router

      235 Which TCP/IP port number will an email client use to push email to its email server?

      A. 23

      B. 25

      C. 110

      D. 143

      236 A technician is going to set up a Wi-Fi network using standard omnidirectional antennae. Because of the building configuration, transmitting signals for the greatest distance is his primary criterion. Which standard should he choose?

      A. 802.11a

      B. 802.11g

      C. 802.11n

      D. 802.11ac

      237 You are troubleshooting an intermittently failing CAT7 network connection. You suspect that there is a short in the connection. Which tool can you use to determine this?

      A. Tone generator and probe

      B. Loopback plug

      C. Multimeter

      D. Crimper

      238 Which TCP/IP protocol gathers and manages network performance information using devices called agents?

      A. SNMP

      B. SMTP

      C. LDAP

      D. SMB

      239 Which Internet connection type, popular for home use, offers asymmetrical download and upload speeds and is implemented over common phone lines?

      A. POTS

      B. Cable

      C. DSL

      D. ISDN

      240 Which Wi-Fi encryption standard was the first to include the use of a 128-bit dynamic per-packet encryption key?

      A. WEP

      B. WPA

      C. WPA2

      D. AES

      241 You are installing an 802.11n Wi-Fi network with five wireless access points. The access points are set up so their ranges overlap each other. To avoid communications issues, what principle should you follow when configuring them?

      A. Configure all access points to use the same channel.

      B. Configure all access points to use adjacent channels.

      C. Configure all access points to use non-overlapping channels.

      D. Channel configuration will not cause communications issues.

      242 Which TCP/IP protocol is designed to send email from clients to mail servers?

      A. SMTP

      B. POP3

      C. IMAP

      D. SMB

      243 You are setting up a small network in your neighbor’s house. She is concerned about wireless security, so she doesn’t want to use wireless networking at all. She needs to connect two computers to each other, but it will be impossible to run a network cable between them. Which technology can help her network these computers?

      A. Ethernet over Power

      B. Power over Ethernet

      C. Firewall

      D. Access point

      244 You have been asked to install a Wi-Fi network in a building that is approximately 100 meters long and 25 meters wide. Because of cost considerations, you will need to use 802.11g. At a minimum, how many wireless access points will you need?

      Конец ознакомительного фрагмента.

      Текст предоставлен ООО «ЛитРес».

      Прочитайте эту книгу целиком, купив полную легальную версию на ЛитРес.

      Безопасно оплатить книгу можно банковской картой Visa, MasterCard, Maestro, со счета мобильного телефона, с платежного терминала, в салоне МТС или Связной, через PayPal, WebMoney, Яндекс.Деньги, QIWI Кошелек, бонусными картами или другим удобным Вам способом.

      1

      B. FireWire 800 can span 100 meters when implemented over fiber-optic cable. Over copper cable, it’s limited to 4.5 meters,


<p>230</p>

D. If you need to trace a wire in a wall from one location to another, a tone generator and probe is the right tool to use. It consists of two pieces: a tone generator and a probe. To use it, attach one end to one end of the cable, such as the end at the computer. Then go to the patch panel with the other end of the probe to locate the cable. These are lifesavers when the cables are not properly labeled.

<p>231</p>

B. Dynamic Host Configuration Protocol (DHCP) dynamically assigns IP addresses and other IP configuration information to network clients.

<p>232</p>

D. Shielded twisted pair (STP) cabling has a foil shield surrounding the wire pairs to decrease electrical interference. Some STP cables also shield individual wire pairs. Unshielded twisted pair (UTP) does not have the shielding. Both types use RJ-45 connectors, can follow the T568A wiring standard, and can be produced as plenum-rated cable that does not produce poisonous gas when burned.

<p>233</p>

D. The connectors shown are ST connectors, which are used with fiber-optic cable. ST connectors are the most popular fiber connector, and they attach with a BNC-like locking mechanism.

<p>234</p>

B. Switches work at Layer 2 as do bridges, and they provide centralized connectivity just like hubs. Switches examine the Layer 2 header of the incoming packet and forward it properly to the right port and only that port. Switches are multiport bridges.

<p>235</p>

B. Email is pushed from clients to servers using the Simple Mail Transfer Protocol (SMTP). SMTP uses port 25.

<p>236</p>

C. Of the Wi-Fi standards, 802.11n has the longest range by default, at roughly 70 meters indoors and 250 meters outdoors. 802.11ac is newer and faster than 802.11n, but it transmits exclusively in the 5GHz range, which restricts its functional distance.

<p>237</p>

C. Multimeters are versatile electronic measuring tools. A multimeter can measure voltage, current, and resistance on a wire.

<p>238</p>

A. Simple Network Management Protocol (SNMP) gathers and manages network performance information. A management device called an SNMP server can be set up to collect data from these devices (called agents) and ensure that your network is operating properly.

<p>239</p>

C. One of the two most popular broadband choices for home use is Digital Subscriber Line (DSL). It utilizes existing phone lines and provides fairly reliable high-speed access. Most DSL subscriptions are asymmetrical, meaning they offer faster download speeds than upload speeds.

<p>240</p>

B. Wi-Fi Protected Access (WPA) was the first Wi-Fi encryption standard to implement the use of the Temporal Key Integrity Protocol (TKIP). Whereas WEP used a static 40- or 128-bit key, TKIP uses a 128-bit dynamic per-packet key. It generates a new key for each packet sent.

<p>241</p>

C. When setting up wireless access points, it’s good practice to have their ranges overlap to ensure there is no loss of communication when roaming in the network’s area. However, to avoid problems, it’s best to set up the access points with nonoverlapping channels.

<p>242</p>

A. Simple Mail Transfer Protocol (SMTP), Post Office Protocol 3 (POP3), and Internet Message Access Protocol (IMAP) are all email protocols. SMTP is for sending email. POP3 and IMAP are for downloading email.

<p>243</p>

A. Ethernet over power can make Ethernet connections by using electrical outlets. For it to work, both devices must be on the same electrical circuit.

<p>244</p>

B. The 802.11g standard has an indoor range of approximately 40 meters. At a minimum, you will need three access points. Depending on coverage and indoor interference, such as thick walls, you might need more, though.