CompTIA A+ Practice Tests. Docter Quentin. Читать онлайн. Newlib. NEWLIB.NET

Автор: Docter Quentin
Издательство: John Wiley & Sons Limited
Серия:
Жанр произведения: Зарубежная образовательная литература
Год издания: 0
isbn: 9781119372677
Скачать книгу
The 169.254.0.0/16 range in IPv4 is the APIPA range, used for automatic configuration if the host can’t locate a DHCP server. The same task in IPv6 is accomplished with a link local address in the FE80::/10 range.

211

D. The connectors are a four-pin RJ-11, typically used for telephone installations, and an eight-pin RJ-45 connector, used on UTP and STP for network transmissions.

212

D. Universal Plug and Play (UPnP) is a standard designed to simplify the process of connecting devices to a network and to enable those devices to automatically announce their presence to other devices on the network.

213

A, C. Addresses in the FE80::/10 range are link local unicast addresses. A link local address is assigned to each IPv6 interface but is not routable on the Internet. If this is the only address the host has, it will not be able to get on the Internet.

214

C. The connector shown is a type of mini form factor (MFF) fiber-optic connector called a local connector (LC). It’s especially popular for use with Fibre-Channel adapters, fast storage area networks, and Gigabit Ethernet adapters.

215

A. The File Transfer Protocol (FTP) is optimized for downloading files from servers. It uses port 21.

216

D. The Lightweight Directory Access Protocol (LDAP) is a directory services protocol based on the X.500 standard. LDAP is designed to access information stored in an information directory typically known as an LDAP directory or LDAP database. This often includes employee phone numbers and email addresses.

217

B. The default subnet mask for class B networks is 255.255.0.0, or written in shorthand, /16.

218

D. If you’re working on a larger network installation, you might use a punchdown tool. It’s not a testing tool but one that allows you to connect (that is, punch down) the exposed ends of a wire into wiring harnesses, such as a 110 block.

219

C. Fiber-optic broadband Internet offers fast speeds (often in the 1Gbps range) but is also the most expensive.

220

A. The correct order for a T568B cable is white/orange, orange, white/green, blue, white/blue, green, white/brown, brown.

221

A. Cable television installations typically use either RG-6 or RG-59 cable. RG-6 is slightly thicker, can run longer distances, and supports digital signals. RG-59 is suited only for analog TV signals.

222

C. Server Message Block (SMB) is a protocol used to provide shared access to files, printers, and other network resources. It uses TCP ports 137–139 and 445.

223

A, C. Each IPv6 interface can and often does have multiple addresses assigned to it. IPv6 is backward compatible with IPv4.

224

B, C. A hub is a device used to link several computers together. Hubs are simple devices that possess no real intelligence, and they work at Layer 1 of the OSI model. Extenders simply allow a signal to propagate for a longer distance, and they also work at Layer 1. Switches are Layer 2 devices, and routers work at Layer 3.

225

D. RG-6 and RG-59 can, in many cases, be used interchangeably. RG-6 is a better choice because it supports digital signals and has a longer range (304 meters or 1,000 feet). RG-59 can run up to 228 meters (750 feet). Both have impedance of 75 ohms, and both use BNC connectors or F-connectors.

226

A, D. Multimode fiber and UTP CAT6 and newer support 10Gbps transmission speeds.

227

B. The Apple Filing Protocol (AFP) was developed by Apple as a file transfer protocol similar to FTP and Server Message Block (SMB). It was the default file transfer protocol on Mac OS until Apple changed to SMB2 in 2013.

228

B. 127.0.0.7 is the loopback address, used to ping the local network interface. The IPv6 equivalent is ::1.

229

B. Port triggering allows traffic to enter the network on a specific port after a computer makes an outbound request on that specific port. For example, if a computer on your internal network makes an outbound Telnet request (port 23), subsequent inbound traffic destined for the originating computer on port 23 would be allowed through.

230

D. If you need to trace a wire in a wall from one location to another, a tone generator and probe is the right tool to use. It consists of two pieces: a tone generator and a probe. To use it, attach one end to one end of the cable, such as the end at the computer. Then go to the patch panel with the other end of the probe to locate the cable. These are lifesavers when the cables are not properly labeled.

231

B. Dynamic Host Configuration Protocol (DHCP) dynamically assigns IP addresses and other IP configuration information to network clients.

232

D. Shielded twisted pair (STP) cabling has a foil shield surrounding the wire pairs to decrease electrical interference. Some STP cables also shield individual wire pairs. Unshielded twisted pair (UTP) does not have the shielding. Both types use RJ-45 connectors, can follow the T568A wiring standard, and can be produced as plenum-rated cable that does not produce poisonous gas when burned.

233

D. The connectors shown are ST connectors, which are used with fiber-optic cable. ST connectors are the most popular fiber connector, and they attach with a BNC-like locking mechanism.

234

B. Switches work at Layer 2 as do bridges, and they provide centralized connectivity just like hubs. Switches examine the Layer 2 header of the incoming packet and forward it properly to the right port and only that port. Switches are multiport bridges.

235

B. Email is pushed from clients to servers using the Simple Mail Transfer Protocol (SMTP). SMTP uses port 25.

236

C. Of the Wi-Fi standards, 802.11n has the longest range by default, at roughly 70 meters indoors and 250 meters outdoors. 802.11ac is newer and faster than 802.11n, but it transmits exclusively in the 5GHz range, which restricts its functional distance.

237

C. Multimeters are versatile electronic measuring tools. A multimeter can measure voltage, current, and resistance on a wire.

238

A. Simple Network Management Protocol (SNMP) gathers and manages network performance information. A management device called an SNMP server can be set up to collect data from these devices (called agents) and ensure that your network is operating properly.

239

C. One of the two most popular broadband choices for home use is Digital Subscriber Line (DSL). It utilizes existing phone lines and provides fairly reliable high-speed access. Most DSL subscriptions are asymmetrical, meaning they offer faster download speeds than upload speeds.

240

B. Wi-Fi Protected Access (WPA) was the first Wi-Fi encryption standard to implement the use of the Temporal Key Integrity Protocol (TKIP). Whereas WEP used a static 40- or 128-bit key, TKIP uses a 128-bit dynamic per-packet key. It generates a new key for each packet sent.

241

C. When setting up wireless access points, it’s good practice to have their ranges overlap to ensure there is no loss of communication when roaming in the network’s area. However, to avoid problems, it’s best to set up the access points with nonoverlapping channels.

242

A. Simple Mail Transfer Protocol (SMTP), Post Office Protocol 3 (POP3), and Internet Message Access Protocol (IMAP) are all email protocols. SMTP is for sending email. POP3 and IMAP are for downloading email.

243

A. Ethernet over power can make Ethernet connections by using electrical outlets. For it to work, both devices must be on the same electrical circuit.

244

B. The 802.11g standard has an indoor range of approximately 40 meters. At a minimum, you will need three access points. Depending on coverage and indoor interference, such as thick walls, you might need more, though.