CompTIA Network+ Practice Tests. Craig Zacker

Чтение книги онлайн.

Читать онлайн книгу CompTIA Network+ Practice Tests - Craig Zacker страница 14

CompTIA Network+ Practice Tests - Craig Zacker

Скачать книгу

AClass BClass CClass DClass E

      174 Which of the following is an address that you can assign to a host on a private IPv4 network?192.167.9.46172.16.255.25510.1.0.253225.87.34.1

      175 Which of the following is the correct subnet mask for an IPv4 network with the address 172.16.0.0/20?255.255.224.0255.255.240.0255.255.248.0255.255.255.224255.255.255.240

      176 Ed has been assigned the IPv4 network address 192.168.2.32/28 for the computers in his department. Which of the following ranges of addresses can Ed use to configure the TCP/IP clients on his computers?192.168.2.32 to 192.168.2.55192.168.2.33 to 192.168.2.46192.168.2.33 to 192.168.2.40192.168.2.1 to 192.168.2.254

      177 Which of the following IPv4 addresses is available for use on a network device?1.0.0.1127.98.127.0234.9.76.32240.65.8.124

      178 Which of the following IPv6 address types is the functional equivalent of an IPv4 APIPA address?Link localGlobal unicastSite localAnycast

      179 When two workstations access the Internet using the same Port Address Translation (PAT) router, which of the following does the router assign to each workstation? (Choose all that apply.)A unique port numberA common public IPv4 addressA common port numberA unique public IPv4 address

      180 Which of the following is the IPv6 equivalent of Automatic Private IP Addressing (APIPA)?EUI-64SLAACAPIPAv6DHCPv6

      181 Which of the following are mechanisms by which IPv6 traffic can be transmitted on an IPv4 network through the use of tunneling? (Choose all that apply.)TeredoIPsecICMPv66to4

      182 Which of the following best describes why IPv6 hosts exchange ICMPv6 Router Solicitation and Router Advertisement messages with routers?To obtain the prefix needed to generate a link-local addressTo learn the IPv6 address of the nearest routerTo perform address conflict detection for its link-local addressTo encapsulate IPv4 packets and transmit them over the router

      183 Which of the following are examples of Virtual IP (VIP) addresses? (Select all that apply.)An IP address assigned to a host workstation by a DHCP serverA public IP address substituted for a host's own private IP address by a NAT routerAn IP address assigned to a host workstation by APIPAAn IP address assigned to a virtual NIC

      184 Which of the following is the best definition of a subinterface?A logical network interface created from a physical network interfaceOne of the ports on a physical network interface adapter with multiple portsA physical network interface connected to a subnetOne of the IP addresses associated with a network interface that has multiple IP addresses

      185 Which of the following pairs of well-known ports are the default values you would use to configure a POP3 email client?110 and 25143 and 25110 and 14380 and 11025 and 80

      186 Which of the following server applications use two well-known port numbers during a typical transaction?NTPSNMPHTTPFTP

      187 Which of the following protocols does the Ping utility use to exchange messages with another system?UDPTCPICMPIGMP

      188 Which of the following components does the port number in a transport layer protocol header identify?A transport layer protocolAn applicationA gatewayA proxy server

      189 Which of the following organizations is responsible for assigning the well-known port numbers used in transport layer protocol headers?Institute for Electronic and Electrical Engineers (IEEE)Internet Assigned Numbers Authority (IANA)Internet Engineering Task Force (IETF)International Organization for Standardization (ISO)

      190 Which of the following is the default well-known port number for the Hypertext Transfer Protocol (HTTP) used for web client/server communications?222080443

      191 The secured version of the Hypertext Transfer Protocol (HTTPS) uses a different well-known port from the unsecured version. Which of the following ports is used by HTTPS by default?2580110443

      192 What field in the Transmission Control Protocol (TCP) Option subheader specifies the size of the largest segment a system can receive?MSSWindowMMSWinMS

      193 What is the term for the combination of an IPv4 address and a port number, as in the following example: 192.168.1.3:23?SocketOUIWell-known portNetwork addressDomain

      194 Which of the following protocols generate messages that are carried directly within Internet Protocol (IPv4) datagrams, with no intervening transport layer protocol? (Choose all that apply.)ICMPIGMPSMTPSNMP

      195 Which of the following protocols is used to exchange directory service information?RDPLDAPSNMPSMB

      196 Ralph is configuring a new email client on a workstation to use the Simple Mail Transfer Protocol (SMTP) and Post Office Protocol (POP3) email protocols. He wants both protocols to use encryption when communicating with the email server. Which of the following port numbers should Ralph use to secure the SMTP connection with Transport Layer Security (TLS) and the POP3 connection with Secure Sockets Layer (SSL) encryption? (Choose all that apply.)11025587993995

      197 Which of the following is not a port number used for Structured Query Language (SQL) communications?1433152133063389

      198 Which of the following port numbers is assigned to a Unix logging services program?389514636993

      199 Which of the following is the primary application layer protocol used by web browsers to communicate with web servers?HTTPHTMLSMTPFTP

      200 Which of the following protocols appears on the network as a service that client computers use to resolve names into IP addresses?DHCPBOOTPDNSSNMP

      201 Which of the following protocols use(s) the term datagram to describe the data transfer unit it creates? (Choose all that apply.)EthernetIPTCPUDP

      202 What is the native file sharing protocol used on all Microsoft Windows operating systems?Hypertext Transfer Protocol (HTTP)Network File System (NFS)File Transfer Protocol (FTP)Server Message Block (SMB)Lightweight Directory Access Protocol (LDAP)

      203 When analyzing captured TCP/IP packets, which of the following control bits must you look for in the Transmission Control Protocol (TCP) header to determine whether the receiving host has successfully received the sending host's data?ACKFINPSHSYNURG

      204 Which of the following terms describes the Transmission Control Protocol (TCP) exchange that establishes a connection prior to the transmission of any data?SynchronizationInitialization exchangeConnection establishmentThree-way handshake

      205 Alice has been instructed to install 100 Windows workstations, and she is working on automating the process by configuring the workstations to use PXE boots. Each workstation therefore must obtain an IP address from a DHCP server and download a boot image file from a TFTP server. Which of the following well-known ports must Alice open on the firewall separating the workstations from the servers? (Choose all that apply.)6566676869

      206 Which of the following explanations best describes the function of a Transmission Control Protocol (TCP) or User Datagram Protocol (UDP) port number?The port number indicates to the receiver that the sender can activate a specific port only.The port number is used by both the sender and the receiver to identify the application that generated the information in the datagram.The port number is used only by the receiver, to indicate the application process running on the sender.The port number is used by both the sender and the receiver to negotiate a well-known server port for the communicating processes.

      207 What is the valid range of numbers for the ephemeral client ports used by the Transmission Control Protocol (TCP) and User Datagram Protocol (UDP)?1023 through 655341 through 102449152 through 655351024 to 49151

      208 Which

Скачать книгу