CompTIA Network+ Practice Tests. Craig Zacker
Чтение книги онлайн.
Читать онлайн книгу CompTIA Network+ Practice Tests - Craig Zacker страница 15
209 Which of the following port values are used by the File Transfer Protocol (FTP)? (Choose all that apply.)2123205369
210 Which of the following protocols provides connectionless delivery service at the transport layer of the Open Systems Interconnection (OSI) model?TCPHTTPUDPARP
211 What is the valid range of numbers for the well-known Transmission Control Protocol (TCP) and User Datagram Protocol (UDP) ports used by servers?1024 through 491511 through 4915149152 through 655341 through 1023
212 Ralph is a network administrator who has just installed a new open-source email server for the users at his company. The server is configured to send and receive Internet email and create a mailbox for each user that will permanently store the user's mail on the server. Ralph next uses a protocol analyzer to examine the network traffic resulting from the new server installation. Which of the following new protocols should Ralph expect to see in his network traffic analysis? (Choose all that apply.)SNMPSMTPPOP3IMAPRIP
213 Which of the following values could a web client use as an ephemeral port number when communicating with a web server?123801024199950134
214 Which of the following protocols provides connection-oriented service with guaranteed delivery at the transport layer of the OSI model?TCPHTTPUDPIP
215 Which of the following protocols is limited to use on the local subnet only?Address Resolution Protocol (ARP)Dynamic Host Configuration Protocol (DHCP)Domain Name System (DNS)Simple Mail Transfer Protocol (SMTP)
216 Which of the following prefixes must you use in the URL you type into a web browser when the website you want to access has been secured with Transport Layer Security (TLS)?TLS://HTTPS://HTTP://HTLS://
217 What is the difference when you specify the HTTPS:// prefix in a Uniform Resource Locator (URL) instead of HTTP://? (Choose all that apply.)The connection between the web browser and the server is encrypted.The browser uses a different port number to connect to the server.The connection uses SSL or TLS instead of HTTP.The browser uses a different IP address to connect to the server.
218 You are a consultant installing a web server application for a client called Adatum. The domain name Adatum.com has been registered in the DNS, and the server has one public IP address, so the new website will be accessible to users on the Internet. You want to be able to access the web server application's administrative site from your remote office, so you configure that site to be encrypted and to use the port number 12354 instead of the default. Which of the following URLs will you have to use to access the administrative website?http://www.adatum.comhttp://www.adatum.com:12354https://www.adatum.com:80https://www.adatum.com:12354
219 Which of the following protocols does IPsec use to digitally encrypt packets before transmitting them over the network?ESPSSLAHMSCHAP
220 Which of the following are the protocols that IPsec uses to secure network traffic? (Choose all that apply.)SSHAHESPSSL
221 What is the primary shortcoming of the File Transfer Protocol (FTP) that is addressed by FTPS and SFTP?Lack of securitySlow file transfersFile size limitationsLack of authentication
222 Which of the following File Transfer Protocol (FTP) variants transmit authentication passwords over the network in clear text?FTPFTPSSFTPTFTP
223 Which of the following File Transfer Protocol (FTP) variants is typically used to download boot image files during Preboot Execution Environment (PXE) startup sequences?FTPFTPSSFTPTFTP
224 Which of the following protocols does IPsec use to digitally sign packets before transmitting them over the network?ESPSSLAHMSCHAP
225 Which of the following security protocols used to protect traffic exchanged by web browsers and servers was created first?SSLTLSSSHDTLS
226 Which of the following security protocols for web servers or browsers was deprecated in 2015 in favor of Transport Layer Security (TLS) and Datagram Transport Layer Security (DTLS)?SSHSSLRDPIPsec
227 In which of the following DNS transactions does the querying system generate a recursive query? (Choose all that apply.)A DNS client sends the server name www.adatum.com from a URL to its designated DNS server for resolution.A client's DNS server sends a request to a root domain server to find the authoritative server for the com top-level domain.A client's DNS server sends a request to the com top-level domain server to find the authoritative server for the adatum.com domain.A client's DNS server, which has been configured to function as a forwarder, sends the server name www.adatum.com from a URL to its ISP's DNS server for resolution.A client's DNS server sends a request to the adatum.com domain server to find the IP address associated with the server name www.
228 Which of the following devices would you most likely configure to function as a Dynamic Host Configuration Protocol (DHCP) server?A wireless routerAn unmanaged switchA hubA bridge
229 Which of the following protocols are responsible for assigning IP addresses to hosts? (Choose all that apply.)Dynamic Host Configuration Protocol (DHCP)Address Resolution Protocol (ARP)Domain Name System (DNS)File Transfer Protocol (FTP)Bootstrap Protocol (BOOTP)
230 Which of the following Domain Name System (DNS) resource records is used only for reverse name resolution?MXAAAACNAMEPTR
231 Which of the following features is supported by DHCP, but not by BOOTP and RARP?Dynamic address allocationRelay agentsManual address allocationAutomatic address allocation
232 Which of the following message types are exchanged by Dynamic Host Configuration Protocol (DHCP) clients and servers during a successful IP address allocation transaction? (Choose all that apply.)DHCPDISCOVERDHCPOFFERDHCPINFORMDHCPACKDHCPREQUESTDHCPNAKDHCPRENEWDHCPRELEASE
233 Which of the following message types are exchanged by Dynamic Host Configuration Protocol (DHCP) clients and servers during a successful IP address lease renewal transaction? (Choose all that apply.)DHCPDISCOVERDHCPOFFERDHCPINFORMDHCPACKDHCPREQUESTDHCPNAKDHCPRENEWDHCPRELEASE
234 Which of the following is not a protocol used to allocate IP address assignments to clients on a network?ARPRARPBOOTPDHCP
235 Which of the following best describes what happens when a DNS server receives an iterative name resolution query?The DNS server responds immediately to the query with the best information it has in its resource records or in its cache, or failing that, with an error message stating that it could not resolve the requested name.The DNS server attempts to resolve the requested name by checking its own resource records and cache, or failing that, by issuing its own iterative queries to other DNS servers.The DNS server attempts to resolve the requested name by checking its own resource records and cache, or failing that, by forwarding the name resolution request to another DNS server in a recursive query.The DNS server responds immediately if it is the authoritative server for the domain in which the requested name is located. Otherwise, it returns an error message stating that it could not resolve the requested name.
236 What