CompTIA Network+ Practice Tests. Craig Zacker

Чтение книги онлайн.

Читать онлайн книгу CompTIA Network+ Practice Tests - Craig Zacker страница 20

CompTIA Network+ Practice Tests - Craig Zacker

Скачать книгу

read the IP addresses of packets, not the hardware addresses.

      47 Which of the following is a correct definition of a collision domain?A group of Local Area Networks (LANs), connected by routers, that enables any node to transmit to any other nodeA group of computers connected so that a broadcast transmission by any one device reaches all of the other devicesA group of devices connected by cable segments that are longer than the maximum length stated in the physical layer specificationA group of devices connected so that when two devices transmit at exactly the same time, a data collision occurs

      48 Which of the following terms are used to describe the device used to place calls on a Voice over Internet Protocol (VoIP) installation? (Choose all that apply.)TerminalGatewayEndpointPBX

      49 Which of the following statements about hubs is not true?Hubs are data link layer devices that connect network devices in a star or ring topology.Hubs amplify and repeat signals received through one port out all other ports regardless of the destination.Hubs are physical layer devices that connect network devices in a star topology.Hubs provide internal crossover circuits and use uplink ports to form a hierarchical star.

      50 Which of the following statements about routers are true? (Choose all that apply.)Routers are network layer devices that use IP addresses to forward frames.Routers are data link layer devices that use Media Access Control (MAC) addresses to forward frames.Routers build their internal tables based on destination MAC addresses and forward frames based on source MAC addresses.Routers must support the network layer protocol implemented on the Local Area Network (LAN).Each port on a router defines a separate broadcast domain.

      51 Which of the following hub types are supported by the 100Base-TX physical layer specification? (Choose all that apply.)Class IClass IIClass IIIClass IV

      52 Which of the following statements about routers is not true?Routers can connect two or more networks with dissimilar data link layer protocols and media.Routers can connect two or more networks with the same data link layer protocols and media.Routers store and maintain route information in a local text file.Servers with multiple network interfaces can be configured to function as software routers.Routers can learn and populate their routing tables through static and dynamic routing.

      53 The network administrator for a small business is installing a computer to function as a firewall protecting their internetwork from Internet intrusion. At which of the following locations should the administrator install the firewall system?Anywhere on the private internetwork, as long as the Internet is accessibleBetween the Internet access router and the Internet Service Provider's (ISP's) networkAt the ISP's network siteBetween the Internet access router and the rest of the private internetwork

      54 What must you do to configure a firewall to admit File Transfer Protocol (FTP) traffic to the internal network using its default port settings? (Choose all that apply.)Open port 20Open port 21Open port 22Open port 23Open port 24

      55 Proxy servers operate at which layer of the OSI reference model?Data linkNetworkTransportApplication

      56 Which of the following is a feature that is not found in a traditional firewall product, but which might be found in a Next-Generation Firewall (NGFW)?Stateful packet inspectionDeep Packet Inspection (DPI)Network Address Translation (NAT)Virtual Private Network (VPN) support

      57 Which of the following statements about content filtering in firewalls is true?Content filters examine the source IP addresses of packets to locate potential threats.Content filters enable switches to direct packets out through the correct port.Content filters examine the data carried within packets for potentially objectionable materials.Content filters use frequently updated signatures to locate packets containing malware.

      58 Which of the following is not one of the criteria typically used by load balancers to direct incoming traffic to one of a group of servers?Which server has the lightest loadWhich server has the fastest response timeWhich server is next in an even rotationWhich server has the fastest processor

      59 Which of the following devices enables you to use a standard analog telephone to place calls using the Internet instead of the Public Switched Telephone Network (PSTN)?Proxy serverVPN headendVoIP gatewayUTM appliance

      60 Which of the following devices enable users on private networks to access the Internet by substituting a registered IP address for their private addresses? (Choose all that apply.)NAT routerRADIUS serverProxy serverUTM appliance

      61 HVAC systems can use the Internet of Things (IoT) to monitor which of the following? (Choose all that apply.)TemperaturePressureHumidityPrintersOccupancyCamerasDoor locks

      62 A VPN headend is an advanced type of which of the following devices?SwitchRouterGatewayBridge

      63 Which of the following technologies is typically associated with virtual PBX services?Quality of Service (QoS)Voice over IPCARPRound-robin DNS

      64 Ralph, the administrator of a 500-node private internetwork, is devising a plan to connect the network to the Internet. The primary objective of the project is to provide all of the network users with access to web and email services while keeping the client computers safe from unauthorized users on the Internet. The secondary objectives of the project are to avoid having to manually configure IP addresses on each one of the client computers individually and to provide a means of monitoring and regulating the users’ access to the Internet. Ralph submits a proposal calling for the use of private IP addresses on the client computers and a series of proxy servers with public, registered IP addresses, connected to the Internet using multiple T-1 lines. Which of the following statements about Ralph's proposed Internet access solution is true?The proposal fails to satisfy both the primary and secondary objectives.The proposal satisfies the primary objective but neither of the secondary objectives.The proposal satisfies the primary objective and one of the secondary objectives.The proposal satisfies the primary objective and both of the secondary objectives.

      65 Which of the following protocols can be used by wireless controllers to communicate with the Access Points (APs) on a Wireless Local Area Network (WLAN)? Choose all that apply.CAPWAPLWAPPLDAPPPTP

      66 Which of the following devices enables administrators of enterprise wireless networks to manage multiple Access Points (APs) from a central location?HypervisorWireless controllerWireless endpointDemarcation point

      67 Which of the following devices can administrators use to create multiple Virtual Local Area Networks (VLANs) and forward traffic between them?Multilayer switchVirtual routerLoad balancerBroadband router

      68 Which of the following is not a mechanism for distributing incoming network traffic among multiple servers?Load balancerRound-robin DNSNLB clusterVPN headend

      69 A load balancer is a type of which of the following devices?SwitchRouterGatewayFirewall

      70 Which of the following devices expands on the capabilities of the traditional firewall by adding features like Deep Packet Inspection (DPI) and an Intrusion Prevention System (IPS)?RADIUS serverCSU/DSUNGFWProxy server

      71 Which of the following is a device that switches calls between endpoints on the local IP network and provides access to external Internet lines?VoIP PBXVoIP gatewayVoIP endpointMultilayer switch

      72 Which of the following statements about Internet access through a proxy server accounts for the security against outside intrusion that a proxy provides?The proxy server uses a public IP address, and the client computers use private addresses.The proxy server uses a private IP address, and the client computers use public addresses.Both the proxy server and the client computers use private IP addresses.Both the proxy server and the client computers use public IP addresses.

      73 Which of the following statements about proxy servers and NAT servers are true? (Choose

Скачать книгу