CompTIA A+ Practice Tests. Docter Quentin
Чтение книги онлайн.
Читать онлайн книгу CompTIA A+ Practice Tests - Docter Quentin страница 18
■ UPnP
✔ 2.7 Compare and contrast Internet connection types, network types and their features.
■ Internet connection types
■ Cable
■ DSL
■ Dial-up
■ Fiber
■ Satellite
■ ISDN
■ Cellular
■ Tethering
■ Mobile hotspot
■ Line-of-sight wireless internet service
■ Network Types
■ LAN
■ WAN
■ PAN
■ MAN
✔ 2.8 Compare and contrast network architecture devices, their functions and features.
■ Hub
■ Switch
■ Router
■ Access point
■ Bridge
■ Modem
■ Firewall
■ Patch panel
■ Repeaters/extenders
■ Ethernet over Power
■ Power over Ethernet injector
✔ 2.9 Given a scenario, use appropriate networking tools.
■ Crimper
■ Cable stripper
■ Multimeter
■ Tone generator and probe
■ Cable tester
■ Loopback plug
■ Punchdown tool
■ WiFi analyzer
172 Which of the following network devices receives network traffic and makes a decision on whether to send it on based on the destination hardware address?
A. Hub
B. Bridge
C. Access point
D. Repeater
173 A technician installed a UTP splitter on one of your network segments that has CAT6e cable. What is the maximum speed supported by this connection?
A. 10Mbps
B. 100Mbps
C. 1Gbps
D. 10Gbps
174 You are installing a fiber-optic cable between two buildings. To install the cable, you must run it through a conduit between the buildings, and access to the conduit is not easy. Before you run the cable, you want to ensure it’s working properly. Which tool should you use?
A. Cable tester
B. Multimeter
C. Loopback plug
D. Tone generator and probe
175 Which TCP/IP protocol, designed to download email, allows for multiple clients to be simultaneously connected to the same mailbox?
A. SMTP
B. POP3
C. IMAP
D. SMB
176 You are using your laptop on the company network. In your web browser, you type in www.google.com and press Enter. The computer will not find Google. You open the browser on your phone, and using your cellular connection, you can open Google without a problem. Your laptop finds internal servers and can print without any issues. What is the most likely reason you can’t open Google?
A. DNS server problem
B. DHCP server problem
C. Missing subnet mask
D. Duplicate IP address
177 A technician needs to run a network cable to a remote building, which is approximately 15 kilometers from his base station. He’s not sure if any cable will span that distance. What is the maximum distance of SMF cable?
A. 300 meters
B. 550 meters
C. 40 kilometers
D. 100 kilometers
178 You have been asked to install a run of RG-59 cable from one end of a building to the other. What is the maximum distance for this type of cable run?
A. 100 meters (328 feet)
B. 228 meters (750 feet)
C. 304 meters (1,000 feet)
D. 500 meters (1,645 feet)
179 Which one of the following TCP/IP protocols was designed as a replacement for Telnet?
A. SMB
B. SSH
C. SFTP
D. FTPS
180 Which of the following network connectivity devices operate at Layer 2 of the OSI model? (Choose two.)
A. Hub
B. Switch
C. Bridge
D. Router
181 In IPv4, what is the function of the subnet mask?
A. It tells hosts where to route packets.
B. It differentiates between the network ID and
172
B. Because bridges work at the Data Link layer, they are aware of only hardware (MAC) addresses. They are not aware of and do not deal with IP addresses. Bridges are more intelligent than repeaters, but they are unable to move data across multiple networks simultaneously.
173
B. An Ethernet splitter will take the incoming signal on two pairs and then split it, so on the output end it produces two sets of signals using two pairs each. Because of this, Ethernet splitters are limited to 100Mbps connections. It is not recommended that you use Ethernet splitters on a network. If you need to connect multiple computers using UTP, use a hub or a switch.
174
A. Cable testers are indispensable tools for any network technician. Usually you would use a cable tester before you install a cable to make sure it works. Of course, you can test them after they’ve been run as well.
175
C. Internet Message Access Protocol (IMAP) is a secure protocol designed to download email. It has several advantages over the older Post Office Protocol 3 (POP3). First, IMAP4 works in connected and disconnected modes. Second, it lets you store the email on the server, as opposed to POP3, which requires you to download it. Third, IMAP4 allows multiple clients to be simultaneously connected to the same inbox.
176
A. The Domain Name System (DNS) server is responsible for resolving host names, such as www.google.com, to IP addresses to enable communication. If it’s not working properly or you can’t connect to it, you won’t be able to browse the Internet using friendly website names.
178
B. RG-59 network cable can run for about 228 meters (750 feet). The slightly thicker RG-6 can run for about 304 meters (1,000 feet).
179
B. Secure Shell (SSH) can be used to set up a secure Telnet session for remote logins or for remotely executing programs and transferring files. Because it’s secure, it was originally designed to be a replacement for the unsecure telnet command.
180
B, C. Switches and bridges work at Layer 2. Switches are multiport bridges.
181
B. Computers are able to differentiate where the network ID ends and the host address begins through the use of a subnet mask.