CompTIA A+ Practice Tests. Docter Quentin
Чтение книги онлайн.
Читать онлайн книгу CompTIA A+ Practice Tests - Docter Quentin страница 19
D. It masks external networks from the host.
182 Which of the following TCP/IP protocols is connection oriented and attempts to guarantee packet delivery?
A. IP
B. TCP
C. UDP
D. ICMP
183 Which TCP/IP protocol allows a user to log into a remote computer and manage files as if they were logged in locally?
A. FTP
B. SFTP
C. SMB
D. Telnet
184 You are given a network configuration of 155.100.63.0/26 from your ISP. When you configure your network hosts, what subnet mask should you assign them?
A. 255.255.0.0
B. 255.255.255.0
C. 255.255.255.192
D. 255.255.255.240
185 Which Wi-Fi standard specifies a maximum of 54Mbps transmissions in the 2.4GHz frequency range?
A. 802.11a
B. 802.11b
C. 802.11g
D. 802.11n
186 Which TCP/IP protocol is used to provide shared access to files and printers on the network?
A. FTP
B. SSH
C. SMB
D. SNMP
187 What port number does the Telnet protocol use?
A. 21
B. 22
C. 23
D. 25
188 You have just installed a wireless 802.11ac network for a client. The IT manager is concerned about competitors intercepting the wireless signal from outside the building. Which tool is designed to test how far your wireless signal travels?
A. Tone generator and probe
B. Protocol analyzer
C. Packet sniffer
D. Wi-Fi analyzer
189 Some of your network users are concerned about submitting confidential information to an online website. What should you tell them?
A. It’s fine, because all Internet traffic is encrypted.
B. If the website address starts with TLS://, it should be OK to submit confidential information to a trusted site.
C. If the website address starts with HTTPS://, it should be OK to submit confidential information to a trusted site.
D. Don’t ever submit confidential information to any online website.
190 Which TCP/IP Internet layer protocol is responsible for delivering error messages if communication between two computers fails?
A. ICMP
B. IP
C. TCP
D. UDP
191 Which type of IPv6 address identifies a single node on the network?
A. Multicast
B. Anycast
C. Unicast
D. Localcast
192 You are configuring a wireless 802.11n router for a small network. When setting it up, which security option should you choose?
A. WPA2
B. WPA
C. WEP
D. SSID
193 What type of network covers large geographical areas and often supports thousands of users?
A. LAN
B. WAN
C. PAN
D. MAN
194 Which TCP/IP protocol, developed by Microsoft, allows users to connect to remote computers and run programs on them?
A. RDP
B. SMB
C. CIFS
D. Telnet
195 What port number does the SSH protocol use?
A. 21
B. 22
C. 23
D. 25
196 Which of the following IP addresses is not routable on the Internet?
A. 10.1.1.1
B. 11.1.1.1
C. 12.1.1.1
D. 13.1.1.1
197 Which network connectivity device does not forward broadcast messages, thereby creating multiple broadcast domains?
A. Hub
B. Switch
C. Bridge
D. Router
198 You have a desktop computer that is behaving erratically on the network. The wired connection will often disconnect without warning. Which tool should you use to troubleshoot the network adapter?
A. Multimeter
182
B. Transmission Control Protocol (TCP) guarantees packet delivery through the use of a virtual circuit and data acknowledgments, and User Datagram Protocol (UDP) does not. Because of this, TCP is often referred to as connection oriented, whereas UDP is connectionless.
183
D. Telnet lets users log into another machine and “see” the remote computer in a window on their screen. Although this vision is text only, the user can manage files on that remote machine just as if they were logged in locally.
184
C. A CIDR shorthand notation of /26 corresponds to the subnet mask 255.255.255.192.
185
C. 802.11g specifies a maximum of 54Mbps transmissions in the 2.4GHz frequency range.
186
C. Server Message Block (SMB) is a protocol used to provide shared access to files, printers, and other network resources. In a way, it functions a bit like FTP only with a few more options, such as the ability to connect to printers, and more management commands.
187
C. Telnet lets users log into another machine and “see” the remote computer in a window on their screen. Although this vision is text only, the user can manage files on that remote machine just as if they were logged in locally. Telnet uses port 23.
188
D. A wireless locator or a Wi-Fi analyzer can be either a handheld hardware device or specialized software that is installed on a laptop and whose purpose is to detect and analyze Wi-Fi signals. It can detect where signals are strong or weak to determine whether there are potential security issues.
189
C. Internet traffic is not encrypted by default. Websites that are secure and encrypt their transmissions will start with HTTPS://rather than HTTP://. These sites can be trusted to encrypt the data, and their identity is verified.
190
A. The main Internet layer protocol is Internet Protocol (IP), and it’s the workhorse of TCP/IP. Another key protocol at this layer is Internet Control Message Protocol (ICMP), which is responsible for delivering error messages. If you’re familiar with the ping utility, you’ll know that it utilizes ICMP to send and receive packets.
191
C. There are three types of addresses in IPv6: unicast, anycast, and multicast. A unicast address identifies a single node on the network. An anycast address refers to one that has been assigned to multiple nodes. A multicast address is one used by multiple hosts.
192
A. Of the wireless encryption methods listed, WPA2 is the newest and most secure. Some routers offer WPA2 Enterprise, which is a great choice as well.
193
B. A wide area network (WAN) covers large geographical areas and often supports thousands of users.
194
A. Developed by Microsoft, the Remote Desktop Protocol (RDP) allows users to connect to remote computers and run programs on them. When you use RDP, you see the desktop of the computer you’ve signed into on your screen. It’s like you’re really there, even though you’re not.
195
B. Secure Shell (SSH) can be used to set up a secure Telnet session for remote logins or for remotely executing programs and transferring files. SSH uses port 22.
196
A. Private IP addresses are not routable on the Internet. The private IP address range for class A networks is 10.0.0.0/8.
197
D. One of the key features of routers is that they break up broadcast domains. Broadcast traffic on one side of the router will not get passed to the other side, which greatly reduces network traffic.
198
C. A loopback plug is for testing the ability of a network adapter to send and receive. The plug gets plugged into the NIC, and then a loopback test is performed using troubleshooting software. You can then tell whether the card is working properly.