CompTIA A+ Practice Tests. Docter Quentin

Чтение книги онлайн.

Читать онлайн книгу CompTIA A+ Practice Tests - Docter Quentin страница 22

CompTIA A+ Practice Tests - Docter Quentin

Скачать книгу

A technician is configuring a wireless 802.11ac router for a home network. For security purposes, he enables the firewall. He wants to configure it so that if a computer makes an outbound request on a specific port, subsequent inbound traffic on that port would be allowed through the firewall. Which option does he need to configure to manage these settings?

      A. Port forwarding

      B. Port triggering

      C. NAT

      D. QoS

      230 You are asked to perform consulting work for a medium-sized company that is having network connectivity issues. When you examine the patch panel, you notice that none of the dozens of UTP cables are labeled. Which tool can you use to identify which cable goes to which workstation?

      A. Cable tester

      B. Loopback plug

      C. Punchdown tool

      D. Tone generator and probe

      231 Which TCP/IP protocol is responsible for dynamically assigning IP addresses to client computers?

      A. DNS

      B. DHCP

      C. RDP

      D. LDAP

      232 What characteristic differentiates STP from UTP?

      A. It uses RJ-45s connectors instead of RJ-45.

      B. It follows the T568A wiring standard.

      C. It does not produce poisonous gas when burned.

      D. It has a layer of foil shielding.

      233 You are investigating remnants of an old network setup in an unused building. At the end of a conduit, all you see are the connectors shown here. What type of cable do you expect these connectors to be attached to?

Photograph shows cord with two connectors and a cable wire at one end and fiber pin pointing at the other end, metal screws is in between them anchoring pin points and cable wires.

      A. Coaxial

      B. STP

      C. UTP

      D. Fiber-optic

      234 Which networking device works at Layer 2 of the OSI model, has multiple ports in which each is its own collision domain, and examines the header of the incoming packet to determine which port it gets sent to?

      A. Hub

      B. Switch

      C. Bridge

      D. Router

      235 Which TCP/IP port number will an email client use to push email to its email server?

      A. 23

      B. 25

      C. 110

      D. 143

      236 A technician is going to set up a Wi-Fi network using standard omnidirectional antennae. Because of the building configuration, transmitting signals for the greatest distance is his primary criterion. Which standard should he choose?

      A. 802.11a

      B. 802.11g

      C. 802.11n

      D. 802.11ac

      237 You are troubleshooting an intermittently failing CAT7 network connection. You suspect that there is a short in the connection. Which tool can you use to determine this?

      A. Tone generator and probe

      B. Loopback plug

      C. Multimeter

      D. Crimper

      238 Which TCP/IP protocol gathers and manages network performance information using devices called agents?

      A. SNMP

      B. SMTP

      C. LDAP

      D. SMB

      239 Which Internet connection type, popular for home use, offers asymmetrical download and upload speeds and is implemented over common phone lines?

      A. POTS

      B. Cable

      C. DSL

      D. ISDN

      240 Which Wi-Fi encryption standard was the first to include the use of a 128-bit dynamic per-packet encryption key?

      A. WEP

      B. WPA

      C. WPA2

      D. AES

      241 You are installing an 802.11n Wi-Fi network with five wireless access points. The access points are set up so their ranges overlap each other. To avoid communications issues, what principle should you follow when configuring them?

      A. Configure all access points to use the same channel.

      B. Configure all access points to use adjacent channels.

      C. Configure all access points to use non-overlapping channels.

      D. Channel configuration will not cause communications issues.

      242 Which TCP/IP protocol is designed to send email from clients to mail servers?

      A. SMTP

      B. POP3

      C. IMAP

      D. SMB

      243 You are setting up a small network in your neighbor’s house. She is concerned about wireless security, so she doesn’t want to use wireless networking at all. She needs to connect two computers to each other, but it will be impossible to run a network cable between them. Which technology can help her network these computers?

      A. Ethernet over Power

      B. Power over Ethernet

      C. Firewall

Скачать книгу


<p>230</p>

D. If you need to trace a wire in a wall from one location to another, a tone generator and probe is the right tool to use. It consists of two pieces: a tone generator and a probe. To use it, attach one end to one end of the cable, such as the end at the computer. Then go to the patch panel with the other end of the probe to locate the cable. These are lifesavers when the cables are not properly labeled.

<p>231</p>

B. Dynamic Host Configuration Protocol (DHCP) dynamically assigns IP addresses and other IP configuration information to network clients.

<p>232</p>

D. Shielded twisted pair (STP) cabling has a foil shield surrounding the wire pairs to decrease electrical interference. Some STP cables also shield individual wire pairs. Unshielded twisted pair (UTP) does not have the shielding. Both types use RJ-45 connectors, can follow the T568A wiring standard, and can be produced as plenum-rated cable that does not produce poisonous gas when burned.

<p>233</p>

D. The connectors shown are ST connectors, which are used with fiber-optic cable. ST connectors are the most popular fiber connector, and they attach with a BNC-like locking mechanism.

<p>234</p>

B. Switches work at Layer 2 as do bridges, and they provide centralized connectivity just like hubs. Switches examine the Layer 2 header of the incoming packet and forward it properly to the right port and only that port. Switches are multiport bridges.

<p>235</p>

B. Email is pushed from clients to servers using the Simple Mail Transfer Protocol (SMTP). SMTP uses port 25.

<p>236</p>

C. Of the Wi-Fi standards, 802.11n has the longest range by default, at roughly 70 meters indoors and 250 meters outdoors. 802.11ac is newer and faster than 802.11n, but it transmits exclusively in the 5GHz range, which restricts its functional distance.

<p>237</p>

C. Multimeters are versatile electronic measuring tools. A multimeter can measure voltage, current, and resistance on a wire.

<p>238</p>

A. Simple Network Management Protocol (SNMP) gathers and manages network performance information. A management device called an SNMP server can be set up to collect data from these devices (called agents) and ensure that your network is operating properly.

<p>239</p>

C. One of the two most popular broadband choices for home use is Digital Subscriber Line (DSL). It utilizes existing phone lines and provides fairly reliable high-speed access. Most DSL subscriptions are asymmetrical, meaning they offer faster download speeds than upload speeds.

<p>240</p>

B. Wi-Fi Protected Access (WPA) was the first Wi-Fi encryption standard to implement the use of the Temporal Key Integrity Protocol (TKIP). Whereas WEP used a static 40- or 128-bit key, TKIP uses a 128-bit dynamic per-packet key. It generates a new key for each packet sent.

<p>241</p>

C. When setting up wireless access points, it’s good practice to have their ranges overlap to ensure there is no loss of communication when roaming in the network’s area. However, to avoid problems, it’s best to set up the access points with nonoverlapping channels.

<p>242</p>

A. Simple Mail Transfer Protocol (SMTP), Post Office Protocol 3 (POP3), and Internet Message Access Protocol (IMAP) are all email protocols. SMTP is for sending email. POP3 and IMAP are for downloading email.

<p>243</p>

A. Ethernet over power can make Ethernet connections by using electrical outlets. For it to work, both devices must be on the same electrical circuit.