Название: CompTIA Network+ Practice Tests
Автор: Craig Zacker
Издательство: John Wiley & Sons Limited
Жанр: Зарубежная компьютерная литература
isbn: 9781119807315
isbn:
106 Which of the following could be a valid MAC address for a network interface adapter?10.124.25.43FF:FF:FF:FF:FF:FF00:1A:6B:31:9A:4E03:AE:16:3H:5B:11fe80::89a5:9e4d:a9d0:9ed7
107 Which of the following protocols prevents network switching loops from occurring by shutting down redundant links until they are needed?RIPSTPVLANNATARP
108 Which of the following cable types can be used to connect an MDI port on a workstation to an Auto-MDI-X port on an Ethernet switch? (Choose all that apply.)A crossover twisted pair cableA straight-through twisted pair cableA coaxial cableA single-mode fiber optic cableA multimode fiber optic cable
109 Which of the following is a network layer protocol that uses ICMPv6 messages to locate routers, DNS servers, and other nodes on an IPv6 network?BGPNDPOSPFPoE
110 Which of the following is a protocol that identifies VLANs by inserting a 32-bit field in the Ethernet frame?IEEE 802.1PIEEE 802.1QIEEE 802.1XIEEE 802.1ABIEEE 802.1AX
111 Each of the following Carrier-Sense Multiple Access with Collision Detection (CSMA/CD) events occurs on an Ethernet network when two stations transmit simultaneously, although not in the order listed. Which of the following events occurs immediately after the collision?The two stations observe a random backoff interval.The two stations transmit a jam signal.The two stations stop transmitting.The two stations listen to see if the channel is idle.The two stations begin retransmitting their frames.
112 For the Carrier-Sense Multiple Access with Collision Detection (CSMA/CD) mechanism to function properly on an Ethernet network, host systems must be able to detect when a collision occurs, so they can react to it. Which of the following cabling errors can prevent the collision detection process from functioning properly?Excessively long cable segmentsIncorrect wiring pinoutsToo many systems on a single networkAn excessive number of collisions
113 When a packet collision between two systems occurs on an Ethernet network, Carrier-Sense Multiple Access with Collision Detection (CSMA/CD) causes the two systems to stop transmitting and generate a jam signal. After sending the jam signal, why do the two systems wait for a randomized backoff interval before retransmitting their packets?They need time to reassemble the packets.To prevent another collision from occurring.They need to rebuffer the packet.To recalculate the packets’ checksum values.
114 Which of the following devices is used to physically connect computers in the same VLAN?A bridgeA hubA switchA router
115 Which of the following statements is true about an Ethernet network that uses CSMA/CD?Collisions are a normal occurrence.Collisions never occur unless there is a network fault.Collisions cause data to be irretrievably lost.Collisions are the result of duplicate IP addresses.
116 Which of the following is an abnormal occurrence on an Ethernet network?Packet retransmissionsCollision detectionJam signalsLate collisions
117 VLANs create the administrative boundaries on a switched network that are otherwise provided by which of the following devices?HubsRoutersDomainsBridges
118 Which of the following statements about VLANs are true? (Choose all that apply.)All of the devices in a particular VLAN must be physically connected to the same switch.A VLAN creates a limited broadcast domain on a switched network.You must have VLANs on a switched network for communication between computers on different cable segments to occur.A router is required for communication between VLANs.
119 Which of the following elements can be used to identify the devices in a particular VLAN? (Choose all that apply.)Hardware addressesIP addressesDNS namesSwitch port numbers
120 Alice has a network that consists of three Virtual LANs (VLANs) defined on all of the network's switches. VLAN 10 is the Sales VLAN, VLAN 20 is the Marketing VLAN, and VLAN 30 is the Accounting VLAN. Users are reporting that they cannot communicate with anyone outside of their own VLANs. What is the problem, and what must Alice do?The problem is a faulty VLAN configuration on one of the switches. Alice needs to re-create the VLANs and configure each VLAN for routing.One of the VLANs is configured to filter all other VLAN traffic for security purposes. Alice needs to change the filter on this VLAN.VLANs are limited to data link layer communication only. To allow communication between VLANs, Alice must add a router or a layer 3 switch to the network and configure it to route traffic between the VLANs.The VLANs are using different data link layer protocols. VLANs must use the same data link layer protocol in order to communicate.
121 The jumbo frame capability is associated with which layer of the Open Systems Interconnection (OSI) model?ApplicationTransportNetworkData link
122 Which of the following technologies would you be less likely to find on the average home or small office network? (Choose all that apply.)NATDHCP10GBase-TVLAN
123 Which of the following modifications occur when you configure the native Virtual Local Area Network (VLAN) on your network switches to use 802.1q tagging? (Choose all that apply.)Double-tagged packets are prevented.BPDU guards are applied.Root guards are applied.Trunk traffic is routed, not switched.
124 Which of the following protocols is responsible for inserting the tags into frames that enable switches to forward them to the appropriate Virtual Local Area Network (VLAN)?IEEE 802.3xIEEE 802.1XIEEE 802.1qIEEE 802.11ac
125 Which of the following best explains how tagging the native Virtual Local Area Network (VLAN) traffic can improve in-band switch management security?By renaming the default VLANBy preventing double-tagged packetsBy encrypting in-band management trafficBy moving in-band management traffic off the native VLAN
126 A switch with auto-medium-dependent interface crossover (MDI-X) ports eliminates the need for which of the following?8P8C connectorsSwitch-to-switch connectionsStraight-through cablesCrossover cables
127 Which of the following cable types is needed to connect an MDI port on a workstation to an MDI-X port on an Ethernet switch?A crossover twisted pair cableA straight-through twisted pair cableA coaxial cableA single-mode fiber optic cableA multimode fiber optic cable
128 Port security on an Ethernet switch is implemented through the use of which of the following methods?Blacklisted MAC addressesWhitelisted MAC addressesPort-by-port MAC address filteringSpoofed MAC addresses
129 Which of the following best explains why networks using Voice over IP (VoIP) often have separate voice and data Virtual Local Area Networks (VLANs)?To prevent voice and data packet conflictsTo encrypt voice trafficTo encrypt data trafficTo prioritize voice traffic
130 Which of the following protocols uses a form of flow control called the sliding window technique?UDPHTTPTCPDNS
131 Which of the following Power over Ethernet (PoE) specifications supplies power to devices using the spare wire pair on a 10Base-T or 100Base-TX twisted pair network?Alternative AAlternative B4PPoEAll of the above
132 Which of the following best describes the process of whitelisting on a wireless network?Using an Access Control List (ACL) to specify the IP addresses that are permitted to access a wireless networkUsing port protection to specify the well-known port numbers of applications that users are permitted to run over a wireless networkUsing MAC filtering to create a list of devices that are permitted to access a wireless networkUsing an AAA server to create a list of users that are permitted to access a wireless network
133 Which of the following features helps to protect network switches from attacks related to СКАЧАТЬ