Название: CompTIA A+ Practice Tests
Автор: Docter Quentin
Издательство: John Wiley & Sons Limited
Жанр: Зарубежная образовательная литература
isbn: 9781119372677
isbn:
C. Loopback plug
D. Cable tester
199 Your company just expanded and is leasing additional space in an adjacent office building. You need to extend the network to the new building. Fortunately, there is a conduit between the two. You estimate that the cable you need to run will be about 300 meters long. What type of cable should you use?
A. CAT5
B. CAT5e
C. CAT7
D. MMF
200 You want to ensure that client computers can download email from external email servers, regardless of the protocol their email client uses. Which ports do you open on the firewall to enable this? (Choose two.)
A. 23
B. 25
C. 110
D. 143
201 You are installing network cabling in a highly secure facility. The cables need to be immune to electronic eavesdropping. What type of cable should you use?
A. Fiber-optic
B. UTP
C. STP
D. Coaxial
202 Which networking device is capable of reading IP addresses and forwarding packets based on the destination IP address?
A. Hub
B. Switch
C. Bridge
D. Router
203 Which network device is designed to be a security guard, blocking malicious data from entering your network?
A. PoE injector
B. Bridge
C. Firewall
D. Router
204 You are manually configuring TCP/IP hosts on the network. What configuration parameter specifies the address of the router that enables Internet access?
A. Subnet mask
B. DHCP server
C. DNS server
D. Default gateway
205 A senior administrator calls you and tells you that she is working from home and trying to use RDP, but it won’t let her. What port do you need to ensure is open on the firewall to grant her access?
A. 143
B. 443
C. 548
D. 3389
206 Identify the cable connector in the picture.
A. F-connector
B. BNC
C. SC
D. ST
207 What type of network is most commonly associated with Bluetooth devices and covers a small area?
A. LAN
B. WAN
C. PAN
D. MAN
208 Identify the type of cable connectors shown here.
A. F-connector
B. BNC
C. SC
D. ST
209 Which TCP/IP Internet layer protocol is responsible for resolving physical MAC addresses to logical IP addresses?
A. IP
B. ICMP
C. ARP
D. RARP
210 Which of the following IPv6 addresses is equivalent to an address in the 169.254.0.0/16 range in IPv4?
A. 2000::/3
B. FC00::/7
C. FE80::/10
D. FF00::/8
211 Identify the connectors shown here, from left to right.
A. ST and SC
B. SC and ST
C. RJ-45 and RJ-11
D. RJ-11 and RJ-45
212 You need to configure a wireless router for an office network. The office manager wants new devices to be able to automatically join the network and announce their presence to other networked devices. Which service should you enable to allow this?
A. DHCP
B. NAT
C. QoS
D. UPnP
213 You are troubleshooting a computer with an IPv6 address that is in the FE80::/10 range. Which of the following statements are true? (Choose two.)
A. The computer will not be able to get on the Internet.
B. The computer will be able to get on the Internet.
C. The computer СКАЧАТЬ
199
D. UTP cables are limited to 100 meters, so CAT5 and CAT7 will not work. You need fiber, and multimode fiber (MMF) can span distances of 300 meters.
200
C, D. Simple Mail Transfer Protocol (SMTP, port 25), Post Office Protocol 3 (POP3, port 110), and Internet Message Access Protocol (IMAP, port 143) are all email protocols. SMTP is for sending email. POP3 and IMAP are for downloading email.
201
A. Fiber-optic cabling uses pulses of light instead of electric voltages to transmit data, so it is immune to electrical interference and to wiretapping.
202
D. Routers operate at the Network layer (Layer 3) of the OSI model. Because of this, they make their decisions on what to do with traffic based on logical addresses, such as an IP address.
203
C. A firewall is a hardware or software solution that serves as your network’s security guard. Firewalls can protect you in two ways: they protect your network resources from hackers lurking in the dark corners of the Internet, and they can simultaneously prevent computers on your network from accessing undesirable content on the Internet.
204
D. The default gateway is the address to the network’s router, which will allow the host to communicate with hosts not on the local network.
205
D. The Remote Desktop Protocol (RDP) allows users to connect to remote computers and run programs on them. It uses port 3389.
206
A. F-connectors are threaded and screw into place. The BNC connector locks by twisting one-quarter turn. SC and ST connectors are for fiber-optic cable.
207
C. A personal area network (PAN) is a small-scale network designed around one person within a limited boundary area. The term generally refers to networks that use Bluetooth technology.
208
B. The connectors pictured are BNC connectors. They are identifiable by their groove-and-notch fastening mechanism that locks by twisting one-quarter turn. F-connectors are easily identifiable because they are threaded. SC and ST connectors are for fiber-optic cable.
209
D. At the Internet layer of TCP/IP, Address Resolution Protocol (ARP) resolves logical IP addresses to physical MAC addresses built into network cards. Reverse ARP (RARP) resolves MAC addresses to IP addresses.
210
C. The 169.254.0.0/16 range in IPv4 is the APIPA range, used for automatic configuration if the host can’t locate a DHCP server. The same task in IPv6 is accomplished with a link local address in the FE80::/10 range.
211
D. The connectors are a four-pin RJ-11, typically used for telephone installations, and an eight-pin RJ-45 connector, used on UTP and STP for network transmissions.
212
D. Universal Plug and Play (UPnP) is a standard designed to simplify the process of connecting devices to a network and to enable those devices to automatically announce their presence to other devices on the network.
213
A, C. Addresses in the FE80::/10 range are link local unicast addresses. A link local address is assigned to each IPv6 interface but is not routable on the Internet. If this is the only address the host has, it will not be able to get on the Internet.