CompTIA A+ 1101 Flashcards
An HTTPS application is using SSL/TLS protocol but should use a different port for unencrypted HTTP. Which port should unencrypted HTTP use?
A. TCP/80
B. TCP/587
C. TCP/143
D. TCP/993
A. TCP/80, by default, HTTPS uses TCP port 443. Insecure default HTTP port is TCP port 80.
The IT Department is setting up for outsource management of their client firms. The IT department has asked a server admin to configure a Linux server and accept remote terminal connections from clients without using passwords, along with encrypted terminal emulations. How does the admin set up this access? (Select all that apply)
A. Start a File Transfer Protocol (FTP)
B. Establish a Secure File Transfer Protocol (SFTP)
C. Use an open Secure Shell (OpenSSH) connection
D. Use a Secure Shell (SSH) connection
C & D. A SSH connection is the principal means of obtaining secure remote access to UNIX and Linux servers and to most types of network appliances (switches, routers, and firewalls). The most widely used Ssh is OpenSSH. Therefore a common SSH connection is considered OpenSSH
During a company meeting, a technician scribbled some notes about a firewall configuration on a white board. The technician has listed only the port numbers 25 & 587. What is the purpose of these protocols?
A. They are POP3, an early example pf a mailbox access protocol
B. The ports are for message relay between SMTP servers to submit secure and unsecured messages for delivery
C. Use TLS with the HTTP application to send these ports over rather than via an open and unencrypted port
D. They are the Lightweight Directory Access Protocol (LDAP), a TCP/IP protocol used to query and update an X 500 directory
B. The ports are for message delivery relay between SMTP server to submit secure and unsecured messages for delivery. Port TCP/25 is for insecure message relays (MTAs) between Simple Mail Protocol (SMTP) servers. Port TCP/587 submits encrypted authenticated and secured messages for delivery by an SMTP server.
A client connects to an IMAP server over port TCP/143, but this port is insecure. Instead, the client wants a secure connection established using TLS. What is the default port for the secure POP3/IMAP?
A. TCP port 993 or 995
B. TCP port 25 or 587
C. TCP port 143 or 110
D. TCP port 80 or 443
A. The default ports for a secure connection are either TCP port 993 IMAPS or 995 POP3S, depending on the mail access protocol in use (IMAP or POP)
When advising a company on configuring systems, the admin wants to provide better information network device status and how to monitor them in a client manual. Which of the following is the correct protocol that maintains a database containing statistics related to the activity of devices for review?
A. IMAP
B. DHCP
C. POP3
D. SNMP
D. SNMP is a framework for the management and monitoring of network devices. SNMP requires a Syslog agent that maintains a management information base (MIB) database. MIB holds statistics relating to the activity of the device.
A client wishes to download some files from home to upload onto the company’s website. Which ports would establish a connection for the client to achieve this? (Select all that apply)
A. TCP/20
B. TCP/80
C. TCP/443
D. TCP/21
A & D. FTP is associated with TCP/20 & 21 to transfer data in active mode or a server assigned port in passive mode or a server assigned port in passive mode & establish a connection.
As an alternative to static configuration, wired and wireless host can receive their IP address, subnet mask, default gateway, and DNS server addresses from which protocol? (Select all that apply)
A. APIPA
B. DHCP
C. DSL
D. PXE
A & B. Host servers have a failover mechanism when an IP configuration specifies the use of a DHCP server, but the host cannot contact one
The network administrator is configuring a network attached storage (NAS) appliance. What file sharing protocol should the admin use to allow access to Windows, Linux and Apple macOS clients.
A. Lightweight Directory Access Protocol (LDAP)
B. File Transfer Protocol (FTP)
C. Simple Network Management Protocol (SNMP)
D. Server Message Block (SMB)
D. SMB protocol that implements Windows File/Printer sharing is specifically for use on local networks only. Therefore allowing access from the internet would be a security risk.
What network protocol is obsolete and should be disabled on most networks as it poses a significant security risk?
A. NetBIOS
B. TCP/UDP
C. FTP
D. SMB
A. NetBIOS is obsolete and only required if the network must support file sharing for Windows versions earlier than Windows 2000
Authentication, authorization, and accounting (AAA) allows switches and access points to hold directory information to authenticate clients as they connect to the network. Which protocol would the AAA server use if it wanted to communicate with the directory service?
A. SMB/CIFS
B. LDAP
C. SNMP
D. DHCP
B. The AAA server uses LDAP to communicate with the directory service (AD) from an access point with no configured user account credentials, and it cannot decrypt any authentication traffic
In addition to Remote Desktop, which of the following protocols can an administrator use for remote access administration (Select all that apply)
A. SNMP
B. SSH
C. DHCP
D. Telnet
B & D. Telnet opens a plain text, unsecured remote console connection. Telnet uses TCP port 23. SSH provides the same capabilities as Telnet but encrypts the data while transferring to the port. SSH uses TCP port 22.
A top-level domain (i.e., .com) falsely represents the top of the DNS hierarchy. Why is this considered false?
A. The name server hosting the domain is a static configuration as the primary DNS server entry in the IP configuration of local clients
B. The top-level domain cannot be a duplicate, but also, it does not have to be a fully FQDN
C. The name server hosting the domain resource records on the internet is configured as the only DNS server entry and recognized by a specific IP address, not the domain name.
D. The DNS uses root servers at the hierarchy top, represented by a trailing dot at the end of a FQDN, ensuring a unique host name.
C. DNS is a global hierarchy of distributed server databases that contain information about each domain and the hosts within those domains
Which hardware networking device implements Ethernet cabling and ports to repeat transmission from one device to another as a concentrator function instead of the outdated hub? (Select all that apply)
A. Switch
B. Firewall
C. SDN controller
D. Router or modem
A B & D. A switch is a hardware networking appliance acting as a concentrator or connector for cable segments to a patch panel or router port. A firewall is a network security system of shielding layer/barrier to protect a computer system from unwanted data/viruses. DSL modems or SOHO router is a separate hardware device that can be embedded into a system to connect to the ethernet.
A network admin disconnected the company network router during a recent construction project. The system had a full fiber connection terminated to an optical network terminal, but now the patch cable is missing. The department manager insists the cable fiber optic since the service is full fiber. What type of cable does the system need for this connection?
A. An RJ45 unshielded twisted pair (UTP) patch cable
B. A copper wire VGA, HDMI, or USB
C. An RS-232 serial port cable
D. An RJ11 terminated patch cord asymmetrical digital subscriber line
A. The RJ45 unshielded twisted pair (UTP) patch cable will allow the ONT to convert the optical signal over the external fiber optic cable to an electrical one to connect to the local router
A network administrator sets up a high-speed, long range Asymmetrical DSL (ADSL) router/modem for a client. Unfortunately, the vendor did not include a list of the box contents and the instructions. What type of cable does the administrator need to connect the router’s interface?
A. A rewired RJ45 unshielded twisted pair (UTP) patch cable
B. A type A USB 3.2 high speed long range cable over 5m
C. A high speed 5 m asymmetrical VDSL cable
D. An RJ11 terminated patch cord over 300m long
D. A 300 m ADSL RJ11 terminated patch cord can connect to the phone line to support 52 Mbps downstream/6 Mbps upstream. A symmetric link only supports 26 Mbps in both direction.
A network administrator can configure a SOHO router to provide an IPv4 address configuration to hosts without further admin attention. A tech wrote some notes about IPv4 addresses used in various networks associated with the company support tickets. The tech assigned one of the addresses to the WAN interface of a SOHO router that requires troubleshooting. Which of these addresses must it be?
A. 169.254.1.21
B. 192.168.100.52
C. 224.100.100.1
D. 52.165.16.254
D. The WAN interface of the router must use an IPv4 address from a valid public range, so 52.165.16.254 is the only one to use on a SOHO router
What devices uses a embedded adapter to forward traffic through hardware ports between public and private network segments? (Select all that apply)
A. SOHO router
B. Patch panel
C. Firewall
D. Switch
A & D. A small office or home office (SOHO) will generally use a single wireless router, which combines the functions of a router, DSL/cable modem, Ethernet switch, and Wi-Fi access point to provide connectivity. The role of filtering allowed and denied hosts and protocols is performed by a network firewall. A basic firewall is configured with rules, referred to as a network access control list (ACL). An Ethernet switch provisions one port for each device that needs to connect to the network.
Another group has cabled wall ports to a patch panel during a previous construction. Now the company network administrator is completing the remaining network installation as part of a team effort, and will require additional infrastructure to complete this installation. What does the network admin need to do the finish the network?
A. Switch
B. Hub
C. NIC
D. Modem or router
A. The admin needs to install a networking app to act as a concentrator, connecting the cable segments like a switch, then cabling it to the patch panel ports using RK45 patch cords
A network admin is expanding the company network with new settings and requirements for switches, VLANs and IP subsets. What is the purpose of what the admin is doing?
A. To use unmanned switches to connect more clients without requiring configuration or intervention
B. To assign an FQDN managed by using a DNS within the org VLAN
C. To divide the VLAN into multiple secure broadcast domains through managed switches, allowing additional remote access via VPNs
D. To match the cable type and switches with sufficient ports to meet demand on the enterprise network
C. A VLAN ports can divide into groups using a feature of managed switches to allow additional remote access via VPNs
The TIA/EIA-568 standard defines two methods for terminating twisted pairs: T568A or T568B. In T568A, pin 1 is wired to green/white, pin 2 is wired to green, pin 3 is wired to orange/white and pin 6 is wired to orange. In T568B, the position of the green and orange pairs swap over so that orange terminates to 1 & 2 while green terminates to 3 & 6. What is the reason for this?
A. To terminate Cat 5 cable into a two-pair cable used in telephone systems and broadband digital subscriber line modems
B. To use PoE 802.3bt installation and run distribution system cables to wireless access points
C. To rewire a network with Cat 5 cables to support twisted pair for Gigabit Ethernet switches
D. To use the same termination method consistently to support a Gigabit Ethernet or an upgrade to an optical network terminal
D. A network admin wires a straight through ethernet cable with the dame type of termination at both ends. Using T568A at one end and T568B at the other creates a crossover cable, but Gigabit Ethernet interfaces can. crossover automatically using a standard cable.
Cloud services require the rapid provisioning and de-provisioning of server instances and networks. These components must be fully accessible to scripting, which brought about software defined networking (SDN). According to the definition by the IETF, the principal innovation of SDN is to do what?
A. To keep the layers and component interactions separated in the SDN architecture
B. To insert a control layer between the application and infrasture layers
C. To expose an API automated by scripts that call functions in the layer above or below and shut them down
D. To implement a physical device referred to as the “SDN controller”
B. The principal innovation of SDN is to insert a control layer between the application and infrastructure layers. It is a model for how these processes can provision and de-provision networks.
All PC motherboard have a built-in 1000BASE-T compatible adapter to establish connectivity with the ethernet. What other devices connect to different types of ethernet, such as fiber optics. (Select all that apply)
A. Modem
B. Patch Panel
C. NIC
D. SOHO router
A B & D. Modem, Patch panel & SOHO router
Which hardware networking device implements ethernet cabling and ports to repeat transmission from one device to another as a concentrator function instead of the outdated hub? (Select all that apply)
A. router or modem
B. switch
C. An SDN controller
D. Firewall
Router or modem, switch and firewall
A network admin plans to install a network of wireless access points with power supplied over data cabling. Each access point requires a 20W power supply. What version of Power over (PoE) must the switch support to fulfill this requirement (Select all that apply)
A. An 802.3af switch
B. PoE+ (802.3at)
C. POE++/4PPoE (802.3bt)
D. PoE-power injector
B & C. PoE 802.3at (PoE+) allows powered devices to draw up to about 25W with a maximum current of 600 mA. (PoE) 802.3bt (PoE++ or 4PPoE) supplies up to about 51W (Type 3) or 73W (Type 4) usable power