CompTIA A+ Exam 220-1101 - Network Services Quiz Flashcards

1
Q

To connect to a website and display its contents, a URL entered in the web browser address bar needs to be translated into an IP address. Which servers is used to handle this type of request?

A

DNS server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Which of the DNS database records returns a 32-bit IP address?

A

A

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

The DNS database AAAA record creates a pointer that maps a hostname to:

A

IPv6 address

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Which DNS database records maps a domain name to a list of mail servers for that domain?

A

MX

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is the function of a DNS TXT record?

(2 answers)

A

Provides outside services with additional information about a domain

NOT used to direct any traffic

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Which DNS TXT records are used for spam management?

(3 answers)

A

SPF
DKIM
DMARC

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Which allows the receiver of an email message to verify that the message claimed to have come from a specific domain was indeed authorized by the owner of that domain?

A

DKIM

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Which refers to an authentication method that enables signing an outbound email message with digital signature?

A

DKIM

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Which refers to an open standard defining a technical method to prevent electronic mail sender address forgery?

A

SPF

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Which refers to a DNS TXT record that allows the owner of a domain to specify all the servers authorized to send mail from their domain?

A

SPF

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Which refers to a DNS TXT record containing instructions for the recipient of an email message on how to handle emails that do not align with the sender’s mail policies?

A

DMARC

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Which server type enables automatic allocation of IP addresses on a network?

A

DHCP server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

The time a DHCP client can use an IP address dynamically assigned by the DHCP server is referred to as:

A

Lease

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Which refers to permanent IP address assignment from a DHCP server?

A

Reservation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

A range of IP addresses that a DHCP server can lease out to DHCP clients is known as:

A

Scope

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

A dedicated file server is also referred to as:

A

FTP server

17
Q

IPP, LPD/LPR, and SMB/CIFS are examples of protocols that enable what kind of network service?

A

Printing

18
Q

What is the function of an SMTP server?

A

Email handling

19
Q

Which type of server is used for collecting diagnostic and monitoring data from networked devices?

A

Syslog server

20
Q

What is the function of an HTTP server?

A

Serving of web pages

21
Q

Which part of the AAA security architecture deals with the verification of the identity of a person or process?

A

Authentication

22
Q

Which refers to the process of granting or denying access to resources?

A

Authorization

23
Q

In the AAA security architecture, the process of tracking accessed services as well as the amount of consumed resources is called:

A

Accounting

24
Q

Which solutions provide the AAA functionality?

(2 answers)

A

TACACS+

RADIUS

25
Q

Which refers to the protocol and port number used by spam filter?

(2 answers)

A

SMTP

PORT: 25

26
Q

The term “Unified Threat Management” (UTM) refers to a network security solution, commonly in the form of a dedicated device (called UTM appliance or web security gateway), which combines the functionality of a firewall with additional features such as URL filtering, content inspection, spam filtering, gateway antivirus protection, IDS/IPS function, or malware inspection.

TRUE / FALSE

A

TRUE

27
Q

A physical network device or software solution designed for managing the optimal distribution of workloads across multiple computing resources is known as:

A

Load balancer

28
Q

In computer networking, a computer system or application that acts as an intermediary between another computer and the Internet is commonly referred to as:

A

Proxy

29
Q

Which refers to industrial and manufacturing control system?

A

SCADA

30
Q

An emerging field of new technologies, such as wearable tech or home automation is known as:

A

IoT