Networking (4) Flashcards

1
Q

Your network is currently running on a mix of 802.1.1b and 802.1.1g devices. At the end of the year, you have extra budget to upgrade some, but not all, of the wireless infrastructure. You want to upgrade to the newest technology but still maintain backward compatibility. Which standard should you choose?

  1. 1.1g
  2. 1.1r
  3. 1.1n
A
  1. 1.1n
  2. 11b/g transmit in the 2.4 GHz frequency, as does 802.11n, so they are compatible. The newer 802.11ac is a 5 GHz standard and therefore is not backward compatible with 802.11b/g. 802.11r is not a standard related to Wi-Fi speed and is not in the A+ exam objectives
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

You are consulting with a small office that needs a dedicated. digital point-to-point network connection to its parent office. Which internet connection type will meet this requirement?

Dial-up

DSL

ISDN

A

ISDN

Integrated Services Digital Network (ISDN) is a digital, point-to-point network capable of maximum transmission speeds of about 2 Mbps, although speeds of 128 Kbps are more common

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What type of network spans multiple buildings or offices but is confined to a relatively small geographical area?

WAN

PAN

MAN

A

MAN

Networks that are larger than a LAN but confined to a relatively small geographical area are metropolitan area networks (MANs). A MAN is generally defined as a network that spans a city or a large campus

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Which of the following shorthand notations corresponds to the CIDR subnet mask 255.255.224.0?

/19

/20

/21

A

/19

A subnet mask of 255.255.224.0 has eight bits in each of the first two octets set to on, and it has three bits in the third octet on. Therefore, it corresponds to /19 in shorthand

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

You are configuring hosts on a network IPv4. Which elements are required for the computer to connect to the network?

IP address

IP address and subnet mask

IP address and subnet mask, and default gateway

A

IP address and subnet mask

To communicate on an IPv4 network, a host must be configured with a valid IP address and a subnet mask. A default gateway is needed only if the host will connect to a remote network. DNS servers are optional but useful, because they resolve hostnames to IP addresses

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Which TCP/IP protocol was developed by Microsoft and has been the default file and print sharing protocol on Windows-based computers since Windows 2000?

CIFS

SMB

FTP

A

CIFS

Common Internet File System (CIFS) is a Microsoft-developed enhancement of the SMB protocol, which was also developed by Microsoft. The intent behind CIFS is that it can be used to share files and printers between computers, regardless of the operating system that they run. It’s been the default file and print sharing protocol on Windows-based computers since Windows 2000

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Which of the following statements regarding IPv4 configuration is true?

All hosts on a network must have a unique subnet mask

All hosts on a network must have a default gateway

All hosts on a network must have a unique host address

A

All hosts on a network must have a unique host address

All hosts on a network must have a unique IP address. The subnet mask should be the same for all computers on a local network. The network ID can’t be set to all 1s; otherwise, it replicates the subnet mask. Default gateways, or router addresses, are needed only if hosts will communicate with hosts outside their local network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Which Wi-Fi encryption standard uses a static key, which is commonly 10, 26, or 58 character long?

WPA2

TKIP

WEP

A

WEP

Wired Equivalent Privacy (WEP) was one of the first security standards for wireless devices. It uses a static key; the keys are commonly 10, 26, or 58 hexadecimal characters long

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Which TCP/IP port number does SNMP use?

UDP 143

TCP 161

UDP 161

A

UDP 161

Simple Network Management Protocol (SNMP) is a noncritical service, so it uses UDP. It’s assigned port 161. IMAP4 uses port 143

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Because of recent security breach, your IT team shut down several ports on the external firewall. Now, users can’t get to websites by using their URLs, but they can get there by using IP addresses. What port does the IT team need to open back up to enable internet access via URLs?

53

67

80

A

53

Clients are unable to get to the DNS server, which resolves hostnames (or URLs) to IP addresses. DNS uses port 53

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

All your network hosts are configured to use DHCP. Which IP address would indicate that a host has been unable to locate a DHCP server?

  1. 168.1.1
  2. 16.1.1
  3. 254.1.1
A

169.254.1.1

Automatic Private IP Addressing (APIPA) is a TCP/IP standard used to automatically configure IP-based hosts that are unable to reach a DHCP server. APIPA addresses are in the 169.254.0.0/16 range. If you see a computer that has an IP address beginning with 169.254, you know that it has configured itself

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

A technician is trying to establish a dial-up network connection using a legacy modem. What is the fastest data throughput for a modem?

28.8 Kbps

56 Kbps

4 Mbps

A

56 Kbps

The fastest modems produced had a data rate of 56 Kbps. At the time, they were considered fast. Today, not so much

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

You have reason to believe that several network users are actively browsing prohibited content on unsecured sites on the internet.. Which port can you disable on the firewall to immediately stop access to these websites?

67

80

443

A

80

Normal (unsecured) websites are accessed on port 80, which is the port that Hypertext Transfer Protocol (HTTP) uses. Shut it down, and no one will be able to access websites, except secure sites that use HTTPS, which is on port 443

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Which TCP/IP protocol is designed to help resolve hostnames to IP addresses?

ARP

RARP

DNS

A

DNS

The Domain Name System (DNS) is responsible for resolving hostnames to IP addresses. This is used millions of times daily on the Internet; when someone types in a website name, such as www.sybex.com, DNS will resolve that to an IP address to enable communication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

You need to install a internet connection for a forest ranger outlook tower, located far away from electrical lines. Which option would be best for broadband internet access?

Cable

DSL

Satellite

A

Satellite

Satellite Internet is not much like any other type of broadband connection. Instead of a cabled connection, it uses a satellite dish to receive data from an orbiting satellite and relay station that is connected to the Internet. Because it requires a clear line of sight between the transmitter and receiver, it can be referred to as “line of sight” wireless. For an installation far from civilization, it may be the only option

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Which TCP/IP host-to-host protocol makes its best effort to deliver data but does not guarantee it?

IP

TCP

UDP

A

UDP

The two host-to-host protocols are Transmission Control Protocol (TCP) and User Datagram Protocol (UDP). TCP guarantees packet delivery through the use of a virtual circuit and data acknowledgments, and UDP does not. Because of this, TCP is often referred to as connection oriented, whereas UDP is connectionless

17
Q

What type of network is typically defined as being contained within a single office or building?

LAN

PAN

MAN

A

LAN

A local area network (LAN) is often defined as being contained in a single building, office, or home

18
Q

Which port is AFP ca[able of using?

443

445

548

A

548

The Apple Filing Protocol (AFP) is a file transfer protocol developed by Apple. It uses port 548

19
Q

You are installing a wireless network for a small company. It wants to have 100 Mbps or better wireless transmission rates. Which of the following standards will allow you to provide this? (Choose two)

  1. 1.1g
  2. 1.1i
  3. 1.1n
  4. 1.1ac
A
  1. 1.1n
  2. 1.1ac

The only two options as Wi-Fi standards that provide greater than 100 Mbps throughput are 802.11n and 802.11ac. The 802.11g standard has a maximum throughput of 54 Mbps, and 802.11i is an encryption standard. Other standards not presented but that do provide throughputs over 100 Mbps are 802.11ah and 802.11ad

20
Q

What legacy network protocol allows NetBIOS-dependent computer applications to communicate over TCP/IP?

SPX

NetBT

BGP

A

NetBT

NetBIOS over TCP/IP (NetBT) is for older applications still reliant on NetBIOS, the legacy network protocol intended for very small networks. NetBT lets such applications communicate over TCP/IP

21
Q

What network segmentation technique reduces broadcast domains?

VPN

VLAN

BGP

A

VLAN

Virtual LANs, or VLANs, will segment your network into smaller broadcast domains. Traffic is isolated to only the paths determined by how you have identified VLANs on your managed switches

22
Q

What connectivity technique can ensure that your network traffic is encrypted from endpoint to endpoint?

VPN

VLAN

BGP

A

VPN

A virtual private network (VPN) can encrypt your network traffic, keeping your data confidential along the wire

23
Q

Which of the following components is not typically found in a wireless mash network (WMN)?

WMN gateway

WMN server

WMN client

A

WMN server

Wireless mesh networks commonly have three types of nodes: a client, a router and a gateway