Practice Tests - Chapter 2: Networking Flashcards

1
Q

Which of the following network devices receives network traffic and makes a decision on whether to send it on based on the destination hardware address?

A. Hub

B. Bridge

C. Access point

D. Repeater

A

B. Bridge

Because bridges work at the Data Link layer, they are aware of only hardware (MAC) addresses. They are not aware of and do not deal with IP addresses. Bridges are more intelligent than repeaters, but they are unable to move data across multiple networks simultaneously.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

A technician installed a UTP splitter on one of your network segments that has CAT6e cable. What is the maximum speed supported by this connection?

A. 10Mbps

B. 100Mbps

C. 1Gbps

D. 10Gbps

A

B. 100Mbps

An Ethernet splitter will take the incoming signal on two pairs and then split it, so on the output end it produces two sets of signals using two pairs each. Because of this, Ethernet splitters are limited to 100Mbps connections. It is not recommended that you use Ethernet splitters on a network. If you need to connect multiple computers using UTP, use a hub or a switch.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

You are installing a fiber-optic cable between two buildings. To install the cable, you must run it through a conduit between the buildings, and access to the conduit is not easy. Before you run the cable, you want to ensure it’s working properly. Which tool should you use?

A. Cable tester

B. Multimeter

C. Loopback plug

D. Tone generator and probe

A

A. Cable tester

Cable testers are indispensable tools for any network technician. Usually you would use a cable tester before you install a cable to make sure it works. Of course, you can test them after they’ve been run as well.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Which TCP/IP protocol, designed to download email, allows for multiple clients to be simultaneously connected to the same mailbox?

A. SMTP

B. POP3

C. IMAP

D. SMB

A

C. IMAP

Internet Message Access Protocol (IMAP) is a secure protocol designed to download email. It has several advantages over the older Post Office Protocol 3 (POP3). First, IMAP4 works in connected and disconnected modes. Second, it lets you store the email on the server, as opposed to POP3, which requires you to download it. Third, IMAP4 allows multiple clients to be simultaneously connected to the same inbox.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

You are using your laptop on the company network. In your web browser, you type in www.google.com and press Enter. The computer will not find Google. You open the browser on your phone, and using your cellular connection, you can open Google without a problem. Your laptop finds internal servers and can print without any issues. What is the most likely reason you can’t open Google?

A. DNS server problem

B. DHCP server problem

C. Missing subnet mask

D. Duplicate IP address

A

A. DNS server problem

The Domain Name System (DNS) server is responsible for resolving host names, such as www.google.com, to IP addresses to enable communication. If it’s not working properly or you can’t connect to it, you won’t be able to browse the Internet using friendly website names.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

A technician needs to run a network cable to a remote building, which is approximately 15 kilometers from his base station. He’s not sure if any cable will span that distance. What is the maximum distance of SMF cable?

A. 300 meters

B. 550 meters

C. 40 kilometers

D. 100 kilometers

A

C. 40 kilometers

Single-mode fiber (SMF) can provide data throughput rates of 10Gbps at a distance of 40 kilometers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

You have been asked to install a run of RG-59 cable from one end of a building to the other. What is the maximum distance for this type of cable run?

A. 100 meters (328 feet)

B. 228 meters (750 feet)

C. 304 meters (1,000 feet)

D. 500 meters (1,645 feet)

A

B. 228 meters (750 feet)

RG-59 network cable can run for about 228 meters (750 feet). The slightly thicker RG-6 can run for about 304 meters (1,000 feet).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Which one of the following TCP/IP protocols was designed as a replacement for Telnet?

A. SMB

B. SSH

C. SFTP

D. FTPS

A

B. SSH

Secure Shell (SSH) can be used to set up a secure Telnet session for remote logins or for remotely executing programs and transferring files. Because it’s secure, it was originally designed to be a replacement for the unsecure telnet command.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Which of the following network connectivity devices operate at Layer 2 of the OSI model? (Choose two.)

A. Hub

B. Switch

C. Bridge

D. Router

A

B. Switch

C. Bridge

Switches and bridges work at Layer 2. Switches are multiport bridges.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

In IPv4, what is the function of the subnet mask?

A. It tells hosts where to route packets.

B. It differentiates between the network ID and host ID.

C. It determines which subnet the host is on.

D. It masks external networks from the host.

A

B. It differentiates between the network ID and host ID.

Computers are able to differentiate where the network ID ends and the host address begins through the use of a subnet mask.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Which of the following TCP/IP protocols is connection oriented and attempts to guarantee packet delivery?

A. IP

B. TCP

C. UDP

D. ICMP

A

B. TCP

Transmission Control Protocol (TCP) guarantees packet delivery through the use of a virtual circuit and data acknowledgments, and User Datagram Protocol (UDP) does not. Because of this, TCP is often referred to as connection oriented, whereas UDP is connectionless.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Which TCP/IP protocol allows a user to log into a remote computer and manage files as if they were logged in locally?

A. FTP

B. SFTP

C. SMB

D. Telnet

A

D. Telnet

Telnet lets users log into another machine and “see” the remote computer in a window on their screen. Although this vision is text only, the user can manage files on that remote machine just as if they were logged in locally.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

You are given a network configuration of 155.100.63.0/26 from your ISP. When you configure your network hosts, what subnet mask should you assign them?

A. 255.255.0.0

B. 255.255.255.0

C. 255.255.255.192

D. 255.255.255.240

A

C. 255.255.255.192

A CIDR shorthand notation of /26 corresponds to the subnet mask 255.255.255.192.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Which Wi-Fi standard specifies a maximum of 54Mbps transmissions in the 2.4GHz frequency range?

A. 802.11a

B. 802.11b

C. 802.11g

D. 802.11n

A

C. 802.11g

802.11g specifies a maximum of 54Mbps transmissions in the 2.4GHz frequency range.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Which TCP/IP protocol is used to provide shared access to files and printers on the network?

A. FTP

B. SSH

C. SMB

D. SNMP

A

C. SMB

Server Message Block (SMB) is a protocol used to provide shared access to files, printers, and other network resources. In a way, it functions a bit like FTP only with a few more options, such as the ability to connect to printers, and more management commands.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What port number does the Telnet protocol use?

A. 21

B. 22

C. 23

D. 25

A

C. 23

Telnet lets users log into another machine and “see” the remote computer in a window on their screen. Although this vision is text only, the user can manage files on that remote machine just as if they were logged in locally. Telnet uses port 23.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

You have just installed a wireless 802.11ac network for a client. The IT manager is concerned about competitors intercepting the wireless signal from outside the building. Which tool is designed to test how far your wireless signal travels?

A. Tone generator and probe

B. Protocol analyzer

C. Packet sniffer

D. Wi-Fi analyzer

A

D. Wi-Fi analyzer

A wireless locator or a Wi-Fi analyzer can be either a handheld hardware device or specialized software that is installed on a laptop and whose purpose is to detect and analyze Wi-Fi signals. It can detect where signals are strong or weak to determine whether there are potential security issues.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Some of your network users are concerned about submitting confidential information to an online website. What should you tell them?

A. It’s fine, because all Internet traffic is encrypted.

B. If the website address starts with TLS://, it should be OK to submit co fidential information to a trusted site.

C. If the website address starts with HTTPS://, it should be OK to submit confidential information to a trusted site.

D. Don’t ever submit confidential information to any online website.

A

C. If the website address starts with HTTPS://, it should be OK to submit confidential information to a trusted site.

Internet traffic is not encrypted by default. Websites that are secure and encrypt their transmissions will start with HTTPS://rather than HTTP://. These sites can be trusted to encrypt the data, and their identity is verified.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Which TCP/IP Internet layer protocol is responsible for delivering error messages if communication between two computers fails?

A. ICMP

B. IP

C. TCP

D. UDP

A

A. ICMP

The main Internet layer protocol is Internet Protocol (IP), and it’s the workhorse of TCP/IP. Another key protocol at this layer is Internet Control Message Protocol (ICMP), which is responsible for delivering error messages. If you’re familiar with the ping utility, you’ll know that it utilizes ICMP to send and receive packets.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Which type of IPv6 address identifies a single node on the network?

A. Multicast

B. Anycast

C. Unicast

D. Localcast

A

C. Unicast

There are three types of addresses in IPv6: unicast, anycast, and multicast. A unicast address identifies a single node on the network. An anycast address refers to one that has been assigned to multiple nodes. A multicast address is one used by multiple hosts.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

You are configuring a wireless 802.11n router for a small network. When setting it up, which security option should you choose?

A. WPA2

B. WPA

C. WEP

D. SSID

A

A. WPA2

Of the wireless encryption methods listed, WPA2 is the newest and most secure. Some routers offer WPA2 Enterprise, which is a great choice as well.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

What type of network covers large geographical areas and often supports thousands of users?

A. LAN

B. WAN

C. PAN

D. MAN

A

B. WAN

A wide area network (WAN) covers large geographical areas and often supports thousands of users.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Which TCP/IP protocol, developed by Microsoft, allows users to connect to remote computers and run programs on them?

A. RDP

B. SMB

C. CIFS

D. Telnet

A

A. RDP

Developed by Microsoft, the Remote Desktop Protocol (RDP) allows users to connect to remote computers and run programs on them. When you use RDP, you see the desktop of the computer you’ve signed into on your screen. It’s like you’re really there, even though you’re not.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

What port number does the SSH protocol use?

A. 21

B. 22

C. 23

D. 25

A

B. 22

Secure Shell (SSH) can be used to set up a secure Telnet session for remote logins or for remotely executing programs and transferring files. SSH uses port 22.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Which of the following IP addresses is not routable on the Internet?

A. 10.1.1.1

B. 11.1.1.1

C. 12.1.1.1

D. 13.1.1.1

A

A. 10.1.1.1

Private IP addresses are not routable on the Internet. The private IP address range for class A networks is 10.0.0.0/8.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

Which network connectivity device does not forward broadcast messages, thereby creating multiple broadcast domains?

A. Hub

B. Switch

C. Bridge

D. Router

A

D. Router

One of the key features of routers is that they break up broadcast domains. Broadcast traffic on one side of the router will not get passed to the other side, which greatly reduces network traffic.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

You have a desktop computer that is behaving erratically on the network. The wired connection will often disconnect without warning. Which tool should you use to troubleshoot the network adapter?

A. Multimeter

B. Tone generator and probe

C. Loopback plug

D. Cable tester

A

C. Loopback plug

A loopback plug is for testing the ability of a network adapter to send and receive. The plug gets plugged into the NIC, and then a loopback test is performed using troubleshooting software. You can then tell whether the card is working properly.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

Your company just expanded and is leasing additional space in an adjacent office building. You need to extend the network to the new building. Fortunately, there is a conduit between the two. You estimate that the cable you need to run will be about 300 meters long. What type of cable should you use?

A. CAT5

B. CAT5e

C. CAT7

D. MMF

A

D. MMF

UTP cables are limited to 100 meters, so CAT5 and CAT7 will not work. You need fiber, and multimode fiber (MMF) can span distances of 300 meters.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

You want to ensure that client computers can download email from external email servers, regardless of the protocol their email client uses. Which ports do you open on the firewall to enable this? (Choose two.)

A. 23

B. 25

C. 110

D. 143

A

C. 110

D. 143

Simple Mail Transfer Protocol (SMTP, port 25), Post Office Protocol 3 (POP3, port 110), and Internet Message Access Protocol (IMAP, port 143) are all email protocols. SMTP is for sending email. POP3 and IMAP are for downloading email.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

You are installing network cabling in a highly secure facility. The cables need to be immune to electronic eavesdropping. What type of cable should you use?

A. Fiber-optic

B. UTP

C. STP

D. Coaxial

A

A. Fiber-optic

Fiber-optic cabling uses pulses of light instead of electric voltages to transmit data, so it is immune to electrical interference and to wiretapping.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

Which networking device is capable of reading IP addresses and forwarding packets based on the destination IP address?

A. Hub

B. Switch

C. Bridge

D. Router

A

D. Router

Routers operate at the Network layer (Layer 3) of the OSI model. Because of this, they make their decisions on what to do with traffic based on logical addresses, such as an IP address.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

Which network device is designed to be a security guard, blocking malicious data from entering your network?

A. PoE injector

B. Bridge

C. Firewall

D. Router

A

C. Firewall

A firewall is a hardware or software solution that serves as your network’s security guard. Firewalls can protect you in two ways: they protect your network resources from hackers lurking in the dark corners of the Internet, and they can simultaneously prevent computers on your network from accessing undesirable content on the Internet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

You are manually configuring TCP/IP hosts on the network. What configuration parameter specifies the address of the router that enables Internet access?

A. Subnet mask

B. DHCP server

C. DNS server

D. Default gateway

A

D. Default gateway

The default gateway is the address to the network’s router, which will allow the host to communicate with hosts not on the local network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

A senior administrator calls you and tells you that she is working from home and trying to use RDP, but it won’t let her. What port do you need to ensure is open on the firewall to grant her access?

A. 143

B. 443

C. 548

D. 3389

A

D. 3389

The Remote Desktop Protocol (RDP) allows users to connect to remote computers and run programs on them. It uses port 3389.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

Identify the cable connector in the picture.

A. F-connector

B. BNC

C. SC

D. ST

A

A. F-connector

F-connectors are threaded and screw into place. The BNC connector locks by twisting one-quarter turn. SC and ST connectors are for fiber-optic cable.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

What type of network is most commonly associated with Bluetooth devices and covers a small area?

A. LAN

B. WAN

C. PAN

D. MAN

A

C. PAN

A personal area network (PAN) is a small-scale network designed around one person within a limited boundary area. The term generally refers to networks that use Bluetooth technology.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

Identify the type of cable connectors shown here.

A. F-connector

B. BNC

C. SC

D. ST

A

B. BNC

The connectors pictured are BNC connectors. They are identifiable by their groove-and-notch fastening mechanism that locks by twisting one-quarter turn. F-connectors are easily identifiable because they are threaded. SC and ST connectors are for fiber-optic cable.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

Which TCP/IP Internet layer protocol is responsible for resolving physical MAC addresses to logical IP addresses?

A. IP

B. ICMP

C. ARP

D. RARP

A

D. RARP

At the Internet layer of TCP/IP, Address Resolution Protocol (ARP) resolves logical IP addresses to physical MAC addresses built into network cards. Reverse ARP (RARP) resolves MAC addresses to IP addresses.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

Which of the following IPv6 addresses is equivalent to an address in the 169.254.0.0/16 range in IPv4?

A. 2000::/3

B. FC00::/7

C. FE80::/10

D. FF00::/8

A

C. FE80::/10

The 169.254.0.0/16 range in IPv4 is the APIPA range, used for automatic configuration if the host can’t locate a DHCP server. The same task in IPv6 is accomplished with a link local address in the FE80::/10 range.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

Identify the connectors shown here, from left to right.

A. ST and SC

B. SC and ST

C. RJ-45 and RJ-11

D. RJ-11 and RJ-45

A

D. RJ-11 and RJ-45

The connectors are a four-pin RJ-11, typically used for telephone installations, and an eight-pin RJ-45 connector, used on UTP and STP for network transmissions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

You need to configure a wireless router for an office network. The office manager wants new devices to be able to automatically join the network and announce their presence to other networked devices. Which service should you enable to allow this?

A. DHCP

B. NAT

C. QoS

D. UPnP

A

D. UPnP

Universal Plug and Play (UPnP) is a standard designed to simplify the process of connecting devices to a network and to enable those devices to automatically announce their presence to other devices on the network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
42
Q

You are troubleshooting a computer with an IPv6 address that is in the FE80::/10 range. Which of the following statements are true? (Choose two.)

A. The computer will not be able to get on the Internet.

B. The computer will be able to get on the Internet.

C. The computer is configured with a link local unicast address.

D. The computer is configured with a global unicast address.

A

A. The computer will not be able to get on the Internet.

C. The computer is configured with a link local unicast address.

Addresses in the FE80::/10 range are link local unicast addresses. A link local address is assigned to each IPv6 interface but is not routable on the Internet. If this is the only address the host has, it will not be able to get on the Internet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
43
Q

Identify the connector shown here.

A. ST

B. SC

C. LC

D. MFF

A

C. LC

The connector shown is a type of mini form factor (MFF) fiber-optic connector called a local connector (LC). It’s especially popular for use with Fibre-Channel adapters, fast storage area networks, and Gigabit Ethernet adapters.

44
Q

You have set up your web server to function as an FTP server as well. Users on the Internet complain that they are not able to access the server using FTP clients. What port number are they trying to access the server on?

A. 21

B. 22

C. 23

D. 25

E. 80

A

A. 21

The File Transfer Protocol (FTP) is optimized for downloading files from servers. It uses port 21.

45
Q

Which TCP/IP protocol allows you to access data such as employee phone numbers and email addresses that are stored within an information directory?

A. SNMP

B. SMTP

C. CIFS

D. LDAP

A

D. LDAP

The Lightweight Directory Access Protocol (LDAP) is a directory services protocol based on the X.500 standard. LDAP is designed to access information stored in an information directory typically known as an LDAP directory or LDAP database. This often includes employee phone numbers and email addresses.

46
Q

You are configuring network hosts with static IP addresses. You have chosen to use a class B network address. What is the default subnet mask that you should configure on the hosts?

A. 255.0.0.0

B. 255.255.0.0

C. 255.255.255.0

D. 255.255.255.255

A

B. 255.255.0.0

The default subnet mask for class B networks is 255.255.0.0, or written in shorthand, /16.

47
Q

You are installing a new network and working in a wiring closet. You need to attach several network cables to a 110 block. Which tool should you use to perform this task?

A. Crimper

B. Cable stripper

C. Cable tester

D. Punchdown tool

A

D. Punchdown tool

If you’re working on a larger network installation, you might use a punchdown tool. It’s not a testing tool but one that allows you to connect (that is, punch down) the exposed ends of a wire into wiring harnesses, such as a 110 block.

48
Q

Which of the following Internet connection types offers the fastest download speeds?

A. Cable

B. DSL

C. Fiberoptic

D. ISDN

A

C. Fiberoptic

Fiber-optic broadband Internet offers fast speeds (often in the 1Gbps range) but is also the most expensive.

49
Q

You need to create several UTP cables from a roll of bulk cable. Your company uses the T568B standard. What is the correct order for wires in the connectors?

A. White/orange, orange, white/green, blue, white/blue, green, white/brown, brown

B. White/orange, orange, white/green, green, white/blue, blue, white/brown, brown

C. White/orange, green, white/green, blue, white/blue, orange, white/brown, brown

D. Orange, white/orange, white/green, blue, white/blue, green, white/brown, brown

A

A. White/orange, orange, white/green, blue, white/blue, green, white/brown, brown

The correct order for a T568B cable is white/orange, orange, white/green, blue, white/blue, green, white/brown, brown.

50
Q

You are installing network cable that will support digital cable television signals. What type of cable should you install?

A. RG-6

B. RG-8

C. RG-58 A/U

D. RG-59

A

A. RG-6

Cable television installations typically use either RG-6 or RG-59 cable. RG-6 is slightly thicker, can run longer distances, and supports digital signals. RG-59 is suited only for analog TV signals.

51
Q

Which TCP/IP protocol uses TCP ports 137–139 and 445 by default?

A. FTP

B. SSH

C. SMB

D. SNMP

A

C. SMB

Server Message Block (SMB) is a protocol used to provide shared access to files, printers, and other network resources. It uses TCP ports 137–139 and 445.

52
Q

For IPv6, which of the following statements are not true? (Choose two.)

A. Each IPv6 interface can have only one address.

B. Each IPv6 interface is required to have a link local address.

C. IPv6 addresses are incompatible with IPv4 networks.

D. IPv6 no longer uses broadcasts.

A

A. Each IPv6 interface can have only one address.

C. IPv6 addresses are incompatible with IPv4 networks.

Each IPv6 interface can and often does have multiple addresses assigned to it. IPv6 is backward compatible with IPv4.

53
Q

Which of the following network architecture devices operate at Layer 1 of the OSI model? (Choose two.)

A. Switch

B. Hub

C. Extender

D. Router

A

B. Hub

C. Extender

A hub is a device used to link several computers together. Hubs are simple devices that possess no real intelligence, and they work at Layer 1 of the OSI model. Extenders simply allow a signal to propagate for a longer distance, and they also work at Layer 1. Switches are Layer 2 devices, and routers work at Layer 3.

54
Q

You need to replace a faulty 250-foot section of RG-6 cable, but all you have available is RG-59. Which of the following statements is true?

A. The replacement cable will not work because the distance exceeds RG-59 specifications.

B. The replacement cable will not work because RG-6 and RG-59 use different connectors.

C. The replacement cable will not work because RG-6 and RG-59 have different impedance.

D. The replacement cable should work.

A

D. The replacement cable should work.

RG-6 and RG-59 can, in many cases, be used interchangeably. RG-6 is a better choice because it supports digital signals and has a longer range (304 meters or 1,000 feet). RG-59 can run up to 228 meters (750 feet). Both have impedance of 75 ohms, and both use BNC connectors or F-connectors.

55
Q

You have been asked to design a new network that requires 10Gbps transmission speeds. Which cable types will meet the minimum specifications? (Choose two.)

A. MMF

B. CAT5

C. CAT5e

D. CAT7

A

A. MMF

D. CAT7

Multimode fiber and UTP CAT6 and newer support 10Gbps transmission speeds.

56
Q

Which TCP/IP protocol was developed by Apple and used to transfer files between computers?

A. FTP

B. AFP

C. ATP

D. SMB

A

B. AFP

The Apple Filing Protocol (AFP) was developed by Apple as a file transfer protocol similar to FTP and Server Message Block (SMB). It was the default file transfer protocol on Mac OS until Apple changed to SMB2 in 2013.

57
Q

Which of the following IPv6 addresses is equivalent to 127.0.0.1 in IPv4?

A. ::0

B. ::1

C. ::127

D. 2000::/3

A

B. ::1

127.0.0.7 is the loopback address, used to ping the local network interface. The IPv6 equivalent is ::1.

58
Q

A technician is configuring a wireless 802.11ac router for a home network. For security purposes, he enables the firewall. He wants to configure it so that if a computer makes an outbound request on a specific port, subsequent inbound traffic on that port would be allowed through the firewall. Which option does he need to configure to manage these settings?

A. Port forwarding

B. Port triggering

C. NAT

D. QoS

A

B. Port triggering

Port triggering allows traffic to enter the network on a specific port after a computer makes an outbound request on that specific port. For example, if a computer on your internal network makes an outbound Telnet request (port 23), subsequent inbound traffic destined for the originating computer on port 23 would be allowed through.

59
Q

You are asked to perform consulting work for a medium-sized company that is having network connectivity issues. When you examine the patch panel, you notice that none of the dozens of UTP cables are labeled. Which tool can you use to identify which cable goes to which workstation?

A. Cable tester

B. Loopback plug

C. Punchdown tool

D. Tone generator and probe

A

D. Tone generator and probe

If you need to trace a wire in a wall from one location to another, a tone generator and probe is the right tool to use. It consists of two pieces: a tone generator and a probe. To use it, attach one end to one end of the cable, such as the end at the computer. Then go to the patch panel with the other end of the probe to locate the cable. These are lifesavers when the cables are not properly labeled.

60
Q

Which TCP/IP protocol is responsible for dynamically assigning IP addresses to client computers?

A. DNS

B. DHCP

C. RDP

D. LDAP

A

B. DHCP

Dynamic Host Configuration Protocol (DHCP) dynamically assigns IP addresses and other IP configuration information to network clients.

61
Q

What characteristic differentiates STP from UTP?

A. It uses RJ-45s connectors instead of RJ-45.

B. It follows the T568A wiring standard.

C. It does not produce poisonous gas when burned.

D. It has a layer of foil shielding.

A

D. It has a layer of foil shielding.

Shielded twisted pair (STP) cabling has a foil shield surrounding the wire pairs to decrease electrical interference. Some STP cables also shield individual wire pairs. Unshielded twisted pair (UTP) does not have the shielding. Both types use RJ-45 connectors, can follow the T568A wiring standard, and can be produced as plenum-rated cable that does not produce poisonous gas when burned.

62
Q

You are investigating remnants of an old network setup in an unused building. At the end of a conduit, all you see are the connectors shown here. What type of cable do you expect these connectors to be attached to?

A. Coaxial

B. STP

C. UTP

D. Fiber-optic

A

D. Fiber-optic

The connectors shown are ST connectors, which are used with fiber-optic cable. ST connectors are the most popular fiber connector, and they attach with a BNC-like locking mechanism.

63
Q

Which networking device works at Layer 2 of the OSI model, has multiple ports in which each is its own collision domain, and examines the header of the incoming packet to determine which port it gets sent to?

A. Hub

B. Switch

C. Bridge

D. Router

A

B. Switch

Switches work at Layer 2 as do bridges, and they provide centralized connectivity just like hubs. Switches examine the Layer 2 header of the incoming packet and forward it properly to the right port and only that port. Switches are multiport bridges.

64
Q

Which TCP/IP port number will an email client use to push email to its email server?

A. 23

B. 25

C. 110

D. 143

A

B. 25

Email is pushed from clients to servers using the Simple Mail Transfer Protocol (SMTP). SMTP uses port 25.

65
Q

A technician is going to set up a Wi-Fi network using standard omnidirectional antennae. Because of the building configuration, transmitting signals for the greatest distance is his primary criterion. Which standard should he choose?

A. 802.11a

B. 802.11g

C. 802.11n

D. 802.11ac

A

C. 802.11n

Of the Wi-Fi standards, 802.11n has the longest range by default, at roughly 70 meters indoors and 250 meters outdoors. 802.11ac is newer and faster than 802.11n, but it transmits exclusively in the 5GHz range, which restricts its functional distance.

66
Q

You are troubleshooting an intermittently failing CAT7 network connection. You suspect that there is a short in the connection. Which tool can you use to determine this?

A. Tone generator and probe

B. Loopback plug

C. Multimeter

D. Crimper

A

C. Multimeter

Multimeters are versatile electronic measuring tools. A multimeter can measure voltage, current, and resistance on a wire.

67
Q

Which TCP/IP protocol gathers and manages network performance information using devices called agents?

A. SNMP

B. SMTP

C. LDAP

D. SMB

A

A. SNMP

Simple Network Management Protocol (SNMP) gathers and manages network performance information. A management device called an SNMP server can be set up to collect data from these devices (called agents) and ensure that your network is operating properly.

68
Q

Which Internet connection type, popular for home use, offers asymmetrical download and upload speeds and is implemented over common phone lines?

A. POTS

B. Cable

C. DSL

D. ISDN

A

C. DSL

One of the two most popular broadband choices for home use is Digital Subscriber Line (DSL). It utilizes existing phone lines and provides fairly reliable high-speed access. Most DSL subscriptions are asymmetrical, meaning they offer faster download speeds than upload speeds.

69
Q

Which Wi-Fi encryption standard was the first to include the use of a 128-bit dynamic per-packet encryption key?

A. WEP

B. WPA

C. WPA2

D. AES

A

B. WPA

Wi-Fi Protected Access (WPA) was the first Wi-Fi encryption standard to implement the use of the Temporal Key Integrity Protocol (TKIP). Whereas WEP used a static 40- or 128-bit key, TKIP uses a 128-bit dynamic per-packet key. It generates a new key for each packet sent.

70
Q

You are installing an 802.11n Wi-Fi network with five wireless access points. The access points are set up so their ranges overlap each other. To avoid communications issues, what principle should you follow when configuring them?

A. Configure all access points to use the same channel.

B. Configure all access points to use adjacent channels.

C. Configure all access points to use non-overlapping channels.

D. Channel configuration will not cause communications issues.

A

C. Configure all access points to use non-overlapping channels.

When setting up wireless access points, it’s good practice to have their ranges overlap to ensure there is no loss of communication when roaming in the network’s area. However, to avoid problems, it’s best to set up the access points with nonoverlapping channels.

71
Q

Which TCP/IP protocol is designed to send email from clients to mail servers?

A. SMTP

B. POP3

C. IMAP

D. SMB

A

A. SMTP

Simple Mail Transfer Protocol (SMTP), Post Office Protocol 3 (POP3), and Internet Message Access Protocol (IMAP) are all email protocols. SMTP is for sending email. POP3 and IMAP are for downloading email.

72
Q

You are setting up a small network in your neighbor’s house. She is concerned about wireless security, so she doesn’t want to use wireless networking at all. She needs to connect two computers to each other, but it will be impossible to run a network cable between them. Which technology can help her network these computers?

A. Ethernet over Power

B. Power over Ethernet

C. Firewall

D. Access point

A

A. Ethernet over Power

Ethernet over power can make Ethernet connections by using electrical outlets. For it to work, both devices must be on the same electrical circuit.

73
Q

You have been asked to install a Wi-Fi network in a building that is approximately 100 meters long and 25 meters wide. Because of cost considerations, you will need to use 802.11g. At a minimum, how many wireless access points will you need?

A. 2

B. 3

C. 4

D. 6

A

B. 3

The 802.11g standard has an indoor range of approximately 40 meters. At a minimum, you will need three access points. Depending on coverage and indoor interference, such as thick walls, you might need more, though.

74
Q

You are installing network cabling in a drop ceiling of an office space. The ceiling area is used to circulate breathable air. What type of cable do you need to install?

A. Coaxial

B. UTP

C. Fiber-optic

D. Plenum

A

D. Plenum

The cable can be any of the three major types, coaxial, twisted pair, or fiber, but it needs to be plenum rated. Normal cables have a PVC coating, which produces a poisonous gas when burned. Plenum-rated cables have a Teflon coating, which is not toxic when burned.

75
Q

You need to install a wireless hub in a drop ceiling where there is no access to a power source. Which technology will allow you to get power to that device?

A. Ethernet over Power

B. Power over Ethernet

C. Wireless access point

D. Repeater/extender

A

B. Power over Ethernet

Power over Ethernet (PoE) allows you to power an Ethernet device (such as a switch) through one of the Ethernet ports. For it to work, the access point and the device it plugs into both need to support PoE.

76
Q

Which of the following IP addresses is not a private address and therefore is routable on the Internet?

A. 10.1.2.3

B. 172.18.31.54

C. 172.168.38.155

D. 172.168.38.155

A

C. 172.168.38.155

The private IP address ranges are 10.0.0.0/8, 172.16.0.0/12, and 192.168.0.0/16. The address 172.168.38.155 is outside the private IP address range and is a public address.

77
Q

You are configuring a wireless 802.11n router. The office manager insists that you configure the router such that traffic from her computer receives higher priority on the network than other users’ traffic. Which setting do you need to configure to enable this?

A. QoS

B. UPnP

C. DMZ

D. Port forwarding

A

A. QoS

Quality of Service (QoS) is a strategy that allows an administrator to control resources to maintain a certain service level. By using QoS, an administrator can set different priorities for one or more types of network traffic based on different applications, data flows, or users.

78
Q

If you are connecting to a website that encrypts its connection using TLS, what port number does that traffic travel on?

A. 21

B. 80

C. 143

D. 443

A

D. 443

To encrypt traffic between a web server and client securely, Hypertext Transfer Protocol Secure (HTTPS) can be used. HTTPS connections are secured using either Secure Sockets Layer (SSL) or Transport Layer Security (TLS). HTTPS uses port 443.

79
Q

Your network is currently running a mix of 802.11b and 802.11g devices. At the end of the year, you have extra budget to upgrade some, but not all, of the wireless infrastructure. You want to upgrade to the newest technology but still maintain backward compatibility. Which standard should you choose?

A. 802.11g

B. 802.11ac

C. 802.11r

D. 802.11n

A

D. 802.11n

802.11b/g transmit in the 2.4GHz frequency, as does 802.11n, so they are compatible. The newer 802.11ac is a 5GHz standard and therefore is not backward compatible with 802.11b/g. 802.11r is not a standard related to Wi-Fi speed and is not in the A+ test objectives.

80
Q

You are consulting with a small field office that needs a dedicated, digital point-to-point network connection to its parent office. Which Internet connection type will meet this requirement?

A. Dial-up

B. Cable

C. DSL

D. ISDN

A

D. ISDN

Integrated Services Digital Network (ISDN) is a digital, point-to-point network capable of maximum transmission speeds of about 2Mbps, although speeds of 128Kbps are more common.

81
Q

What type of network spans multiple buildings or offices but is confined to a relatively small geographical area?

A. LAN

B. WAN

C. PAN

D. MAN

A

D. MAN

Networks that are larger than a LAN but confined to a relatively small geographical area are metropolitan area networks (MANs). A MAN is generally defined as a network that spans a city or a large campus.

82
Q

Identify the connector shown here.

A. ST

B. SC

C. LC

D. MFF

A

B. SC

The connector shown is a subscriber connector (SC), also known as a square connector because of its shape. It’s a fiber-optic cable connector.

83
Q

While cleaning out a storage room, a technician finds several rolls of CAT5e network cable. He thinks that he might be able to use it to create replacement cables for his network. What is the maximum speed that this cable will support?

A. 100Mbps

B. 1Gbps

C. 10Gbps

D. 20Gbps

A

B. 1Gbps

CAT5e cable can support speeds of 1Gbps. CAT5 has a maximum of 100Mbps. CAT6 and newer can support 10Gbps, but no UTP cabling can currently support 20Gbps.

84
Q

Which of the following shorthand notations corresponds to the CIDR subnet mask 255.255.224.0?

A. /19

B. /20

C. /21

D. /22

A

A. /19

A subnet mask of 255.255.224.0 has eight bits in each of the first two octets set to on, and it has three bits in the third octet on. Therefore, it corresponds to /19 in shorthand.

85
Q

You are configuring hosts on a network running IPv4. Which elements are required for the computer to connect to the network?

A. IP address

B. IP address and subnet mask

C. IP address, subnet mask, and default gateway

D. IP address, subnet mask, default gateway, and DNS server address

A

B. IP address and subnet mask

To communicate on an IPv4 network, a host must be configured with a valid IP address and a subnet mask. A default gateway is needed only if the host will connect to a remote network. DNS servers are optional but useful, because they resolve host names to IP addresses.

86
Q

Which TCP/IP protocol was developed by Microsoft and has been the default file and print sharing protocol on Windows-based computers since Windows 2000?

A. CIFS

B. SMB

C. FTP

D. LDAP

A

A. CIFS

Common Internet File System (CIFS) is a Microsoft-developed enhancement of the SMB protocol, which was also developed by Microsoft. The intent behind CIFS is that it can be used to share files and printers between computers, regardless of the operating system that they run. It’s been the default file and print sharing protocol on Windows-based computers since Windows 2000.

87
Q

Which of the following statements regarding IPv4 configuration is true?

A. All hosts on a network must have a unique subnet mask.

B. All hosts on a network must have their network ID set to all 1s.

C. All hosts on a network must have a default gateway.

D. All hosts on a network must have a unique host address.

A

D. All hosts on a network must have a unique host address.

All hosts on a network must have a unique IP address. The subnet mask should be the same for all computers on a local network. The network ID can’t be set to all 1s; otherwise, it replicates the subnet mask. Default gateways, or router address, are needed only if hosts will communicate with hosts outside their local network.

88
Q

Which Wi-Fi encryption standard uses a static key, which is commonly 10, 26, or 58 characters long?

A. WPA

B. WPA2

C. TKIP

D. WEP

A

D. WEP

Wired Equivalent Privacy (WEP) was one of the first security standards for wireless devices. It uses a static key; the keys are commonly 10, 26, or 58 hexadecimal characters long.

89
Q

Which TCP/IP port number does SNMP use?

A. TCP 143

B. UDP 143

C. TCP 161

D. UDP 161

A

D. UDP 161

Simple Network Management Protocol (SNMP) is a noncritical service, so it uses UDP. It’s assigned port 161. IMAP4 uses port 143.

90
Q

Because of a recent security breach, your IT team shut down several ports on the external firewall. Now, users can’t get to websites by using their URLs, but they can get there by using IP addresses. What port does the IT team need to open back up to enable Internet access via URLs?

A. 21

B. 53

C. 67

D. 80

A

B. 53

Clients are unable to get to the DNS server, which resolves host names (or URLs) to IP addresses. DNS uses port 53.

91
Q

All of your network hosts are configured to use DHCP. Which IP address would indicate that a host has been unable to locate a DHCP server?

A. 192.168.1.1

B. 10.1.1.1

C. 172.16.1.1

D. 169.254.1.1

A

D. 169.254.1.1

Automatic Private IP Addressing (APIPA) is a TCP/IP standard used to configure automatically IP-based hosts that are unable to reach a DHCP server. APIPA addresses are in the 169.254.0.0/16 range. If you see a computer that has an IP address beginning with 169.254, you know that it has configured itself.

92
Q

Which type of coaxial cable connector locks by twisting the connector one-quarter turn?

A. F-connector

B. BNC

C. SC

D. ST

A

B. BNC

The BNC connector locks by twisting one-quarter turn. F-connectors are threaded and screw into place. SC and ST connectors are for fiber-optic cable.

93
Q

Your network uses UTP cabling. Which of the following types of network connections require the use of a crossover cable? (Choose two.)

A. Computer to hub

B. Computer to switch

C. Computer to router

D. Switch to switch

A

C. Computer to router

D. Switch to switch

If you are going to make a connection from hub to hub, switch to switch, hub to switch, or a computer directly to a router, you need a crossover cable. Otherwise, you need a regular patch cable.

94
Q

A technician is trying to establish a dial-up network connection using a legacy modem. What is the fastest data throughput for a modem?

A. 28.8Kbps

B. 56Kbps

C. 1Mbps

D. 4Mbps

A

B. 56Kbps

The fastest modems produced had a data rate of 56Kbps. At the time, they were considered fast. Today, not so much.

95
Q

You are replacing a connector at the end of coaxial cable. What type of connector is threaded and screws into place?

A. F-connector

B. BNC

C. SC

D. ST

A

A. F-connector

F-connectors are threaded and screw into place. The BNC connector locks by twisting one-quarter turn. SC and ST connectors are for fiber-optic cable.

96
Q

You are installing UTP network cabling. The network has a mixture of network cards, but the minimum required speed is 100Mbps. What is the minimum grade of cable you can install to meet this requirement?

A. CAT3

B. CAT5

C. CAT5e

D. CAT6a

A

B. CAT5

Cat 5 UTP can transmit data at speeds up to 100Mbps, for a distance of 100 meters.

97
Q

You have reason to believe that several network users are actively browsing prohibited content on unsecured sites on the Internet. Which port can you disable on the firewall to immediately stop access to these web sites?

A. 53

B. 67

C. 80

D. 443

A

C. 80

Normal (unsecured) websites are accessed on port 80, which is the port that Hypertext Transfer Protocol (HTTP) uses. Shut it down, and no one will be able to access web sites, except secure sites that use HTTPS, which is on port 443.

98
Q

You are installing UTP network cable for a client. The client’s policies require that network cables do not produce poisonous gas when burned. What type of cable do you need to install?

A. Plenum

B. PVC

C. STP

D. CAT5e or higher

A

A. Plenum

Most network cables are coated with a plastic PVC coating, which produces toxic gas when burned. Plenum-rated cables are coated with a Teflon-like material that is not poisonous when burned.

99
Q

You have been asked to create a UTP crossover cable. Which pins need to be crossed over to make the cable work properly?

A. 1 and 2, 3 and 6

B. 1 and 3, 2 and 6

C. 1 and 6, 2 and 3

D. None of the above

A

B. 1 and 3, 2 and 6

In a crossover cable, pin 1 to pin 3 and pin 2 to pin 6 are crossed on one side of the cable only. This is to get the “send” pins matched up with the “receive” pins on the other side, and vice versa.

100
Q

Which TCP/IP protocol is designed to help resolve host names to IP addresses?

A. ARP

B. RARP

C. DHCP

D. DNS

A

D. DNS

The Domain Name System (DNS) is responsible for resolving host names to IP addresses. This is used millions of times daily on the Internet; when someone types in a website name, such as www.sybex.com, DNS will resolve that to an IP address to enable communication.

101
Q

You need to install an Internet connection for a forest ranger outlook tower, located far away from electrical lines. Which option would be best for broadband Internet access?

A. Cable

B. DSL

C. ISDN

D. Satellite

A

D. Satellite

Satellite Internet is not much like any other type of broadband connection. Instead of a cabled connection, it uses a satellite dish to receive data from an orbiting satellite and relay station that is connected to the Internet. Because it requires a clear line of sight between the transmitter and receiver, it can be referred to as “line of sight” wireless. For an installation far from civilization, it may be the only option.

102
Q

Which TCP/IP host-to-host protocol makes its best effort to deliver data but does not guarantee it?

A. IP

B. TCP

C. UDP

D. ICMP

A

C. UDP

The two host-to-host layer protocols are Transmission Control Protocol (TCP) and User Datagram Protocol (UDP). TCP guarantees packet delivery through the use of a virtual circuit and data acknowledgments, and UDP does not. Because of this, TCP is often referred to as connection oriented, whereas UDP is connectionless.

103
Q

What type of network is typically defined as being contained within a single office or building?

A. LAN

B. WAN

C. PAN

D. MAN

A

A. LAN

A local area network (LAN) is often defined as being contained in a single building, office, or home.

104
Q

Which port number is AFP capable of using?

A. 427

B. 443

C. 445

D. 548

A

D. 548

The Apple Filing Protocol (AFP) is a file transfer protocol developed by Apple. It uses port 548.

105
Q

You are installing a wireless network for a small company. They want to have 100Mbps or better wireless transmission rates. Which of the following standards will allow you to provide this? (Choose two.)

A. 802.11g

B. 802.11i

C. 802.11n

D. 802.11ac

A

C. 802.11n

D. 802.11ac

The only two Wi-Fi standards that provide greater than 100Mbps throughput are 802.11n and 802.11ac. The 802.11g standard has a maximum throughput of 54Mbps, and 802.11i is an encryption standard.

106
Q
A