2.0 Networking - A+ 1101 Flashcards
(122 cards)
- You are installing a fiber-optic cable between two buildings. To install the cable, you must
run it through a conduit between the buildings, and access to the conduit is not easy. Before
you run the cable, you want to ensure that it’s working properly. Which tool should you use?
A. Cable tester
B. Multimeter
C. Loopback plug
D. Tone generator and probe
- A. Cable testers are indispensable tools for any network technician. Usually you would use a cable tester before you install a cable to make sure it works. Of course, you can test them
after they’ve been run as well.
Multimeters are used to test power supplies and wall outlets.
Loopback plugs are used to test network interface cards, and tone generators and probes are used to locate a wire among other wires
- Which TCP/IP protocol, designed to download email, allows for multiple clients to be
simultaneously connected to the same mailbox?
A. SMTP
B. POP3
C. IMAP
D. SMB
- C. Internet Message Access Protocol (IMAP) is a secure protocol designed to download email. It has several advantages over the older Post Office Protocol 3 (POP3). First, IMAP4 works in connected and disconnected modes. Second, it lets you store the email on the server, as opposed to POP3, which requires you to download it. Third, IMAP4 allows multiple clients to be simultaneously connected to the same inbox.
Simple Mail Transfer Protocol (SMTP) is used for sending mail, and Server Message Block (SMB) is used in sharing
files across a network.
- You are using your laptop on the company network. In your web browser, you type
www.google.com and press Enter. The computer will not find Google. You open the
browser on your phone, and using your cellular connection, you can open Google without
a problem. Your laptop finds internal servers and can print without any issues. What is the
most likely reason you can’t open Google?
A. DNS server problem
B. DHCP server problem
C. Missing subnet mask
D. Duplicate IP address
- A. The Domain Name System (DNS) server is responsible for resolving hostnames, such as www.google.com, to IP addresses to enable communication.
If it’s not working properly or you can’t connect to it, you won’t be able to browse the Internet using friendly website
names.
Dynamic Host Configuration Protocol (DHCP) is used to assign IP addresses to network clients.
The subnet mask might be incorrect, but it wouldn’t be missing, and a duplicate IP address would provide an error message stating that
- Which one of the following TCP/IP protocols was designed as a replacement for Telnet?
A. SMB
B. SSH
C. SFTP
D. FTPS
- B. Secure Shell (SSH) can be used to set up a secure session over port 22 for remote logins or for remotely executing programs and transferring files. Because it’s secure, it was originally designed to be a replacement for the unsecure telnet command.
Server Message Block (SMB), File Transfer Protocol (FTP), and FTP Secure (FTPS) protocols are used for sharing
files across a network.
- Which of the following network connectivity devices operates at Layer 2 of the OSI model?
A. Hub
B. Switch
C. Cable
D. Router
- B. A switch operates at layer 2 of the open systems interconnection (OSI) model. Layers of the OSI model are (1) physical, (2) datalink, (3) network, (4) transport, (5) session, (6) presentation, and (7) application.
The physical layer encompasses transmission media such as
unshielded twisted pair (UTP), shielded twisted pair (STP), fiber optic, and so on.
The data link layer deals with transmitting frames on a LAN, so it includes the network interface card (NIC) and switch. Routers operate on OSI layer 3, because they transmit data between networks.
Hubs work on OSI layer 1 because they merely connect devices in the same collision domain without regard to packet header information.
- Which of the following TCP/IP protocols is connection-oriented and attempts to guarantee
packet delivery?
A. IP
B. TCP
C. UDP
D. ICMP
- B. Transmission Control Protocol (TCP) guarantees packet delivery through the use of a virtual circuit and data acknowledgments, and User Datagram Protocol (UDP) does not.
Because of this, TCP is often referred to as connection-oriented, whereas UDP is connectionless.
Internet Protocol (IP) is used to get packets to their destination across the Internet, and
Internet Control Message Protocol (ICMP) is used by connectivity devices to diagnose problems and send messages.
- Which Wi-Fi standard is the fastest, operating in both the 2.4 and 5 GHz frequencies?
A. 802.11a
B. 802.11ac
C. 802.11ax
D. 802.11n
- C. 802.11ax (Wi-Fi 6) is considered a replacement for 802.11ac (Wi-Fi 5). 802.11ac operates in the 5 GHz frequency, while 802.11ax can operate between 1 and 7.125 GHz frequencies, encompassing the 2.4 GHz and 5 GHz bands. 802.11ac can send data at over 1 Gbps, while
802.11ax can be several times that. 802.11a was adopted in 1999.
It operates at 54 Mbps in the 5 GHz frequency band. 802.11n was adopted in 2008.
It operates at 600 Mbps in both the 2.4 GHz and 5 GHz ranges.
- Bob has a device that operates at 5 GHz. He is unable to connect his device to a LAN that he
hasn’t accessed before, although he has verified that he has the correct password. What type
of network might pose this problem?
A. 802.11g
B. 802.11n
C. 802.11ac
D. 802.11ax
- A. If Bob is trying to connect to an 802.11g network, his device will not be able to connect because 802.11g operates on the 2.4 GHz frequency only. 802.11n and 802.11ax both
operate on 2.4 GHz and 5 GHz. 802.11ac operates only on the 5 GHz frequency.
- You have just installed a wireless 802.11ac network for a client. The IT manager is concerned
about competitors intercepting the wireless signal from outside the building. Which tool is
designed to test how far your wireless signal travels?
A. Tone generator and probe
B. Protocol analyzer
C. Packet sniffer
D. Wi-Fi analyzer
- D. A wireless locator, or a Wi-Fi analyzer, can be either a handheld hardware device or specialized software that is installed on a laptop, smartphone, or other mobile device and whose purpose is to detect and analyze Wi-Fi signals.
It can detect where signals are strong or weak to determine whether there are potential security issues.
A tone generator and probe are used for locating a wire.
Protocol analyzers and packet sniffers are tools used for capturing and analyzing network traffic.
- Which TCP/IP protocol is used to provide shared access to files and printers on the network?
A. FTP
B. SSH
C. SMB
D. SMTP
- C. Server Message Block (SMB) is a protocol used to provide shared access to files, printers, and other network resources. In a way, it functions a bit like
File Transfer Protocol (FTP), only with a few more options, such as the ability to connect to printers and more
management commands.
Secure Shell (SSH) uses encryption to create a secure contact between two computers, and
Simple Mail Transfer Protocol (SMTP) is used for sending email.
- Which TCP/IP Internet layer protocol is responsible for delivering error messages if communication between two computers fails?
A. ICMP
B. IP
C. TCP
D. UDP
- A. The main Internet layer protocol is Internet Protocol (IP), and it’s the workhorse of TCP/IP. Another key protocol at this layer is Internet Control Message Protocol (ICMP), which is responsible for delivering error messages.
If you’re familiar with the ping utility, you’ll know that it utilizes ICMP to send and receive packets.
Transmission Control Protocol (TCP) and User Datagram Protocol (UDP) are both communication protocols; TCP guarantees delivery but UDP does not.
- Which type of IPv6 address identifies a single node on the network?
A. Multicast
B. Anycast
C. Unicast
D. Localcast
- C. There are three types of addresses in IPv6: unicast, anycast, and multicast.
A unicast address identifies a single node on the network.
An anycast address refers to one that has been assigned to multiple nodes, and a packet will be delivered to one of them.
A multicast
address is one that identifies multiple hosts, and a packet will be sent to all of them
- Which TCP/IP protocol, developed by Microsoft, uses port 3389 to connect to a
remote computer?
A. RDP
B. SMB
C. CIFS
D. Telnet
- A. Developed by Microsoft, the Remote Desktop Protocol (RDP) allows users to connect to remote computers and run programs on them as if they were sitting at the computer. It uses port 3389. A port is associated with a specific protocol and must be “opened” on a router to allow traffic from the program or protocol to enter the LAN.
The combination of an IP address and a port is considered a socket. The IP address gets the data to the right destination, and the port number tells the transmission layer of the OSI model which application the data is to be sent to.
Server Message Block (SMB) and Common Internet File System (CIFS) are used in sharing files across a network. Telnet is an unsecure protocol that has been largely replaced by the Secure Shell (SSH) protocol.
- What port does the SSH protocol use?
A. 21
B. 22
C. 23
D. 25
- B. Secure Shell (SSH) can be used to set up a secure session for remote logins or for remotely executing programs and transferring files.
SSH uses port 22. SSH has largely replaced the insecure Telnet, which uses port 23.
Port 21 is used by File Transfer Protocol (FTP), and port 25 is used by Simple Mail Transfer Protocol (SMTP)
- Which of the following IP addresses is not routable on the Internet?
A. 10.1.1.1
B. 11.1.1.1
C. 12.1.1.1
D. 13.1.1.1
- A. Private IP addresses are not routable on the Internet. IPv4 network numbers were arranged in classes, and classes A, B, and C each have their own private range.
The private IP address range for Class A networks is 10.0.0.0/8.
The /8 means that the first 8 bits of the subnet mask denote the network number.
Expressing a subnet mask this way is known as
CIDR (pronounced cider) notation. CIDR stands for classless interdomain routing.
- Which network connectivity device does not forward broadcast messages, thereby creating
multiple broadcast domains?
A. Hub
B. Switch
C. Bridge
D. Router
- D. One of the key features of routers is that they break up broadcast domains.
Broadcast traffic from one port of the router will not get passed to the other ports, which greatly reduces network traffic.
Bridges, hubs, and switches will all forward broadcast packets.
- What type of address does a router use to get data to its destination?
A. IP
B. MAC
C. Memory
D. Loopback
- A. Routers are OSI model Layer 3 devices. They keep a chart containing the IP address of the device connected to each port, whether that device is a computer or another router’s external
address.
A media access control (MAC) address is the address of a network interface card (NIC).
Memory addresses identify where information is stored, and a loopback address is used to test TCP/IP on the local host.
The loopback address for IPv4 is 127.0.0.1, and for IPv6 it is ::1.
- You have a desktop computer that is behaving erratically on the network. The wired connection will often disconnect without warning. Which tool should you use to troubleshoot the
network adapter?
A. Multimeter
B. Tone generator and probe
C. Loopback plug
D. Cable tester
- C. A loopback plug is for testing the ability of a network adapter to send and receive. The plug gets plugged into the network interface card (NIC), and then a loopback test is performed using troubleshooting software.
You can then tell whether the card is working properly.
Multimeters are used for testing power supplies and wall outlets, a tone generator and probe help the technician to find a specific wire, and
a cable tester checks that an Ethernet wire was configured correctly and that it can make an end-to-end connection
- Your company just expanded and is leasing additional space in an adjacent office building.
You need to extend the network to the new building. Fortunately, there is a conduit between
the two. You estimate that the cable you need to run will be about 300 meters long. What
type of cable should you use?
A. CAT-5e
B. CAT-7
C. CAT-8
D. MMF
- D. Category 5, 6, and 7 UTP cables are limited to 100 meters, while Category 8 is limited to only 100 feet, so none of the UTP cables listed will work.
You need fiber, and multimode fiber (MMF) can span distances of 300 meters.
MMF is also known as OM1, OM2, OM3, OM4,
and OM5.
OM stands for optical mode. Specifications for each type of multimode fiber are available in the ISO/IEC 11801 standard.
- You want to ensure that client computers can download email from external email servers
regardless of the protocol their email client uses. Which ports do you open on the firewall to
enable this? (Choose two.)
A. 23
B. 25
C. 110
D. 143
- C, D. Simple Mail Transfer Protocol (SMTP, port 25), Post Office Protocol 3 (POP3, port
110), and Internet Message Access Protocol (IMAP, port 143) are all email protocols.
SMTP
is for sending email.
POP3 and IMAP are for downloading (receiving) email. Port 23 is used
by Telnet.
Option B is incorrect because the question specifically asks about downloading (not sending) email.
- You are installing network cabling in a highly secure facility. The cables need to be immune
to electronic eavesdropping. What type of cable should you use?
A. Fiber-optic
B. UTP
C. STP
D. Coaxial
- A. Fiber-optic cabling uses pulses of light instead of electric voltages to transmit data, so
it is immune to electrical interference and to wiretapping. UTP, STP, and coaxial are all copper cables, which use electricity to transmit data and so can be subjected to electronic eavesdropping.
- Which networking device is capable of reading IP addresses and forwarding packets based on
the destination IP address?
A. Hub
B. Switch
C. NIC
D. Router
- D. Routers operate at the Network layer (Layer 3) of the OSI model. Because of this, they make their decisions on what to do with traffic based on logical addresses, such as an Internet Protocol (IP) address.
Switches use media access control (MAC) addresses and are OSI
Layer 2 devices. Hubs and NICs operate primarily at the physical layer (Layer 1).
- You are manually configuring TCP/IP hosts on the network. What configuration parameter
specifies the internal address of the router that enables Internet access?
A. Subnet mask
B. DHCP server
C. DNS server
D. Default gateway
- D. The default gateway is the address to the network’s router on the LAN side of the router.
T
he router allows the host to communicate with hosts who are not on the local network. The default gateway is also called the router’s internal address.
The ipconfig /all command can be used to see the default gateway address that the local computer is currently configured to use.
The router will also have an external address, which is used to communicate with networks outside the LAN. Virtually all modern routers use a process called network address translation (NAT), which will substitute the router’s external address for a host’s IP
address when requesting information from a remote network.
The router knows which host requested the information and will pass it on to the correct host when it is received. This is one of the ways that the router protects the local hosts from the outside world.
- Which of the following devices will be found in a telecommunications room and provides a
means to congregate horizontal wiring, terminating each run in a female port?
A. Patch panel
B. Multiplexer
C. Rack U
D. Demarcation point
- A. A patch panel can be found in a telecommunications room (also called a wiring closet), usually mounted in a networking rack. On the back will be connections to “punch down”
wires into.
On the front will be a female port, usually an RJ45 type. A multiplexer is a device that aggregates several connections into one. A rack U is simply a measurement of the height of a device mounted into a rack (e.g., my patch panel is 4U).
Each U is equal to 1.75 inches.
The demarcation point is where responsibility for a network changes from the ISP to
its customer