Chapter 2 Networking Flashcards

1
Q

You are using your laptop on the company network. In your web browser, you type www.google.com and press Enter. The computer will not find Google. You open the browser on your phone, and using your cellular connection, you can open Google without a problem. Your laptop finds internal servers and can print without any issues. What is the most likely reason you can’t open Google?

A) DNS server problem
B) DHCP server problem
C) Missing subnet mask
D) Duplicate IP address

A

A. The Domain Name System (DNS) server is responsible for resolving hostnames, such as www.google.com, to IP addresses to enable communication. If it’s not working properly or you can’t connect to it, you won’t be able to browse the Internet using friendly website names. Dynamic Host Configuration Protocol (DHCP) is used to assign IP addresses to network clients. The subnet mask might be incorrect, but it wouldn’t be missing, and a duplicate IP address would provide an error message stating that.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Which of the following network connectivity devices operates at Layer 2 of the OSI model?

A) Hub
B) Switch
C) Cable
D) Router

A

B. A switch operates at layer 2 of the open systems interconnection (OSI) model. Layers of the OSI model are (1) physical, (2) datalink, (3) network, (4) transport, (5) session, (6) presentation, and (7) application. The physical layer encompasses transmission media such as unshielded twisted pair (UTP), shielded twisted pair (STP), fiber optic, and so on. The datalink layer deals with transmitting frames on a LAN, so it includes the network interface card (NIC) and switch. Routers operate on OSI layer 3, because they transmit data between networks. Hubs work on OSI layer 1 because they merely connect devices in the same collision domain without regard to packet header information. The OSI model is not listed as an objective on the CompTIA A+ exam, but understanding it will help you understand network communications.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Which Wi-Fi standard is the fastest, operating in both the 2.4 and 5 GHz frequencies?

A) 802.11a
B) 802.11ac
C) 802.11ax
D) 802.11n

A

C. 802.11ax (Wi-Fi 6) is considered a replacement for 802.11ac (Wi-Fi 5). 802.11ac operates in the 5 GHz frequency, while 802.11ax can operate between 1 and 7.125 GHz frequencies, encompassing the 2.4 GHz and 5 GHz bands. 802.11ac can send data at over 1 Gbps, while 802.11ax can be several times that. 802.11a was adopted in 1999. It operates at 54 Mbps in the 5 GHz frequency band. 802.11n was adopted in 2008. It operates at 600 Mbps in both the 2.4 GHz and 5 GHz ranges.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Which type of IPv6 address identifies a single node on the network?

A) Multicast
B) Anycast
C) Unicast
D) Localcast

A

C. There are three types of addresses in IPv6: unicast, anycast, and multicast. A unicast address identifies a single node on the network. An anycast address refers to one that has been assigned to multiple nodes, and a packet will be delivered to one of them. A multicast address is one that identifies multiple hosts, and a packet will be sent to all of them.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What type of network covers large geographical areas and often supports thousands of users, often using lines owned by other entities?

A) LAN
B) WAN
C) PAN
D) MAN

A

B. A wide area network (WAN) covers large geographical areas and often supports thousands of users. A WAN can be for different locations of a single company, or a WAN may connect several different companies together to share information. WAN lines are often leased from a WAN provider. The Internet is considered to be a very large WAN. A local area network (LAN) covers a relatively small area such as a home or business. A personal area network (PAN) is usually used by one person and consists of their computer and its Bluetooth devices. A metropolitan area network (MAN) is similar to a WAN, but the area covered is much smaller, such as a university or a city.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Which of the following IP addresses is not routable on the Internet?

A) 10.1.1.1
B) 11.1.1.1
C) 12.1.1.1
D) 13.1.1.1

A

A. Private IP addresses are not routable on the Internet. IPv4 network numbers were arranged in classes, and classes A, B, and C each have their own private range. The private IP address range for Class A networks is 10.0.0.0/8. The /8 means that the first 8 bits of the subnet mask denote the network number. Expressing a subnet mask this way is known as CIDR (pronounced cider) notation. CIDR stands for classless interdomain routing. While the term CIDR doesn’t appear on the objectives for this CompTIA A+ exam, you may still run into it while working in IT.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Which network connectivity device does not forward broadcast messages, thereby creating multiple broadcast domains?

A) Hub
B) Switch
C) Bridge
D) Router

A

D. One of the key features of routers is that they break up broadcast domains. Broadcast traffic from one port of the router will not get passed to the other ports, which greatly reduces network traffic. Bridges, hubs, and switches will all forward broadcast packets.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

your company just expanded and is leasing additional space in an adjacent office building. You need to extend the network to the new building. Fortunately, there is a conduit between the two. You estimate that the cable you need to run will be about 300 meters long. What type of cable should you use?

A) CAT-5e
B) CAT-7
C) CAT-8
D) MMF

A

D. Category 5, 6, and 7 UTP cables are limited to 100 meters, while Category 8 is limited to only 100 feet, so none of the UTP cables listed will work. You need fiber, and multimode fiber (MMF) can span distances of 300 meters. MMF is also known as OM1, OM2, OM3, OM4, and OM5. OM stands for optical mode. Specifications for each type of multimode fiber are available in the ISO/IEC 11801 standard.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Which of the following devices will be found in a telecommunications room and provides a means to congregate horizontal wiring, terminating each run in a female port?

A) Patch panel
B) Multiplexer
C) Rack U
D) Demarcation point

A

A. A patch panel can be found in a telecommunications room (also called a wiring closet), usually mounted in a networking rack. On the back will be connections to “punch down” wires into. On the front will be a female port, usually an RJ45 type. A multiplexer is a device that aggregates several connections into one. A rack U is simply a measurement of the height of a device mounted into a rack (e.g., my patch panel is 4U). Each U is equal to 1.75 inches. The demarcation point is where responsibility for a network changes from the ISP to its customer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Which of the following IPv6 addresses is automatically assigned by the host when it boots and is only usable on the broadcast domain that it exists in?

A) 2000::/3
B) FC00::/7
C) FE80::/10
D) FF00::/8

A

C. An IPv6 address in the FE80::/10 range is called a link-local address and is similar to an IPv4 automatic private IP addressing (APIPA) address. (The 169.254.0.0/16 range in IPv4 is the APIPA range, used for automatic configuration if the host can’t locate a Dynamic Host Configuration Protocol [DHCP] server.) Link-local addresses are generated by the PC when it boots up. Packets using a link-local address cannot be forwarded by a router.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

You need to configure a wireless router for an office network. The office manager wants new devices to be able to automatically join the network and announce their presence to other networked devices. Which service should you enable to allow this?

A) DHCP
B) NAT
C) QoS
D) UPnP

A

D. Universal Plug and Play (UPnP) is a standard designed to simplify the process of connecting devices to a network and to enable those devices to automatically announce their presence to other devices on the network. In a truly secure environment, UPnP would be disabled, but it is often left enabled on home networks. Dynamic Host Configuration Protocol (DHCP) automatically assigns an IP address to a device when it is powered on, attached to a network, and configured to obtain an address dynamically. Network address translation (NAT) is a feature of routers used to hide the IP addresses of computers on the local network side of the router from the other networks and computers on the outside of the network. Quality of Service (QoS) can be configured to give desired devices preference over others for using network bandwidth.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

You are troubleshooting a computer with an IPv6 address that is in the FE80::/10 range. Which of the following statements are true? (Choose two.)

A) The computer will not be able to get on the Internet using that IP address.
B) The computer will be able to get on the Internet using that IP address.
C) The computer is configured with a link-local unicast address.
D) The computer is configured with a global unicast address.

A

A, C. Addresses in the FE80::/10 range are link-local unicast addresses. A link-local address is assigned to each IPv6 interface but is not routable on the Internet. If this is the only address the host has, it will not be able to get on the Internet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

You are configuring network hosts with static IP addresses. You have chosen to use a Class B network address. What is the default subnet mask that you should configure on the hosts?

A) 255.0.0.0
B) 255.255.0.0
C) 255.255.255.0
D) 255.255.255.255

A

B. The default subnet mask for Class B networks is 255.255.0.0, or written in shorthand, /16. The default subnet mask for Class A networks is 255.0.0.0, or written in shorthand, /8, and for Class C it is 255.255.255.0, or written in shorthand, /24. 255.255.255.255 is an IPv4 broadcast address. As a subnet mask it is represented as /32 (in shorthand) in the classless interdomain routing (CIDR) notation.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Which TCP/IP protocol uses port 445?

A) FTP
B) SSH
C) SMB
D) SNMP

A

C. Server Message Block (SMB) is a protocol used to provide shared access to files, printers, and other network resources. It originally ran on NetBIOS over UDP using ports 137/138 and over TCP using ports 137 and 139, but it’s now part of the TCP/IP stack and uses port 445. Running on NetBIOS allows SMB to facilitate file sharing on a single network, while being part of TCP/IP allows it to facilitate file sharing across the Internet. By itself, SMB is not secure, so it needs other network appliances or software to secure the data being sent over its port(s). File

Transfer Protocol (FTP) uses ports 20/21,

Secure Shell (SSH) uses port 22, and

Simple Network Management Protocol (SNMP) uses ports 161/162.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What rendition of SMB was used by Windows servers and NAS servers but is no longer often used?

A) CIFS
B) Samba
C) NFS
D) SMB3

A

A. All of the answer choices are communications protocols for sharing resources. The Common Internet File System (CIFS) is Microsoft’s version of Server Message Block (SMB.) Once upon a time CIFS was used extensively for file sharing over a network, but it has since fallen out of favor. While CIFS and SMB both facilitate file sharing, SMB does it better and has other features as well. Samba and Network File System (NFS) facilitate sharing files between clients and servers in Linux distributions. Samba will allow mixed environments with both Windows and Linux machines to share files. NFS will not.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

For IPv6, which of the following statements are true? (Choose two.)

A) Each IPv6 interface can have only one address.
B) Each IPv6 interface is required to have a link-local address.
C) IPv6 addresses are incompatible with IPv4 networks.
D) IPv6 does not use broadcasts.

A

B, D. Each IPv6 interface can and often does have multiple addresses assigned to it. IPv6 is backward compatible with IPv4 by using tunneling, dual stack, or translation. IPv6 uses multicast addresses in place of broadcast addresses, and a link-local address is established either automatically when a computer boots up or by manually configuring it, but either way the link-local address must be present.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Which network connectivity device is seldom used in modern networks, except to extend a network?

A) Bridge
B) Hub
C) Switch
D) Router

A

B. Hubs were once used extensively in Ethernet networks, but they have fallen out of favor because they have a large disadvantage when compared to switches. A hub forms a single collision domain with all of their ports. On a switch, each port is its own collision domain. A switch keeps a table of its ports and the media access control (MAC) address that can be reached from each port. A switch will only forward a packet to a specific port, whereas a hub will forward a packet to all of its ports. The exception is that a broadcast packet will be sent to all switch ports. Switches are faster and more accurate than hubs and are used almost exclusively as the connectivity device within a local area network (LAN.)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

There is a TCP/IP protocol that should only be used locally because it has virtually no security. It may be used as a part of a preboot execution environment (PXE) or with thin clients booting from a network drive. It uses very little memory and is good for transferring boot files or configuration data between computers on a LAN, and it is connectionless. Which file transfer protocol is this?

A) FTP
B) TFTP
C) FTPS
D) SMTP

A

B. The Trivial File Transfer Protocol (TFTP) is a very simple connectionless protocol. It has little overhead, meaning that it doesn’t take much memory to run it. This makes it perfect for booting a thin client across a network. It can be used to transfer the needed boot files to devices that don’t have hard drives. It should not be used to transfer files across the Internet because it is not secure. File Transfer Protocol (FTP) is more robust than TFTP. File Transfer Protocol Secure (FTPS) is a secure version of FTP. Simple Mail Transfer Protocol (SMTP) is used to send email messages.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Which of the following IPv6 addresses is equivalent to 127.0.0.1 in IPv4?

A) ::0
B) ::1
C) ::127
D) 2000::/3

A

B. 127.0.0.1 is the IPv4 loopback address, used to ping the local network interface. The IPv6 equivalent is ::1.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Which networking device has multiple ports, each of which is its own collision domain, and examines the header of the incoming packet to determine which port the packet gets sent to?

A) Hub
B) Switch
C) Bridge
D) Router

A

B. Switches provide centralized connectivity for a LAN. Switches examine the header of incoming packets and forward each to only the port whose associated media access control (MAC) address matches the receiving MAC address in the header. Hubs are seldom used now because the entire hub is one collision domain and when a packet is received, the hub sends the packet out to all of its ports indiscriminately. Bridges are used to connect different networks to work as one, and routers are used to forward packets from one network to other networks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

A technician is going to set up a Wi-Fi network using standard omnidirectional antennae. Because of the building configuration, transmitting signals for the greatest distance is the technician’s primary criterion. Which standard should they choose?

A) 802.11a
B) 802.11g
C) 802.11n
D) 802.11ac

A

C. Of the Wi-Fi standards listed, 802.11n has the longest range by default, at roughly 70 meters indoors and 250 meters outdoors. 802.11ac is newer and faster than 802.11n, but it transmits exclusively in the 5 GHz range, which restricts its functional distance. 802.11a, which is legacy and uses the 5 GHz frequency range, could only send a signal about 30 meters, and 802.11g, which is also legacy but uses the 2.4 GHz frequency range, could only send a signal about 50 meters.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

What marks the boundary of a IPv4 broadcast domain?

A) Hub
B) Switch
C) Router
D) Modem

A

C. Hubs send every communication they receive out every connected port. Switches will send broadcast packets out every port, but otherwise will send packets to a specific port based on the MAC address. A router will not forward any broadcast packet; therefore a router is the boundary of an IPv4 broadcast domain. A modem (modulator/demodulator) converts signals from one type to another, such as from an analog signal to a digital one.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

You have been asked to install a Wi-Fi network in a building that is approximately 100 meters long and 25 meters wide. Because of cost considerations, you will be using 802.11ac. At a minimum, how many wireless access points will you need?

A) Two
B) Three
C) Four
D) Six

A

B. The 802.11ac standard has an indoor range of approximately 35 meters. At a minimum, you will need three access points. Depending on coverage and indoor interference, such as thick walls, you might need more.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

If you are connecting to a website that encrypts its connection using TLS, what port does that traffic travel on?

A) 21
B) 80
C) 143
D) 443

A

D. To encrypt traffic between a web server and client securely, Hypertext Transfer Protocol Secure (HTTPS) can be used. HTTPS connections are secured using either Secure Sockets Layer (SSL) or Transport Layer Security (TLS). HTTPS uses port 443. Port 21 is used by File Transfer Protocol (FTP), port 80 is used by Hypertext Transfer Protocol (HTTP), and port 143 is used by Internet Mail Access Protocol (IMAP).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

What type of network spans multiple buildings or offices, possibly even crossing roads, but is confined to a relatively small geographical area?

A) LAN
B) WAN
C) PAN
D) MAN

A

D. Networks that are larger than a LAN but confined to a relatively small geographical area are metropolitan area networks (MANs). A MAN is generally defined as a network that spans a city or a large campus. LAN stands for local area network. PAN (personal area network) is the smallest of the types of networks, and a WAN is the largest type of network. It could connect faraway cities or even other countries.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

Which of the following shorthand notations corresponds to the CIDR subnet mask 255.255.224.0?

A) /19
B) /20
C) /21
D) /22

A

A. A subnet mask of 255.255.224.0 has 8 bits in each of the first 2 octets set to on, and it has 3 bits in the third octet on. Therefore, it corresponds to /19 in shorthand. In the binary number system (base two), each bit has two possible values, 0 or 1. Each bit in an octet going from right to left increments by an exponent of two, making the bits of the octets worth the decimal values as follows: | 128 |64 |32 |16 | 8 | 4 | 2 | 1 |. Bits for the subnet mask are always used from left to right, so one bit would be equal to a decimal value of 128. Two bits would be equal to a decimal value of 192 (128 + 64). Three bits would be equal to a decimal value of 224 (128 + 64 + 32), and so on. When all 8 bits of the octet are used for the subnet mask, the equivalent decimal value is 255. For this example, the first 2 octets (8 bits each) are completely on, and in the third octet, only 3 bits are on, making a total of 19 bits in the subnet mask turned on to indicate the network number (8 + 8 + 3 = 19).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

You are configuring hosts on a network running IPv4. Which elements are required for the computer to connect to the network?

A) IP address
B) IP address and subnet mask
C) IP address, subnet mask, and default gateway
D) IP address, subnet mask, default gateway, and DNS server address

A

B. To communicate on an IPv4 network, a host must be configured with a valid IP address and a subnet mask. A default gateway is needed only if the host will connect to a remote network. DNS servers are optional but useful, because they resolve hostnames to IP addresses.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

You work at a tech support company and a customer called reporting that they received an error, something about a duplicate IP address. Why are they getting this message? (Choose two.)

A) All hosts on a network must have a unique IP address.
B) A PC is manually configured with an IP that is in the DHCP scope.
C) A PC is manually configured with an IP that is not in the DHCP scope.
D) None of the PCs have been manually configured.

A

A, B. No two nodes on any network, whether IPv4 or IPv6, can have the same IP address because the host portion (or interface ID) of the IP address is what identifies the individual computer on the network. If the network has some machines manually configured, which is generally done with servers, and the remainder of the computers are configured to use Dynamic Host Configuration Protocol (DHCP), you would need to ensure that the manually configured numbers are outside of the DHCP scope (the numbers the DHCP server will automatically assign) but within the bounds of the network. For example, in an IPv4 network, if the network number is 200.100.1.0, the router, which is also acting as a default gateway, might be assigned 200.100.1.1, and numbers from 200.100.1.2 through 200.100.1.20 could be reserved for static configuration on devices that need an IP address that does not change. The DHCP scope would need to not include those numbers. If the network needed an available 180 IP addresses, then 200.100.1.21 to 200.100.1.200 could be safely assigned to the DHCP scope, avoiding any IP address duplication.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

Which obsolete Wi-Fi encryption standard uses a static key, which is commonly 10, 26, or 58 characters long?

A) WPA3
B) WPA2
C) TKIP
D) WEP

A

D. Wired Equivalent Privacy (WEP) was one of the first security standards for wireless devices. It uses a static key; the keys are commonly 10, 26, or 58 hexadecimal characters long. WEP was depreciated in 2004 because it was no longer secure and was replaced temporarily by WPA, which was quickly replaced by WPA2. WPA3 is the current and most secure standard.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

You’ve been asked to set up a device that will be monitored using an SNMP agent and manager. What port will the SNMP manager use when polling the agent?

A

UDP 161, Simple Network Management Protocol (SNMP) uses UDP port 161. User Datagram Protocol (UDP) is considered connectionless, so it does not guarantee delivery of data packets and has a lower network overhead than Transmission Control Protocol (TCP), a connection-oriented protocol, does. Port 143 is used for IMAP.

31
Q

What legacy network protocol allows NetBIOS-dependent computer applications to communicate over TCP/IP?

A) TFTP
B) HTTPS
C) NetBT
D) BGP

A

C. NetBIOS over TCP/IP (NetBT) is for older applications still reliant on NetBIOS, the legacy network protocol intended for very small networks. NetBT lets such applications communicate over TCP/IP. Trivial File Transfer Protocol (TFTP) is a basic connectionless protocol that allows file transfer functions without user interaction. Hypertext Transfer Protocol Secure (HTTPS) is a secure connection-oriented protocol that runs over port 443.

32
Q

Which of the following features does not require a managed network switch?

A) Priority of traffic
B) VLAN configuration
C) Direct packets out the proper port
D) Port mirroring

A

C. An unmanaged switch will simply perform the basic task a switch should do: direct network traffic out the correct destination port. Prioritizing traffic, configuring virtual LANs (VLANs), and mirroring ports are all jobs that are done using managed switches.

33
Q

The senior network administrator struggles to configure company network devices spanning several cities. It’s a challenge because they are required to be on premises for the network infrastructure of each building. What would be a cost-effective solution?

A) Employ network administrators at each building.
B) Go to a flat network.
C) Train a local sales associate.
D) Employ a cloud-based network controller.

A

D. Migrating network configuration to the cloud would allow the network administrator to perform their duties without requiring travel.

34
Q

What port(s) does DHCP use?

A) 67/68
B) 137/139
C) 80
D) 445

A

A. DHCP uses ports 67/68.
Ports 137/139 are for NetBIOS/NetBT.
Port 80 is for HTTP, and
port 445 is for SMB.

35
Q

What is the maximum distance allowed between a power over Ethernet injector and the Ethernet device running on a 1000BaseT network?

A) 50 meters
B) 100 meters
C) 250 meters
D) 450 meters

A

B. The distance for Power over Ethernet (PoE) is limited by the maximum distance set by the Ethernet cabling: 100 meters (328 feet). The power injector, the device that sources the electrical power to certain wires in the cable, can be as much as 100 meters from the powered device. The injector also needs to have sufficient power to match device needs, and devices must be compatible. PoE devices such as powered switches can provide a few watts or well over 100 watts, depending on the device.

36
Q

Which of the following protocols uses port 137 and 139?

A) DNS
B) SMB
C) NetBT
D) SSH

A

C. NetBT is NetBIOS over TCP/IP, an older protocol for applications that still rely on NetBIOS. It uses ports 137 and 139, and it’s still on the CompTIA A+ certification objectives. DNS uses port 53, SMB uses port 445, and SSH uses port 22.

37
Q

When setting up a small office, home office (SOHO) network, how do the end-user devices know what IP address they need to use to connect with the network?

A) The network switch broadcasts configuration settings.
B) Devices utilize service location protocol.
C) The NIC is set with a static address or DHCP-served.
D) End users configure IP addresses as needed.

A

C. The end-user devices are configured to at least request a DHCP-assigned IP address or they are preconfigured with a static IP, gateway, subnet mask, and DNS information.

38
Q

What is the most likely way for a homeowner’s IoT devices to connect to their wireless network?

A) DNS
B) AD
C) SSO
D) DHCP

A

D. Unless an Internet of Things (IoT) device possesses an end-user accessible management interface, that device will likely connect at least initially using Dynamic Host Configuration Protocol (DHCP) to obtain an IP address. Domain Name System (DNS) resolves names like Wiley.com to an IP address. AD is Active Directory, which is a Microsoft client-server security solution, and Single Sign-On (SSO) allows a user to enter their credentials once to access several resources.

39
Q

What type of server provides Internet access to company-provided information such as how to contact a company, products or services for sale, and other information?

A) FTP server
B) Proxy server
C) File server
D) Web server

A

D. A web server consists of hardware and software used to provide information to remote clients via the Internet. The main protocols for web servers are HTTP and HTTPS, but they can use other protocols as well. File Transfer Protocol (FTP) servers are used for downloading files quickly, and while they may have a graphical user interface (GUI), they have much less overhead than a web server. Proxy servers are a security measure between an internal user and the web and are used to monitor and filter information going into or out of a network. File servers are often used on a LAN to provide access to the same files by multiple users.

40
Q

What type of server can host files for easy access and downloading, similar to how a web server serves web pages?

A) FTP server
B) Proxy server
C) File server
D) DNS server

A

A. The File Transfer Protocol (FTP) server hosts files for easy access, allowing users to browse it and download and upload files. Proxy servers monitor and filter traffic into and out of a network. File servers are a repository of files accessed by multiple users on a network. A DNS server resolves human-readable names such as Wiley.com to an IP address.

41
Q

What server is accessed each time it’s necessary to challenge and validate a user’s credentials in order for the user to access a network resource?

A) Syslog server
B) DNS server
C) Print server
D) Authentication server

A

D. The authentication server facilitates the challenge/response service for validating someone’s credentials. Syslog servers provide a repository of events on the network to aid in network management. DNS servers resolve URLs to IP addresses, and print servers provide and manage access to one or more printers by multiple users on a network.

42
Q

What service can collect and journal all the system-generated messages produced by servers and network devices?

A) Syslog server
B) DNS server
C) Print server
D) Authentication server

A

A. The syslog server operates with the Syslog protocol, which is used by many different operating systems and devices. These system-generated messages vary from the mundane “System started” to critical alerts. DNS servers resolve domain names to IP addresses. Print servers facilitate and manage printing by multiple users to one or more printers on a network, and authentication servers verify identity before granting access to a resource.

43
Q

Which of the following are connection-oriented protocols? (Choose two.)

A) DHCP
B) TFTP
C) HTTPS
D) SSH

A

C, D. Connection-oriented protocols work over TCP, which guarantees delivery of packets. This guarantee requires greater resources than UDP, which is connectionless, therefore not requiring that a packet be resent if not received. HTTPS and SSH are connection-oriented protocols, whereas Trivial File Transfer Protocol (TFTP) and DHCP are connectionless protocols.

44
Q

A company wanting to monitor network traffic or host system behavior to identify suspect activity will install what type of service?

A) Proxy server
B) IDS
C) UTM
D) ATM

A

B. An intrusion detection system (IDS) will monitor and alert you on suspect behavior. The IDS can be a network-based device or host-based, meaning it runs as a process in the background. Proxy servers are used to control traffic into and out of a network. Unified Threat Management (UTM) provides multiple security features on a single appliance. ATM (Asynchronous Transfer Mode) has to do with transferring different types of traffic (i.e., voice and data) over the same communication lines at the same time.

45
Q

A switch is overheating, and the SNMP agent is sending an SNMP trap to an SNMP manager. Which of the following are true? (Choose two.)

A) It is a managed switch.
B) It is an unmanaged switch.
C) It is communicating on port 161.
D) It is communicating on port 162.

A

A, D. A Simple Network Management Protocol (SNMP) trap is unrequested information being sent from an SNMP agent, in this case running on a managed switch. SNMP traps are sent via port 162.

46
Q

Your cousin is a nature photographer, traveling the country and living in their Class A motorhome. Much of the time their motorhome is parked in a national park, but seldom is Wi-Fi available. Your cousin uploads photos from their camera to a laptop, modifies them, and needs to upload them to their publisher, various magazines, and their website on a regular basis. What is a viable networking option for your cousin?

A) Satellite
B) Cellular
C) WISP
D) DSL

A

B. Cellular is the only type of network connection that allows for the type of mobility that this photographer needs. A cellular hotspot device from a mobile provider would work well. Satellite would require repositioning of the dish on a regular basis and may not work well because of obstructions. WISP requires being within a few miles of a tower and line-of-sight between the antenna and tower, so that wouldn’t work well either. DSL requires a stationary phone line.

47
Q

You are a network administrator. Currently there is no wireless access to the business network, but the company is purchasing tablets so that employees can take their work with them as they move around the facility. What device will you install so that employees will be able to connect to the wired network with wireless devices?

A) Ethernet router
B) Proxy server
C) WAP
D) NFC hub

A

C. You need to add a wireless access point (WAP), which will have an RJ45 port to connect to the company server and Wi-Fi antennas to provide wireless connectivity. An Ethernet router is wired. A proxy server is a security device. NFC, although wireless and using radio waves, is for connecting devices within a few centimeters of each other.

48
Q

What network segmentation technique reduces broadcast domains and provides a layer of security between users on the same network?

A) VPN
B) VLAN
C) UPS
D) SQL

A

B. Virtual LANs, or VLANs, will segment your network into smaller broadcast domains. Multiple VLANs can exist on the same physical switch. Traffic is isolated to only the paths determined by how you have identified VLANs on your managed switches. A VPN (virtual private network) uses tunneling protocols to secure a private connection across a public network. A UPS (uninterruptable power supply) is a battery backup with other features used to maintain power to a device when the main power goes down, and SQL (Structured Query Language) is used to retrieve information from a database.

49
Q

Which of the following components is not typically found in a wireless LAN (WLAN)?

A) WLAN router
B) WLAN gateway
C) WLAN server
D) WLAN client

A

C. Wireless LAN (WLAN) networks commonly have three types of nodes: a client, a router, and a gateway. They typically don’t include a server and often are of fluid nature, where devices come and go as needed. They may include a printer. A WLAN can be used to connect wireless users to a wired network.

50
Q

You need to configure dynamic IP addressing on your network to cut down on management time. How will you do this? (Choose two.)

A) Enable DHCP settings on the router.
B) Configure each NIC to obtain an IP address automatically.
C) Configure each NIC to a specific IP address.
D) Configure each NIC to obtain DNS server addresses automatically.

A

A, B. A NIC can be configured either with a specific (static) IP address, or to obtain an IP address from an available Dynamic Host Configuration Protocol (DHCP) server. Many routers have the capability to provide DHCP services. When a device with a properly configured NIC attempts to join a network, a request for an address will be sent to the DHCP server, and the DHCP server will lease an address to that device, if one is available.

51
Q
A
52
Q

Your network admin needs to add a computer to an IPv6 subnet. Which of the following IPv6 addresses is on the same subnet as 2601:0:0:0f:1a:308c:2acb:fee2?

A) 2601::of:308c:47:4321
B) 2601::0f:ab:cd:123:4a
C) fe80:ab:bc:0f:1a:308c:2abc:fee5
D) 2601:0:0:0x::2acb:ac01

A

B. Option B, 2601::0f:ab:cd:123:4a, and the address in the question both have a subnet of 0f. IPv6 addresses consist of 128 bits, divided by colons (:) into 8 hextets. Therefore, each hextet represents 16 bits. Leading 0s can be omitted, and in one place in each address, consecutive groups of 0s can be omitted, represented by double colons (::). The last 64 bits (4 hextets) of an IPv6 address are the Interface ID, identifying the unique computer. The first 64 bits are called the prefix. ISPs and very large organizations are assigned /48 prefixes. The next 16-bits (the fourth hextet) are used to define subnets. Option A has a fourth hextet of 0. Option C is a link-local address. Option D is an invalid number because hex numbers only go to letter f.

53
Q

Dylan is troubleshooting his IPv4 network. The network’s subnet mask is 255.255.192.0. Which of the following IP addresses is not on the same network as the others?

A) 130.200.65.5
B) 130.200.130.1
C) 130.200.100.4
D) 130.200.125.5

A

B. The third octet’s subnet mask of 192 means that the first 2 bits of the octet are used to identify the network number, so the network can be broken down into four subnets using those first 2 bits of the octet. The subnets would be 00000000, 01000000, 10000000, and 11000000. IP addresses within each range would be 0 to 63, 64 to 127, 128 to 191, and 192 to 255. The first and last IP in each range would not be used because they would represent the subnet itself and the broadcast numbers. Options A, C, and D all fall in the second subnet’s range. Option B is in the third subnet.

54
Q

Your friend has purchased a PoE device for their home. It is a type 2 device. Which of the following PoE switches will be compatible with this device? (Choose two,)

A) 802.3af-compliant switch
B) 802.3at-compliant switch
C) 802.3bt-compliant switch
D) 802.11b-compliant switch

A

B, C. PoE devices providing power are backward compatible with older devices, meaning that while 802.3bt is rated at 60W for Type 3 and 10W for Type 4, an 802.3bt device will work with an 802.3at (Type 2) device. Option A would not provide enough power for your friend’s device. Option D is a Wi-Fi standard, not a PoE standard.

54
Q

Which of the following is not a benefit of software-defined networking (SDN)?

A) Dynamic load balancing
B) Reduced infrastructure costs
C) Requires a cloud-based network
D) Centrally manage physical and virtual routers

A

C. Software-defined networking (SDN) has many advantages over traditional networking. It can work with virtual and physical networks using SDN-compatible devices, providing centralized control of the entire network and the ability to reconfigure networks often without having to physically touch a router or switch.

54
Q

Which of the following is a PoE standard?

A) 802.3bt
B) 802.3b
C) 802.11
D) 802.11ax

A

A. The PoE standards are IEEE 802.3af (PoE), 802.3at (PoE+), and 802.3bt (PoE++). A main difference between the standards is how much power per port can be provided. 802.3af can supply up to 15.4 watts per port, 802.3at can provide up to 30 watts per port, and 802.3bt can provide 60 watts (Type 3) or 100 watts (Type 4). The power that actually reaches the devices is less due to voltage loss over distance. 802.3b is a legacy broadband Ethernet standard. 802.11 and802.11ax are Wi-Fi standards.

55
Q

Which type of WISP radio frequency has the advantages of no fees, less expensive equipment, and a wide pool of practical knowledge so help is easier to find?

A) Licensed
B) Unlicensed
C) Limited
D) Unlimited

A

B. Frequencies for wireless Internet service providers (WISPs) can be licensed or unlicensed. (The FCC is the licensing body.) Most WISPs use the unlicensed frequencies because they are free to use.

56
Q

You are working with your customer, a doctor’s office, to develop a network that will allow the doctor’s staff to work with their tablet PCs in any room of the office without having to worry about network cabling. What type of network will you establish for the doctor’s office?

A) LAN
B) VLAN
C) WLAN
D) WAN

A

C. A wireless LAN (WLAN) would be the best solution for this office. A WLAN is a group of devices in the same location that communicate via radio waves instead of cables. WLANS can have multiple wireless access points (WAPs), preferably overlapping so that users won’t experience signal drop. Wi-Fi is a type of WLAN. A LAN is incorrect because it would require disconnecting and reconnecting cables in each room. A VLAN (virtual LAN) is established using security protocols to segregate a network. WAN is incorrect because this is a network in a single office, not geographically distant computers.

57
Q

Which of the following is true of a network TAP? (Choose two.)

A) TAP stands for terminal access point.
B) It is solely used by hackers to intercept packets.
C) It is part of a router.
D) It allows network admins to monitor network traffic.

A

A, D. A network terminal access point (TAP) connects to a network in an area of concern and creates a copy of traffic, sending it on to monitoring devices. It can be an integral part of network management. TAPs can be active or passive. Passive TAPs do not require power or management, but active TAPs do.

58
Q

What software runs on a machine where data files to be accessed are housed and controls access to those files as requested by a client?

A) CAL
B) Fileshare server
C) Fileshare client
D) SAN

A

B. A fileshare server handles requests from fileshare clients for access to data stored on the server. The fileshare server resides on the same machine as the data. A client access license (CAL) is a license allowing one machine to connect to a server, and SAN is a storage area network, both of which are unrelated to the question.

59
Q

In the United States, the Federal Communications Commission (FCC) imposes rules that govern radio communications. What is the maximum EIRP (watts) that can be transmitted in the 2.4 GHz band for a point-to-multipoint WISP connection?

A) 2 watts
B) 4 watts
C) 158 watts
D) 125 mw

A

B. Wireless Internet service providers (WISPs) that are operating in the 2.4 GHz band are limited to 4 watts of effective isotropic radiated power (EIRP) for their point-to-multipoint connections. Their point-to-point connections vary between 4 watts and 158 watts for the 2.4 GHz band. The maximum EIRP for the 5 GHz bands is 125 mw. FCC maximums can be found at FCC maximums can be found at www.air802.com/fcc-rules-and-regulations.html.

60
Q

Using which Wi-Fi channels does not require that your router has Dynamic Frequency Selection (DFS) and Transmit Power Control (TPC) built into the router?

A) Channels 36 to 48
B) Channels 52 to 64
C) Channels 100 to 144
D) Channels 149-165

A

A. Channels 36 to 48 are set aside for domestic use. All channels above that require a router to have DFS and TPC. DFS will automatically switch to a different channel when weather radar and radar system signals are detected. TPC can be used to force clients to lower power so that they won’t interfere with nearby users or access points on the same channel. Channel 165 is set aside for industrial, scientific, and medical (ISM) use. In the United States, the FCC and IEEE are the authorities that approve channel uses.

61
Q

Which broadband network communications technology became more competitive with other types of service when, in 2021, the FCC ruled to include it in the Over-The-Air-Reception Devices Rule (OTARD), which protects the rights of those organizations to place antennas where they are needed?

A) Fios
B) Long-range fixed wireless
C) DSL
D) Satellite

A

B. The FCC’s ruling was expanded to include long-range fixed wireless hub or relay antennas and the customer’s right to place antennas of certain sizes on their premises, putting WISP providers on a more equal footing with satellite and cellular providers.

62
Q

What is the host number in an IP address of 192.168.2.200 and a subnet mask of 255.255.255.0?

A) 192.168
B) 192.168.2
C) 2.200
D) 200

A

D. When an IP address and subnet mask are converted to the binary numbers that the computer sees, wherever there is a 1 in the subnet mask, that tells the computer that the corresponding bit in the IP address is part of the network number. Wherever there is a 0 in the subnet mask, the corresponding bit in the IP address is part of the host number. The address in the question, 192.168.2.200/24, is a Class C private address, where, in the subnet mask, the first three octets (24 bits) are all 1s, and the last octet (8 bits) are 0s. So, the first three decimal numbers of the IP address, which is expressed in dotted decimal notation, are the network number, (192.168.2) and the last octet (.200) is the host (individual computer) address. Network numbers will always go from left to right with no breaks between.

63
Q

What type of system, consisting of both hardware and software, is used to control and monitor industrial machines and processes?

A) SCADA
B) IrDA
C) UTM
D) RADIUS

A

A. Supervisory Control and Data Acquisition (SCADA) systems consist of both hardware and software. Hardware is used to gather information, which is sent to a computer running software that analyzes the data and logs events. SCADA can also initiate alarms when specified conditions exist. Infrared Data Association (IrDA) is network communications via infrared light. Unified threat management (UTM) is an appliance, software, or service that combines all malware security in one place. Remote Authentication Dial-In User Service (RADIUS) is a protocol for authentication servers that encrypts transmissions between client and server.

64
Q

Your friend owns a restaurant and provides free Wi-Fi to their clientele. Lately they have been receiving complaints that the Wi-Fi isn’t working. It seems to work for customers already connected but not for people trying to connect. What can be configured on the router to release an IP address and make it available for other users after a couple of hours?

A) MAC address filtering
B) Port forwarding
C) DHCP lease duration
D) SSID broadcast

A

C. A DHCP server will “lease” an IP address to a client for a specified period of time. The default is usually 24 hours. In a SOHO where there are few new users, the lease time could be longer, but in a restaurant where many people come and go each hour, the DHCP scope might not have enough addresses to accommodate that many users. Setting the lease time to a shorter duration will release the IP address and make it available for a new user. MAC address filtering only allows connection from computers with specific MAC addresses and would greatly limit connectivity. Port forwarding sends traffic for a specific port to a specified computer on the network. The SSID is the wireless network name and can be broadcast so that it is easily found, or it can be hidden.

65
Q

What type of address is known as a DNS AAAA address?

A) IPv4
B) IPv6
C) MAC
D) Physical

A

B. The Domain Name System (DNS) uses two types of records to resolve domain names to IP addresses. Type A records resolve the domain name to IPv4 addresses. Type AAAA records resolve domain names to IPv6 addresses. MAC and Physical addresses are two names for the NIC address.

66
Q

What type of entry in a DNS record can be used for load balancing of incoming mail?

A) MX
B) DX
C) AAAA
D) TXT

A

A. Multiple Mail Exchanger (MX) records can be set up for a domain that specify different mail servers for load balancing. Direct Connect (DX) is an Amazon Web Services dedicated connection between client and AWS. AAAA signifies an IPv6 address in a DNS record, and TXT DNS records let an administrator specify text in their DNS record. These text records can be used to prevent email spam.

67
Q

What type of DNS record contains a list of users (IP addresses) that are authorized to send email on behalf of a domain?

A) DKIM
B) SPF
C) DMARC
D) A

A

B. Sender Policy Framework (SPF) is a technique to prevent email address spoofing. It is done using a TXT entry in a domain’s DNS service. DomainKeys Identified Mail (DKIM) performs a similar function, but it uses a digital signature. Domain-Based Message Authentication, Reporting, and Conformance (DMARC) uses SPF or DKIM and in addition requires that the sender’s domain be the same as the DNS domain name. Domain administrators can specify to quarantine or reject emails that fail DMARC. To use DMARC, a DMARC record must exist in the DNS.

68
Q

What is the interface ID of the IP address 2001::1a3:f1a:308:833?

A) 2001:0:0:0:
B) 2001
C) 1a3:f1a:308:833
D) 833

A

C. This is an IPv6 address. It is 128 bits long, and the last 64 bits are the interface ID, which identifies the individual computer. Since there are eight groups of hex numbers, that means the rightmost four groups are the interface ID. Any leading zeros in an IPv6 address can be omitted, and the :: can be used once in an address to replace consecutive groups of all zeros, so the number in the question fully expanded would be 2001:0000:0000:0000:01a3:0f1a:0308:0833. The interface ID is therefore 1a3:f1a:308:833. The leftmost three sections identify the network, and the fourth identifies the subnet. In this example, 2001:0:0 is the site prefix and 0 is the subnet ID. IPv6 addresses do not need a subnet mask like IPv4 addresses do.

69
Q

What two terms are used to identify an Internet provider that may connect to the Internet using T1 or T3 lines, or fiber optic, for example, and uses point-to-point millimeter-wave or microwave links between its towers for its backbone or to extend its service area, and point-to-multipoint wireless to provide Internet access to its customers?

A) WISP
B) ISP
C) Demarcation point
D) Long-range fixed wireless

A

A, D. For decades now, wireless Internet service providers (WISPs) have been established by groups of individuals or small companies to provide Internet access to areas where it is not profitable for large commercial Internet providers to run, such as very rural areas. They are also called long-range fixed wireless providers. The first one was established in 1992 in the Midwest of the United States. Now there are thousands of them all over the world. In some areas of the world, where there is little or no wired infrastructure, WISPs are the only way that people can get Internet connectivity. A WISP connects to the Internet using either leased lines or microwaves, generally uses point-to-point microwaves between its towers, and uses point-to-multipoint connections between the final tower and users. An ISP is an Internet service provider, and a demarcation point is the place in a customer’s premises where the responsibility for the network changes from the ISP to the customer.

70
Q

Your friend is again considering the network configuration in their apartment. They’ve asked you the difference between channels on the 2.4 GHz and 5 GHz networks that are available on their Internet connection. What will you tell them? (Choose two.)

A) If they are using the 2.4 GHz network, they should choose channel 1, 6, or 11 because they don’t overlap each other.
B) The 5 GHz network channels provide greater bandwidth, so data could be transferred faster, but they may have more interference with their neighbors.
C) The 5 GHz frequency is considered obsolete, so the 2.4 GHz frequency should be used.
D) All of the 5 GHz frequencies overlap, so there will be greater interference.

A

A, B. Option A is true. Channels 1, 6, and 11 are the only ones that don’t overlap in a 2.4 GHz network. Option B is also true. Each channel in a 2.4 GHz network is only about 5 MHz wide, while in a 5 GHz network the minimum is 20 MHz, but it can be configured to use 40 MHz or 80 MHz by combining channels. Option C is false. The 2.4 GHz frequency supports older devices; the 5 GHz frequency is newer. While 2.4 GHz channels overlap with the exception of 1, 6, and 11, 5 GHz channels don’t overlap. Your friend needs to choose a frequency and channel that are compatible with their devices, but the router may automatically configure the channel if using the 5 GHz frequency.

71
Q

Which IEEE Wi-Fi standard is also known as Wi-Fi 6?

A) 802.11a
B) 802.11ac
C) 802.11ax
D) 802.11n

A

C. The Institute of Electrical and Electronics Engineers (IEEE) 802.11ax standard is now known as Wi-Fi 6, and is considered a replacement for 802.11ac (Wi-Fi 5). 802.11n is designated as Wi-Fi 4. Prior IEEE standards (802.11b, 802.11a, and 802.11g) are not designated with official Wi-Fi X nomenclature, but working backward in time, 802.11g would be Wi-Fi 3, 802.11a would be Wi-Fi 2, and 802.11b would be Wi-Fi 1. The CompTIA A+ objectives only ask that you know what Wi-Fi 5 and Wi-Fi 6 are.

72
Q
A