Dion Training CompTIA A+ Core 1 (220-1101) Practice Exam - Results Flashcards
(235 cards)
Sarah is connecting a new wireless mouse to a client’s laptop. Which of the following technologies is MOST likely being used to connect the mouse to the laptop?
Explanation
OBJ 1.3 - Bluetooth is a wireless technology standard used for exchanging data between fixed and mobile devices over short distances using UHF radio waves in the industrial, scientific, and medical radio bands from 2.402 GHz to 2.480 GHz and building a personal area network (PAN). Bluetooth is commonly used when connecting wireless devices like mice, trackpads, headphones, and other devices.
Infrared (IR)
was a wireless networking standard supporting speeds up to about 4 Mbps with a direct line of sight for communications. Infrared sensors are used in mobile devices and with IR blasters to control appliances. While infrared (IR) used to be commonly used to connect wireless mice and keyboards to a laptop in the 1990s, it has fallen out of favor in the last 10-15 years since Bluetooth is more reliable and does not require a direct line of sight between the device and the laptop.
Near field communication (NFC)
is a standard for peer-to-peer (2-way) radio communications over very short (around 4”) distances that facilitates contactless payment and similar technologies.
Universal serial bus (USB)
is the main type of connection interface used on desktops and laptops. A larger Type A connector attaches to a port on the host; Type B and Mini- or Micro-Type B connectors are used for devices. USB 1.1 supports 12 Mbps while USB 2.0 supports 480 Mbps and is backward compatible with 1.1 devices which run at a slower speed. USB devices are considered hot-swappable and each device can draw up to 2.5 W of power over a USB port. USB 3.0 and 3.1 define 5 Gbps (SuperSpeed) and 10 Gbps (SuperSpeed+) rates and can deliver up to 4.5 W of power.
Jason is teaching a CompTIA course at a large company, but they do not allow non-employees to connect to their network. Since Jason needs the Internet for an in-class demonstration, he connects his laptop to his iPhone using a USB cable. He essentially connects to the Internet using the smartphone as a modem. Which of the following terms best describes this configuration?
Explanation
OBJ 1.4 - Tethering is the use of a mobile device’s cellular data plan to provide Internet access to a laptop or PC. The PC can be tethered to the mobile by USB, Bluetooth, or Wi-Fi. One method of doing this is to connect the laptop to the device using a USB cable, and then it can be used as a wired network connection.
A portable hotspot
is a dedicated mobile device that connects to a cellular network and provides a wireless (Wi-Fi) network for a small number of users.
A tunneling (or encapsulation) protocol
wraps up data from one protocol for transfer over a different type of network. For example, PPP can carry TCP/IP data over a dial-up line, enabling a remote computer to communicate with the LAN. A baseband update is the modification of the firmware of a cellular modem.
Which of the following types of data should you transmit over UDP?
Explanation
OBJ 2.1 - UDP (User Datagram Protocol) is a connectionless, non-guaranteed method of data communication. It does not provide any sequencing or flow control. Data sent over UDP could be lost and never resent. For this reason, UDP is not used for general web browsing or activity over HTTP/HTTPS (Ports 80 and 443). UDP is very good at delivering streaming media, though, since UDP is faster than TCP. Streaming videos or making Voice over IP (VoIP) calls are examples of use cases that rely upon UDP for their transmission.
Which of the following ports should you block at the firewall if you want to prevent a remote login to a server from occurring?
Explanation
OBJ 2.1 - Secure shell (SSH) is the protocol used for remote administration and file copying using TCP port 22. SSH is considered secure since it uses authenticated and encrypted sessions for communication.
The file transfer protocol (FTP)
is the protocol used to transfer files across the internet over ports 20 and 21.
The hypertext transfer protocol (HTTP)
is a protocol used to provide web content to browsers using port 80.
The internet message access protocol (IMAP)
is a TCP/IP application protocol that provides a means for a client to access email messages stored in a mailbox on a remote server using TCP port number 143. Unlike POP3, messages persist on the server after the client has downloaded them. IMAP also supports mailbox management functions, such as creating subfolders and access to the same mailbox by more than one client at the same time.
You are trying to select the best device to install to proactively stop outside attackers from reaching your internal network. Which of the following devices would be the BEST for you to select?
Explanation
OBJ 2.4 - An intrusion prevention system (IPS) is a form of network security that detects and prevents identified threats. Intrusion prevention systems continuously monitor your network, looking for possible malicious incidents, and capturing information about them. An IPS can block malicious network traffic, unlike an IDS, which can only log them.
A proxy server
is a server application that acts as an intermediary between a client requesting a resource and the server providing that resource.
System Logging Protocol (Syslog)
uses port 514 and is a way network devices can use a standard message format to communicate with a logging server. It was designed specifically to make it easy to monitor network devices. Devices can use a Syslog agent to send out notification messages under a wide range of specific conditions.
Which of the following statements about the 5.0 GHz wireless frequency used by Wi-Fi is correct?
Explanation
OBJ 2.3 - The 5.0 GHz frequency has more individual channels giving it less congestion and interference than the 2.4 GHz frequency. The 5.0 GHz frequency supports higher data rates than the 2.4 GHz frequency due to lower levels of congestion and interference.
The longer wavelength of 2.4 GHz
- makes it better at propagating through solid surfaces than the 5.0 GHz frequency.
- The 2.4 GHz frequency has a longer wavelength than the 5.0 GHz frequency. This longer wavelength gives the 2.4 GHz frequency the ability to cover a longer range using the same power output levels.
A cybersecurity analyst wants to install a network appliance to conduct packet capturing of the network traffic between the router and the firewall on the network. The device should not be installed in line with the network, so it must receive a copy of all traffic flowing to or from the firewall. Which of the following tools is required to meet these requirements?
Explanation
OBJ 2.8 - A network tap is used to create a physical connection to the network that sends a copy of every packet received to a monitoring device for capture and analysis.
A WiFi analyzer
can determine the wireless network’s signal strength, the frequencies in use, and any possible radio frequency interference.
A tone generator
is connected to a wall jack and sends a repeating signal over the cable. The probe can then be used to detect which cable is attached to the wall jack by detecting the signal being sent by the tone generator. The probe needs to be near or touch the cable with the tone generator attached to identify it positively.
A cable tester
is used to ensure a cable is properly created as a patch cable (straight through) or a crossover cable. Cable testers provide detailed information on the physical and electrical properties of the cable. For example, they test and report cable conditions, crosstalk, attenuation, noise, resistance, and other cable run characteristics.
You are troubleshooting an older wireless network that is running Wireless G (802.11g). This network appears to have a lot of collisions and interference. You look up the configuration on two of the three access points in the areas and see they are using Channel 1 and Channel 6. To prevent interference and ensure non-overlapping of the channels, what channel should the third access point utilize?
Explanation
OBJ 2.3 - With wireless access points that run 2.4 GHz frequencies, you can only select channels between 1 and 11 in the United States. This includes 802.11b, 802.11g, 802.11n, and 802.11ax networks. To prevent overlapping of the channels, you should select channels 1, 6, and 11. By doing so, you can increase the reliability and throughput of your wireless network.
You have just finished building a Windows server, installing its operating system, updating its security patches, formatting a dedicated data partition, and creating accounts for all of the company’s employees. What is the next thing that must be configured to provide users with the ability to access the data contained on the server’s data partition?
OBJ 2.4 - Most of the options provided are reasonable next steps, but the question specifically states that you want to allow the users to access the server’s data. Therefore, **file sharing **is the next step to providing access to the data and folders for employees on the network. After configuring file sharing, it would be good to configure audit logging and possibly a print server. RAID storage should have been configured before installing the operating system or creating the data partition. A file server is used to host and control access to shared files and folders for the organization.
Which port is used to connect to a POP3 server?
Explanation
OBJ 2.1 - The post office protocol (POP3) is a TCP/IP application protocol providing a means for a client to access email messages stored in a mailbox on a remote server over port 110. The server usually deletes messages once the client has downloaded them.