Pinguis Web Design Ireland COMPTIA A+ ESSENTIALS Quiz questions and answers.
Answer questions GOODLUCK FROM IRISH WEB DESIGN
In the 2.4GHz range, which of the following channel combinations are non-overlapping?
1, 6, 11
2, 7, 10
2, 8, 13
3, 6, 9
Which of the following is the port number used by HTTP?
Which of the following is most effective against threats when used with an updated server? (Select TWO)
A crossover cable is MOST commonly associated with which of the following layers of the OSI model?
For security reasons Kurt, a network technician, wants to install a Linux based email server. Microsoft web services, and directory services on different servers. Which of the following technologies would be BEST to reduce hardware costs?
A company is about to install a second network connection with a new ISP. Which of the following routing protocols is the BEST choice?
A layer 3 switch can move packets between subnets based on which of the following criteria?
Which of the following would be used to test out the security of a specific network by allowing it to receive security attacks?
Network based IDS
A bridge handles frames at which of the following layers of the OSI model?
Joe, an administrator, is using a punch-down tool to connect a cable. To which of the following is Joe MOST likely connecting?
A 110 block
A smart jack
Joe, an administrator, has just finished installing a new switch and connected two servers with IPs of 192.168.105.20 and 30. The servers are able to communicate with each other, but are unable to reach the Internet. Joe sees the following information in the switch configuration: Interface VLAN 105 IP address 192.168.105.5 255.255.255.0 Joe is able to ping the router at 192.168.105 1 from the switch. Which of the following is the MOST likely cause of the problem?
The subnet mask is incorrect.
A routing loop has occurred.
Joe used a crossover cable to connect the switch to the gateway
The server is missing default-gateway information
Which of the following wireless technologies can support the MOST allowable MIMO streams?
Which of the following devices should Joe, an administrator, connect to a protocol analyzer in order to collect all of the traffic on a LAN segment?
Switch A is configured with VLAN 105 and 106. Switch B is configured with VLAN 105 and 107. Both switches are connected with a fiber cable. In order for packets from all VLANs to cross the fiber cable, which of the following configurations MUST be present?
Full duplex on the fiber link
Sandy, a user, is unable to access the company website on a laptop. A network technician verifies that the user can access other Internet pages. According to network troubleshooting methodology, which of the following steps should be taken NEXT?
Remotely connect to Sandy's laptop and review the network configuration settings.
Ping the web server from inside the network to ensure it is still up and running.
Check to make sure the company's website is accessible from the Internet.
Ensure the Ethernet cable is securely plugged into Sandy's laptop.
Karen, a network technician, is troubleshooting a problem and has just established a plan of action to resolve the problem. Which of the following is the NEXT step in the troubleshooting methodology?
Verify full system functionality and if applicable implement preventative measures.
Implement the solution or escalate as necessary.
Document findings, actions, and outcomes.
Establish a theory of probable cause (e.g. question the obvious).
Which of the following wireless technologies can support the GREATEST distance on either 2.4GHz or 5GHz frequencies?
A company needs strong wireless security enabled for minimal cost. Which of the following security measures is the BEST to use?
Longer SSID broadcast intervals
Which of the following ports is the default telnet port?
Sandy, a network technician, is attempting to map a FQDN to an internal server at the address of 10.0.0.15 without NAT/PAT. Which of the following is the reason this will ultimately not work?
This is a private address which cannot be seen by external users.
The address does not have the appropriate subnet mask assigned.
This is a public address which can only be seen by internal users.
This is a private address which can only be seen by external users.
Which of the following is the network topology in which computers connect to form a straight line?
Users have reported slow access limes when retrieving information from a server on the company's
network. Which of the following tools would provide access time information on each segment of the
network to reach the server?
Karen, a network administrator, needs to add an additional connection to a room. She adds a new Ethernet switch and must connect it to an existing switch. Which cable type should Karen use to connect the two switches?
Which of the following DNS record types provides the hostname to IP address mapping?
The selection of the correct punch down tool to use depends on which of the following?
Demarcation point location
Which of the following uses a ring topology?
A company wants to secure access to its internal wireless network. The company wants to use the most secure means to access the network. Which of the following is the BEST choice for wireless security in this situation?
1000BaseT has a MAXIMUM run distance of:
25 meters (82 feet)
100 meters (328 feet)
500 meters (1640 feet)
1000 meters (3280 feet)
Sandy, an administrator, attempts to open a web page and sees the following error 'Error 404: Page not found'. She then uses the ping command and finds that the default gateway cannot be pinged. At which of the following layers does the problem MOST likely reside?
Which of the following protocols is Joe, a technician, using to encrypt data between web servers and web browsers?
Which of the following would Karen, a technician, use in voice over IP communications?
Kurt, an administrator, needs to install a new 100 foot (30 meter) cable run from an IDF switch to the MDF, through a room that has a large number of motors. Which of the following would be the BEST cable type to choose?
Karen, a customer, wants to install a wireless network into a shared office space. There are several other wireless networks from other companies that can be detected within the office space. Which of the following should be configured on Karen's wireless network to differentiate it from other wireless network and still provide the BEST performance and security? (Select TWO).
Joe, a user, can no longer access the accounting file share, but others are still able to access the share. Which of the following would be the FIRST step in troubleshooting the issue?
Notify senior management of the issue.
Develop a probable cause theory.
Ask Joe if anything has changed on the system.
Escalate the issue to the vendor.
Which of the following wiring standards would Karen, a technician, MOST likely use to interconnect two devices without the use of a hub or switch?
Which of the following would provide Kurt, a technician, with a performance reference point to refer back to after hardware repair?
Which of the following connector types is MOST commonly found with coaxial cabling?
Which of the following connector types will MOST likely be located on a serial cable?
Kurt, a user, on a network cannot access any network resources. The link light on his computer shows that a connection is present. Which of the following is the MOST likely cause of the problem?
The wrong cable type has been used
IDS has shut down the computer's switch port
The port on the switch is configured incorrectly
Spanning tree protocol was implemented
Which of the following basic devices blocks ports and can sometimes filter data?
Which of the following protocols is commonly used for VoIP technology?
Which of the following metrics indentifies the number of connections that is between two devices?
A router that takes the workstations internal IP address and changes it to another IP address when it sends the data outside of the network is and example of which of the following?
Karen, a technician, is asked to run new cabling for an office that is 350 feet (107 meters) away from the networking equipment. The type of cable being run is CAT6. Karen purchases and installs a 500 foot (152 meters) CAT6 cable, but after installation, notices a weak signal between the office and the networking equipment. Which of the following would have been the BEST to install instead of the CAT6 cable?
Install two CAT6 cables with a repeater.
Install a 500 foot (152 meter) CAT5 cable.
Install a 500 foot (152 meter) CAT5e cable.
Install three CAT6 cables with a repeater.
Kurt, the network administrator, has just finished installing a new 10/100/1000 switch, but receives reports from the server administrator that servers connected to the new switch seem to be experiencing slow LAN connections. Kurt checks the port connecting the new switch to the core switch and sees the following information:
Which of the following is the MOST likely cause of the slow connections?
The servers have not had VLAN tagging enabled on their NICs
Speed and duplex have not been set
VLAN tagging was not set on the trunk
The servers have been connected with CAT5 cable
Karen, an administrator, wants to list all the network connections to and from the server. Which of the following commands would MOST likely be used?
A company plans to implement a wired network between several computers. The company wants this network to be able to have a transmission rate of 1Gbps. Which of the following cable types should be purchased?
Which of the following regulates the amount of network traffic a single node receives in a server cluster?
Quality of service
Before installing a wireless network, which of the following should Karen, a network technician, take into consideration to reduce signal exposure for war drivers?
MAC address filtering
Which of the following ports would have to be allowed through a firewall to allow SNMP traffic to pass on its default port? (Select TWO).
Which of the following virtual components maintains a MAC-to-port forwarding table?
In which of the following layers of the OSI model does the TCP protocol operate?
Which of the following DNS records would be queried to locate a company's mail server?
Which of the following improves wireless performance only allowing only one wireless transmission on the network at a time?
Creating a uniform user environment throughout the network can BEST be achieved by using which of the following?
After a baseline check was completed it was noted that the network was working far below the level of the last baseline. Which of the following should Joe, the technician, do NEXT to determine where the network problems are occurring?
Upgrade the firmware on all routers and switches
Reboot the entire network one device at a time
Conduct a network traffic analysis
Rerun the baseline to ensure the results were correct
he location where the Telco wiring stops and the clients wiring starts is known as the:
Which of the following layers of the OSI model maps to the Network Interface layer of the TCP stack?
Which of the following would help a new administrator quickly determine if a network had a VLAN for its publicly accessible servers?
Logical network diagrams
Keyword and blacklist filtering would be handled at which level in a network?
Layer 2 managed switch
A common technique used to prevent the unauthorized network devices from sending traffic across a network is port.
When installing two 802.11g access points in the same building, which of the following channels will MOST likely be used to minimize interference?
5 and 6
1 and 6
6 and 10
2 and 6
Which of the following devices transmits timed broadcasts onto an active network?
Users are unable to stay connected to the company's wireless network. Several times throughout the day the users' signals are dropped and they are forced to reconnect to the network. A technician determines the network cabling that supplies the WAP has been run inside with several power lines. Which of the following is the MOST likely cause of the network issue?
Which of the following describes the location where an administrator would terminate a bundle of CAT5e cables?
Which of the following can be an STP cable?
Which of the following is used to identify active hosts along with their network addresses?
A section of the building has been having intermittent connectivity problems lately. An action plan and solution has been created. Which of the following steps would an administrator perform NEXT?
Document the solution and process.
Establish the most probable cause.
Implement and test the solution.
Identify additional symptoms and problems
Which of the following tools should be used to determine the listening port of the web server?
Which of the following utilities can be used to list the routing table?
Which of the following is a multifunction device in a SOHO network?
At which of the following layers does the TFTP protocol operate?
Which of the following is an EGP routing protocol?
Which of the following is used by RADIUS to encrypt messages between the server and the client?
Which of the following is the name of the routing update process involved when a change occurs in the routing environment?
Which of the following is MOST commonly powered using PoE?
Which of the following should an administrator do after running a command from the console on the perimeter router?
Update the configuration logs
Update the network wiring schematics
Update the network configuration procedures
Compare the configuration with the baseline
Which of the following features should an administrator configure to allow an IDS to watch the traffic on a switch?
Which of the following utilities would be used to display a NIC's cache of MAC addresses?
Which of the following WAN technologies uses a telephone cable?
Which of the following is an intelligent repeater that is aware of the MAC addresses of the nodes on either side of the data link?
Which of the following security devices would MOST likely be used on a network to screen and prevent malicious traffic?
At which of the following layers does the ICMP protocol operate?
A user reports sporadic connectivity with their wireless connection. A technician determines the wireless speed reported by the laptop to be 1Mbps. Which of the following is the MOST likely cause of this issue?
The client does not support 802.11n.
Incorrect frequency on the client is being used.
Incorrect encryption on the AP.
The client distance from the AP.
Which of the following are common VPN transports? (Select TWO)
Which of the following interfaces is used to connect analog devices to the Internet?
Which of the following would contain information regarding network device alerts using SNMP?
Ping sweep reports
A network technician arrives to work and discovers users are having a problem connecting the company server. The server operator was working on upgrades the night before. Which of the following documents should the technician use to attempt to discover the problem?
Which of the following are valid MAC addresses? (Select TWO)
Which of the following tools would an administrator use to determine if a DNS server is answering authoritatively for a domain?
Which of the following is a correct IP ACL? (Select TWO)
DENY ANY ANY
PERMIT 192.168 1.100 80
Which of the following is an example of a MAC address?
Which of the following is a performance optimization technology?
A technician receives an urgent call that the switch in accounting is down. Which of the following should the technician do FIRST to troubleshoot this issue?
Identity symptoms and problems
Document the process and solutions
Establish the most probable cause
Escalate if necessary.
By default, which of the following ports would a network need to have opened to allow for the transmission of incoming and outgoing email? (Select TWO).
A Stateful firewall is MOST useful in protecting against which of the following network scans?
Which of the following would be BEST to use when identifying HTTP traffic running on TCP port 53?
Network layer firewall
Stateful inspection firewall
Zone aware firewall
Application layer firewall
An administrator is setting up a network and would like to prevent users from having the ability to plug their PC into the network to receive an IP address. Which of the following addressing schemes should the technician use?
Which of the following features does SNMPv3 have over previous versions when remotely monitoring networking devices? (Select TWO).