CompTIA A+ Complete Practice Tests by Jeff T. Parker
Author:Jeff T. Parker [Parker, Jeff T.]
Language: eng
Format: epub
ISBN: 9781119516934
Publisher: Wiley
Published: 2019-06-11T00:00:00+00:00
Chapter 2: Networking
B. Because bridges work at the Data Link layer, they are aware of only hardware (MAC) addresses. They are not aware of and do not deal with IP addresses. Bridges are more intelligent than repeaters, but they are unable to move data across multiple networks simultaneously.
B. An Ethernet splitter will take the incoming signal on two pairs and then split it, so on the output end it produces two sets of signals using two pairs each. Because of this, Ethernet splitters are limited to 100 Mbps connections. It is not recommended that you use Ethernet splitters on a network. If you need to connect multiple computers using UTP, use a hub or a switch.
A. Cable testers are indispensable tools for any network technician. Usually you would use a cable tester before you install a cable to make sure it works. Of course, you can test them after they’ve been run as well.
C. Internet Message Access Protocol (IMAP) is a secure protocol designed to download email. It has several advantages over the older Post Office Protocol 3 (POP3). First, IMAP4 works in connected and disconnected modes. Second, it lets you store the email on the server, as opposed to POP3, which requires you to download it. Third, IMAP4 allows multiple clients to be simultaneously connected to the same inbox.
A. The Domain Name System (DNS) server is responsible for resolving hostnames, such as www.google.com, to IP addresses to enable communication. If it’s not working properly or you can’t connect to it, you won’t be able to browse the Internet using friendly website names.
C. Single-mode fiber (SMF) can provide data throughput rates of 10 Gbps at a distance of 40 kilometers. Compare that to multimode fiber, which can reliably transmit 10 Gbps for only about 550 meters.
B. RG-59 network cable can run for about 228 meters (750 feet). The slightly thicker RG-6 has more insulation and can run for about 304 meters (1,000 feet). Transmission quality for RG-59 differs depending on the frequencies. RG-59 is good for baseband video, but at high frequencies the RG-59 does not do well over long distances.
B. Secure Shell (SSH) can be used to set up a secure Telnet session for remote logins or for remotely executing programs and transferring files. Because it’s secure, it was originally designed to be a replacement for the unsecure telnet command.
B, C. Switches and bridges work at Layer 2. Switches are multiport bridges.
B. Computers are able to differentiate where the network ID ends and the host address begins through the use of a subnet mask.
B. Transmission Control Protocol (TCP) guarantees packet delivery through the use of a virtual circuit and data acknowledgments, and User Datagram Protocol (UDP) does not. Because of this, TCP is often referred to as connection oriented, whereas UDP is connectionless.
D. Telnet lets users log into another machine and “see” the remote computer in a window on their screen. Although this vision is text only, users can manage files on that remote machine just as if they were logged in locally.
Download
This site does not store any files on its server. We only index and link to content provided by other sites. Please contact the content providers to delete copyright contents if any and email us, we'll remove relevant links or contents immediately.
Linux Device Driver Development Cookbook by Rodolfo Giometti(3935)
Embedded Programming with Modern C++ Cookbook by Igor Viarheichyk(3620)
Implementing Cellular IoT Solutions for Digital Transformation by Dennis McCain(3553)
Embedded Linux Development Using Yocto Project - Third Edition by Otavio Salvador & Daiane Angolini(3386)
TinyML Cookbook by Gian Marco Iodice(3322)
Simplifying 3D Printing with OpenSCAD by Colin Dow(2842)
TinyML Cookbook by Gian Marco Iodice & Ronan Naughton(2603)
Fusion 360 for Makers by Lydia Sloan Cline(2220)
Networking A Beginner's Guide by Bruce Hallberg(2210)
Hands-On Linux for Architects by Denis Salamanca(2051)
But How Do It Know? by J. Clark Scott(2030)
Computers For Seniors For Dummies by Nancy C. Muir(1997)
Raspberry Pi and MQTT Essentials by Dhairya Parikh(1953)
Arduino Project Handbook, Volume 2: 25 Simple Electronics Projects for Beginners by Geddes Mark(1947)
9781803246888-ENHANCING DEEP LEARNING WITH BAYESIAN INFERENCE by Unknown(1902)
Hack and HHVM by Owen Yamauchi(1884)
31 Days Before Your CompTIA A+ Exams (Shanette Luellen's Library) by Benjamin Patrick Conry(1861)
MicroPython Projects by Jacob Beningo(1736)
Hands-On Internet of Things with MQTT by Tim Pulver(1708)
