CompTIA A+ Complete Practice Tests by Jeff T. Parker

CompTIA A+ Complete Practice Tests by Jeff T. Parker

Author:Jeff T. Parker [Parker, Jeff T.]
Language: eng
Format: epub
ISBN: 9781119516934
Publisher: Wiley
Published: 2019-06-11T00:00:00+00:00


Chapter 2: Networking

B. Because bridges work at the Data Link layer, they are aware of only hardware (MAC) addresses. They are not aware of and do not deal with IP addresses. Bridges are more intelligent than repeaters, but they are unable to move data across multiple networks simultaneously.

B. An Ethernet splitter will take the incoming signal on two pairs and then split it, so on the output end it produces two sets of signals using two pairs each. Because of this, Ethernet splitters are limited to 100 Mbps connections. It is not recommended that you use Ethernet splitters on a network. If you need to connect multiple computers using UTP, use a hub or a switch.

A. Cable testers are indispensable tools for any network technician. Usually you would use a cable tester before you install a cable to make sure it works. Of course, you can test them after they’ve been run as well.

C. Internet Message Access Protocol (IMAP) is a secure protocol designed to download email. It has several advantages over the older Post Office Protocol 3 (POP3). First, IMAP4 works in connected and disconnected modes. Second, it lets you store the email on the server, as opposed to POP3, which requires you to download it. Third, IMAP4 allows multiple clients to be simultaneously connected to the same inbox.

A. The Domain Name System (DNS) server is responsible for resolving hostnames, such as www.google.com, to IP addresses to enable communication. If it’s not working properly or you can’t connect to it, you won’t be able to browse the Internet using friendly website names.

C. Single-mode fiber (SMF) can provide data throughput rates of 10 Gbps at a distance of 40 kilometers. Compare that to multimode fiber, which can reliably transmit 10 Gbps for only about 550 meters.

B. RG-59 network cable can run for about 228 meters (750 feet). The slightly thicker RG-6 has more insulation and can run for about 304 meters (1,000 feet). Transmission quality for RG-59 differs depending on the frequencies. RG-59 is good for baseband video, but at high frequencies the RG-59 does not do well over long distances.

B. Secure Shell (SSH) can be used to set up a secure Telnet session for remote logins or for remotely executing programs and transferring files. Because it’s secure, it was originally designed to be a replacement for the unsecure telnet command.

B, C. Switches and bridges work at Layer 2. Switches are multiport bridges.

B. Computers are able to differentiate where the network ID ends and the host address begins through the use of a subnet mask.

B. Transmission Control Protocol (TCP) guarantees packet delivery through the use of a virtual circuit and data acknowledgments, and User Datagram Protocol (UDP) does not. Because of this, TCP is often referred to as connection oriented, whereas UDP is connectionless.

D. Telnet lets users log into another machine and “see” the remote computer in a window on their screen. Although this vision is text only, users can manage files on that remote machine just as if they were logged in locally.



Download



Copyright Disclaimer:
This site does not store any files on its server. We only index and link to content provided by other sites. Please contact the content providers to delete copyright contents if any and email us, we'll remove relevant links or contents immediately.