Эротические рассказы

CompTIA Network+ Practice Tests. Craig ZackerЧитать онлайн книгу.

CompTIA Network+ Practice Tests - Craig Zacker


Скачать книгу
router

      115 Which of the following statements is true about an Ethernet network that uses CSMA/CD?Collisions are a normal occurrence.Collisions never occur unless there is a network fault.Collisions cause data to be irretrievably lost.Collisions are the result of duplicate IP addresses.

      116 Which of the following is an abnormal occurrence on an Ethernet network?Packet retransmissionsCollision detectionJam signalsLate collisions

      117 VLANs create the administrative boundaries on a switched network that are otherwise provided by which of the following devices?HubsRoutersDomainsBridges

      118 Which of the following statements about VLANs are true? (Choose all that apply.)All of the devices in a particular VLAN must be physically connected to the same switch.A VLAN creates a limited broadcast domain on a switched network.You must have VLANs on a switched network for communication between computers on different cable segments to occur.A router is required for communication between VLANs.

      119 Which of the following elements can be used to identify the devices in a particular VLAN? (Choose all that apply.)Hardware addressesIP addressesDNS namesSwitch port numbers

      120 Alice has a network that consists of three Virtual LANs (VLANs) defined on all of the network's switches. VLAN 10 is the Sales VLAN, VLAN 20 is the Marketing VLAN, and VLAN 30 is the Accounting VLAN. Users are reporting that they cannot communicate with anyone outside of their own VLANs. What is the problem, and what must Alice do?The problem is a faulty VLAN configuration on one of the switches. Alice needs to re-create the VLANs and configure each VLAN for routing.One of the VLANs is configured to filter all other VLAN traffic for security purposes. Alice needs to change the filter on this VLAN.VLANs are limited to data link layer communication only. To allow communication between VLANs, Alice must add a router or a layer 3 switch to the network and configure it to route traffic between the VLANs.The VLANs are using different data link layer protocols. VLANs must use the same data link layer protocol in order to communicate.

      121 The jumbo frame capability is associated with which layer of the Open Systems Interconnection (OSI) model?ApplicationTransportNetworkData link

      122 Which of the following technologies would you be less likely to find on the average home or small office network? (Choose all that apply.)NATDHCP10GBase-TVLAN

      123 Which of the following modifications occur when you configure the native Virtual Local Area Network (VLAN) on your network switches to use 802.1q tagging? (Choose all that apply.)Double-tagged packets are prevented.BPDU guards are applied.Root guards are applied.Trunk traffic is routed, not switched.

      124 Which of the following protocols is responsible for inserting the tags into frames that enable switches to forward them to the appropriate Virtual Local Area Network (VLAN)?IEEE 802.3xIEEE 802.1XIEEE 802.1qIEEE 802.11ac

      125 Which of the following best explains how tagging the native Virtual Local Area Network (VLAN) traffic can improve in-band switch management security?By renaming the default VLANBy preventing double-tagged packetsBy encrypting in-band management trafficBy moving in-band management traffic off the native VLAN

      126 A switch with auto-medium-dependent interface crossover (MDI-X) ports eliminates the need for which of the following?8P8C connectorsSwitch-to-switch connectionsStraight-through cablesCrossover cables

      127 Which of the following cable types is needed to connect an MDI port on a workstation to an MDI-X port on an Ethernet switch?A crossover twisted pair cableA straight-through twisted pair cableA coaxial cableA single-mode fiber optic cableA multimode fiber optic cable

      128 Port security on an Ethernet switch is implemented through the use of which of the following methods?Blacklisted MAC addressesWhitelisted MAC addressesPort-by-port MAC address filteringSpoofed MAC addresses

      129 Which of the following best explains why networks using Voice over IP (VoIP) often have separate voice and data Virtual Local Area Networks (VLANs)?To prevent voice and data packet conflictsTo encrypt voice trafficTo encrypt data trafficTo prioritize voice traffic

      130 Which of the following protocols uses a form of flow control called the sliding window technique?UDPHTTPTCPDNS

      131 Which of the following Power over Ethernet (PoE) specifications supplies power to devices using the spare wire pair on a 10Base-T or 100Base-TX twisted pair network?Alternative AAlternative B4PPoEAll of the above

      132 Which of the following best describes the process of whitelisting on a wireless network?Using an Access Control List (ACL) to specify the IP addresses that are permitted to access a wireless networkUsing port protection to specify the well-known port numbers of applications that users are permitted to run over a wireless networkUsing MAC filtering to create a list of devices that are permitted to access a wireless networkUsing an AAA server to create a list of users that are permitted to access a wireless network

      133 Which of the following features helps to protect network switches from attacks related to the Spanning Tree Protocol (STP)? (Choose all that apply.)BPDU guardRoot guardDHCP snoopingGeofencing

      134 Which of the following IEEE standards calls for the use of the Carrier-Sense Multiple Access with Collision Avoidance (CSMA/CA) Media Access Control (MAC) mechanism?802.11ac802.1X802.3All of the above

      135 Which of the following topologies enables wireless devices to access resources on a wired network?Ad hocStarInfrastructureBus

      136 Which of the following components are required for two computers to communicate using an IEEE 802.11 wireless LAN in an ad hoc topology?A router connected to the InternetA Wireless Access Point (WAP)An external antennaNone of the above

      137 Which of the following wireless networking technologies will never experience interference from a 2.4 GHz wireless telephone? (Choose all that apply.)IEEE 802.11aIEEE 802.11bIEEE 802.11gIEEE 802.11nIEEE 802.11acIEEE 802.11ax

      138 Which of the following wireless networking standards is capable of supporting speeds of 54 Mbps and is also backward compatible with IEEE 802.11b?IEEE 802.11aIEEE 802.11gIEEE 802.11nBluetoothIEEE 802.11

      139 Which of the following wireless LAN standards include the ability to use Multiple Input, Multiple Output (MIMO) antennae? (Choose all that apply.)IEEE 802.11aIEEE 802.11b/gIEEE 802.11nIEEE 802.11acIEEE 802.11ax

      140 Which of the following is a cellular communication technology that is virtually obsolete in the United States?GSMCDMATDMALTE

      141 Which of the following IEEE wireless LAN standards uses the Direct Sequence Spread Spectrum (DSSS) signal modulation technique?802.11a802.11b802.11g802.11n802.11ac

      142 When designing a wireless LAN installation, which of the following are valid reasons to install a unidirectional antenna in an Access Point (AP), rather than an omnidirectional one? (Choose all that apply.)The AP will be located against an outside wall.There are many interior walls between the AP and the most distant workstation.A unidirectional antenna can be focused to a specific signal pattern width.All of the above

      143 How do wireless networking devices conforming to the IEEE 802.11n and 802.11ac standards achieve transmission speeds greater than 72.2 Mbps?By using direct sequence spread spectrum (DSSS) modulationBy using multiple antennae to transmit several data streams simultaneouslyBy using frequencies in the 5 GHz bandBy sacrificing transmission range for speed

      144 Which of the following are possible reasons why the 5 GHz frequency tends to perform better than the 2.4 GHz frequency on a wireless LAN? (Choose all that apply.)The 5 GHz frequency has more channels than the 2.4 GHz frequency.The 5 GHz frequency supports longer ranges than the 2.4 GHz frequency.The 5 GHz frequency conflicts with fewer common household devices than the 2.4 GHz frequency.The 5 GHz frequency transmits at faster speeds than the 2.4 GHz frequency.

      145 Alice is attempting to deploy an IEEE 802.11b/g wireless LAN on the fifth floor of a 10-story office building that is surrounded on all sides by other office buildings, all of which seem to be running many wireless LANs. Scanning the 2.4 GHz band, she sees literally dozens of networks, spread across all of the available channels. As a result, her wireless devices have trouble connecting to their Access Point (AP), and when they do, they achieve only low speeds. Which of the following tasks should Alice perform to enable the wireless clients to connect to the network more


Скачать книгу
Яндекс.Метрика