Craig Zacker - CompTIA Network+ Practice Tests

Здесь есть возможность читать онлайн «Craig Zacker - CompTIA Network+ Practice Tests» — ознакомительный отрывок электронной книги совершенно бесплатно, а после прочтения отрывка купить полную версию. В некоторых случаях можно слушать аудио, скачать через торрент в формате fb2 и присутствует краткое содержание. Жанр: unrecognised, на английском языке. Описание произведения, (предисловие) а так же отзывы посетителей доступны на портале библиотеки ЛибКат.

CompTIA Network+ Practice Tests: краткое содержание, описание и аннотация

Предлагаем к чтению аннотацию, описание, краткое содержание или предисловие (зависит от того, что написал сам автор книги «CompTIA Network+ Practice Tests»). Если вы не нашли необходимую информацию о книге — напишите в комментариях, мы постараемся отыскать её.

Assess and improve your networking skillset with proven Sybex practice tests  In the freshly revised Second Edition of 
, IT expert and author Craig Zacker delivers a set of accessible and useful practice tests for the updated Network+ Exam N10-008. You’ll prepare for the exam, learn the information you need in an industry interview, and get ready to excel in your first networking role. 
These practice tests will gauge your skills in deploying wired and wireless devices; understanding network documentation and the purpose of network services; work with datacenter, cloud, and virtual networking concepts; monitor network activity; and more. 
Further, this book offers: 
Comprehensive coverage of all five domain areas of the updated Network+ exam, including networking fundamentals, implementations, operations, security, and troubleshooting Practical and efficient preparation for the Network+ exam with hundreds of domain-by-domain questions Access to the Sybex interactive learning environment and online test bank Perfect for anyone preparing for the CompTIA Network+ Exam N10-008, the 
 is also an indispensable resource for network administrators seeking to enhance their skillset with new, foundational skills in a certification endorsed by industry leaders around the world.

CompTIA Network+ Practice Tests — читать онлайн ознакомительный отрывок

Ниже представлен текст книги, разбитый по страницам. Система сохранения места последней прочитанной страницы, позволяет с удобством читать онлайн бесплатно книгу «CompTIA Network+ Practice Tests», без необходимости каждый раз заново искать на чём Вы остановились. Поставьте закладку, и сможете в любой момент перейти на страницу, на которой закончили чтение.

Тёмная тема
Сбросить

Интервал:

Закладка:

Сделать

192 What field in the Transmission Control Protocol (TCP) Option subheader specifies the size of the largest segment a system can receive?MSSWindowMMSWinMS

193 What is the term for the combination of an IPv4 address and a port number, as in the following example: 192.168.1.3:23?SocketOUIWell-known portNetwork addressDomain

194 Which of the following protocols generate messages that are carried directly within Internet Protocol (IPv4) datagrams, with no intervening transport layer protocol? (Choose all that apply.)ICMPIGMPSMTPSNMP

195 Which of the following protocols is used to exchange directory service information?RDPLDAPSNMPSMB

196 Ralph is configuring a new email client on a workstation to use the Simple Mail Transfer Protocol (SMTP) and Post Office Protocol (POP3) email protocols. He wants both protocols to use encryption when communicating with the email server. Which of the following port numbers should Ralph use to secure the SMTP connection with Transport Layer Security (TLS) and the POP3 connection with Secure Sockets Layer (SSL) encryption? (Choose all that apply.)11025587993995

197 Which of the following is not a port number used for Structured Query Language (SQL) communications?1433152133063389

198 Which of the following port numbers is assigned to a Unix logging services program?389514636993

199 Which of the following is the primary application layer protocol used by web browsers to communicate with web servers?HTTPHTMLSMTPFTP

200 Which of the following protocols appears on the network as a service that client computers use to resolve names into IP addresses?DHCPBOOTPDNSSNMP

201 Which of the following protocols use(s) the term datagram to describe the data transfer unit it creates? (Choose all that apply.)EthernetIPTCPUDP

202 What is the native file sharing protocol used on all Microsoft Windows operating systems?Hypertext Transfer Protocol (HTTP)Network File System (NFS)File Transfer Protocol (FTP)Server Message Block (SMB)Lightweight Directory Access Protocol (LDAP)

203 When analyzing captured TCP/IP packets, which of the following control bits must you look for in the Transmission Control Protocol (TCP) header to determine whether the receiving host has successfully received the sending host's data?ACKFINPSHSYNURG

204 Which of the following terms describes the Transmission Control Protocol (TCP) exchange that establishes a connection prior to the transmission of any data?SynchronizationInitialization exchangeConnection establishmentThree-way handshake

205 Alice has been instructed to install 100 Windows workstations, and she is working on automating the process by configuring the workstations to use PXE boots. Each workstation therefore must obtain an IP address from a DHCP server and download a boot image file from a TFTP server. Which of the following well-known ports must Alice open on the firewall separating the workstations from the servers? (Choose all that apply.)6566676869

206 Which of the following explanations best describes the function of a Transmission Control Protocol (TCP) or User Datagram Protocol (UDP) port number?The port number indicates to the receiver that the sender can activate a specific port only.The port number is used by both the sender and the receiver to identify the application that generated the information in the datagram.The port number is used only by the receiver, to indicate the application process running on the sender.The port number is used by both the sender and the receiver to negotiate a well-known server port for the communicating processes.

207 What is the valid range of numbers for the ephemeral client ports used by the Transmission Control Protocol (TCP) and User Datagram Protocol (UDP)?1023 through 655341 through 102449152 through 655351024 to 49151

208 Which of the following statements about the User Datagram Protocol (UDP) are true? (Choose all that apply.)UDP does not use packet sequencing and acknowledgments.UDP uses packet sequencing and acknowledgments.UDP is a connection-oriented protocol.UDP is a connectionless protocol.UDP has an 8-byte header.UDP has a 20-byte header.

209 Which of the following port values are used by the File Transfer Protocol (FTP)? (Choose all that apply.)2123205369

210 Which of the following protocols provides connectionless delivery service at the transport layer of the Open Systems Interconnection (OSI) model?TCPHTTPUDPARP

211 What is the valid range of numbers for the well-known Transmission Control Protocol (TCP) and User Datagram Protocol (UDP) ports used by servers?1024 through 491511 through 4915149152 through 655341 through 1023

212 Ralph is a network administrator who has just installed a new open-source email server for the users at his company. The server is configured to send and receive Internet email and create a mailbox for each user that will permanently store the user's mail on the server. Ralph next uses a protocol analyzer to examine the network traffic resulting from the new server installation. Which of the following new protocols should Ralph expect to see in his network traffic analysis? (Choose all that apply.)SNMPSMTPPOP3IMAPRIP

213 Which of the following values could a web client use as an ephemeral port number when communicating with a web server?123801024199950134

214 Which of the following protocols provides connection-oriented service with guaranteed delivery at the transport layer of the OSI model?TCPHTTPUDPIP

215 Which of the following protocols is limited to use on the local subnet only?Address Resolution Protocol (ARP)Dynamic Host Configuration Protocol (DHCP)Domain Name System (DNS)Simple Mail Transfer Protocol (SMTP)

216 Which of the following prefixes must you use in the URL you type into a web browser when the website you want to access has been secured with Transport Layer Security (TLS)?TLS://HTTPS://HTTP://HTLS://

217 What is the difference when you specify the HTTPS:// prefix in a Uniform Resource Locator (URL) instead of HTTP://? (Choose all that apply.)The connection between the web browser and the server is encrypted.The browser uses a different port number to connect to the server.The connection uses SSL or TLS instead of HTTP.The browser uses a different IP address to connect to the server.

218 You are a consultant installing a web server application for a client called Adatum. The domain name Adatum.comhas been registered in the DNS, and the server has one public IP address, so the new website will be accessible to users on the Internet. You want to be able to access the web server application's administrative site from your remote office, so you configure that site to be encrypted and to use the port number 12354 instead of the default. Which of the following URLs will you have to use to access the administrative website? http://www.adatum.com http://www.adatum.com:12354 https://www.adatum.com:80 https://www.adatum.com:12354

219 Which of the following protocols does IPsec use to digitally encrypt packets before transmitting them over the network?ESPSSLAHMSCHAP

220 Which of the following are the protocols that IPsec uses to secure network traffic? (Choose all that apply.)SSHAHESPSSL

221 What is the primary shortcoming of the File Transfer Protocol (FTP) that is addressed by FTPS and SFTP?Lack of securitySlow file transfersFile size limitationsLack of authentication

222 Which of the following File Transfer Protocol (FTP) variants transmit authentication passwords over the network in clear text?FTPFTPSSFTPTFTP

223 Which of the following File Transfer Protocol (FTP) variants is typically used to download boot image files during Preboot Execution Environment (PXE) startup sequences?FTPFTPSSFTPTFTP

224 Which of the following protocols does IPsec use to digitally sign packets before transmitting them over the network?ESPSSLAHMSCHAP

Читать дальше
Тёмная тема
Сбросить

Интервал:

Закладка:

Сделать

Похожие книги на «CompTIA Network+ Practice Tests»

Представляем Вашему вниманию похожие книги на «CompTIA Network+ Practice Tests» списком для выбора. Мы отобрали схожую по названию и смыслу литературу в надежде предоставить читателям больше вариантов отыскать новые, интересные, ещё непрочитанные произведения.


Отзывы о книге «CompTIA Network+ Practice Tests»

Обсуждение, отзывы о книге «CompTIA Network+ Practice Tests» и просто собственные мнения читателей. Оставьте ваши комментарии, напишите, что Вы думаете о произведении, его смысле или главных героях. Укажите что конкретно понравилось, а что нет, и почему Вы так считаете.

x