WGU CompTIA A+ lesson 5 D316 complete questions with expert solutions + rationales

0.0(0)
studied byStudied by 0 people
0.0(0)
full-widthCall with Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/63

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No study sessions yet.

64 Terms

1
New cards

A host is configured with the IP address 172.16.1.100 in the 172.16.1.0/16 IP network. What value should be entered as the subnet mask?

A subnet mask field uses dotted decimal format. The /16 network prefix means that the first 16 bits in the mask are set to one: 11111111 11111111 00000000 00000000. A whole octet of ones converts to 255 in decimal. Therefore, the dotted decimal mask is 255.255.0.0.

2
New cards

What type of value would you expect a query for an AAAA resource record to return?

An IPv6 address.

3
New cards

You are assisting another customer with a full fiber connection terminated to an optical network terminal (ONT). The customer's router was disconnected while some building work was being completed, and the patch cable is now missing. The customer thinks that the cable should be a fiber optic one because the service is "full fiber." What type of cable do you need to locate?

An RJ45 unshielded twisted pair (UTP) patch cable. The ONT converts the optical signal over the external fiber optic cable to an electrical one to connect to the local router.

4
New cards

You are setting up an ADSL router/modem for a client; unfortunately, the contents of the box have become scattered. What type of cable do you need to locate to connect the router's WAN interface?

Asymmetrical Digital Subscriber Line (DSL) connects to the phone line via a filter. You need an RJ11-terminated patch cord to make the connection.

5
New cards

What type of TXT record uses cryptography to help recipient servers reject spoofed messages and spam?

DomainKeys Identified Mail (DKIM)

6
New cards

True or false? A top-level domain such as .com represents the top of the DNS hierarchy.

False. The Domain Name System (DNS) uses root servers at the top of the hierarchy. The root is represented by a trailing dot at the end of a fully qualified domain name (FQDN), though this can very commonly be omitted in ordinary usage.

7
New cards

True or false? A SOHO router uses an embedded modem and Ethernet adapter to forward traffic between public and private network segments over a single hardware port.

False. The modem and Ethernet interfaces use separate ports.

8
New cards

True or false? At the Transport layer, connections between hosts to exchange application data are established over one port number.

False. The server application is identified by one port, but the client must also assign its own port to track the connection.

9
New cards

Another technician has scribbled some notes about a firewall configuration. The technician has listed only the port numbers 25 and 3389. What is the purpose of the protocols that use these ports by default?

Port TCP/25 is used by the Simple Mail Transfer Protocol (SMTP) to send and receive email messages. Port TCP/3389 is used by Remote Desktop Protocol (RDP) to connect to a computer's graphical shell over the network.

10
New cards

The technician has made a note to check that port 445 is blocked by the firewall. What is the purpose of the protocol that uses this port by default, and why should it be blocked?

Port TCP/445 is used by the Server Message Block (SMB) protocol that implements Windows File/Printer Sharing. SMB is designed for use on local networks only. Allowing access from the Internet would be a security risk.

11
New cards

What feature of DHCP means that it must use UDP at the transport layer?

The Dynamic Host Configuration Protocol (DHCP) uses broadcast addressing, which is not supported by the connection-oriented Transmission Control Protocol (TCP). Consequently, DHCP uses the connectionless User Datagram Protocol (UDP).

12
New cards

You are setting up a printer to use static IPv4 addressing. What type of value is expected in the default gateway field?

The IPv4 address of the local router interface, entered in dotted decimal format.

13
New cards

You need to ensure that a print device receives the same IP address when connecting to the network. What value do you need to configure on the DHCP server to enable a reservation?

The reservation should be configured with the media access control (MAC) address of the print device (plus the IP address to assign).

14
New cards

You are advising another technician about typical DNS configuration. The technician thinks that the name server hosting the 515 support domain resource records on the Internet should be configured as the primary DNS server entry in the IP configuration of local clients. Why is this unlikely to be the case?

The role of a name server is to respond to queries for the resource records of the specific domain(s) that it is responsible for. The role of the DNS server types listed in a client's IP configuration is to resolve requests for records in any valid domain. To do this, the resolver must take on the task of querying multiple name servers on behalf of the client. Mixing these roles on the same server machine is possible in theory, but for performance and security reasons, they are more commonly performed by separate servers.

15
New cards

Another technician has scribbled some notes about IPv4 addresses used in various networks associated with support tickets. One of them is assigned to the WAN interface of a SOHO router that requires troubleshooting. Which of these addresses must it be?

52.165.16.254

192.168.100.52

169.254.1.121

172.30.100.32

224.100.100.1

The WAN interface of the router must use an IPv4 address from a valid public range, so 52.165.16.254 is the only one it could be: 172.30.100.32 and 192.168.100.52 are in the class B and class C private ranges, 169.254.1.121 is in the range reserved for APIPA, and 224.100.100.1 is outside the range of valid public addresses (it is part of class D, which is used for a type of addressing called "multicasting").

16
New cards

True or false? A valid IPv6 configuration requires prefix length notation.

True. In IPv6, while there is no separate entity called a subnet mask, as in IPv4, the concept of dividing the address into network and host portions still exists and is necessary. This division is indicated by the prefix length in IPv6, such as /64, /48, etc. The prefix length in IPv6 serves the same purpose as the subnet mask in IPv4, specifying how many bits of the address are allocated for the network portion.

17
New cards

True or false? Both 4G and 5G cellular can be used for fixed access broadband as well as in mobile devices.

True. These can work as an alternative to wired broadband or as a backup/failover Internet connection type. Many router models now come with a cellular radio. A subscribed identity module (SIM) card from the service provider must also be installed.

18
New cards

True or false? A SOHO router can be configured to provide an IPv4 address configuration to hosts without further administrator attention.

True. This service is implemented by the Dynamic Host Configuration Protocol (DHCP).

19
New cards

Which network configuration technology can be configured on switches to divide a local network into multiple broadcast domain segments?

Virtual LAN (VLAN)

20
New cards

Internet Service Providers (ISPs)

Provides Internet connectivity and web services to its customers.

21
New cards

public switched telephone network (PSTN)

Global network connecting national telecommunications systems.

22
New cards

Plain Old Telephone System (POTS)

Parts of a telephone network "local loop" that use voice-grade cabling. Analog data transfer over POTS using dial-up modems is slow (33.3 Kb/s)

23
New cards

Digital Subscriber Line (DSL)

Carrier technology to implement broadband Internet access for subscribers by transferring data over voice-grade telephone lines. There are various "flavors" of DSL, notably S(ymmetric)DSL, A(symmetric)DSL, and V(ery HIgh Bit Rate)DSL.

24
New cards

Fixed wireless Internet access

A method for accessing the internet in areas where wired broadband is unavailable. It includes satellite-based systems, such as Geostationary Orbital Satellite Internet, which offers broad coverage with typical speeds of 2-6 Mbps up and 30 Mbps down but higher latency (600-800 ms RTT), and Low Earth Orbital Satellite Internet, which offers better bandwidth (70-100 Mbps) and lower latency (100-200 ms RTT) but requires a motorized, phased array antenna to track the moving satellites.

25
New cards

Fiber to the Premises (FTTP)

Internet connection type that uses a fiber link between the subscriber premises and ISP network. Fiber to the premises (FTTP) uses a full fiber link, while fiber to the curb (FTTC) retains a short segment of copper wire between the subscriber premises and a street cabinet.

26
New cards

optical network terminal (ONT)

Device that converts between optical and electrical signaling deployed to facilitate full fiber Internet connection types.

27
New cards

Satellite

System of microwave transmissions where orbital satellites relay signals between terrestrial receivers or other orbital satellites. Satellite internet connectivity is enabled through a reception antenna connected to the PC or network through a DVB-S modem.

28
New cards

Wireless Internet Service Provider (WISP)

ISP offering Internet access over ground-based Line of Sight (LoS) microwave transmitters.

29
New cards

Cellular radio

Standards for implementing data access over cellular networks are implemented as successive generations. For 2G (up to about 48 Kb/s) and 3G (up to about 42 Mb/s), there are competing GSM and CDMA provider networks. Standards for 4G (up to about 90 Mb/s) and 5G (up to about 300 Mb/s) are developed under converged LTE standards.

30
New cards

Global System for Mobile Communication (GSM)

Standard for cellular radio communications and data transfer. GSM phones use a SIM card to identify the subscriber and network provider. 4G and later data standards are developed for GSM.

31
New cards

Code Division Multiple Access (CDMA)

Method of multiplexing a communications channel using a code to key the modulation of a particular signal. CDMA is associated with Sprint and Verizon cellular phone networks.

32
New cards

Router

Intermediate system working at the Network layer capable of forwarding packets around logical networks of different layer 1 and layer 2 types.

33
New cards

Firewall

Software or hardware device that protects a network segment or individual host by filtering packets to an access control list.

34
New cards

Transmission Control Protocol/Internet Protocol (TCP/IP)

Network protocol suite used to implement the Internet and most WANs and LANs. It uses a four-layer network model that corresponds roughly to the OSI model as follows: Network Interface (Physical/Data Link), Internet (Network), Transport (Transport), Application (Session, Presentation, Application).

35
New cards

Transmission Control Protocol (TCP)

Protocol in the TCP/IP suite operating at the transport layer to provide connection-oriented, guaranteed delivery of packets.

36
New cards

User Datagram Protocol (UDP)

Protocol in the TCP/IP suite operating at the transport layer to provide connectionless, non-guaranteed communication.

37
New cards

Internet Protocol (IP)

Network (Internet) layer protocol in the TCP/IP suite providing packet addressing and routing for all higher-level protocols in the suite.

38
New cards

IPv4

Version of the Internet Protocol that uses 32-bit address values and subnet masks typically expressed in dotted decimal notation.

39
New cards

Subnet mask

Number of bits applied to an IP address to mask the network ID portion from the host/interface ID portion.

40
New cards

Default gateway

IP configuration parameter that identifies the address of a router on the local subnet that the host can use to contact other networks.

41
New cards

Public IP address

Some IP address ranges are designated for use on private networks only. Packets with source IP addresses in public ranges are permitted to be forwarded over the Internet. Packets with source IP addresses from private ranges should be blocked at Internet gateways or forwarded using some type of translation mechanism.

42
New cards

Network Address Translation (NAT)

Routing mechanism that conceals internal addressing schemes from the public Internet by translating between a single public address on the external side of a router and private, non-routable addresses internally.

43
New cards

Domain Name System (DNS)

Service that maps fully qualified domain name labels to IP addresses on most TCP/IP networks, including the Internet.

44
New cards

Dynamic Host Configuration Protocol (DHCP)

Protocol used to automatically assign IP addressing information to hosts that have not been configured manually.

45
New cards

Automatic private IP addressing (APIPA)

Mechanism for Windows hosts configured to obtain an address automatically that cannot contact a DHCP server to revert to using an address from the range 169.254.x.y. This is also called a link-local address.

46
New cards

IPv6

Version of the Internet Protocol that uses 128-bit address values typically expressed in canonical hex notation with slash notation network prefixes.

47
New cards

Hypertext Transfer Protocol (HTTP)/HyperText Transfer Protocol Secure (HTTPS)

Application protocol used to provide web content to browsers. HTTP uses port 80. HTTPS(ecure) provides for encrypted transfers, using TLS and port 443.

48
New cards

Secure Shell (SSH)

Application protocol supporting secure tunneling and remote terminal emulation and file copy. SSH runs over TCP port 22.

49
New cards

Describe the Trivial File Transfer Protocol (TFTP)

The Trivial File Transfer Protocol (TFTP) is a simplified form of the File Transfer Protocol (FTP) and supports only file copying. TFTP works over UDP port 69, whereas FTP work on port 21.

50
New cards

Scope

Range of consecutive IP addresses in the same subnet that a DHCP server can lease to clients.

51
New cards

Lease

Address configuration assigned by a DHCP server to a client for a limited period.

52
New cards

Reserve

DHCP configuration that assigns either a prereserved or persistent IP address to a given host, based on its hardware address or other ID.

53
New cards

Host name

A human-readable name that identifies a network host.

54
New cards

Fully Qualified Domain Name (FQDN)

Unique label specified in a DNS hierarchy to identify a particular host within a subdomain within a top-level domain.

55
New cards

Resource records

Data file storing information about a DNS zone. The main records are as follows: A (maps a host name to an IPv4 address), AAAA (maps to an IPv6 address), CNAME (an alias for a host name), MX (the IP address of a mail server), and PTR (allows a host name to be identified from an IP address).

56
New cards

MX record

Type of DNS resource record used to identify the email servers used by a domain.

57
New cards

TXT record

DNS resource record for storing free-form string values.

58
New cards

Spam

Junk, fraudulent, and malicious messaging sent over email (or instant messaging, which is called spam). Spam can also be spread via social networking.

59
New cards

Sender Policy Framework (SPF)

DNS record identifying hosts authorized to send mail for the domain.

60
New cards

DomainKeys Identified Mail (DKIM)

Cryptographic authentication mechanism for mail utilizing a public key published as a DNS record.

61
New cards

Domain-Based Message Authentication, Reporting, and Conformance (DMARC)

Framework for ensuring proper application of SPF and DKIM utilizing a policy published as a DNS record.

62
New cards

Virtual LAN (VLAN)

Logical network segment comprising a broadcast domain established using a feature of managed switches to assign each port a VLAN ID. Even though hosts on two VLANs may be physically connected to the same switch, local traffic is isolated to each VLAN, so they must use a router to communicate.

63
New cards

Virtual Private Network (VPN)

Secure tunnel created between two endpoints connected via an unsecure transport network (typically the Internet).

64
New cards