A+ Certification

Card Set Information

Author:
drummermankent
ID:
157718
Filename:
A+ Certification
Updated:
2012-07-27 21:16:43
Tags:
comptia
Folders:

Description:
Sample questions for the A+ networking certification exam.
Show Answers:

Home > Flashcards > Print Preview

The flashcards below were created by user drummermankent on FreezingBlue Flashcards. What would you like to do?


  1. A user is having problems accessing the wireless network with a gaming device. Which is most likely the problem?
    A. device doesnt support 802.1p
    B. Broadcast prevention is enabled on the switch
    C. PoE is not enabled over wireless
    D. WPA2 is not supported by the device
    D. WPA2 isnt supported by the device.
    (this multiple choice question has been scrambled)
  2. Which of the following is a distance vector routing protocol?

    A. OSPF
    B. EIGRP
    C. IS-IS
    D. RIP
    D. RIP
    (this multiple choice question has been scrambled)
  3. Which of the following controls are MOST effective when a route only supports remote configuration changes via TELNET?
    A. Vulnerability scanner
    B. Strong passwords
    C. Port Scanner
    D. Two Factor Authentication
    E IP ACLs
    • D. Two factor autherntication
    • E. IP ACLs
  4. Which of the following terms BEST describes the time required for routers to exchange new routes and update their routing tables with rinforation from other network routers?
    A. Propagation
    B. Convergence
    C. Crosstalk
    D. Attenuation
    B. Convergence
    (this multiple choice question has been scrambled)
  5. Which of the following is true about an IP address if the first three bits are all one and the fourth bit is a zero?

    A. Class B address
    B. Class D address
    C. Class A address
    D. class C address
    B. Class D
    (this multiple choice question has been scrambled)
  6. Which of the following protocols would a multilayer switch use to learn the IP address of a directly connected device?

    A. BOOTP
    B. DHCP
    C. ARP
    D. DNS
    C. ARP - address resolution protocol
    (this multiple choice question has been scrambled)
  7. The address 0:0:0:0:0:0:0:1 is also known as the

    A. IPv6 loopback address
    B. IPv4 localhost address
    C. IPv4 loopback address
    D. IPv6 default DNS address
    A. IPv6 Loopback
    (this multiple choice question has been scrambled)
  8. When each routing device has a consisten view of the network topology, the network is said to be

    A. vectored
    B. converged
    C. fault tolerant
    D. autonomous
    B. converged
    (this multiple choice question has been scrambled)
  9. For an enterprise to use one of the reservered private IP address ranges, as best practive they should coordinate with:

    A. IANA
    B. IT dept
    C. legal dept
    D. IEEE
    B. IT
    (this multiple choice question has been scrambled)
  10. Which of the following is the name of the routing uodate process involved when achange occurs in the routing enviornment?

    A. supernetting
    B. convergence
    C. subnetting
    D. dynamic
    B. convergence
    (this multiple choice question has been scrambled)
  11. Which of the following routing protocol uses a state algorithm?

    A. RIPv2
    B. RIP
    C. BGP
    D. OSPF
    D. OSPF
    (this multiple choice question has been scrambled)
  12. Wich of the following protocols is used during boot-up of diskless hosts?

    A. IGMP
    B. TFTP
    C. SNMP
    D. TLS
    B. TFTP
    (this multiple choice question has been scrambled)
  13. Which of the following protocolsi used to transmit emails?

    A. SNMP
    B. POP3
    C. SMTP
    D. IMAP4
    C SMTP
  14. A software vender wants to distribute free updates for clients via the web Which of the following would be the MOST efficient to distribute the updates?

    A. TLS
    B.DNS
    C. SSH
    D. FTP
    D. FTP
    (this multiple choice question has been scrambled)
  15. A network with 20 clients needs to view a video file. Which of the following should be configured on the client's computers to reduce network traffic?

    A. multicast
    B. class A addresses
    C. broadcast
    D. Class C addresses
    A. multicast
    (this multiple choice question has been scrambled)
  16. Which of the following items changes the encryption ket on a users session after a set period of time?

    A. WEP
    B. AES
    C. RADIUS
    D. TKIP
    D. TKIP - Temporal Key Integrity Protocol
    (this multiple choice question has been scrambled)
  17. Which of the following standards uses 5GHz frequency for network communications?

    A. 802.3
    B. 802.11a
    C. 802.11g
    D. 802.11b
    B. 802.11a
    (this multiple choice question has been scrambled)
  18. A workstation has an IP address of 169.254.128.1 Which of the following IP address types is this?

    A. DHCP lease
    B. APIPA
    C. Public Internet Address
    D. RFC 1918 private IP
    B. APIPA
    (this multiple choice question has been scrambled)
  19. An administratir just installed a new DS3 WAN circuit providing 45Mbps. However, multiple users ar the site report slowness when accessing remote resources. Which of the following tools should the admin use to dx the issue?

    A. throughtput tester
    B. Loopvack plug 
    C. content filter
    D. crossover cable
    A. Throughput tester
    (this multiple choice question has been scrambled)
  20. Multiple users on the same floor cannot access the network. Upon investigation, an admin sees that the switch has power and all of the active ports are blinking almost non-stop. which of the following is MOST likely the cause?

    A. broadcast storm
    B. DHCP snooping
    C. speed/duplex mismatch 
    D. routing loop
    A. broadcast storm
    (this multiple choice question has been scrambled)
  21. A VoIP telephone with a built in hub is plugged into a single network using both the hub port and the telephone port. The network begins to experience severe lag due to a significant increase in traffic. Which feature would prevent it?

    A. Spanning tree
    B. VLANs
    C. Trunking 
    D. Port Mirroring
    A. Spanning tree
    (this multiple choice question has been scrambled)
  22. Which of the following is the maximum number of available segments on a 10base-T network?

    A. 1024
    B. 1256
    C. 512
    D. 2
    D. 2
    (this multiple choice question has been scrambled)
  23. An administrator needs to oextend the wireless coverage inside of the company's office space. Which of the following devices would MOST likely be installed to allow this extension?

    A. router 
    B. switch
    C. repeater
    D. firewall
    C. repeater
    (this multiple choice question has been scrambled)
  24. a network is experiencing man in the middle attacks - a user is impersonating the default gateway IP 192.168.1.1 the default gateway of the MAC address is 00-11-22-33-44-55 which of the following commands can an admin run on the affected host to resolve the issue?

    A. apr -s 192.168.1.1 00-11-22-33-44-55 
    B. arp -a 00-11-22-33-44-55
    C. arp -a 192.168.1.1
    D. arp -s 00-111-22-33-44-55 192.168.1.1 
    A. apr -s 192.168.1.1 00-11-22-33-44-55 
    (this multiple choice question has been scrambled)
  25. Which of the following network devices is used to segment multiple networks?

    A. hub
    B. layer 2 switch 
    C. modems
    D. router
    D. router
    (this multiple choice question has been scrambled)
  26. An admin needs to test connectivity to a particular website without launching a browser session. Which of the following commands would likely be used?

    A. nslookup 
    B. ping
    C. tracerroute
    D. ipconfig
    B. ping
    (this multiple choice question has been scrambled)
  27. An admin needs to find out a specific NICs MAC address, the IP of the NIC is known. which utility wouldn enable the admin to discover the MAC?

    A. ping
    B. netstat
    C. nbstat
    D. arp 
    D. arp
    (this multiple choice question has been scrambled)
  28. When terminating a CAT5e cable a tech terminates the 568A end and the 568B end. The resulting cable is 

    A. non-fuctional
    B. a crossover cable
    C. a straight through cable
    d capable of 10gbaseT 
    B. a crossover cable
    (this multiple choice question has been scrambled)
  29. Which of the following is a secure way to transfer files from one device to another?

    A. SNMPV3
    B. FTP 
    C. TFTP
    D. SFTP
    D. SFTP
    (this multiple choice question has been scrambled)
  30. An admin has determined that auto-negation has failed on a connection. Which of the following are the MOST important setting that should be matched on each side of the connection?

    A. IP address, OSPF area, route propagation
    B. port enable, port mirroring, link aggregation
    C. VLAN assignment, port auth, flow control 
    D. port speed, port duplex, flow control
    D. port speed, port duplex, flow control
    (this multiple choice question has been scrambled)
  31. An admin is provisioning a 10baseSR Ethernet connection between two core switches. Which cable should be used?

    A. single mode fiber
    B. RG-6 copper
    C. CAT6 copper 
    D. multimode fiber 
    D. multimode fiber
    (this multiple choice question has been scrambled)
  32. Allowing two ports to function as one is considered to be which of the following features?

    A. port auth
    B. port trunking on different switches
    C. etherchanneling on same switch
    D. port mirroring 
    C. etherchanneling on same switch
    (this multiple choice question has been scrambled)
  33. Which of the following protocols is the most secure for transferring network device configurations?

    A. RCP  
    B. TFTP
    C. FTP
    D. SCP
    D. SCP
    (this multiple choice question has been scrambled)
  34. An admin needs to connect a fiber cable to a CP that only has a RJ-45 jack. Which could be used to accomplish the connection?

    A. optical media
    B. smart jack
    C. token ring
    D. media converter 
    D. media converter 
    (this multiple choice question has been scrambled)
  35. Which of the following should be used to unsure that all packets are received by every connected device?

    A. firewall
    B. switch
    C. router 
    D. hub
    D. hub
    (this multiple choice question has been scrambled)
  36. Which of the following would allow for encrypted login credentials to be sent ove the network?

    A. SSH
    B. HTTP 
    C. telnet
    D. FTP
    A. SSH
    (this multiple choice question has been scrambled)
  37. Which of the following will list the destination MAC addresses?
    A. ping
    B. dig
    C. nbtstat 
    D. arp
    D. arp
    (this multiple choice question has been scrambled)
  38. Which of the following transport protocols should be used to avoid retransmitting lost packets?

    A. IGMP 
    B. UDP
    C. ARP
    D. TCP
    B. UDP 
    (this multiple choice question has been scrambled)
  39. A network admin is documenting all devices on the network. This type of documentation is:

    A. network diagram 
    B. network guidelines
    C. network baseline
    D. network procedures
    A. network diagram 
    (this multiple choice question has been scrambled)
  40. Which of the following wireless communication standards allows for communication at both 2.4 and 5 GHz frequencies?

    A. 802.11g 
    B. 802.11a
    C. 802.11n
    D. 802.11b
    C. 802.11n
    (this multiple choice question has been scrambled)
  41. Users from different locations are reporting issues with carious intranet sites. After identifying all the affected areas, which should be done next?

    A. determine what has recently changed
    B. create an action plan and solution identifying potential effects
    C. continue to identify new Sx elsewhere 
    D. establish the most probable cause
    A. determine what has recently changed
    (this multiple choice question has been scrambled)
  42. Which of the following cables would a tech use to connect two switches together?

    A. crossover
    B. loopback
    C. 568A 
    D. 568B
    A. crossover
    (this multiple choice question has been scrambled)
  43. A company finished deploying an 802.11g mesh. the admin receives a call from a user who cannot connect wirelessly though all network connections are centrally managed. Which is most likely the cause?

    A. access point has omni-directional antennas
    B. end user is using an 802.11a card
    C. end user is using an 802.11b/g card
    D. access point is not broadcasting the SSID 
    B. end user is using an 802.11a card
    (this multiple choice question has been scrambled)
  44. which of the following does a star ring topology use for data transfer?

    A. CSMA/CA
    B. CSM/CD
    C. CHAP
    D. token passing 
    D. token passing 
    (this multiple choice question has been scrambled)
  45. an admin would like to test the firewall rules on a corporate network. Which of the following tools would most likely be used?

    A. ping sweep 
    B. port scanner
    C. traffic shaper
    D. packet sniffer
    B. port scanner
    (this multiple choice question has been scrambled)
  46. A router receives a packet with a destination address 72.44.69.254 however, no entry in the routing table exists for the network. Which of the following actions will the router take?

    A. packet will be dropped as non-routable
    B. the packet will be queued while the router queries for an acceptable path
    C. packet will be forwarded to the next hop address of the default route
    D. packet will be forwarded out until another router forwards the packet
    C. packet will be forwarded to the next hop address of the default route
    (this multiple choice question has been scrambled)
  47. A tech is implementing new wireless access points in an existing wireles infrastructure. The security is the WPA2 standard. Which of the following encryption methods may not be compatible withe the previously installed access points?

    A. CHAP 
    B. 3DES
    C. AES
    D. TKIP
    C. AES
    (this multiple choice question has been scrambled)
  48. A recently installed wireless router needs to be configured to have the highest level of security. Which of the following would most likely be used?

    A. WEP
    B. WPA
    C. IPSec 
    D. SSL
    B. WPA
    (this multiple choice question has been scrambled)
  49. Which of the following protocols would an admin use to backup files from a router to a local server?

    A. NTP
    B. SMTP
    C. DHCP
    D. TFTP 
    D. TFTP
    (this multiple choice question has been scrambled)
  50. Which of the following protocols describes an connectionless state and does not use acknowledgements?

    A. UDP
    B. NTP
    C. TCP 
    D. POP3
    A. UDP
    (this multiple choice question has been scrambled)
  51. Which of the following routing protocols uses the next hop metric in deciding how to route traffic?

    A. RIP
    B. IGP
    C. IS-IS 
    D. BGP
    A. RIP
    (this multiple choice question has been scrambled)
  52. Which of the following would an admin most likely require in order to connect a client to a WPA encrypted network?

    A. gateway address
    B. SSID 
    C. DSA public key
    D. PIN
    E. pre-shared key
    E. pre-shared key 
    (this multiple choice question has been scrambled)
  53. Which of the following protocols are used to transfer files between two systems? choose 2!

    A. RIP
    B. SCP
    C. FTP
    D. NTP
    E. SNMP 
    SCP, FTP
  54. Which of the following subnet masks will produce the smallest subnet size for a point to point network link?

    A. 255.255.255.0 
    B. 255.255.255.252
    C. 255.255.255.128
    D. 255.255.255.248 
    B. 255.255.255.252
    (this multiple choice question has been scrambled)
  55. Which of the following wireless networsk is configured without an access point?

    A. extended 
    B. ad-hoc
    C. multiport repeating
    D. local
    B. ad-hoc
    (this multiple choice question has been scrambled)
  56. Which of the following is a correct Ethernet MAC address?

    A. 12:H7:45:89:9F:65
    B. 12:88:FF:9X:58:9E 
    C. 16-15-4D-31-59-5J
    D. 11:34:7A:88:0C:DB
    D. 11:34:7A:88:0C:DB
    (this multiple choice question has been scrambled)
  57. Which of the following protocols uses port 143?

    A. SNMP
    B. IMAP4 
    C. NTP
    D. SSH
    B. IMAP4
    (this multiple choice question has been scrambled)
  58. Which of the following protocols enables admins to control network devices like routers and switches?

    A. NAT
    B. SNMP
    C. DNS
    D. NFS 
    B. SNMP
    (this multiple choice question has been scrambled)
  59. A tech receives a call on monday morning that several computers will not connect to the network. The tech determines  that the computers that were left on over the weekend are fuctional and those that were turned off are not. Which of the following is the problem?

    A. WINS needs to be restarted
    B. DHCP is not functioning 
    C. LDAP is not functioning
    D. DNS is not functioning
    B. DHCP is not functioning 
    (this multiple choice question has been scrambled)
  60. Which of the following technologies facilitates the conversion of internal private ip addressing to external ip addressing?

    A. TCP/IP 
    B. DHCP
    C. SNMP
    D. NAT
    D. NAT
    (this multiple choice question has been scrambled)
  61. Which of the following protocols are commonly used for VoIP?
    2 of em

    A. NPP
    B. SIP
    C. HSRP
    D. RTP
    E. NNP 
    SIP, RTP
  62. Which of the forrling is port 123 used for?

    A. NTP
    B. DNS 
    C. IMAP4
    D. HTTPS
    A. NTP
    (this multiple choice question has been scrambled)
  63. Two business partnets have recently been connected via a dedicated extranet. It has been discovered that each of the companies are using the same private IP address space. Which of the following will help to resolve potential routing issues?

    A. MULTICAST
    B. CIDR
    C. PAT
    D. NAT
    D. NAT
    (this multiple choice question has been scrambled)
  64. A scanner has determined the open ports on a network device. Assuming services are running on their default ports, which of the following ports will provide secure connections?

    A. 67
    B. 443 
    C. 69
    D. 143
    B. 443
    (this multiple choice question has been scrambled)
  65. Which protocol uses a three way handshake?

    A. TFTP
    B. DNS
    C. UDP
    D. TCP
    D. TCP
    (this multiple choice question has been scrambled)
  66. Which of the following provides the greatest level of protection against someone attempting to capture a router password transversing the network?

    A. ACL
    B. SSH
    C. SCP
    D. AH
    B. SSH port 22
    (this multiple choice question has been scrambled)
  67. Which of the following protocols uses port 20 by default?

    A. HTTPS
    B. FTP
    C. SSH
    D. DNS
    B. FTP
    (this multiple choice question has been scrambled)
  68. Which of the following is port 123 commonly used for?

    A. IMAP4
    B. HTTPS
    C. DNS
    D. NTP
    D. NTP Network Time Protocol
    (this multiple choice question has been scrambled)
  69. Which of the following protocols would most likely be used to provide for the simple movement of files across two machines over the internet?

    A. FTP
    B. POP3
    C. SMTP
    D. NTP
    A. FTP port 20
    (this multiple choice question has been scrambled)
  70. Which of the following protocols should be used to securely copy a file? Two..
    A. SFTP
    B. SCP
    C. TFTP
    D. FTP
    E. SNMP
    SFTP AND SCP (22)
  71. Which of the following ports would be most commonly used for email traffic?

    A. 110
    B. 443
    C. 80
    D. 20
    A. 110 POP3
    (this multiple choice question has been scrambled)
  72. Which of the following port combinations need to be opened over a firewall for internet browsing?

    A. 443 and 143
    B. 80 and 25
    C. 80 and 443
    D. 80 and 110
    C. 80 and 443 hhtp and https
    (this multiple choice question has been scrambled)
  73. Which of the following prtotocols is responsible for the delivery of email from server to server?

    A. IMAP
    B. SNMP
    C. POP3
    D. SMTP
    D. SMTP port 25
    (this multiple choice question has been scrambled)
  74. Which of the following ports would be commonly used for HTTP?

    A. 80
    B. 20
    C. 443
    D. 23
    A. 80
    (this multiple choice question has been scrambled)
  75. A scanner has determined the open ports on a network device. Assuming services are running on their default ports, which of the following ports will procide secure communications?

    A. 143
    B. 69
    C. 67
    D. 443
    D. 443 https
    (this multiple choice question has been scrambled)
  76. An admin would like to turn off web-based admin access to critical network routers and switches. Which of the following ports should be blocked? two

    a. 21
    b.80
    c. 23
    d. 110
    e. 443
    80 hhtp and 443 https
  77. Which of the following network services replies to requests to port 67?

    A. IMAP
    B. DNS
    C. SNMP
    D. DHCP
    D. DHCP port 67 
    (this multiple choice question has been scrambled)
  78. Which of the following protocols uses port 22 by default?

    A. TELNET
    B. DNS
    C. SSH
    D. FTP
    C. SSH
    (this multiple choice question has been scrambled)
  79. A network tech is connecting through the console port to configure a switch. Which of the following ports would be used to transfer configuration files from the switch?

    A. UDP 69
    B. TCP 110
    C. TCP 69
    D. UDP 67
    D. UDP 69 TFTP 
    (this multiple choice question has been scrambled)
  80. Which of the followingis part of the IP protocol suite andis used to monitor network managed devices?

    A. SNMP
    B. LDAP
    C. SMTP
    D. SMB
    A. SNMP 161 udp - Simple network management protocol
    (this multiple choice question has been scrambled)
  81. Which of the following transport protocols shuld be used to avoid retransmitting lost packets?

    A. TCP
    B. IGMP
    C. ARP
    D. UDP
    D. UDP 
    (this multiple choice question has been scrambled)
  82. Which of the following protocols allows email to be vieweed while remaining on the email server?

    A. SSL
    B. SMTP
    C. IMAP4
    D. POP3
    C. IMAP4 Internet message access protocol port 143
    (this multiple choice question has been scrambled)
  83. The SSL protocol is most commonly associated ehich of the following ports?

    A. 443
    B. 22
    C. 80
    D. 143
    A. 443 HTTPS over SSL *22 is SSH*
    (this multiple choice question has been scrambled)
  84. Which of the following is considered a connection - oriented protocol?

    A. TCP
    B. UDP
    C. IP
    D. SPX
    A. TCP
    (this multiple choice question has been scrambled)
  85. Which of the following protocols uses port 443?

    A. FTP
    B. HTTP
    C. HTTPS
    D. SMTP
    C. HTTPS
    (this multiple choice question has been scrambled)
  86. Which of the following is a secure method for file transfer to a network device?

    A. FTP
    B. SCP
    C. SNMPv2
    D. TFTP
    B. SCP port 22
    (this multiple choice question has been scrambled)
  87. Which of the following protocols is used to access files on a remote server?

    A. NTP
    B. ARP
    C. SIP
    D. FTP
    D. FTP port 20
    (this multiple choice question has been scrambled)
  88. Which of the following ports is associated with FTP?

    A. 23
    B. 20
    C. 3389
    D. 53
    B. 20
    (this multiple choice question has been scrambled)
  89. A software vender wants to distribute free updates for clients via the web. Which of the following protocols would be the most effecient to distribute the updates?

    A. FTP
    B. TLS
    C. DNS
    D. SSH
    A. FTP port 20
    (this multiple choice question has been scrambled)
  90. Which of the following network protocols is used to ensure consistent time across network devices on the domain?

    A. IGMP
    B. FTP
    C. NTP
    D. RTP
    C. NTP Network Time Protocol port 123
    (this multiple choice question has been scrambled)
  91. Which of the following are commonly used for VoIP? two

    A. NPP
    B. SIP
    C. HSRP
    D. RTP
    E. NNTP
    SIP AND RTP 
  92. Which of the following is the default port for telnet?

    A. 21
    B. 22
    C. 20
    D. 23
    D. 23
    (this multiple choice question has been scrambled)
  93. Which of the following would allow for encrypted login credentials to be sent over the network?

    A. HTTP
    B. TELNET
    C. FTP
    D. SSH
    D. SSH
    (this multiple choice question has been scrambled)
  94. Which of the following protocols is used for connecting clients to a news server?

    A. NCP
    B. NNTP
    C. IMAP4
    D. SMTP
    B. NNTP Network news transfer protocol port 119
    (this multiple choice question has been scrambled)
  95. Which of the following protocols operates at the transport layer of the OSI model and has the best effort delivery method?

    A. FTP
    B. HTTP
    C. TCP
    D. UDP
    D. UDP
    (this multiple choice question has been scrambled)
  96. Which of the following ports will allow a tech to transfer configuration data to a network switch?

    A. 389
    B. 69
    C. 3359
    D. 110
    B. 69 TFTP
    (this multiple choice question has been scrambled)
  97. Which of the following is the default port for POP3?

    A. 80
    B. 21
    C. 110
    D. 25
    C. 110 
    (this multiple choice question has been scrambled)
  98. ... Error message reads error on port 53 when trying to access internet, which is not working?

    A. DNS
    B. FTP
    C. HTTP
    D. HTTPS
    A. DNS
    (this multiple choice question has been scrambled)
  99. What is the default port for SMTP?

    A. 110
    B. 25
    C. 21
    D. 443
    B. 25
    (this multiple choice question has been scrambled)
  100. Default port for telnet?

    A. 23
    B. 20
    C. 22
    D. 21
    A. 23
    (this multiple choice question has been scrambled)
  101. Which of the following ports are associated with email protocols by defaule? two..

    A. 123
    B. 22
    C. 25
    D. 110
    E. 161
    25 SMTP AND 110 POP3
  102. What is port 443 used for?

    A. SNMP
    B. IMAP4
    C. SSH
    D. NTP
    B. IMAP 4
    (this multiple choice question has been scrambled)
  103. Which of the following is the difference between FTP and SFTP?

    A. SFTP protocol is tunneled over SSL
    B. SFTP is tunneled over IPSec
    C. SFTP runs in passive mode
    D. SFTP is run over SSH
    D. SFTP is run over SSH
    (this multiple choice question has been scrambled)
  104. A company would like to configure newsfeeds on the network for employees to be aware of internal company info. Which ports would be used to allow newsfeeds to pass-through?

    A. 25
    B. 22
    C. 143
    D. 119
    D. 119 Network News Transfer Protocol
    (this multiple choice question has been scrambled)
  105. Which of the following replaces the destination IP address of a packet?

    A. DNS
    B. NAT
    C. DHCP
    D. SNAT
    D. SNAT Secure Network Address Translation
    (this multiple choice question has been scrambled)
  106. Which of the following ports does IPSec use?

    A. 8080
    B. 3389
    C. 500
    D. 53
    C. 500
    (this multiple choice question has been scrambled)
  107. Which of the following network services replies to requests sent to port 67?

    A. DNS
    B. SNMP
    C. DHCP
    D. IMAP
    C. DHCP
    (this multiple choice question has been scrambled)
  108. Which of the following tech can prevent a depts network broadcast from propagating to another depts network if the are on the same switch?

    A. hub
    B. firewall
    C. A trunk
    D. VLAN

What would you like to do?

Home > Flashcards > Print Preview