Home > Sample chapters

CompTIA A+ Rapid Review: Networking

Answers

This section contains the answers to the “Can you answer these questions?” sections in this chapter.

Objective 2.1: Identify types of network cables and connectors

  1. Fiber cable uses LC, ST, and SC connectors.

  2. RJ-11 connectors are used for phone lines, and RJ-45 connectors are used for networks. Both connectors use twisted-pair cable.

  3. F-type screw-on connectors are used with coaxial cable.

Objective 2.2: Categorize characteristics of connectors and cabling

  1. Fiber supports the longest cables without a repeater. SMF cable supports longer cable runs than MMF cable.

  2. CAT 6 cable supports data transmissions up to 10 Gbps.

  3. RG-6 cable supports both analog and digital transmissions.

Objective 2.3: Explain properties and characteristics of TCP/IP

  1. The IP address 192.168.15.7 is a Class C address. The first number in the IP address 192.168.15.7 is 192, and addresses with the first number between 192 and 223 are Class C addresses.

  2. The IP address FC00::42A:0:0:7F5 is an IPv6 address with leading zeros omitted and using zero compression.

  3. Addresses starting with 169.254 are APIPA addresses, and they are assigned to DHCP clients when a DHCP server has not answered with an available IP address.

  4. DNS provides a mapping for user friendly names (host names) to IP addresses. Clients send the name (such as bing.com) to the DNS server, and the DNS server responds with the IP address.

  5. DHCP provides IP addresses and other TCP/IP configuration information to DHCP clients.

Objective 2.4: Explain common TCP and UDP ports, protocols, and their purpose

  1. Email uses ports 25 (SMTP), 110 (POP3), and 143 (IMAP).

  2. SFTP is encrypted with SSH, and it is used to transfer large encrypted files.

  3. TCP uses a three-way handshake to establish a connection and provides guaranteed delivery.

Objective 2.5: Compare and contrast wireless networking standards and encryption types

  1. Both 802.11a and 802.11n use the 5-GHz frequency range.

  2. 802.11n can transmit up to 150 Mbps, 300 Mbps, or 600 Mbps at a time by using multiple antennas. In comparison, 802.11g has a maximum of 54 Mbps.

  3. WEP has been broken and should not be used.

Objective 2.6: Install, configure, and deploy a SOHO wireless/wired router using appropriate settings

  1. You use MAC addresses with MAC address filtering to block network access to specific computers.

  2. Channels 1 and 11 are good alternative channels if channel 6 has excessive interference from other wireless networks.

  3. Internet-facing servers (including gaming servers) should be placed in a DMZ to provide an extra layer of protection.

Objective 2.7: Compare and contrast Internet connection types and features

  1. Fiber and cable broadband connections provide the highest speeds when compared with other wired connections.

  2. Dial-up, DSL, and ISDN connections use phone lines.

  3. Cellular Internet connections are appropriate for people who frequently travel.

  4. Mobile hotspots (also called MiFi) connections are mobile and can be used to provide Internet access for multiple users.

Objective 2.8: Identify various types of networks

  1. A network centered on an individual is a PAN.

  2. A WAN connects two or more networks located in separate geographical locations.

  3. A mesh topology provides the most redundancy.

Objective 2.9: Compare and contrast network devices and their functions and features

  1. Switches provide performance improvements because each device connected to the switch uses a separate segment, resulting in less traffic for each segment. Also, switches provide some security because traffic is not sent to all devices connected to the switch.

  2. Routers used to connect to the Internet commonly include NAT to translate public and private IP addresses. In many cases, the router also includes firewall capabilities.

  3. Modems are used for dial-up Internet connections.

  4. Firewalls block all traffic unless an exception or rule is created to allow the traffic.

Objective 2.10: Given a scenario, use appropriate networking tools

  1. Crimpers are used to connect RJ-45 connectors to twisted-pair cable.

  2. A toner probe is an effective tool used to trace cables.

  3. Loopback plugs are commonly used to test NICs.