CompTIA Network+ Certification Exam
Which of the following is the main difference between TCP and UDP?
A. TCP data flows in two directions, while UDP data flows from server to client.
B. The TCP header implements flags, while the UDP header does not.
C. The TCP header implements checksum, while the UDP header does not.
D. TCP connections can be secured by stateful firewalls, while UDP connections cannot.
Correct Answer: B
Transmission Control Protocol (TCP) is a connection-oriented transport protocol. Connection- oriented transport protocols provide reliable transport. When a computer wants to send data to another computer, TCP will first establish a connection between the two computers. When a sending computer sends data segments, the receiving computer acknowledges receipt of the segments. If the receiving computer does not receive an expected segment, the sending computer will send it again.
User Datagram Protocol (UDP) is a connectionless transport protocol. Connectionless transport protocols provide unreliable transport. With UDP, there is no connection establishment between the sending and receiving computers. If a data segment is lost in transit, the sending computer will not know about it so it will not resend the segment.
TCP uses control messages to manage the process of contact and communication. TCP uses a set of control flags in the TCP header to indicate whether a segment is being used for control purposes or just to carry data.
Which of the following PDUs is used by a connectionless protocol?
Correct Answer: D
UDP is a connectionless transport protocol that operates in the transport layer of the OSI model.
UDP stands for User Datagram Protocol. PDUs (Protocol Data Units) used by UDP are known as Datagrams.
A network technician is utilizing a network protocol analyzer to troubleshoot issues that a user has been experiencing when uploading work to the internal FTP server. Which of the following default port numbers should the technician set the analyzer to highlight when creating a report? (Select TWO).
Correct Answer: AB
FTP (File Transfer Protocol) is used for transferring files between an FTP client and an FTP server. FTP uses TCP Ports 20 and 21.
A network technician has just installed a TFTP server on the administrative segment of the network to store router and switch configurations. After a transfer attempt to the server is made, the process errors out. Which of the following is a cause of the error?
A. Only FTP can be used to copy configurations from switches
B. Anonymous users were not used to log into the TFTP server
C. An incorrect password was used and the account is now locked
D. Port 69 is blocked on a router between the network segments Correct Answer: D
The question states that the TFTP server is installed on the “administrative segment of the network”. This implies that the network has multiple segments (subnets) and TFTP server is on a different network segment to other computers.
For a computer on one subnet to connect to a computer on a different subnet, a router is required to route traffic between the two subnets. Routers often include firewalls so they can be configured to allow specific traffic to be routed between the subnets and block unwanted traffic.
TFTP uses UDP port 69. The most likely cause of the connection timeout error in the question is that the firewall has not been configured to allow traffic using UDP port 69.
A network administrator has created a virtual machine in the cloud. The technician would like to connect to the server remotely using RDP. Which of the following default ports needs to be opened?
Correct Answer: B
RDP (Remote Desktop Protocol) is used for connecting to a remote Windows computer. When using RDP to connect to a remote Windows computer, you can view and control the desktop of the remote computer. RDP uses TCP port 3389.
After recent changes to the pictured network, several users are unable to access the servers. Only PC1, PC2, PC3, and PC4 are configurable. You can only change the adapter configurations to each PC.
Your company recently purchased a new building down the street from the existing office.
For each of the tasks below, select the appropriate antenna type and encryption object for all wireless access point (AP).
1. Create an encrypted wireless connection between the two buildings that BEST controls signal propagation, while maximizing security.
2. Restrict the wireless signal generated by the access points (AP’s) inside Building 1, so that it minimizes broadcast beyond the building.
3. Maximize wireless coverage inside Building 1.
4. Building 1’s internal wireless network is for visitors only and must not require any special configuration on the visitor’s device to connect.
Wireless network users recently began experiencing speed and performance issues after access point 2 (AP2) was replaced due to faulty hardware. The original network was installed according to a consultant’s specifications and has always worked without a problem.
You a network technician, have been tasked with evaluating the situation and resolving the issues to improve both performance and connectivity. Refer to the following exhibits and perform any necessary changes to the wireless and wired infrastructure by adjusting devices. Note: Adjust the LEAST number of devices needed to fix the issue.
After you fix AP2, you must click on the switch, which will bring up the switch interface. Type in the two commands that they show there, to prove the fix. Do not worry that interface 4 is down, there is no interface 4 for you to do
A customer’s email server is not sending emails. Arrange the troubleshooting steps in the order the technician should perform them:
Drag and drop the fiber cable connection types to the appropriate image.