All Posts

Comptia A+ 1001 2023 Questions and answer - Part 44

Mary Mary Smith
03 Mar 2023
3 min
0

1. Firewalls are used to ___________.

A) A. Protect private networks from attacks on the public side.
B) B. Protect the Internet from attacks on the private side.
C) C. Both
D) D. Neither



2. Which touch screen technology uses electrodes that sense the conductive properties of skin?

A) A. Passive
B) B. Capacitive
C) C. Resistive
D) D. Resistant



3. You hibernate your docked laptop at the office to save time when starting it back up at home. When you power it up at home, you discover that while typing emails, some of your keystrokes are misinterpreted by the system. For example, when you type the letter O it appears as a 6 and a P is an *. What is the quickest way to fix this?

A) A. The Function (Fn) Num Lock is on. Turn it off.
B) B. Restart the Machine.
C) C. In Control Panel assign proper keyboard mapping.
D) D. In Device Manager make sure the correct keyboard is listed. Refresh if necessary.



4. Which Applications level protocol is used to transfer files on the Internet?

A) A. Email
B) B. FTP
C) C. Web browser
D) D. Telnet



5. If you are able to use FTP, this verifies which transport protocol is functioning?

A) A. IP
B) B. IPX
C) C. TCP
D) D. NWLink



1. Right Answer: C
Explanation: A firewall can greatly improve network security and reduce risks to hosts on the subnet by filtering inherently insecure services. As a result, the subnet network environment is exposed to fewer risks, since only selected protocols will be able to pass through the firewall. A firewall also provides the ability to control access to site systems. For example, some hosts can be made reachable from outside networks, whereas others can be effectively sealed off from unwanted access. Privacy is of great concern to certain sites, since what would normally be considered innocuous information might actually contain clues that would be useful to an attacker. Using a firewall, some sites wish to block services such as finger and Domain Name Service. If all access to and from the Internet passes through a firewall, the firewall can log accesses and provide valuable statistics about network usage. A firewall, with appropriate alarms that sound when suspicious activity occurs can also provide details on whether the firewall and network are being probed or attacked.

2. Right Answer: B
Explanation: Human skin is capable of conducting electricity. Capacitive touch screens use this trait to execute the action the user wishes to perform.

3. Right Answer: A
Explanation: The keyboard Num Lock was set to ON by the external keyboard used by the docking station. Hibernation preserved this setting. Although restarting the machine will fix this, it is quicker to simply turn it off.

4. Right Answer: B
Explanation: File Transfer Protocol (FTP) is a type of protocol supported on the Internet that allows you to easily transfer files from your computer to another computer. To use FTP, you need the address of a server that supports FTP and a client software package that supports FTP running on your computer. This protocol runs in the OSI model Application Layer.

5. Right Answer: C
Explanation: Remember, FTP also allows for access in both directions. FTP teams up with Telnet to transparently log you on to the FTP server and then provides for the transfer of files. Accessing a host is only the first step. Users must then be subjected to an authentication login that-s probably secured with passwords and usernames placed there by the systems administrator to restrict access. FTP is part of the TCP/IP stack, and since it is connection oriented, it can verify TCP is functioning.

0 Comments
Leave a comment