CIS-345 Chapter3

¡Supera tus tareas y exámenes ahora con Quizwiz!

36. What does the MX record do in a forward DNS zone? a. It identifies the hostname and port of a computer that hosts a specific network service, such as FTP or SIP. b. It identifies the authoritative name server for a domain. c. It identifies the e-mail server to be used for e-mail traffic for the domain. d. It holds the alternative names for a host.

C

39. A Windows computer on your network is having issues resolving queries for a specific domain, but not other domains. Other computers on the same network resolve the name just fine. What command can you issue that might fix the problem? a. ipconfig /renew b. ipconfig /release c. ipconfig /flushdns d. ipconfig /refresh

C

50. Why are the Class D and Class E IPv4 address ranges not available for general use?

Class D addresses begin with octets 224 through 239 and are used for multicast transmissions, in which one host sends messages to multiple hosts. An example of this is when a host transmits a videoconference over the Internet to multiple participants. Class E addresses, which begin with 240 through 254, are reserved for research.

12. With a FQDN of ftp1.dallas.mycompany.com, what part is the domain name? a. ftp1 b. ftp1.dallas c. ftp1.dallas.mycompany. d. mycompany.com

D

15. Which of the following IP addresses would be a loopback IP address? a. 169.254.0.1 b. 192.168.1.1 c. 224.0.0.1 d. 127.0.0.1

D

19. Which of the following protocols is used as a signaling protocol for the initial connection between hosts, but does not participate in data transfer during the session? a. NTP b. LDAP c. TFTP d. SIP

D

20. What is by far the most popular DNS server software available? a. Microsoft DNS b. Dnsmasq c. Oracle Resolver d. BIND

D

26. How do routers create a broadcast domain boundary? a. They forward broadcasts only to necessary segments. b. They listen to and direct broadcast traffic. c. They only forward broadcasts that are intended for multiple subnets. d. They do not forward broadcast traffic.

D

27. Which of the following is NOT a range of IP addresses recommended for use in private networks? a. 10.0.0.0 through 10.255.255.255 b. 172.16.0.0 through 172.31.255.255 c. 192.168.0.0 through 192.168.255.255 d. 127.0.0.0 through 127.255.255.255

D

28. When using DHCP for IPv6 (i.e. DHCPv6), what port do clients receive responses on? a. port 67 b. port 68 c. port 546 d. port 547

D

33. What is the ARPA domain suffix utilized for? a. It is a specialized government restricted TLD. b. It is used to announce records for other TLDs such as .com and .net. c. It is a private TLD used for synchronization of zones between servers. d. It is used for reverse DNS queries, and holds PTR records.

D

37. You are troubleshooting a DNS issue on a Linux system, and need to test the resolution of your domain mycompany.com MX record using Google's DNS server with the IP address of 8.8.8.8. What dig command will accomplish this? a. dig --server 8.8.8.8 --type=mx mycompany.com b. dig -s 8.8.8.8 -t mx mycompany.com c. dig query 8.8.8.8 domain mycompany.com type mx d. dig @8.8.8.8 mycompany.com MX

D

41. What is a subnet mask, and how is it used?

It is a 32-bit number that helps one computer find another. The 32 bits are used to indicate what portion of an IP address is the network portion, called the network ID or network address, and what part is the host portion, called the host ID or node ID. Using this information, a computer can determine if another computer with a given IP address is on its own or a different network.

1. A hexadecimal number is a number written in the base 16 number system.

True

4. Each organization that provides host services on the public Internet is responsible for providing and maintaining DNS authoritative servers for public access.

True

6. At the root level of the DNS hierarchical structure, 13 clusters of root servers hold information used to locate TLD servers.

True

8. UDP port 123 is utilized by the Network Time Protocol service.

True

9. When using IPv6, two or more nodes on the same link are said to be neighbors.

True

13. How can you determine the manufacturer of a NIC card based on the MAC address? a. The first 24 bits, known as the Organizationally Unique Identifier, identify the manufacturer. b. The last 24 bits, known as the Organizationally Unique Identifier, identify the manufacturer. c. The middle 24 bits, known as the Organization Universal Identifier, identify the manufacturer. d. The first 12 bits and last 12 bits combined are known as the Organizationally Unique Identifier.

A

30. If a host's IPv6 address contains the network adapter's MAC address within the last 64 bits of the IPv6 address, what standard is being used? a. EUI-64 b. IEEE 802.36 c. UUID-128 d. MACin6

A

45. What is the difference between a port and a socket?

A port is a number assigned to a process, such as an application or a service, that can receive data. Whereas an IP address is used to find a computer, a port is used to find a process running on that computer. TCP and UDP ports ensure that data is transmitted to the correct process among multiple processes running on the computer. A socket consists of both a host's IP address and a process's TCP or UDP port, with a colon separating the two values. For example, the standard port for the Telnet service is TCP 23. If a host has an IP address of 10.43.3.87, the socket address for Telnet running on that host is 10.43.3.87:23.

18. Which of the following IPv6 addresses represents a global unicast address? a. FE80::10 b. 2000::/3 c. FC00::/7 d. FD00::/8

B

43. What is the difference between unicast, multicast, and anycast addresses?

A unicast address specifies a single node on a network. This differs from a multicast address, which is delivered to all nodes in a targeted, multicast group. An anycast address can identify multiple destinations, with packets delivered to the closest destination. For example, a DNS name server might send a DNS request to a group of DNS servers that have all been assigned the same anycast address. A router handling the request examines routes to all the DNS servers in the group and routes the request to the closest server.

47. How might an organization configure a DNS server for use on their network?

An organization might utilize these four common types of DNS server configurations: * primary DNS server-The authoritative name server for the organization, which holds the authoritative DNS database for the organization's zones. This server is contacted by clients, both local and over the Internet, to resolve DNS queries for the organization's domains. * secondary DNS server-The backup authoritative name server for the organization. When a secondary DNS server needs to update its database, it makes the request to the primary server for the update; this process is called a zone transfer. * caching DNS server-A server that accesses public DNS data and caches the DNS information it collects. This server receives DNS queries from local network clients and works to resolve them by contacting other DNS servers for information. Caching DNS servers do not store zone files (which is why they must rely on their caches and resolution efforts), and therefore do not participate in zone transfers. * forwarding DNS server-An optional server that receives queries from local clients but doesn't work to resolve the queries. Typically, a forwarding server will maintain its own DNS cache from previous queries, and so it might already have the information the client needs. If not, the forwarding server forwards the query to another server to resolve. Several forwarding servers might be strategically placed throughout the organization's network to reduce network traffic on slow links.

11. At the Transport layer of the OSI, what is used to find and communicate with a particular application running on a host? a. IP addresses b. port numbers c. domain names d. MAC addresses

B

17. On a Linux-based system, what command can be used to display TCP/IP information associated with every interface on the system? a. ipconfig /all b. ifconfig -a c. ip show d. if status

B

21. Your supervisor has asked you to configure a new prototype network with a dual stack configuration. What does this mean? a. Two different IPv4 address spaces will exist on the same network segment. b. Both IPv4 and IPv6 protocols will be used on the network. c. The router serving the network will have a redundant spare. d. The network will exist on two separate segments, separated by a proxy.

B

24. What part of a MAC address serves as the extension identifier, or device ID? a. The first 24 bits of the MAC address. b. The last 24 bits of the MAC address. c. The first 12 bits of the MAC address. d. The last 12 bits of the MAC address.

B

25. In the classful addressing scheme, what range of network addresses is considered a Class B? a. 1.x.y.z to 126.x.y.z b. 128.0.x.y to 191.255.x.y c. 192.0.0.x to 223.255.255.x d. 224.x.y.z to 255.x.y.z

B

29. What type of IPv6 address is fe80::8cf1:2c42:ffde:da1c? a. global address b. link local address c. multicast address d. anycast address

B

32. What statement regarding the Server Message Block protocol is accurate? a. It is a simple protocol used to synchronize block messages written to iSCSI drives on a network. b. It is used by Windows and UNIX-based operating systems to share files. c. It is a signaling protocol used to make a connection between hosts prior to data transfer. d. It is a protocol used for accessing network-based LDAP directories.

B

34. In a DNS zone, what type of record holds the name-to-address mapping for IPv6 addresses? a. A record b. AAAA record c. PTR record d. TXT record

B

38. What command can be used to check a domain computer's time source from a Command Prompt window? a. date /source b. w32tm /query /source c. ntpd show source d. time --source

B

40. In the DNS hierarchy, where is information about how to find the top-level domain servers held? a. In the hosts file on the local machine. b. On the DNS root servers. c. On DNS caching-only servers. d. In the organization's forward lookup zone.

B

14. What command can you utilize to display TCP/IP configuration information for each network adapter installed? a. ipconfig /show b. ipconfig /list c. ipconfig /all d. ipconfig /full

C

16. What text editor can be used on Linux to view and edit the contents of a configuration file? a. Notepad b. Microsoft Word c. vim d. edit

C

22. What utility is used to verify that TCP/IP installed, bound to the NIC, configured correctly, and communicating with the network? a. traceroute b. ifconfig c. ping d. route

C

23. You are troubleshooting a network issue on a client computer and discover that the network card has an IP address of 169.254.196.200. What does this mean? a. The computer has been assigned a routed public IP address. b. The network card has been erroneously assigned a loopback address. c. The computer is configured to use DHCP, but was unable to lease an address. d. The network card is set up for multicast communication.

C

31. Encrypted control of remote computers using the RDP protocol is accomplished using what port number? a. TCP 22 b. UDP 161 c. TCP 3389 d. UDP 10000

C

35. You are setting up a DNS zone and have been asked to create SPF and DKIM records. What type of DNS record will hold this information? a. SRV record b. CNAME record c. TXT record d. PTR record

C

10. The FTP protocol utilizes UDP, while TFTP uses TCP for data transmission.

False

2. DNS follows a centralized database model, allowing for easier management of DNS records.

False

3. ICANN is responsible for restrictions on use of the .com, .org, and .net TLDs.

False

5. An IPv6 address consists of 128 bits that are written as 10 blocks of hexadecimal numbers separated by colons.

False

7. The 1024 - 65535 range of ports is also known as the "well-known" range.

False

42. How is an IPv6 address written and displayed?

IPv6 addresses are written and displayed as follows: * An IPv6 address has 128 bits that are written as eight blocks (also called quartets) of hexadecimal numbers separated by colons, like this: 2001:0000:0B80:0000:0000:00D3:9C5A:00CC. * Each block is 16 bits. For example, the first block in the preceding IP address is the hexadecimal number 2001, which can be written as 0010 0000 0000 0001 in binary. * Leading zeroes in a four-character hex block can be eliminated. This means our sample IP address can be written as 2001:0000:B80:0000:0000:D3:9C5A:CC. * If blocks contain all zeroes, they can be eliminated and replaced by double colons (::). To avoid confusion, only one set of double colons is used in an IP address. This means our sample IP address can be written two ways: 2001::B80:0000:0000:D3:9C5A:CC or 2001:0000:B80::D3:9C5A:CC

49. IPv6 has two different types of unicast addresses. How do these two types differ from each other?

IPv6 unicast addresses come in two types: * global addresses-Can be routed on the Internet and is similar to public IPv4 addresses. Most begin with the prefix 2000::/3, although other prefixes are being released. The /3 indicates that the first three bits are fixed and are always 001. * link local addresses-Can be used for communicating with nodes in the same link, and is similar to an autoconfigured APIPA address in IPv4. It begins with FE80::/10. The first 10 bits of the reserved prefix are fixed (1111 1110 10), and the remaining 54 bits in the 64-bit prefix are all zeroes. Therefore, a link local address prefix is sometimes written as FE80::/64. Link local addresses are not allowed past the local link or on the Internet.

46. What are the three different types of port number ranges as defined by IANA?

Port numbers range from 0 to 65535 and are divided by IANA into three types: * well-known ports-Range from 0 to 1023 and are assigned by IANA to widely used and well-known utilities and applications, such as Telnet, FTP, and HTTP. * registered ports-Range from 1024 to 49151 and can be used temporarily by processes for nonstandard assignments for increased security. Default assignments of these registered ports must be registered with IANA. * dynamic and private ports-Range from 49152 to 65535 and are open for use without restriction.

44. What are the two different variations of network address translation (NAT)?

The two variations of NAT are: * SNAT-Using SNAT (Static Network Address Translation or Source Network Address Translation), the gateway assigns the same public IP address to a host each time it makes a request to access the Internet. Small home networks with only a single public IP address provided by its ISP use SNAT. * DNAT or Destination NAT-Using DNAT (Destination Network Address Translation), hosts outside the network address a computer inside the network by a predefined public IP address. When a message sent to the public IP address reaches the router managing DNAT, the destination IP address is changed to the private IP address of the host inside the network. The router must maintain a translation table of public IP addresses mapped to various hosts inside the network.

48. What are the two different types of DNS requests?

There are two types of DNS requests: * recursive query-A query that demands a resolution or the answer "It can't be found." For example, the initial request the resolver makes to the local server is a recursive query. The local server must provide the information requested by the resolver, as in "The buck stops here." * iterative query-A query that does not demand resolution. For example, when the local server issues queries to other servers, the other servers only provide information if they have it.


Conjuntos de estudio relacionados

Practice Assessment for Exam MS-900: Microsoft 365 Fundamentals

View Set

Unit 6 Real Estate Law Questions

View Set