Module 03 Addressing (ITNW-1325)

¡Supera tus tareas y exámenes ahora con Quizwiz!

You have just brought online a new secondary DNS server and notice your network-monitoring software reports a significant increase in network traffic. Which two hosts on your network are likely to be causing the increased traffic and why?

a. The secondary and primary DNS servers because the secondary server is requesting zone transfers from the primary server

What protocol does ping use?

a. ICMP

Which DNS server offers the most current resolution to a DNS query?

a. Primary DNS server

Which DNS record type is listed first in a zone file?

b. SOA

What decimal number corresponds to the binary number 11111111?

c. 255

What numbering system do humans use to write MAC addresses?

c. Hexadecimal

Which part of a MAC address is unique to each manufacturer?

c. The OUI

Your client has hired you to change the command-line tool from nslookup to dig since it provides more detailed domain information than nslookup. Which of the following commands will you use to perform a DNS lookup on a domain name?

dig google.com (dig google.com performs a DNS lookup on a domain name, so this command should be used in this scenario)

The University of Bethesda has requested your professional help in giving a masterclass on how to use Telnet ports for interacting with remote computers. Which of the following ports will you open to teach students how to establish an unencrypted connection with a remote computer?

23 (Telnet uses this port for unencrypted control of remote computers, so this port will be used in this case.)

What type of device does a computer turn to when attempting to connect with a host with a known IP address on another network?

Default gateway

Your client has hired you to troubleshoot a network error. The client is complaining of an extremely limited network connection on most days and a failed network connection on certain days. Which of the following network configuration issues do you think is at play in this case?

Incorrect subnet mask (An incorrect subnet mask will result in a failed or extremely limited connection to the network. This seems to be the issue in this case.)

You are the DNS administrator and have been tasked to identify an email server in a DNS zone file. Which of the following resource records would you apply as a DNS administrator in this case?

MX record (Correct. An MX record identifies an email server and is used for email traffic, so this should be applied in this case)

You have just installed a network at the Jamieson Hydro Power Plant, and you want to test the basic connectivity of the network. Which of the following utilities will you use first in such a situation so that you get to verify that the TCP/IP is configured correctly and is communicating with the network?

Ping (The ping utility is the first tool that should be used to test basic connectivity to the network and Internet. It is also used to verify that TCP/IP is installed, bound to the NIC, configured correctly, and communicating with the network)

Which of the following protocols is used for encrypted control of remote Windows computers?

RDP (RDP (Remote Desktop Protocol) is a protocol used for encrypted control of remote Windows computers.)

Which IPv6 prefix can be routed on the Internet?

a. 2000::/3

Suppose you send data to the 11111111 11111111 11111111 11111111 IP address on an IPv4 network. To which device(s) are you transmitting?

a. All devices on your local network

Which of the following IPv4 addresses is a public IP address?

b. 64.233.177.189

When your computer first joins an IPv6 LAN, what is the prefix of the IPv6 address the computer first configures for itself?

b. FE80::/64

What problem will ping google.com check for that ping 8.8.8.8 will not?

b. Name resolution issues

Which type of DNS record identifies an email server?

c. MX record

What Windows command outputs a computer's MAC address?

c. ipconfig /all

Which port should be open so you can remote into the corporate office's Linux Server from a branch office?

d. 22

Which DNS record type is used to find an FQDN from a given IP address?

d. PTR

Which of these commands has no parameters in Windows?

d. hostname

What command shows you a computer's TCP/IP configuration?

d. ipconfig

If you are connected to a network that uses DHCP, and you need to terminate your Windows workstation's DHCP lease, which command would you use?

d. ipconfig /release

hich command disables a computer's connection to the network?

d. ipconfig /release

Which of the following command-line tools is used to query DNS name servers for information about host addresses and other DNS records?

dig (The dig utility is used to query DNS name servers for information about host addresses and other DNS records)

You have been hired to fix an issue related to the booting up of a computer using a Linux operating system. Before fixing any error, you want to check the history of the previous warning messages that were generated by the system. Which of the following utilities will you use in this scenario?

Syslog (Syslog is a Linux standard for generating, storing, and processing messages about events on a system. The syslog utility does not alert a user to problems, but it only keeps a history of messages issued by the system. So, this utility would be ideal in this scenario.)

Your employer has sent you to establish a private IP address for the devices used in Infoglobal Ltd. with the help of a router. Your employer has instructed you to implement the address ranging from 172.16.0.0 to 172.31.255.255 as per IANA's RFC1918 document. Which class of classful addressing will you apply in this scenario?

Class B (IANA has allotted Class B addresses from 172.16.0.0 through 172.31.255.255, so this is the class that should be used in this scenario)

Hypervile Solutions has hired Joseph to establish a multimedia session so that it can preview its products to a list of potential clients. Joseph has to ensure that the session is properly encrypted so that there is no loss or theft of data as it will be a closed meeting. Analyze which of the following ports should be opened in this case.

Port 5061 (Opening up port 5061 will allow the creation of encrypted connections for multimedia sessions and hence should be used in this case)

When your computer requests a DNS lookup, which DNS server holds the most reliable information for that DNS record?

b. Primary DNS server

When hosting a secure email server for access from the Internet, which port should be open on the corporate firewall?

d. 587


Conjuntos de estudio relacionados

SS CSET - US History Crash Course

View Set

Chapter 19 the circulatory or cardiovascular system

View Set