Module 5-10: Network fundamentals group exam

¡Supera tus tareas y exámenes ahora con Quizwiz!

Match the application protocols to the correct transport protocols.

TCP - FTP, HTTP, SMTP UDP - DHCP, TFTP

A PC is downloading a large file from a server. The TCP window is 1000 bytes. The server is sending the file using 100-bytes segments. How many segments will the server send before it requires an acknowledgment from the PC?

10 segments

A device has been assigned the IPv6 address of 2001:0db8:cafe:4500:1000:00d8:0058:00ab/64. Which is the host identifier of the device?

100:00d8:0058:00ab

What are the three ranges of IP addresses that are reserved for internal private use? (Choose three.)

192.168.0.0/16 172.16.0.0/12 10.0.0.0/8

What is the full decompressed form of the IPv6 address 2001:420:59:0:1::a/64?

2001:0420:0059:0000:0001:0000:0000:000a

Refer to the exhibit. A network security analyst is examining captured data using Wireshark. The captured frames indicate that a host is downloading malware from a server. Which source port is used by the host to request the download?

58598

How many host addresses are available on the 192.168.10.128/26 network?

62

What are the two sizes (minimum and maximum) of an Ethernet frame? (Choose two.)

64 bytes 1518 bytes

How is a DHCPDISCOVER transmitted on a network to reach a DHCP server?

A DHCPDISCOVER message is sent with the broadcast IP address as the destination address.

How can network scanning help assess operations security?

It can detect open TCP ports on network systems

What is the result of an ARP poisoning attack?

Client information is stolen

Which process failed if a computer cannot access the internet and received an IP address of 169.254.142.5?

DHCP

What three application layer protocols are part of the TCP/IP protocol suite? (Choose three.)

DHCP FTP DNS

A host PC is attempting to lease an address through DHCP. What message is sent by the server to let the client know it is able to use the provided IP information?

DHCPACK

What network service uses the WHOIS protocol?

DNS

Match each statement about ftp communications to the connection it describes. ( not all options are used)

FIRST CONNECTION ESTABLISHED from client to server via tcp port 21 used for commands and replies SECOND CONNECTION ESTABLISHED from client to server via TCP port 20 used for actual file transfer

What mechanism is used by a router to prevent a received IPv4 packet from traveling endlessly on a network?

It decrements the value of the TTL field by 1 and if the result is 0, it discards the packet and sends a time exceeded message to the source host

What is done to an IP packet before it is transmitted over the physical medium?

It is encapsulated in a layer 2 frame

Which two functions or operations are performed by the MAC sublayer? (Choose two.)

It is responsible for Media Access Control It adds a header and trailer to form an OSI layer 2 PDU

What action does a DHCPv4 client take if it receives more than one DHCPOFFER from multiple DHCP servers?

It sends a DHCPREQUEST that identifies which lease offer the client is accepting

Match reach description to its corresponding term. (not all options are used)

Message encoding - the process of converting information from one format into another acceptable for transmission message sizing - the process of breaking up a long message into individual pieces before being sent over the network message encapsulation - the process of placing one message format inside another message format

Which type of transmission is used to transmit a single video stream such as a web-based video conference to a select number of users?

Multicast

Match each characteristic to the appropriate email protocol. (not all options are used)

POP does not require a centralized backup solution mail is deleted as it is downloaded desirable for an ISP or large business IMAP download copies of messages to be the client original messages must be manually deleted requires a larger amount of disk space

Refer to the exhibit. This PC is unable to communicate with the host at 172.16.0.100. What information can be gathered from the displayed output?

The communication fails after the default gateway

A computer can access devices on the same network but cannot access devices on other networks. What is the probable cause of this problem?

The computer has an invalid default gateway address

A user sends an HTTP request to a web server on a remote network. During encapsulation for this request, what information is added to the address field of a frame to indicate the destination?

The mac address of the default gateway

An employee complains that a Windows PC cannot connect to the Internet. A network technician issues the ipconfig command on the PC and is shown an IP address of 169.254.10.3. Which two conclusions can be drawn? (Choose two.)

The pc is configured to obtain an IP address automatically The PC cannot contact a DHCP server

What is a function of the tracert command that differs from the ping command when they are used on a workstation?

The tracert command shows the information of routers in the path

Which statement describes the ping and tracert commands?

Tracert shows each hop, while ping shows a destination reply only

A user is executing a tracert to a remote device. At what point would a router, which is in the path to the destination device, stop forwarding the packet?

When the value in the TTL field reaches zero

A cybersecurity analyst believes an attacker is spoofing the MAC address of the default gateway to perform a man-in-the-middle attack. Which command should the analyst use to view the MAC address a host is using to reach the default gateway?

arp -a

A large corporation has modified its network to allow users to access network resources from their personal laptops and smart phones. Which networking trend does this describe?

bring your own device

Match the HTTP status code group to the type of message generated by the HTTP server.

client error - 4xx redirection - 3xx success - 2xx informational - 1xx server error - 5xx

Which network model is being used when an author uploads one chapter document to a file server of a book publisher?

client/server

What is a basic characteristic of the IP protocol?

connectionless

At which OSI layer is a source MAC address added to a PDU during the encapsulation process?

data link layer

What addresses are mapped by ARP?

destination MAC address to a destination IPv4 address

Which field in an IPv4 packet header will typically stay the same during its transmission?

destination address

A user issues a ping 192.168.250.103 command and receives a response that includes a code of 1. What does this code represent?

host Unreachable

Refer to the exhibit. From the perspective of users behind the NAT router, what type of NAT address is 209.165.201.1?

inside global

Which two commands can be used on a Windows host to display the routing table? (Choose two.)

netstat -r route print

A network administrator is testing network connectivity by issuing the ping command on a router. Which symbol will be displayed to indicate that a time expired during the wait for an ICMP echo reply message?

period - .

Which two operations are provided by TCP but not by UDP? (Choose two.)

retransmitting any unacknowledged data acknowledging received data

Which two ICMP messages are used by both IPv4 and IPv6 protocols? (Choose two.)​

route direction protocol unreachable

Refer to the exhibit. A cybersecurity analyst is viewing captured packets forwarded on switch S1. Which device has the MAC address 50:6a:03:96:71:22?

router DG

Which method would an IPv6-enabled host using SLAAC employ to learn the address of the default gateway?

router advertisement messages received from the link router

Refer to the exhibit. PC1 attempts to connect to File_server1 and sends an ARP request to obtain a destination MAC address. Which MAC address will PC1 receive in the ARP reply?

the MAC address of the G0/0 interface on R1

What type of information is contained in a DNS MX record

the domain name mapped to mail exchange servers

Which value, that is contained in an IPv4 header field, is decremented by each router that receives a packet?

time-to-live

What is the purpose of ICMP messages?

to provide feedback of IP packet transmissions

What is the function of the HTTP GET message?

to request an HTML page from a web server

A user who is unable to connect to the file server contacts the help desk. The helpdesk technician asks the user to ping the IP address of the default gateway that is configured on the workstation. What is the purpose for this ping command?

to test that the host has the capability to reach hosts on other networks

What is a description of a DNS zone transfer?

transfering blocks of DNS data from a DNS server to another server

Match each IPv4 address to the appropriate address category. ( not all options are used)

HOST ADDRESSES 192.168.100.161/25 203.0.113.100/24 NETWORK ADDRESS 10.10.10.128/25 172.110.12.64/28 BROADCAST ADDRESS 192.168.1.191/26 10.0.0.159/27

Which two parts are components of an IPv4 address? (choose 2)

Host portion network portion

A user issues a ping 192.168.250.103 command and receives a response that includes a code of 1 . What does this code represent?

Host unreachable

A technician is configuring email on a mobile device. The user wants to be able to keep the original email on the server, organize it into folders, and synchronize the folders between the mobile device and the server. Which email protocol should the technician use?

IMAP

What type of information is contained in an ARP table?

IP address to MAC address mappings

Which statement describes a feature of the IP protocol?

IP relies on upper layer services to handle situations of missing or out-of-order packets

A user gets an IP address of 192.168.0.1 from the company network administrator. A friend of the user at a different company gets the same IP address on another PC. How can two PCs use the same IP address and still reach the Internet, send and receive email, and search the web?

ISPs use Network Address Translation to change a user IP address into an address that can be used on the Internet.

What are three responsibilities of the transport layer? (Choose three.)

Identifying the applications and services on the client and server that should handle transmitted data meeting the reliability requirements of applications, if any multiplexing multiple communication streams from many users or applications on the same network

When a wireless network in a small office is being set up, which type of IP addressing is typically used on the networked devices?

Private

A user issues a ping 2001:db8:FACE:39::10 command and receives a response that includes a code of 2 . What does this code represent?

Protocol unreachable

Refer to the exhibit. PC1 issues an ARP request because it needs to send a packet to PC3. In this scenario, what will happen next?

RT1 will send an ARP reply with its own Fa0/0 MAC address

Which protocol is a client/server file sharing protocol and also a request/response protocol?

SMB

Which PDU is processed when a host computer is de-encapsulating a message at the transport layer of the TCP/IP model?

Segment

Match the characteristic to the protocol category. (Not all options are used)

TCP window size 3-way handshake UDP best for VoIP connectionless BOTH UDP AND TCP port number checksum

What message informs IPv6 enabled interfaces to use stateful DHCPv6 for obtaining an IPv6 address?

The ICMPv6 router advertisement


Conjuntos de estudio relacionados

Records and information management chapter 4

View Set

Articles of Confederation vs. The Constitution

View Set

Ch 4. Quiz Q's "Effectively Managing Diversity"

View Set

The Four Major Oceans- Earth Science

View Set

Chapter 7: Pattern Matching with Regular Expressions

View Set

Chapter 52: Care of the Patient with a Sensory Disorder

View Set

Review: Principles of Ecology - Food Chains

View Set