Network Ch 3

¡Supera tus tareas y exámenes ahora con Quizwiz!

ICMP

If you use the ping command to send an echo request from one host to the other, then which of the following protocols have you used?

On the DNS root server

In the DNS hierarchy, where is information about how to find the top-level domain servers held?

Port TCP 25

SMTP server to server email transfer , device to mail server outgoing.

Port UDP 69

TFTP -trivial file transfer no authentication and no encryption.

Vim

What text editor can be used on Linux to view and edit the contents of a configuration file?

Ping

What utility is used to verify that TCP/IP is installed, bound to the NIC, configured correctly, and communicating with the network?

FE80::/10

When your computer first joins an IPv6 network, what is the prefix of the IPv6 address the computer first configures for itself?

Root servers

Which computers are the highest authorities in the Domain Name System hierarchy?

Port UDP 67 & UDP 68

DHCP - automated ip configuration & subnet mask

Forward lookup zone

DNS clients can use this zone to obtain information such as IP address that correspond to DNS domain names or services. What type of DNS zone is this?

Port UDP 53

DNS server names to IP

W32tm /query /source

What command can be used to check a domain computer's time source from a Command Prompt window?

Dig

Which of these commands is available only in Linux?

dig @8.8.8.8 mycompany.com MX

You are troubleshooting a DNS issue on a Linux system, and need to test the resolution of your domain mycompany.com MX record using Google's DNS server with the IP address of 8.8.8.8. What dig command will accomplish this?

Port TCP 20 or TCP 21

transfer files between systems , authenticate username & password , full featured functionality

Connectivinty to the default DNS server

What is the first thing you should check if you discover that domain names are not resolving into IP addresses on a PC or workstation?

True

A hexadecimal number is a number written in the base 16 number system.

Port numbers

At the Transport layer of the OSI, what is used to find and communicate with a particular application running on a host?

True

At the root level of the DNS hierarchical structure, 13 clusters of root servers hold information used to locate TLD servers.

Port TCP 80 & TCP 443

HTTP & HTTPS

The first 24 bits, known as the Organizationally Unique Identifier, identify the manufacturer

How can you determine the manufacturer of a NIC card based on the MAC address?

They do not forward broadcast traffic

How do routers create a broadcast domain boundary?

Layer 3: Network

IP address (IPv4 OR IPv6) IP address required to communicate outside the local network. Need Gateway and Subnet Mask -Get IP address by static (Manually configure with gateway and subnet mask |or| dynamic (DHCP server))

Ipconfig /release

If you are connected to a network that uses DHCP, and you need to terminate your Windows workstation's DHCP lease, which command would you use?

AAAA record (ipv 6 Returns a 128-bit IPv6 address, most commonly used to map hostnames to an IP address of the host.)

In a DNS zone, what type of record holds the name-to-address mapping for IPv6 addresses?

Layer 2: Data Link

MAC address 48 bits first 24 bits OUI (NIC Mfr) last 24 bits Device ID (identify device itself) MAC address are used for communication inside network (local network)

Ifconfig -a

On a Linux-based system, what command can be used to display TCP/IP information associated with every interface on the system?

Layer 4: Transport

Port number assigned to a process that can receive data (application service) Socket address has IP address AND port number - 10.43.3.87:80 When host receives request then a Session (Layer 5) opens.

Port TCP 3389

RDP - remote desktop protocol

PING

Refer to the exhibit. Which of the following command is likely to show the required output? ( IP address of the source of the reply,The size of the ping packet sent,The time the round-trip took,A Time to Live or TTL value of 128, Summarized statistics of the echo request)

Traceroute

Refer to the exhibit. Which of the following command is likely to show the required output? (shows three collums with time )

the one that says ports and closed / open

Refer to the exhibit. Which of the pictured software is a port scanner?

The one that says protocol slack on it

Refer to the exhibit. Which of the pictured software is a protocol analyzer?

Port UDP 161

SNMP simple network management protocol

Port TCP 22

SSH uses this port number to send encrypted communication back and forth to these infrastructure devices. It has the same look and feel as the Telnet console, but an SSH console is sending all communication as encrypted data, including your username and your password.

All devices on your local network

Suppose you send data to the 11111111 11111111 11111111 11111111 IP address on an IPv4 network. To which device(s) are you transmitting?

Port TCP 23

Telnet is a way to be able to log in to devices remotely and be able to access them from this text-based console. It's a way to communicate to servers, routers, switches, and other infrastructure devices to be able to administer those machines. But all of this Telnet communication is sent in a non-encrypted form.

False ( 0 -1023 system or well known , 1024 -49151 user or registered ports , 49152 - 65535 dynamic or private ports)

The 1024-65535 range of ports is also known as the "well-known" range.

FTP uses port 21 to send its commands and control information while port 20 is used for the transfer of the actual files, so both ports 20 and 21 must be permitted.

The network administrator has configured the enterprise firewall to permit port 21 to allow FTP transfers to occur from outside the enterprise. Users can connect to the FTP server that is located on the enterprise network. However, file transfers fails. Why could this be?

53

Users on a network are complaining that they cannot connect to a Webserver by its name in the Web browser. You can access the Webserver using its IP address. You discover an access list is blocking several UDP ports. Which port should you remove from the access list to allow users to connect to the Webserver?

Ipconfig /all

What command can you utilize to display TCP/IP configuration information for each network adapter installed?

255

What decimal number corresponds to the binary number 11111111?

BIND

What is by far the most popular DNS server software available?

static ip address allocation

What method of IP network configuration would you use for devices such as servers and printers so that all users on a network will always be able to reach these resources using the same network address?

Link local address

What type of IPv6 address is fe80::8cf1:2c42:ffde:da1c?

Default gateway

What type of device does a computer turn to first when attempting to make contact with a host with a known IP address on another network?

127.0.0.1

Which of the following IP addresses would be a loopback IP address?

Manually allocate the MAC address to a desired IP address in the DHCP server

Which of the following describes the configuring of MAC reservation in a DHCP server?

127.0.0.0 through 127.255.255.255 ( private ip addresses are 10.0.0.0 - 10.255.255.255 , 172.16.0.0 - 172.31.255.255 , 192.168.0.0 - 192.168.255.255)

Which of the following is NOT a range of IP addresses recommended for use in private networks?

SIP ( Session Initiation protocol)

Which of the following protocols is used as a signaling protocol for the initial connection between hosts, but does not participate in data transfer during the session?

The OUI

Which part of a MAC address is unique to each manufacturer?

MX record

Which type of DNS record identifies an email server?

SSH

You are a network administrator and you need to access the secure command line interface access of an edge router on your network. The router uses cryptography for remote authentication. Which protocol is the router configured with for this purpose?

SMB Server Message Block (SMB) is an application layer network protocol used primarily for providing shared access to files, printers and serial ports between nodes on a network

You are a network administrator for an organization. You are asked to create a shared folder on a Microsoft Windows system so that other users on the same network are able to access its contents. To be able to meet this requirement, which protocol is likely to be used?

Proxy server

You are the network administrator for a small organization of 100 users. Users till now were freely browsing the Internet. You want to put a provision in place where you can monitor their visits to the different Websites and block all unwanted Websites. Which of the following should you install and configure?

SSL/TLS

You have been asked to host a new e-commerce Website. Your manager has asked you to configure the Website with a certificate. After hosting the Website with the certificate, which security protocol have you use?

Lease time

You have configured a DHCP pool to allocate the IP addresses to the system for 3 days. What have you defined?

Secondary and primary DNS , because the secondary is requesting zone transfers from the primary

You have just brought online a new secondary DNS server and notice your network-monitoring software reports a significant increase in network traffic. Which two hosts on your network are likely to be causing the increased traffic and why?

80

You need to block all unsecured web traffic using its default port from a specific network segment of the enterprise network. Which port would you block to achieve this?

Block all incoming ICMP requests

You suspect that the Webserver, which is located on your network and hosts multiple Internet facing Websites. The Webserver runs on Windows Server 2008. After receiving complaints from the users of Webserver occasionally being unavailable, you investigate and find that it is getting flooded with many ping requests. What should you do to immediately handle this situation?

-a

You want to display the cache entries for 192.168.1.101. Which parameter should you use with the arp command?

TCP port 20 , TCP port 21

Your network firewall currently allows only HTTP traffic to pass through. You need to allow FTP traffic to pass through the firewall. Which of the following should be allowed?[Choose all that apply].

SSH & RDP

Your organization has multiple remote offices. The users at the remote office often remotely connect to the application servers. Which of the protocols should you enforce for encrypted communication?[Choose all that apply].


Conjuntos de estudio relacionados

Leadership and Management skills

View Set

Case study - convolutional neural networks (CNNs)

View Set

Essay Question 14 - Number and Function of Cranial Nerves

View Set

Java Chapter 11: Exceptions and Advanced File I/O

View Set