Quiz2 -CH-4
A) The first 24 bits, known as the Organizationally Unique Identifier, identify the manufacturer.
How can you determine the manufacturer of a NIC card based on the MAC address?
False
ICANN is responsible for restrictions on use of the .com, .org, and .net TLDs.
It allows the receiving node to determine whether the TCP segment became corrupted during transmission.
What is the purpose of the checksum TCP field?
C) vim
What text editor can be used on Linux to view and edit the contents of a configuration file?
A) MTR
What utility is the equivalent to the pathping command on a Linux system?
ping
What utility is used to verify that TCP/IP installed, bound to the NIC, configured correctly, and communicating with the network?
False
IPv4 and IPv6 use the same packet format.
Flow Label
In IPv6, what field is used to indicate what sequence of packets from one source to one or multiple destinations a packet belongs to?
True
In general, a Layer 3 or Layer 4 switch is still optimized for fast Layer 2 data handling.
ifconfig -a
On a Linux-based system, what command can be used to display TCP/IP information associated with every interface on the system?
B) False
Routing Information Protocol (RIP) is an interior gateway protocol that uses a link-state algorithm.
False
UDP provides error checking, but not sequencing.
C. ipconfig /all
What command can you utilize to display TCP/IP configuration information for each network adapter installed?
B) netstat -n
What command will list only current connections, including IP addresses and port numbers?
A) The router drops the packet and sends an ICMP TTL expired message back to the host.
What happens when a router receives a packet with a TTL of 0?
It is the time it takes for the protocol to recognize the best path in the event of a network change.
What is routing protocol convergence time defined as?
False
An IPv6 address consists of 128 bits that are written as 10 blocks of hexadecimal numbers separated by colons.
B) port numbers
At the Transport layer of the OSI, what is used to find and communicate with a particular application running on a host?
B. False
DNS follows a centralized database model, allowing for easier management of DNS records.
True
Each organization that provides host services on the public Internet is responsible for providing and maintaining DNS authoritative servers for public access.
False
TCP uses a four-step process called a four-way handshake to establish a TCP connection.
C. TCP
The IP connectionless protocol relies on what other protocol to guarantee delivery of data?
D) 127.0.0.1
Which of the following IP addresses would be a loopback IP address?
B) 2000::/3
Which of the following IPv6 addresses represents a global unicast address?
A router forwards broadcasts over the network.
Which of the following is not a task handled by a router?
sip
Which of the following protocols is used as a signaling protocol for the initial connection between hosts, but does not participate in data transfer during the session?
D) traceroute -I srv1.mycompany.com
Which traceroute command will perform a trace using ICMP echo requests instead of UDP datagrams to the host srv1.mycompany.com?
D) mycompany.com
With a FQDN of ftp1.dallas.mycompany.com, what part is the domain name?
B) show ip route
You are connected to your network's Cisco router, and need to verify the route table. What command should you enter?
The computer is configured to use DHCP, but was unable to lease an address.
You are troubleshooting a network issue on a client computer and discover that the network card has an IP address of 169.254.196.200. What does this mean?