Net+
DC10: IP 10.1.16.1 PC10: IP 10.1.24.101 Are the two VMs on the same subnet?
No
Will a router be required for a HostA at 10.1.16.42/24 and HostB at 10.1.16.200/16 to communicate? (Y/N)
No
What are three private IP address ranges?
Reserved Class A- 10.x.y.z (0-127 as first octet) Reserved Class B- 172.16.x.y - 172.31.x.y (128-191 as first octet) Reserved Class C- 192.168.x.y (192-223 as first octet)
What is the output of the 'show ip rip' command? a. Routes learned by RIP b. Routes that will be redistributed by RIP only c. RIP neighbor routers d. Routes installed in the global routing table by RIP
a. Routes learned by RIP
Which accurately describes the primary function of nslookup? a. Tests name resolution b. Displays the path to the destination c. Tests network connectivity
a. Tests name resolution (initiates a name resolution attempt to DNS servers to confirm whether a name resolution is working correctly)
What is indicated when a client has an APIPA IP address (169.254.x.x)? a. The client was unable to lease an IP address configuration from a DHCP server b. The client is using a public Internet IP address c. The client has a valid IP address configuration d. The client is configured with a static IP address
a. The client was unable to lease an IP address configuration from a DHCP server
Why might an administrator save a Performance Monitor Data Collector Set as a template? a. Saved Data Collector Set templates are required for Wireshark to gather statistics b. Saved Data Collector Set templates can be imported to servers with similar performance monitoring requirements c. Saved Data Collector Set templates allow archiving of performance data d. Saved Data Collector Set templates are required for Performance Monitor to run
b. Saved Data Collector Set templates can be imported to servers with similar performance monitoring requirements
Which protocol is used for log collection? a. RDP b. Syslog c. NTP d. DHCP
b. Syslog System Logging Protocol and is a standard protocol used to send system log or event messages to a specific server, called a syslog server. Primarily used to collect various device logs from several different machines in a central location for monitoring and review.
How many bits is a MAC address? a. 16 b. 32 c. 48 d. 128
c. 48
Why should log files be centralized? (Pick 2) a. Centralized logs are required by Linux b. Centralized logs reduce drive space c. Centralized logs are easier to search d. Centralized logs are required by rsyslog e. Centralized logs are easier to archive f. Centralized logs are only accessible by root
c. Centralized logs are easier to search e. Centralized logs are easier to archive
How could someone manage a remote server over SSH if the root user isn't allowed to connect via SSH? a. You will not be able to remotely administer the server unless you connect as root over SSH b. You must administer the remote server via Telnet c. Connect with a nonroot account, and then elevate your privileges with su or sudo d. SSH is not used for remote administration
c. Connect with a nonroot account, and then elevate your privileges with su or sudo
Which 2 choices are part of the process for reconfiguring a Linux service such as SSH? a. Delete the configuration file and download a new one from the Internet b. Reinstall the service c. Edit the service configuration file d. Restart the service E. Edit the registry
c. Edit the service configuration file d. Restart the service
Identify the OSI model layers at which IP addresses and MAC address operate (select 2): a. IP addresses - Layer 1 b. IP addresses - Layer 2 c. IP addresses - Layer 3 d. IP addresses - Layer 7 e. MAC addresses - Layer 1 f. MAC addresses - Layer 2 g. MAC addresses - Layer 3 h. MAC addresses - Layer 7
c. IP addresses - Layer 3 f. MAC addresses - Layer 2
How are client computers recognized when assigned a reserved IP address? a. IPv6 address b. DNS A record c. MAC address d. IP address e, Hostname
c. MAC address
Which type of connector is used for Ethernet twisted-pair cabling? a. RJ-11 b. ST c. RJ-45 d. BNC
c. RJ-45
What does gpupdate command do? a. Removes Group Policy settings b. Launches the Group Policy Management console c. Reapplies Group Policy settings d. Refreshes the computer's security token e. Refreshes security group membership
c. Reapplies Group Policy settings
Which type of firewall maintains stateful information about sessions established between a pair of hosts in a state table? a. Packet filter b. APIPA c. Stateful inspection d. Circuit-switching
c. Stateful inspection
Which of the following is a protocol that is used to protect web communications and other application protocols? a. SNMP b. DHCP c. TLS d. NTP
c. TLS Transport Layer Security
Which accurately describes the primary function of ping? a. Tests name resolution b. Displays the path to the destination c. Tests network connectivity
c. Tests network connectivity (sends request to destination expecting a reply to verify network connectivity btw network nodes)
Why are tcpdump and Wireshark useful for troubleshooting? a. They display the hostname, IP address, MAC address of the host server b. They display all open, closed, and filtered ports on a destination target server c. They display actual packet address, protocol info and content d. They display the IP address configuration of the server, including DNS, DHCP, and Default Gateway values
c. They display actual packet address, protocol info and content
What is the purpose of a "banner grab" connection? a. To download files from a website w/o a browser b. To display operating system information c. To detect software name and version information d. To quickly view a web site's homepage without a browser
c. To detect software name and version information
Which term is used to describe a weakness that could be accidentally triggered or intentionally exploited to cause a security breach? a. Threat b. Risk c. Vulnerability d. Non-repudiation
c. Vulnerability
In what directory are Linux log files stored by default? a. /log b. /var c. /etc d. /var/log
d. /var/log
What is the Nmap utility? a. Used to identify unsecured sensitive data on the network, such as credit cards b. An automated vulnerability and penetration testing framework c. A software firewall that can be used to secure a vulnerable host d. A port scanning utility that can identify open ports on a host
d. A port scanning utility that can identify open ports on a host
Which type of network hosts only server and storage, not end-user devices? a. Home b. PAN c. SOHO d. Datacenter
d. Datacenter
What is the name of a type of attack that allows a threat actor to identify device and OS types and versions? a. DoS b. Spoofing c. Hardening d. Fingerprinting
d. Fingerprinting
Which of the following is a way to mitigate the threat of packet sniffing against email traffic? a. SSH administration b. S/IMAP c. S/POP3 d. HTTPS web mail e. HTTP web mail
d. HTTPS web mail
What command allows you to verify you are connected to the remote SSH server?
hostname
What is the commend to check ip configuration in Linux?
ifconfig; ip addr; ip a
ipconfig /renew
orders your DHCP client to renegotiate an IP address lease with the DHCP server on your router
ipconfig /release
releases any IP configurations received from DHCP server
ipconfig /displaydns ipconfig /registerdns
shows the DNS resolver cache of your system register something into dns cache
What command allows you to create a new user and set a password? (Linux)
sudo adduser user01
Nmap displays different protocols for TCP and UDP. Which of these protocols is stateful and which is stateless? - UDP is stateful - UDP is stateless - TCP is stateful - UDP is stateless
- UDP is stateless - TCP is stateful
What is the loopback address?
127.0.0.1 (anything starting with 127)
Match the port numbers (161, 162, 389, 443, 3389) to their description: https (hypertext transfer protocol - secure) snmp (simple network management protocol) ldap (lightweight directory access protocol) rdp (Remote Desktop protocol) snmp
161 snmp (simple network management protocol) 162 snmp 389 ldap (lightweight directory access protocol) 443 https (hypertext transfer protocol - secure) 3389 rdp (Remote Desktop protocol)
How to convert 192.168.100.200 into a Class A subnet mask? What about class B?
192.0.0.0 Class B- 192.168.0.0
Match the port numbers (20, 21, 22, 23, 25) to their description: SMTP (simple mail transfer protocol) FTP FTP- Data Telnet SSH (Secure Shell)
20 FTP- Data 21 FTP 22 SSH 23 Telnet 25 SMTP
Match the port numbers (53, 80, 110, 123, 143) to their description: pop (post office protocol) http (hypertext transfer protocol) map (internet message access protocol) Domain (DNS) ntp (network time protocol)
53 Domain (DNS) 80 http (hypertext transfer protocol) 110 pop (post office protocol) 123 ntp (network time protocol) 143 imap (internet message access protocol)
Default Subnet Mask for: Class A- _______________ Class B- _______________ Class C- _______________
Class A- 255.0.0.0 /8 Class B- 255.255.0.0 /16 Class C- 255.255.255.0 /24
What is CIDR?
Classless interdomain routing (CIDR) is an addressing scheme for the Internet that allows more efficient use of IP addresses than the old Class A, B, and C scheme. It is more flexible and offers route aggregation (supernetting). A CIDR address is a network address that does not use original Class A, B, and C rules. For example, a CIDR address can look like this: 192.168.2.0/29.
ipconfig /all
Enables the MAC address information to be displayed from the command prompt
Name the OSI model layers (first to seventh)
Physical, Data Link, Network, Transport, Session, Presentation, Application (Please do not touch Steve's pet alligator)
What is the name of the protocol that provides SSO authentication to Active Directory? a. Kerberos b. DNS c. DHCP d. SNMP
a. Kerberos
Why isn't a ping port displayed as Open on the LAMP server? a. Ping ports are displayed b. Ping uses ICMP, which doesn't operate at the Transport later (where port numbers exist) c. Ping ports are closed on web service to prevent DDoS attacks d. Ping ports are always open, and so automatically not displayed
b. Ping uses ICMP, which doesn't operate at the Transport later (where port numbers exist)
What is the well-known port number used by a client to connect to an IMAP server? a. 143 b. 21 c. 25 d. 80
a. 143
How many 0s are in a /24 subnet mask? a. 8 b. 16 c. 24 d. 32
a. 8
What is the difference between an A record and AAAA record? a. A records are hostname to IPv4 address, AAAA records are hostname to IPv6 address b. AAAA records are hostname to IPv4 address, A records are hostname to IPv6 address c. A records are for Linux name resolution, AAAA records are for Windows name resolution d. A records resolve MAC addresses to IP addresses, AAAA records resolve hostnames to IP addresses
a. A records are hostname to IPv4 address, AAAA records are hostname to IPv6 address
Which protocol is used to resolve an IPv4 address to a MAC address? a. ARP b. DHCP c. DNS d. NTP
a. ARP
What info is output by the ipconfig command? a. Address info for local interfaces b. Address info for remote interfaces c. Port configuration for local services d. Port configuration for remote services
a. Address info for local interfaces
Which type of route in a routing table has the lowest default administrative distance? a. Directly connected b. Static c. EIGRP d. RIP
a. Directly connected
What metric is used by RIP? a. Hop count b. Weighted c. Distance vector d. Link state
a. Hop count
What type of recovery site is most expensive to maintain, but can failover almost immediately? a. Hot site b. Warm site c. Cold site D. Lukewarm site
a. Hot site
What type of hypervisor is installed directly onto a computer, and does not go through a host OS? a. Type I b. Type II c. Type III d. Type IV
a. Type I
What is an APIPA address?
an IP address assigned automatically to devices that are unable to receive and IP address from DHCP on Windows networks (169.254.x.x)
Which DNS record is used to resolve a host name to an IPv6 address? a. A b. AAAA c. NS d. MX
b. AAAA A records is used to resolve a hostname which corresponds to an IPv4 address, while AAAA records are used to resolve a domain name which corresponds to an IPv6 address.
In which cloud deployment model do several organizations share the costs of a hosted private or fully private cloud? a. Public b. Community c. Dynamic d. Pharmed
b. Community
Which accurately describes the primary function of traceroute? a. Tests name resolution b. Displays the path to the destination c. Tests network connectivity
b. Displays the path to the destination (reports each router - referred to as a "hop" - between source and destination network nodes)
What 3 identities can be learned by a standard nslookup query? a. MAC address b. IP address c. Hostname d. DNS server e. DHCP server f. OS version g. Open ports
b. IP address c. Hostname d. DNS server
Which best describes the problem if a ping by IP address attempt succeeds but a ping by hostname attempt fails? a. Firewall blocks ICMP packets b. Name resolution is failing c. Router filters ICMP packets d. Network connectivity is down
b. Name resolution is failing
what is wget command used for?
downloads files from HTTP servers
What is the name of the protocol that is used to report errors and send messages about the delivery of a packet, and supports troubleshooting utilities such as ping? a. IP ADD b. Wireshark c. SNMP d. ICMP
d. ICMP
Which type of plan sets out the procedures, tools, methods of communication, and guidelines for dealing with security incidents? a. BCP b. MOU c. APIPA d. IRP
d. IRP
*.* @10.1.16.9:514 What is the purpose of 514 in this command? a. It is the Host ID of the destination server b. It elevates credentials to store files on the destination server c. It is the destination IP address d. It is the destination port number e. It is the destination MAC address
d. It is the destination port number
*.* @10.1.16.9:514 What is the purpose of *.*? a. It represents only emerg severity messages b. It suppresses all log file entries for any services of any severity c. It saves all log file entries to the hard disk drive d. It represents all log file entries for any services of any severity
d. It represents all log file entries for any services of any severity
What is the name of Layer 1 of the OSI model? a. Application b. Transport c. Data link d. Physical
d. Physical
Which of the following is an advantage of using a Reserved IP address rather than a static IP address? a. Static IP address configurations still receive other options from the DHCP server, such as Router and DNS server b. Reserved and static IP addresses are the same thing c. Reserved IP addresses work with Linux, macOS, and Windows, while static IP addresses only function with Windows clients d. Reserved IP address configurations still receive other options from the DHCP server, such as Router and DNS server
d. Reserved IP address configurations still receive other options from the DHCP server, such as Router and DNS server
Which best describes static DNS resource records? a. Resource records automatically created by client computers b. Resource records manually created by Active Directory c. Resource records automatically created DHCP d. Resource records manually created by an administrator
d. Resource records manually created by an administrator
What is the name of the protocol that allows an administrator to establish a secure remote connection to Unix/Linux servers and many network devices? a. Telnet b. NTP c. RTCP d. SSH
d. SSH Telnet is remote and NOT secure
Why would an administrator create a custom Performance Monitor Data Collector Set? a. To enable iftop for use b. To enable Performance Monitor for use c. To enable Wireshark for use d. To tailor the performance information gather to the role of the server e. To filter unwanted information
d. To tailor the performance information gather to the role of the server
Which of the following protocols works at the Transport layer, and is a connectionless, non guaranteed method of communication with no acknowledgements or flow control? a. TCP b. NTP c. IP d. UDP
d. UDP
In which environment might you use short DHCP lease duration? a. Where clients remain on the network for long periods of time b. Where many clients are configured with reserved IP addresses c. Where many clients are configured with static IP addresses d. Where clients enter and leave the network frequently
d. Where clients enter and leave the network frequently
IEEE protocol 802.11ax is also known by what other name? a. Wi-Fi 2 b. Wi-Fi 3 c. Wi-Fi 4 d. Wi-Fi 6
d. Wi-Fi 6
Which of the following best describes the purpose of the grep -i command? a. grep navigates to the appropriate line of text b. grep elevates the user's privileges to root for admin access c. grep displays the command output to the screen, otherwise it couldn't be viewed d. grep checks for patterns of text such as "test"
d. grep checks for patterns of text such as "test"
Which of the following commands may be used on Linux-based devices such as routers, firewalls, universal threat management (UTM), and other network nodes to display IP address information? (Choose 3) a. Get-NetAdapter b. eth0 show ip c. ipconfig d. ifconfig e. ip addr f. nmcli
d. ifconfig e. ip addr f. nmcli