Network Components Midterm

Pataasin ang iyong marka sa homework at exams ngayon gamit ang Quizwiz!

A client has complained to you about connections being dropped on a regular basis in his office. To fix the issue, you plan on checking the RSSI (received signal strength indicator) level to ensure that the minimum signal strength for basic connectivity is maintained. Which RSSI level will you check to get an indication that the minimum signal strength for basic connectivity is maintained?

-50 dBm -30 dBm -70 dBm * -80 dBm

Which of the following sockets will you apply to a standard Telnet port TCP23 where the host has an IP address of 10.43.3.87?

10.43.23.3.87 10.43.3.87:23 * 10:23.43.3.87 10.43.3:23.87

Betty has recently bought a house in Manhattan, and she wants the living room to be wirelessly connected through Bluetooth. She intends on buying a central Bluetooth device that will be the center for all the other Bluetooth devices. This has been presented to you, a network analyst. Which of the following frequencies in the wireless spectrum will you use to successfully enable this connection?

2.4 GHz-2.4835 GHz * 824 MHz-896 MHz 1850 MHz-1990 MHz 5.1 GHz-5.8 GHz

Gamezee is a YouTuber who streams games. He has recently hired Jasmine to help him manage the wireless video streaming services. Currently, Gamezee is facing a network fluctuation issue. As a result, there are lags in his live video stream. He wants Jasmine to install the latest available Wi-Fi so that the devices can tap and utilize the maximum bandwidth and increase the throughput. Analyze which frequency range will help Jasmine to fix this issue.

2.457 GHz 2.4 GHz-2.4835 GHz 5.925 GHz-7.125 GHz * 300 GHz-300,000 GHz

Computer A started a communication sequence with Computer B that has a sequencing number of 300070. Computer B accepted the request and sent an acknowledgment number of 300071. Until this point, no payload has been exchanged. So far, the sequence numbers have increased by exactly 1 in each acknowledgment. Now, Computer A sends a payload data that is 800 bits long. According to you, what will be the acknowledgment number for the return message in this case?

300072 300800 300871 * 300870

What is the secure port for HTTPS?

587 23 80 443 *

The Mosiac Music School has hired Kirk to set up a SIP protocol for a collaborative multimedia conference session that will be limited to the selected students opting for music theory. Which of the following ports should he use in such a situation so that the required encryption can be provided?

993 5060 995 5061 *

Identify which of the following statements is Correct.

A 32-bit IPv4 address is organized into four groups of 8 bits each. * The first part of an IPv4 address identifies the host, and the last part identifies the network. IPv4 is categorized into three classes. The approximate number of possible networks in class B IPv4 is 126.

Which of the following manages the dynamic distribution of IP addresses to devices on a network?

A MAC address NAT A DHCP * A gateway

The administrator at JK Cements wants you to assign a port number other than the standard port 80 to a web server on the Internet so that several people within the organization can test the site before the web server is made available to the public. To reach the web server, which type of port number must a tester enter in the browser address box along with the web server's IP address?

A private port number * A dynamic port number A registered port number A well-known port number

A small office providing television services in Chicago has contacted Mark, a network administrator, to set up a network connection for their operations. The total strength of devices will not exceed 10, and so Mark decides that a LAN connection is all that is required for their functionality. Mark, however, wants to ensure that the devices are connected centrally, and for this purpose he plans on installing a central switch. Analyze which physical topology is best suited for this purpose.

A star topology * A mesh topology A ring topology A bus topology

You are the DNS administrator and have been tasked to hold alternative names for a host that is a newly established start-up venturing into the business of ecommerce. The start-up wants its clients to be directed to the appropriate page whenever they request for alternative names. Which of the following resource records would you apply as a DNS administrator in such a case?

AAAA record CNAME record * PTR record MX record

Which of the following is a centralized directory database that contains user account information and security for the entire group of computers?

Active Directory * Clients Workgroups RAID

Sundareshan has been working as a senior technician at Reifenhauser Corporation. The managing director has requested Sundareshan to establish a similar network connection at his personal property. Which of the following categories of routers should Sundareshan prefer in such a scenario?

An industrial-grade router A consumer-grade router A switch A combo device *

As a network engineer, Matthew has installed a wireless connection in a newly constructed office floor for Yuvi Mediaworks. The office of the managing director of Yuvi Mediaworks is located at the end of the hallway, and he has raised a complaint about slow data transmission and occasional dropped connections. According to Matthew, the issue should be related to obstacles blocking the signal's passage. Analyze which of the following phenomena must be used to ideally describe this scenario.

Attenuation Fading * Interference Refraction

PepsiCo Ltd. has been having a lot of bugs in their network and so they have hired Suleiman to analyze the issue at hand. On inspection, he has come up with the solution that certain changes to the network must be done in order to make it functional.Which of the following statements should Suleiman consider while considering a change in a network?

Change management procedures should consist of preparing a backup plan as well. * Change management procedures do not evaluate the cost of change of a plan. Changes to a network can be done without keeping in view the effect of the change on its users and applications. Changes to a network should be done when there are maximum users on the network.

The University of Philadelphia wants you to format an IPv4 address through which the dean of the university wants to go on a video conference with the teaching staff about certain educational norms which they plan on implementing. Which of the following classes of classful addressing will you apply to deliver the requirement?

Class A Class D * Class E Class C

What is the logical group of Windows Servers controlling the network access to a group of computers also known by?

Client RAID Router Domain *

What should you do once you have tested your theory to determine the cause of the problem at hand? Establish a plan for resolving the problem .b. Implement the solution or escalate the problem. c. Verify the functionality and implement preventive measures. d. Document findings, actions, and outcomes. Analysis:

Correct. Before you implement a fix, one should consider the scope of your change and especially how it will affect users, their applications, and their data.* Incorrect. Before implementing a solution, one should establish a plan of how the implementation will affect the users.* Incorrect. These preventive measures are to be followed post implementation. Incorrect. Call tracking systems to document problems and resolutions are the final stages in such a scenario.

A client has hired you to help him with a client-server application for Windows so that he is able to transfer files. Which of the following applications will you suggest so that the client can transfer such files between two computers?

CuteFTP * MySQL Oracle Database Nginx

As a network administrator, you want to validate that a data packet is being fragmented and subdivided into smaller parts to ensure reliable delivery. Which of the following fields in the 802.11 data frame will you check for this information?

Data Sequence Control * Trailer Frame Control

What is a small file containing verified users' identification information and public key known as?

Digital certificate * Public-key infrastructure Asymmetric encryption Key pair

What should be the ideal procedure after implementing the solution to a network troubleshooting problem?

Document findings, actions, and outcomes. Test the theory to determine the cause. Verify functionality and implement preventive measures. * Establish a theory of probable cause.

Which of the following client-server applications use Apache and Nginx?

Email services FTP services Web service * DNS service

Charlie Gordon is the new technician at Beekman University computer lab. He is unable to get the Wi-Fi client to connect to the AP at all. He has looked into the matter and has found that he can't find an available AP even after using the correct security key. After further investigation, he has realized that if the access point does not broadcast its SSID, he would have to enter the SSID during client configuration. Analyze which of the following issues Charlie might be encountering in this scenario.

Encryption protocol mismatch Incorrect passphrase Wrong SSID * Long AP association time

JK Group of Industries is planning a complete revamp of the office infrastructure, and so it has hired Infrared Solutions to upgrade its network connections. It has also requested Infrared Solutions to ensure that this upgrade should not affect the day-to-day functionality within the office premises. Analyze what would be a proper option to carry out this upgrade.

Establish a plan for resolving the problem. Roll out changes in stages. * Document findings, actions, and outcomes. Verify functionality and implement preventive measures.

Which of the following is the third step in a network troubleshooting methodology?

Establish a plan for solving the problem. Identify the problem and its symptoms. Establish a theory of probable cause. Test your theory to determine the cause. *

Which of the following protocols creates a frame around the payload by adding both a header and a trailer to the payload?

Ethernet * NDP TCP ICMP

A client recently contacted Katie, a networking engineer, at IHP solutions to troubleshoot a connectivity issue. On inspecting the issue, she gets to know that there is a missing default route, which is preventing the network nodes from reaching the DNS servers outside the local network. Analyze which of the following gateway devices she should use to sort this issue.

Firewall Computer Router * Subnet Mask

Which of the following protocols are used to transmit IP and other kinds of messages through a tunnel?

GRE * IKEv2 L2TP OpenVPN

What is the data passed between utility programs or applications and the operating system known as?

Host Payload * Firmware Ethernet

Which of the following terms is also referred to as a "network of networks"?

Hub Backbone * Spoke Network interface card

Which of the following institutions assigns a manufacturer's OUI?

ICANN IEEE * IANA FQDN

The State of Nevada has organized a gaming championship for which you have been contracted to set up the network connection. The championship is a seven-day long affair with a heavy influx of participants. Which of the following protocols would you choose in setting up such a network?

ICMP TCP UDP * IP

Which of the following protocols is used by the echo request and echo reply of ping to carry error messages and information about a network?

ICMP * RDP Syslog NTP

You are a network engineer who is keen to develop a secure TCP/IP transmission so that you can not only add security information to the headers of the IP packets but also encrypt the entire IP package for added security. Which of the following IPsec encryptions will you apply to your program in such a scenario?

IKE ESP * AH ISAKMP

BitBakers is a small start-up selling local bakery items in Kansas. It has its organizational back end running from a small LAN setup. Recently, it received funding for its products to be sold on a larger scale. As a result of this funding, the firm has contracted Kevin to boost up its network strength so that it can traverse to more than one LAN segment. Analyze which of the following protocols he should apply in this scenario.

IP UDP * TCP ICMP

Matt, a senior technician, has installed a switch for the purpose of identifying devices on the LAN. Analyze which of the following addressing methods Matt should follow so that the switch can quickly and efficiently direct the network traffic to its destination.

IP address MAC address * Application layer domain Transport layer ports

Which of the following would you use to provide a set of rules for encryption, authentication, and key management for TCP/IP transmissions?

IPsec * Public key encryption Private key encryption Key pair

You are the new IT admin of Sherpa Logistics. The company's in-house application is showing some aberrant behaviors and your team lead has asked you to handle the situation in his absence. What would be your first point of action in such a scenario?

Identify why the application is behaving in this manner and the symptoms behind such behavior. * Try to establish a theory by yourself regarding the cause by following the OSI model. Escalate the problem. Document the data regarding the person who initially alerted you regarding the anomaly.

JV Enterprises is currently using terminal emulation software to remotely control the devices for its employees. The administration however wants to build a dedicated network connection that will allow network administrators to remotely troubleshoot boot problems. Analyze which of the following options should JV consider for its needs.

In-band management Out-of-band management * Telnet SSH

Your client has hired you to troubleshoot a network error. On inspection, it can be seen that the client has a static IP address, subnet mask, and default gateway all configured correctly. You open a browser to check the connection, and you can't get to a web page. You open a PowerShell window, ping the gateway, and ping Google's public DNS server, and everything is working. But you still can't navigate to websites. What kind of problem are you most likely to be experiencing?

Incorrect DNS * Incorrect IP address Incorrect subnet mask Duplicate IP address

Silicone Printers has raised a ticket claiming that it was unable to view websites from its workstations, because with every attempted access, the system displayed an error message that read "there is another device using the same IP address." What would you, as a network engineer, check for in such a scenario?

Incorrect gateway Duplicate IP addresses * Incorrect subnet mask DHCP scope exhaustion

What is the purpose of the TXT (text) DNS resource record?

Indicates the authoritative name server for a domain Holds any type of free-form text * Identifies an email server and is used for email traffic Holds the name-to-address mapping for IPv6 addresses

Black Lion Cements has set up its new branch office adjacent to its manufacturing unit. Even though there are a lot of heavy pieces of machinery operating adjacent to the office, the management at Black Lion Cements believes that this will enhance the employees' performance. It has hired JW Communications to manage and assess its network requirements. After setting up the network, the network engineers are constantly facing wireless communication errors, which are difficult to diagnose. Analyze which of the following might be the cause of this error.

Interference seems to be the cause. * Insufficient wireless coverage might be the cause. Attenuation might lead to loss in signals. Lack of firmware updates might be the cause.

Kyle is a property consultant, and he has hired you as a programmer to make an application that sends data regarding property sites to his client's base. He has also asked you to ensure that the application should check whether the data has been received and if not, it should resend the data. Which of the following protocols would you apply in such a scenario?

Internet Message Access Protocol Simple Network Management Protocol Transmission Control Protocol * User Datagram Protocol

Glenn Infosys has successfully managed to set up VPN tunnels between branch locations for Syndicate Bank across India, ensuring that it protects the company's data, network, and liability. However, the top management wants Rahul, a network engineer for Glenn Infosys, to examine the network connection so that there are no bugs within the system. On inspection, he found that even though there are multiple points for connecting branch offices to the main office, certain branches have been left out. Analyze which of the following VPN protocols Rahul should use in such a situation.

L2TP OpenVPN GRE mGRE *

What other technical name or PDU can be used to represent the session presentation and application layer?

L4PDU L7PDU * L3PDU L2PDU

Joseph is the managing director of Ideakt Cellular World Pvt Ltd., and he wants you to create an IPv6 network that has one-to-one type of data transmission between his personal department and the company's administration office. Which of the following types of IPv6 addresses would you apply in such a situation?

Multicast address Anycast address Loopback address Unicast address *

Which of the following elements in a Domain Name System is a DNS client that requests information from DNS name servers?

Namespace Name servers TLD Resolvers *

Which of the following will guide an individual to properly handle substances such as chemical solvents and how to dispose of them?

OSHA PPE Fire suppression system SDS *

Jordan wants to install a Z-Wave network for his private sports complex that he has constructed in his backyard. He has contacted you, a network administrator, to carry out the network installation for his Z-Wave devices that will be used to control and transmit data and commands between devices. The total distance spans across 400 meters, so you have decided to use a Z-Wave mesh network to connect the devices. How many hops will you require for the Z-Wave transmission to reach the devices, which will also act as repeaters?

One hop Two hops Three hops Four hops *

Heroku Industries has a SQL Server database that provides data to clients throughout its network. It has now asked George, a network engineer, to sort an issue within the administration branch where the Windows firewall does not allow access to the users to such databases. Analyze what port should George open up in the firewall so that the issue is resolved.

Open up port 1433 * Open up port 1521 Open up port 389 Open up port 5061

HCL Industries are keen on allowing its employees with a work-from-home option for its respective jobs. You have been hired to establish a secure and encrypted control for remote Windows computers. Which of the following ports will you use to establish this connection?

Port 1433 Port 3306 Port 3389 * Port 5061

You, as a network administrator, want to set up a file transfer version of SSH so that you can use a single channel to control both inbound and outbound communications. Which of the following ports will you use to carry out this operation?

Port 20 Port 22 * Port 69 Port 989

Riverview Union High has contacted you to establish a secure communication over the computer network by encrypting the communication protocol using the SSL. Which of the following registered ports will you use to secure the connection?

Port 514 Port 123 Port 443 * Port 3389

White Heavens Entertainment Ltd. has set up a new website for informing people in detail about events that are being planned across the city of Los Angeles. However, when a user tries to gain access to its website to purchase tickets, there seems to be an IP error as a result of which the site crashes. Analyze which of the layers of the OSI model must be checked to fix this error.

Presentation layer Network layer * Transport layer Data link layer

You are a network engineer at Star Fisheries Ltd., Chicago. They want you to send an encrypted email to their branch office at Michigan. In doing so, which of the OSI layers would you apply?

Presentation layer * Transport layer Data link layer Physical layer

Which of the following is an optional server that receives queries from local clients but doesn't work to resolve the queries?

Primary DNS server Secondary DNS server Forwarding DNS server * Catching DNS server

Which of the following remote access methods allows a remote client to take over and command a host computer?

RAS Remote file access Terminal emulation * VPN

Joffrey plans on installing a terminal emulator for a small organization so that he can control the office computers for troubleshooting issues. Joffrey is working as an intern for IVP Internet Solutions, which is an ISP. Analyze which of the following terminal emulators will be more suitable for James as he is new to his job and not well-equipped to handle complex layers of programming.

RDP * Remote desktop gateway SSH Telnet

DMPL is an MNC that wants to establish a one-stop shopping point for consumers. DMPL has contracted you to develop a single card that can be used for loyalty and membership programs as well as for cashless payments. The management at DMPL has specified that the card should not include a power source and should be able to transfer data wirelessly over short distances up to 10 cm. Which of the following technologies will you use?

RFID ANT+ ZigBee NFC *

Which of the following remote access methods requires a virtual connection to remotely access resources between a client and a network?

Remote Desktop Protocol Terminal emulator Remote file access VPN *

The University of Oklahoma has hired you as a network engineer, and you are required to remote into a LINUX server of the legal department building, which is located on the same block. Which of the following protocols will you apply in this case?

SFTP VPN RDP SSH *

Which of the following protocols is used to send an email message to the first server?

SMTP * POP3 IMAP4 FTP

Which of the following fields in a TCP segment confirms receipt of data via return message to the sender?

Sequence number Acknowledgment number * Reserved Source port

While analyzing an intermittent error, James, an independent contractor for HKV Infrastructures, finds that the destination host is constantly asking the source to retransmit the data. He finds that the bug might be related to the transport layer of the OSI model. Since the TCP provides reliable delivery protocols, analyze which of the following characteristics of the TCP protocol James should check to fix this error.

Sequencing Checksum * Flow control Source port

Which of the following network devices does not fall under the category of "end devices" as certified by CISCO?

Smartphone Network printer Router * File server

Raqeeb is an employee working for Deloitte Corporation. He has been allowed to work from home because of the COVID-19 outbreak. You have been asked to establish a VPN so that Raqeeb can access a file server from the office while he operates from his workstation at home. It also has to be kept in mind that Raqeeb wants to stream music alongside when he does this. Which of the following VPN types will you apply so that the necessary requirements are met?

Split tunnel VPN * Site-to-site VPN Host-to-host VPN Full tunnel

You, as a network administrator, want to set up an FTP for remote file access. You also want to add an added layer of protection so that you can encrypt both the data and control channels. Which of the following technologies will you apply in such a case?

TFTP FTPS * SFTP RDP

Which of the following protocols is used to synchronize clocks on computers throughout a network?

TFTP LDAP IMAP4 NTP *

Which of the following is a collection of protocols that performs both authentication and encryption?

Telnet SSH * RDP VNC

HLP Ltd. has already set up a private web server for its corporate network with Windows as an operating system, and now they have contacted you to make their network remotely accessible to a certain group of employees. They have also requested you to ensure that the selected protocol provides secured and encrypted transmissions.Which of the following protocols would you apply so that the employees can have secured remote access to the computer server?

The Telnet protocol RDP * The SSH protocol POP3

James, a supporting technician, is trying to resolve an issue pertaining to the router. On inspecting the issue, he figured that the router was unable to move packages from one node to another. As a resolution to this problem, he intends to follow the OSI model for troubleshooting. What layer of the OSI model should he inspect to understand the issue relating to the router?

The physical layer The session layer The transport layer The network layer *

Which of the following layer's header identifies the IP address of the destination host?

The physical layer The transport layer The data link layer The network Layer *

You have just managed to send a fragmented IP packet across a network as the IP packets are larger than what the network allows. Which of the following bits in the flags section of an IPV4 field will you apply so that you can send a clear message across to the receiving host that there are more fragments on the way?

The third bit * The first bit The second bit The fourth bit

What is help desk software used for?

To document problems and their resolutions * To accumulate insights and solutions to problems encountered on a particular network To properly handle substances such as chemical solvents To protect the computer from an ESD charge

What is a collection of accumulated insights and solutions to problems encountered in a particular network known as?

Tracking system Knowledge base * Change management SDS

Xhang Pho, a senior network engineer, has been tasked with developing an application to channel live music festivals across the world with the help of the web. Given such a situation, which of the following protocols should he opt for?

UDP * TCP SNMP IMAP4

Vialom network has organized an online web concert featuring various well-known pop stars, which will stream globally. It has contacted JMT internet services to help the company in delivering a single video stream to multiple receivers so that there is minimal network traffic. Analyze which of the following IPv6 addresses it should use in this case.

Unicast address Loopback address Link local address Multicast address *

James has been contracted to set up a wireless network for a supermarket. The IT department of the supermarket wants James to develop a mesh network of APs in order to offer customers Internet access and selective discount coupons. James has decided that he will have to add additional security options for this purpose. Analyze which of the following will help James fix the issue.

Use Geofencing security technique * Establish a guest network with a separate SSID Use wireless client isolation Use captive portal

You are a freelance software engineer who has been hired to troubleshoot an error with the antivirus software of a particular computer of an employee where he gets an invalid password message. Which of the following methods will you use in such a scenario?

Use a bottom-to-top OSI layers approach Use a top-to-bottom OSI layers approach * Escalate the problem Check the change management policies of the organization

Mr. Yen has been working as a network technician for Goldyear Tyres. Recently, a couple of routers were reported for hardware failure. As the organization is large, it will take a lot of time to track down and identify the malfunctioning routers. What would be the most feasible option for Mr. Yen in this situation to solve the issue?

Use traceroute or tracert to track down the malfunctioning routers Use ping to test for network connectivity Use tracert to target a node instead of the router * Use Mac spoofing

Which of the following statements is applicable for a peer-to-peer network and not for a client-server network model?

User accounts and passwords to the networks are all assigned in one place. They are simple to configure and for this reason, they may be used in environments in which time or technical expertise is scarce. * Problems on the network can be monitored, diagnosed, and fixed from one location. Access to multiple shared resources can be centrally granted to a single user or a group of users.

Which of the following protocols transfers files without any authentication or security?

VPN FTPS SFTP TFTP *

Hilary has been working on a pilot project for a start-up on which she has been testing the maximum bytes for the length of an IP packet. As her intended IP packets are larger than what the network allows, she has to break them up into smaller packets for transmission. Analyze and suggest which of the following fields Hilary should use in an IPv4 packet so that the receiving host is able to identify and reassemble the fragmented messages.

Version Fragment offset Flags Identification *

The University of Kingston has hired you to install a private area network for its campus so that students and teachers from various departments can exchange data among themselves. Which of the following network models would be best suited for such an institution?

WAN BAN CAN * PAN

Zero Travels, a transport company, has just set up two offices within a range of eight kilometers apart from each other for smoother transactions. Lee, a senior technician at Informatics Ltd., has been hired to set up a network connection between these two branches. Which of the following network models should Lee set up keeping in mind that budget is also a factor to be considered?

WAN MAN PAN CAN *

As a network engineer, you are noticing inconsistent connectivity issues related to certain addresses. After examining the errors, you have decided to flush the ARP table on any device experiencing a similar problem. Which of the following commands will you apply to enable this action?

arp -d * arp -s arp -a IHL

Your client has hired you to change the command-line tool from nslookup to dig since it provides more detailed domain information than nslookup. Which of the following commands will you use to install dig on the Window operating system?

dig google.com apt-get install dnsutils * dig google.com ANY dig -x 74.125.21.102

Which of the following hostname commands resolves a device's hostname with its IP address on the network?

hostname hostname -A hostname -I * sudo hostname

JusDial Telecommunications has requested your help to set up a new hostname on a couple of devices. On inspection, you find out that the devices are operating under LINUX systems. Which of the following command lines would you apply to set up a new hostname for the required network devices?

hostname hostname A hostname -I sudo hostname *

Which of the following command-line tools is used to display current TCP/IP addressing and domain name information on a Windows computer?

ip dig ipconfig * ping

Your client has hired you to extract details about the port on which the TCP/IP connections are running. You, as a network engineer, have decided to use the netstat utility for this purpose. Which of the following commands will you apply to list all current TCP connections and an all listening TCP and UDP ports?

netstat -a * netstat -f netstat -n netstat -r

Which of the following utilities is also known as a packet sniffer?

ping netstat traceroute tcpdump *

As a network administrator in Wright Elementary School, it is your job to monitor all the devices used by the staff and students. Which of the following commands would you employ to be able to detect, identify, and monitor devices on a network?

ping tcpdump netstat nmap *

Liam has just set up a network connection for JLS Tyre's administration and wants to ensure that the IP addresses are functioning correctly with the NIC. Liam just wants to cross-check that basic Internet connection is up and running for the corporation by visiting Google's servers. In such a situation, analyze which of the following addresses Liam should visit to ensure that the network connection has been successful.

ping -a 8.8.8.8 ping 92.10.11.200 ping 192.168.1.1 ping 8.8.8.8 *

Your client has contacted you to examine a workstation that has been showing network fluctuations time and again. The client tells you that one of his employees might have spilled some hot water over the Ethernet ports. Which of the following addresses will you choose to check the functionality of the Ethernet card without worrying about corrupted hardware and to ensure that the workstation's TCP/IP services are running?

ping 192.168.1.1 ping 127.0.0.1 * ping -a 8.8.8.8 ping -?

Which of the following addresses can be identified as an APIPA address?

ping 8.8.8.8 169.254.0.1 * 127.0.0.1 255.255.255.255

Which of the following utilities would you use to display TCP/IP components and connections on a host?

tracert netstat * tcpdump arp


Kaugnay na mga set ng pag-aaral

English Praxis II Famous Quotes and Novels

View Set

Entrepreneurship Chapter 2 Review

View Set

APES Chapter 5: Climate and Terrestrial Biodiversity

View Set

A&P: Ch.13 (Ex.24) - The Spinal Cord, Spinal Nerves, Spinal Reflexes

View Set

Ch. 33 Introduction to Invertebrates (Mollusca)

View Set