Test 2
What occurs when a collision happens on a network? a. Each node on the network waits a random amount of time and then resends the transmission. b. The collision will create an error in the network switch, but otherwise, no issues will occur as a result. c. Each node on the network stops transmitting, until manually told to reconnect and transmit. d. The collision goes undetected, and data transmission continues.
a. Each node on the network waits a random amount of time and then resends the transmission.
What is the purpose of the checksum TCP field? a. It allows the receiving node to determine whether the TCP segment became corrupted during transmission. b. It identifies the data segment's position in the stream of data segments being sent. c. It confirms receipt of data via a return message to the sender. d. It specifies special options, such as the maximum segment size a n
a. It allows the receiving node to determine whether the TCP segment became corrupted during transmission.
Which statement does NOT accurately describe characteristics of the OSPF protocol? a. OSPF requires very little CPU or memory resources. b. OSPF has no hop limits on a transmission path. c. OSPF provides low network overhead. d. OSPF maintains a database of other routers' links.
a. OSPF requires very little CPU or memory resources.
You are troubleshooting a DNS issue on a Linux system, and need to test the resolution of your domain mycompany.com MX record using Google's DNS server with the IP address of 8.8.8.8. What dig command will accomplish this? a. dig @8.8.8.8 mycompany.com MX b. dig --server 8.8.8.8 --type=mx mycompany.com c. dig query 8.8.8.8 domain mycompany.com type mx d. dig -s 8.8.8.8 -t mx mycompany.com
a. dig @8.8.8.8 mycompany.com MX
On a Linux-based system, what command can be used to display TCP/IP information associated with every interface on the system? a. ifconfig -a b. if status c. ip show d. ipconfig /all
a. ifconfig -a
What command will list only current connections, including IP addresses and port numbers? a. netstat -n b. netstat -s c. show ip stats d. portstat
a. netstat -n
In a TCP segment, what field indicates how many bytes the sender can issue to a receiver before acknowledgment is received? a. sliding-window b. URG flag c. urgent pointer d. PSH flag
a. sliding-window
Which of the following IPv6 addresses represents a global unicast address? a. FC00::/7 b. 2000::/3 c. FD00::/8 d. FE80::10
b. 2000::/3
In a DNS zone, what type of record holds the name-to-address mapping for IPv6 addresses? a. A record b. AAAA record c. PTR record d. TXT record
b. AAAA record
Your supervisor has asked you to configure a new prototype network with a dual stack configuration. What does this mean? a. The network will exist on two separate segments, separated by a proxy. b. Both IPv4 and IPv6 protocols will be used on the network. c. Two different IPv4 address spaces will exist on the same network segment. d. The router serving the network will have a redundant spare.
b. Both IPv4 and IPv6 protocols will be used on the network
What is NOT one of the three characteristics of TCP in its role as a reliable delivery protocol? a. Sequencing and checksums b. Framing c. Connection-oriented Protocol d. Flow Control
b. Framing
What statement regarding the Server Message Block protocol is accurate? a. It is a signaling protocol used to make a connection between hosts prior to data transfer. b. It is used by Windows and UNIX-based operating systems to share files. c. It is a simple protocol used to synchronize block messages written to iSCSI drives on a network. d. It is a protocol used for accessing network-based LDAP directories.
b. It is used by Windows and UNIX-based operating systems to share files.
Encrypted control of remote computers using the RDP protocol is accomplished using what port number? a. TCP 22 b. TCP 3389 c. UDP 10000 d. UDP 161
b. TCP 3389
A Windows computer on your network is having issues resolving queries for a specific domain, but not other domains. Other computers on the same network resolve the name just fine. What command can you issue that might fix the problem? a. ipconfig /release b. ipconfig /flushdns c. ipconfig /renew d. ipconfig /refresh
b. ipconfig /flushdns
Which of the following is NOT a range of IP addresses recommended for use in private networks? a. 192.168.0.0 through 192.168.255.255 b. 172.16.0.0 through 172.31.255.255 c. 127.0.0.0 through 127.255.255.255 d. 10.0.0.0 through 10.255.255.255
c. 127.0.0.0 through 127.255.255.255
Which of the following IP addresses would be a loopback IP address? a. 224.0.0.1 b. 192.168.1.1 c. 127.0.0.1 d. 169.254.0.1
c. 127.0.0.1
What part of a MAC address serves as the extension identifier, or device ID? a. The last 12 bits of the MAC address. b. The last 24 bits of the MAC address. c. The first 12 bits of the MAC address. d. The first 24 bits of the MAC address.
c. The first 12 bits of the MAC address.
In the event of a duplicate MAC address shared by two hosts on a switched network, what statement is accurate? a. The network switch will eventually crash due to being unable to properly forward traffic. b. The hosts that share the same MAC addresses will be completely unable to communicate with any other devices. c. The hosts will still send and receive traffic, but traffic may not always reach the correct destination. d. The hosts will generate new MAC addresses until the conflict is resolved.
c. The hosts will still send and receive traffic, but traffic may not always reach the correct destination.
What happens when a router receives a packet with a TTL of 0? a. The router attempts to forward the traffic on a local network. b. The router resets the TTL to 128. c. The router drops the packet and sends an ICMP TTL expired message back to the host. d. The router marks the packet as corrupted and forwards it to the next hop.
c. The router drops the packet and sends an ICMP TTL expired message back to the host.
What routing metric affects a path's potential performance due to delay? a. theoretical bandwidth b. load c. latency d. MTU
c. latency
Which of the following is not a task handled by a router? a. A router can connect dissimilar networks. b. A router can reroute traffic if the path of first choice is down but a second path is available. c. A router can interpret Layer 3 and often Layer 4 addressing. d. A router forwards broadcasts over the network.
d. A router forwards broadcasts over the network.
Which statement regarding the Border Gateway Protocol (BGP) is accurate? a. BGP is a more advanced version of OSPF. b. BGP is limited to a single autonomous system. c. BGP is exclusively a distance-vector protocol. d. BGP utilizes TCP for communicating updates.
d. BGP utilizes TCP for communicating updates.
Which of the following protocols is used as a signaling protocol for the initial connection between hosts, but does not participate in data transfer during the session? a. LDAP b. NTP c. TFTP d. SIP
d. SIP
The IP connectionless protocol relies on what other protocol to guarantee delivery of data? a. ARP b. UDP c. ICMP d. TCP
d. TCP
Routing protocols that enable routers to communicate beyond neighboring routers, allowing each router to independently map the network, are known as which type of protocols? a. distance vector protocols b. interior gateway protocols c. border gateway protocols d. link-state protocols
d. link-state protocols
Which command will produce statistics about each message transmitted by a host, separated according to protocol type? a. ipconfig -s b. netstat -an c. ipstat -a d. netstat -s
d. netstat -s
What utility is used to verify that TCP/IP installed, bound to the NIC, configured correctly, and communicating with the network? a. ifconfig b. traceroute c. route d. ping
d. ping
In IPv6, what field is used to indicate what sequence of packets from one source to one or multiple destinations a packet belongs to? a. group ID b. flow label c. traffic exchange d. traffic class
v