CET 215- Lesson 13 Network protocols (Quiz)

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

Which of the following is a non-routable address?

0.0.0.0

A user asks a technician to set up emails on his mobile device. The user also wants the server to retain a copy of the email. Which of the following ports should be the best for the technician to use for this purpose?

143

Which IPv4 address range is reserved for APIPA?

169.254.0.0/16

Which of the following is a valid IP address assigned through APIPA?

169.254.1.221

Which of the following ports are used for secure sessions? Each correct answer represents a complete solution. Choose all that apply.

22 443

A technician wants to block remote logins to a server. Which of the following ports should be blocked?

23

A junior network technician is setting up a new email server on the company network. Which of the following default ports should the technician ensure is open on the firewall so the new email server can relay email?

25

What is the subnet mask of the address 144.201.5.32?

255.255.0.0

What is the default subnet mask for IP address 196.132.74.10?

255.255.255.0

Which of the following is the maximum number of IP addresses that can be assigned to hosts on a local subnet that uses the 255.255.255.224 subnet mask?

30

A technician would like to connect to a computer using remote desktop. Which of the following ports does remote desktop use by default?

3389

James, a technician, is tasked to configure a SOHO router to ensure that the network computer can only use secured protocols on the Internet. Which of the following ports will be open?

443

Which of the following ports is used for a secure browser connection to do online shopping?

443

Which of the following ports is used by the Server Message Block (SMB) protocol?

445

John, a network administrator, is setting up a new server for the company's network. Which port and service should he open to allow the newly installed server to assign IP addresses for the devices connecting with the network? Each correct answer represents a part of the solution. Choose two.

67 DHCP

Which of the following servers examines the credentials of anyone trying to access the network, and also determines if network access is granted?

Authentication server

Maria, a system engineer, is required to implement a solution to handle data-at-rest encryption requirements for a database. Which of the following would be the best to satisfy these requirements?

Create a virtual encrypted disk, add it to the virtual server, and have the database write to it.

Maria, a network administrator, diagnoses that port 68 is not open. Which of the following protocols is being blocked?

DHCP

Which of the following servers manages a record of all the IP addresses allocated to network nodes?

DHCP

You are working as a network administrator in an organization. Few employees inform you that they are receiving duplicate IP address notifications on their workstations and they are unable to browse the Internet. Which of the following server types should you use to resolve the problem?

DHCP

A server administrator is setting up a new server for the company's network. Which port and service should be open to allow the newly installed server to assign IP addresses for the devices connecting with the network? Each correct answer represents a part of the solution. Choose two.

DHCP 67

Ann, a technician, wants to automatically assign IP addresses to client stations logging on to a TCP/IP network so that he need not manually assign IP addresses. Which of the following server roles should he use?

DHCP server

Jennifer, a network administrator, wants to use a server that automatically assigns IP addresses to client stations logging on to a TCP/IP network. Which of the following servers will she use?

DHCP server

Joe, a user, contacts the network administrator to request a list of all static IP addresses in the building. Which of the following server roles would the network administrator most likely examine to find that information?

DHCP server

A technician has been informed that multiple users are receiving duplicate IP address warnings on their workstations, and they are unable to browse the Internet. Which of the following server types should the technician log in to in order to resolve the problem?

DHCP serverq

Which is an Internet service that translates domain names into IP addresses?

DNS

Which type of server provides the ability to resolve UNC to appropriate IP addresses?

DNS

Maria, a network administrator, wants to use a server that can provide name resolution services for users accessing Internet resources. Which of the following servers offers this service?

DNS server

James, a technician, wants to transfer files between two systems. Which of the following protocols will help him?Each correct answer represents a complete solution. Choose two.

FTP SCP

Maria, an employee, is on a business trip. She connects her laptop to a hotel's wireless network to send emails to customers. Next day she notices that emails have been sent from her account without her consent. Which protocol is used to compromise her email password utilizing a network sniffer?

HTTP

Which of the following protocols is considered stateless and uses TCP when communicating between a server and a client?

HTTP

While configuring a firewall, a system engineer accidentally blocked port 443. Which of the following will be unavailable?

HTTPS

Which protocol is used to retrieve email from mail servers?

IMAP

Which of the following protocols and port combinations is used for retrieving emails from a mail server?

IMAP4, 143

An IT vendor gives a technician the following address on a support call: 192.168.15.2/32. Which of the following best describes the address provided by the vendor?

IPv4 address in CIDR format

An incorrectly configured firewall on a company's network results in an inability to access the company's server using the FTP protocol. Which of the following is the most likely cause?

Incoming traffic on port 21 is blocked.

James, a security analyst, is hardening an authentication server. One of the primary requirements is to ensure there is mutual authentication and delegation. Given these requirements, which of the following technologies should he recommend and configure?

Kerberos

Which of the following provides a single sign-on solution for users and also provides protection for login credentials?

Kerberos

Which protocol is designed to provide strong authentication for client/server applications by using secret-key cryptography?

Kerberos

Which of the following is a directory service protocol that defines how a client can access information and perform operations?

LDAP

Which of the following stores information about authorized users and their privileges as well as other organizational information?

LDAP

Which of the following does IPv6 use to autoconfigure nodes?

NDP

A user reports the inability to access a company server using the FTP protocol. A technician finds other ports to the server seem to work normally. The technician has determined the problem is an incorrectly configured software firewall on the user's machine. Which of the following is most likely the cause?

Outgoing connections on port 21 are blocked.

Which of the following TCP ports are used by the File Transfer Protocol (FTP) for data transfer and to control commands? Each correct answer represents a complete solution. Choose two.

Port 20 Port 21

Jennifer, a network administrator, wants to block external SSH connections from reaching internal machines. Which of the following ports should she block on the firewall?

Port 22

What type of server is responsible for blocking the sender's identity while passing the information to the destination to prevent security-related issues?

Proxy

Which of the following server roles isolates internal clients from the servers by downloading and storing files on behalf of the clients?

Proxy server

Which network card property allows NICs to prioritize and manage data traffic to fully support the networking needs for all connected devices?

QoS

Which of the following enables a server to provide standardized and centralized authentication for remote users?

RADIUS

Which of the following allows a user to remotely log in to a networked device and uses port 3389 as the default port?

RDP

Which of the following protocols is used for file sharing between MAC OS and Windows OS workstations on a LAN?

SMB

Which resource sharing protocol allows folders or hard drives to be shared over a network?

SMB

Which protocol is used to remotely manage and monitor network devices like routers and switches?

SNMP

A technician wants to remotely and securely access the desktop of a Linux workstation. The desktop is running remote control software without encryption. Which of the following should the technician use to secure the connection?

SSH

Maria, a technician, needs to check the running configuration of a remote router securely. For this, she needs an application that utilizes which of the following protocols?

SSH

Which of the following is a program that enables a user or an application to log on to another device over a network, execute commands, and manage files?

SSH

Maria, a network administrator, gets a call regarding intermittent network outages across the country. Which of the following should be used to connect to the network so the administrator can troubleshoot this issue from home? Each correct answer represents a complete solution. Choose all that apply.

SSH VPN

Which of the following is a security protocol that combines digital certificates for authentication with public key data encryption?

SSL

James, a technician, needs to extend the organization's remote access functionality to be used by staff while travelling. He needs to maintain separate access control functionalities for internal, external, and VoIP services. Which of the following represents the best access technology for him to use?

TACACS+

Andrew, a network administrator, wants to enable users at one site to simulate a session on a remote host as if the terminal were directly attached. Which of the following protocols will he use?

Telnet

John, a technician, is trying to connect to another computer on the LAN remotely, but the connection fails. He opens the command prompt and types "telnet computername 3389" but still he is unable to connect to another computer. Which of the following is the most likely cause of this error, assuming that the OS firewall has been disabled?

The RDP connection has been configured to use a non-standard port.

A technician has installed an IPS appliance on the network. Which of the following is the purpose of that installation?

To check and stop unwanted activity

Andrew, a network administrator, wants to use network-based operating system administration tools to manage the network. Which of the following tools will he use? Each correct answer represents a complete solution. Choose two.

VNC RDP

Andrew, a technician, is tasked to provide outside access to a server within the company network so that sensitive documents can be worked on from home. Which of the following will help him to accomplish the task?

VPN

You want to connect to resources from an offsite location while ensuring the traffic is secured. Which of the following will you use to gain access to the secure network?

VPN

Which of the following addresses is equivalent to fe80:0000:0000:0000:c249:3765:00c0:9b22?

fe80::c249:3765:c0:9b22

A client's computer is not connecting to a website. Which of the following commands will allow the technician to view the route/number of hops between the host and remote systems?

tracert


Ensembles d'études connexes

Macroeconomics Quizzes for Test 1

View Set

Framework and Financial Reporting

View Set