Ch 3

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

You have configured a DHCP pool to allocate the IP addresses to the system for 3 days. What have you defined? a. Lease time b. DHCP Hold Timer c. IP Expiry Timer d. DHCP Timer

a. Lease time

Your network firewall currently allows only HTTP traffic to pass through. You need to allow FTP traffic to pass through the firewall. Which of the following should be allowed? [Choose all that apply]. a. TCP port 20 b. UDP port 21 c. TCP port 21 d. UDP port 20

a. TCP port 20 c. TCP port 21

Which of the following IPv4 and IPv6 addresses are correctly portrayed using CIDR notation? [Choose all that apply]. a. 192.168.2.0/34 b. 192.168.2.0/24 c. 192.168.2.0\24 d. 2001:db8::/32 e. 2001:db8::\32 f. 2001:db8::/132

b. 192.168.2.0/24 d. 2001:db8::/32

What is the first thing you should check if you discover that domain names are not resolving into IP addresses on a PC or workstation? a. Check connectivity to the Webserver b. Check connectivity to the default DNS server c. Check connectivity to the default gateway d. Check connectivity to the device loopback address

b. Check connectivity to the default DNS server

Which of the choices describes a DNS name resolution request that requires a resolution or answer? a. Iterative b. Recursive c. Reverse zone d. All of these

b. Recursive

At the transport layer of the OSI, what is used to find and communicate with a particular application running on a host? a. IP addresses b. port numbers c. domain names d. MAC address

b. port numbers

all network devices have a MAC address. How many bits does this address require? a. 24 b. 28 c. 48 d. 64

c. 48

You are the network administrator for a small organization of 100 users. Users till now were freely browsing the Internet. You want to put a provision in place where you can monitor their visits to the different Websites and block all unwanted Websites. Which of the following should you install and configure? a. Proxy server b. IDS server c. Web server d. Firewall

a. Proxy server

Your organization has multiple remote offices. The users at the remote office often remotely connect to the application servers. Which of the protocols should you enforce for encrypted communication? [Choose all that apply]. a. RDP b. Telnet c. HTTP Interface d. SSH

a. RDP d. SSH

Which of these commands is available only in Linux? a. dig b. nslookup c. ping d. ipconfig

a. dig

In a DNS database, which of the choices describes the record that holds the name-to-address mapping for IPv4 addresses? a. PTR b. A c. AAAA d. CNAME

b. A

From the lab you know that the first six hexadecimal characters represent the OUI. Which choice is NOT the basis for the last six hexadecimal characters? a. Extension identifier b. Addressing capabilities c. Date of manufacture d. Device ID

b. Addressing capabilities

You suspect that the Webserver, which is located on your network and hosts multiple Internet facing Websites. The Webserver runs on Windows Server 2008. After receiving complaints from the users of Webserver occasionally being unavailable, you investigate and find that it is getting flooded with many ping requests. What should you do to immediately handle this situation? a. Perform a windows Update on the Webserver b. Block all incoming ICMP requests c. Install an antivirus on the Webserver and immediately perform a d. signature update d. Update the Windows operating system to 2012 or later

b. Block all incoming ICMP requests

Your supervisor has asked you to configure a new prototype network with a dual stack configuration. What does this mean? a. Two different IPv4 address spaces will exist on the same network segment b. Both IPv4 and IPv6 protocols will be used on the network c. The router serving the network will have a redundant spare d. The network will exist on two separate segments, separated by a proxy

b. Both IPv4 and IPv6 protocols will be used on the network

DNS clients can use this zone to obtain information such as IP address that correspond to DNS domain names or services. What type of DNS zone is this? a. Reverse lookup zone b. Forward lookup zone c. DNS lookup zone d. Resource mapping zone

b. Forward lookup zone

What manufacturer is listed for your Wi-Fi MAC OUI? a. Hewlett Packard b. Liteon c. Intel d. Atheros

b. Liteon

Which of the following describes the configuring of MAC reservation in a DHCP server? a. Manually configure the IP parameters of the host b. Manually allocate the MAC address to a desired IP address in the DHCP server c. Exclude the MAC address of the host in question from DHCP allocation d. Dynamically allocate the MAC address to a range of desired IP addresses in the DHCP server

b. Manually allocate the MAC address to a desired IP address in the DHCP server

Which of the following port numbers is used to transmit WWW traffic through a firewall? a. 23 b. 25 c. 80 d. 22

c. 80

In a DNS database, which of the choices describes the record that holds the name-to-address mapping for IPv6 addresses? a. PTR b. A c. AAAA d. CNAME

c. AAAA

Refer to the exhibit. Which of the pictured software is a port scanner? a. A b. B c. C d. D e. E

c. C

What type of device does a computer turn to first when attempting to make contact with a host with a known IP address on another network? a. DHCP server b. Root server c. Default gateway d. DNS server

c. Default gateway

A network engineer is configuring a network to be able to relay IPv6 packets. The network only supports IPv4 and does not have dual-stack support. Which of the following can be used to successfully relay IPv6 packets over this network? a. Dual-stack Lite b. OSPFv3 c. IPv6 tunneling d. GREv3 tunneling

c. IPv6 tunneling

Refer to the exhibit. Which of the following command is likely to show the required output? a. netstat b. ipconfig c. nslookup d. tcpdump e. ping

e. ping

What utility is used to verify that TCP/IP installed, bound to the NIC, configured correctly, and communicating with the network? a. Ping b. Ifconfig c. Route d. traceroute

a. Ping

What method of IP network configuration would you use for devices such as servers and printers so that all users on a network will always be able to reach these resources using the same network address? a. Static IP address allocation b. Dynamic IP address allocation c. DHCPv6 d. SLAAC e. DNS

a. Static IP address allocation

A computer is configured with a subnet mask of 255.255.255.192. How many IP addresses, including the network and broadcast addresses, are available in the subnet the computer is in? a. 128 b. 64 c. 32 d. 16

b. 64

You are a network administrator for an organization. You are asked to create a shared folder on a Microsoft Windows system so that other users on the same network are able to access its contents. To be able to meet this requirement, which protocol is likely to be used? a. NetBIOS b. SMB c. FTP d. SMBP

b. SMB

Which part of a MAC address is unique to each manufacturer? a. The device identifier b. The OUI c. The network identifier d. The physical address

b. The OUI

Which of the following format can be considered a valid IPv6 address? a. 2001:0db8:0000:0003:0000:jk00:0042:8329 b. 192.168.45.72 c. 2001:0db8:0000:0003:0000:ff00:0042:8329 d. 2001:0db8:0000:ff00:0042:8329

c. 2001:0db8:0000:0003:0000:ff00:0042:8329

You need to connect to a colleague's system using the default Microsoft Windows remote desktop application to troubleshoot an application issue. Which port should be opened on the colleague's system firewall to ensure successful remote connection? a. 389 b. 22 c. 3389 d. 33 e. 89

c. 3389

What manufacturer is listed for your sample MAC OUI? a. Hewlett Packard b. Liteon c. Intel d. Atheros

c. Intel

Which type of DNS record identifies an email server? a. PTR record b. CNAME record c. MX record d. AAAA record

c. MX record

Which of the following commands can you enter at the command prompt to determine the DNS Server address your machine is using? a. Ipconfig b. Showdns c. Flushdns d. Ipconfig /all

d. Ipconfig /all

Which computers are the highest authorities in the Domain Name System hierarchy? a. Authoritative name servers b. Primary DNS servers c. Top-level domain servers d. Root servers

d. Root servers

You want to display the cache entries for 192.168.1.101. Which parameter should you use with the arp command? a. -p b. -k c. -d d. -s e. -a

e. -a

How many CNAME records were shown when you initially executed the ipconfig /displaydns command? a. 1 b. 2 c. 3 d. None

a. 1

Which of the following port numbers is used to transmit WWW traffic through a firewall? a. 80 b. 23 c. 22 d. 25

a. 80

Refer to the exhibit. Which of the pictured software is a protocol analyzer? a. A b. B c. C d. D e. E

a. A

In a DNS zone, what type of record holds the name-to-address mapping for IPv6 addresses? a. AAAA record b. TXT record c. A record d. PTR record

a. AAAA record

Suppose you send data to the 11111111 11111111 11111111 11111111 IP address on an IPv4 network. To which device(s) are you transmitting? a. All devices on your local network b. No devices c. All devices on the Internet d. The one device that is configured with this IP address

a. All devices on your local network

What manufacturer is listed for your Ethernet MAC OUI? a. Hewlett Packard b. Liteon c. Intel d. Atheros

a. Hewlett Packard

What statement regarding the Server Message Block protocol is accurate? a. It is used by Windows and UNIX-based operating systems to share files b. It is a signaling protocol used to make a connection between hosts prior to ata transfer c. It is a protocol used for accessing network-based LDAP directories It is a simple protocol used to synchronize block messages written to iSCSI drives on a network

a. It is used by Windows and UNIX-based operating systems to share files

You are planning to implement dual stack of IPv4 and IPv6 in your network. Currently, your network consists of servers, routers, and switches that have not been upgraded for several years. You are still running the Windows Server 2003. When implementing dual stack, which of the following will be your primary concerns? [Choose all that apply]. a. Ensuring the same service-levels for the dual stack b. Ensuring that Internet Service Providers (ISPs) work with IPv6 c. Keeping the hardware and software costs under control d. Ensuring that the hardware and software support the implementation

c. Keeping the hardware and software costs under control d. Ensuring that the hardware and software support the implementation

You are a network administrator and you need to access the secure command line interface access of an edge router on your network. The router uses cryptography for remote authentication. Which protocol is the router configured with for this purpose? a. HTTPS b. Telnet c. SSH d. RDP

c. SSH

You have been asked to host a new e-commerce Website. Your manager has asked you to configure the Website with a certificate. After hosting the Website with the certificate, which security protocol have you use? a. RDP b. SSH c. SSL/TLS d. VMC/VMS

c. SSL/TLS

Which of the following commands can you enter at the command prompt to determine the DNS Server address your machine is using? a. ipconfig b. flushdns c. ipconfig /all d. showdns

c. ipconfig /all

A Windows computer on your network is having issues resolving queries for a specific domain, but not other domains. Other computers on the same network resolve the name just fine. What command can you issue that might fix the problem? a. ipconfig /renew b. ipconfig /release c. ipconfig /flushdns d. ipconfig /refresh

c. ipconfig /flushdns

Refer to the exhibit. Which of the following command is likely to show the required output? a. DNStranslate b. netstat c. nslookup d. ping e. traceroute

c. nslookup

Refer to the exhibit. Which of the following command is likely to show the required output? a. nslookup b. netstat c. traceroute d. show route e. ping

c. traceroute

Which of the following is NOT a range of IP addresses recommended for use in private networks? a. 10.0.0.0 through 10.255.255.255 b. 172.16.0.0 through 172.31.255.255 c. 192.168.0.0 through 192.168.255.255 d. 127.0.0.0 through 127.255.255.255

d. 127.0.0.0 through 127.255.255.255

What decimal number corresponds to the binary number 11111111? a. 256 b. 11,111,111 c. 127 d. 255

d. 255

Users on a network are complaining that they cannot connect to a Webserver by its name in the Web browser. You can access the Webserver using its IP address. You discover an access list is blocking several UDP ports. Which port should you remove from the access list to allow users to connect to the Webserver? a. 22 b. 443 c. 530 d. 53

d. 53

You need to block all unsecured web traffic using its default port from a specific network segment of the enterprise network. Which port would you block to achieve this? a. 45 b. 88 c. 8080 d. 80 e. 81

d. 80

In a DNS database, which of the choices describes the record that holds the alternative names for the host? a. PTR b. A c. AAAA d. CNAME

d. CNAME

When your computer first joins an IPv6 network, what is the prefix of the IPv6 address the computer first configures for itself? a. FF00::/8 b. 2001::/3 c. 2001::/64 d. FE80::/10

d. FE80::/10

If you use the ping command to send an echo request from one host to the other, then which of the following protocols have you used? a. SMTP b. SNMP c. SSH d. ICMP

d. ICMP

The network administrator has configured the enterprise firewall to permit port 21 to allow FTP transfers to occur from outside the enterprise. Users can connect to the FTP server that is located on the enterprise network. However, file transfers fails. Why could this be? a. Port 69 must also be permitted b. Both inbound and outbound port 21 and 22 must be permitted c. Open the inbound port 25 along with port 21 d. Port 20 along with port 21 must also be permitted

d. Port 20 along with port 21 must also be permitted

You have just brought online a new secondary DNS server and notice your network-monitoring software reports a significant increase in network traffic. Which two hosts on your network are likely to be causing the increased traffic and why? a. The web server and primary DNS server, because the web server is requesting zone transfers from the primary DNS server b. The root and primary DNS servers, because the primary server is requesting zone transfers from the root server c. The caching and primary DNS servers, because the caching server is requesting zone transfers from the primary server d. The secondary and primary DNS servers, because the secondary server is requesting zone transfers from the primary server

d. The secondary and primary DNS servers, because the secondary server is requesting zone transfers from the primary server

If you are connected to a network that uses DHCP, and you need to terminate your Windows workstation's DHCP lease, which command would you use? a. ipconfig /renew b. ifconfig /renew c. ifconfig /release d. ipconfig /release

d. ipconfig /release

With a FQDN of ftp1.dallas.mycompany.com, what part is the domain name? a. ftp1 b. ftp1.dallas.mycompany c. ftp1.dallas d. mycompany.com

d. mycompany.com


Ensembles d'études connexes

Supply Chain Management Section 3

View Set

Intro To Humanities Final Review

View Set

NFPA 13 Occupancy Hazard Classifications

View Set

Civil Rights and Liberties Study Guide

View Set