Module 04 Protocols

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

What is the combination of a public key and a private key known as?

Key Pair (Correct. The combination of a public key and a private key is known as a key pair.

Which two protocols manage neighbor discovery processes on IPv4 networks?

b. ICMP and ARP

At which OSI layer does IP operate?

b. Network layer

Which remote file access protocol uses port 22?

b. SFTP

Which protocol's header includes the source MAC address?

c. Ethernet

Which IPsec encryption type encrypts the IP header?

d. ESP

Which encryption benchmark ensures data is not modified after it's transmitted and before it's received?

d. Integrity

Which of the following uses the cross-platform protocol RFB (remote frame buffer) to remotely control a workstation?

Correct. VNC (Virtual Network Computing) is similar in concept to RDP (Remote Desktop Protocol) but uses the cross-platform protocol RFB (remote frame buffer) to remotely control a workstation or server.

You have been appointed as the network administrator of an ISP. Your first project requires you to develop a protocol that can transmit IP and other kinds of messages through a tunnel so that you can connect two VPN endpoints. Which of the following will you choose in this scenario?

GRE (Correct. GRE (Generic Routing Encapsulation) is a layer 3 protocol that is used to transmit IP and other kinds of messages through a tunnel and should be used in this instance.

You, as a network administrator, want to open up a port that will allow you to send data using the file transfer protocol. However, the files you wish to transfer are boot files. Which of the following ports will you open up to carry out this operation?

Port 69 -Correct. TFTP (Trivial File Transfer Protocol) listens at port 69 and negotiates a data channel for each connection. TFTP requires very little memory and is most often used by machines behind the scenes to transfer boot files or configuration files.

Rodriguez has been hired as a network administrator by MJF Tires to create an IPsec suite wherein a definitive set of rules are laid down for encryption, authentication, and key management of TCP/IP transmissions. After accessing the basic network traffic, Rodriguez wants to create a secure channel so that the IP packet's data payload can be authenticated through public key techniques. Analyze which of the following steps Rodriguez must complete after establishing a secure channel.

Renegotiate and reestablish the connection before the current session gets timed out. (IPsec (Internet Protocol Security) requires regular reestablishment of a connection to minimize the opportunity for interference. To maintain communication, the connection can be renegotiated and reestablished before the current session times out.

Which of the following fields in a TCP segment identifies the data segment's position in the stream of data segments being sent?

Sequence number (Correct. The sequence number in a TCP segment identifies the data segment's position in the stream of data segments being sent

Mr. Yoda is a network engineer who has been working on setting up a data delivery service. While creating the TCP segment for this purpose, the network administrator has requested Mr. Yoda to set up a command requesting a synchronization of the sequence numbers between two nodes so that it can indicate to the receiving node that there is no payload attached to the data packet. Analyze which of the following statements will best fit the situation for Mr. Yoda.

Set the SYN to 1 byte in the flag segment of the TCP segment(Correct. When you set SYN to 1, the sender is requesting a synchronization of the sequence numbers between the two nodes. This code indicates that no payload is included in the segment, and the acknowledgment number should be increased by 1 in response.

You have been hired as a security professional for a firm, and you would like to analyze the traffic that crosses the computer's network interface. Which of the following command-line interfaces will help you in achieving this?

Tcpdump (Correct. tcpdump is the command-line interface that is used to capture traffic that crosses a computer's network interface. The output here can be saved to a file that you can filter or play back.

Which of the following utilities uses ICMP echo requests to trace the path from one networked node to another, identifying all intermediate hops between the two nodes?

Tracert (Correct. The Windows tracert utility uses ICMP (Internet Control Message Protocol) echo requests to trace the path from one networked node to another, identifying all intermediate hops between the two nodes.

You are the network administrator for Jungle Technologies, and you have to create a data stream within an application that will mark a certain section of the data stream to be more urgent than the normal stream. In which of the following fields of TCP segment will you specify this information?

Urgent Pointer (Correct. The urgent pointer indicates a location in a data field where urgent data resides.

What is one advantage offered by VDI over RDS and VNC?

a. Offers access to multiple OSs in VMs

Which remote file access protocol is an extension of SSH?

a. SFTP

You need to remote into a Linux server in another building on your network. Which of the following protocols should you use?

a. SSH

You're getting a duplicate IP address error on your computer and need to figure out what other device on your network is using the IP address 192.168.1.56. What command will show you which MAC address is mapped to that IP address?

a. arp -a

You need to determine which device on your network is sending excessive messages to your Ubuntu Server. Which utility will give you this information?

a. tcpdump

Which two components of the CIA triad are ensured by adequate encryption methods? Choose two.

b. Confidentiality c. Integrity

What protocol must be allowed through a firewall for tracert to work correctly?

c. ICMP

Which encryption protocol does GRE use to increase the security of its transmissions?

c. IPsec

You're working from home and need to access a file server at the office while working in an application from your work desktop. At the same time, you often stream music in your browser. Which VPN type will be most efficient while still meeting your needs?

c. Split tunnel VPN

Which protocol's header would a layer 4 device read and process?

c. TCP

What is the Internet standard MTU?

d. 1,500 bytes

What field in a TCP segment is used to determine if an arriving data unit exactly matches the data unit sent by the source?

d. Checksum

An ARP table maps MAC addresses to what information?

d. IPv4 addresses

Which of these protocols does not include some kind of integrity check field in its header?

d. IPv6


Ensembles d'études connexes

Systems of Equations in 3 Variables

View Set

Chapter 42: Nursing Care of the Child With an Alteration in Bowel Elimination/Gastrointestinal Disorder

View Set

Salesforce PD2 Certification Study

View Set

Genetics Ch. 1-5 HW/Quiz Questions

View Set

sensation & perception ap classroom review

View Set

Chapter 20: The Conservative Order and the Challenges of Reform

View Set

PrepU Videbeck Ch 17 Mood Disorders & Suicide

View Set

Corporate Ethics and Responsibility chapter 8

View Set