Network

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

Which of the following utilities uses ICMP echo requests to trace the path from one networked node to another, identifying all intermediate hops between the two nodes?

tracert

Which of the following command-line tools is used to query DNS name servers for information about host addresses and other DNS records?

dig

Your client has hired you to change the command-line tool from nslookup to dig since it provides more detailed domain information than nslookup. Which of the following commands will you use to perform a DNS lookup on a domain name?

dig google.com

What is the arp -a command used for on a Windows device?

Displays address resolution table for the device

Which parameter can be used with the ping command to send a constant stream of packets when using a Windows device?

-t

Which of the following fields in a TCP segment identifies the data segment's position in the stream of data segments being sent?

Sequence number

When executing the tracert 192.168.0.10 command, what can be determined from the output?

The route it will take to reach the destination IP address

Which of the following terms refer to the number of data bits (0s and 1s) that are actually received across a connection each second?

Throughput

Which command must be used on a Linux device to determine the IP configuration of the eth0 network interface? [Choose all that apply]

ifconfig eth0 ip address show eth0

What is the combination of a public key and a private key known as?

key pair

Which permission allows a user access to a resource?

Authentication

You, as a network administrator, want to open up a port that will allow you to send data using the file transfer protocol. However, the files you wish to transfer are boot files. Which of the following ports will you open up to carry out this operation?

Port 69

Which of the following command can be used to display the local routing table for a Windows device?

route print

Which of the following connection methods can be used to connect a company's offices which are located in different geographical areas?

Site-to-Site VPN

You are the network administrator for Jungle Technologies, and you have to create a data stream within an application that will mark a certain section of the data stream to be more urgent than the normal stream. In which of the following fields of TCP segment will you specify this information?

Urgent pointer

Which of the following uses the cross-platform protocol RFB (remote frame buffer) to remotely control a workstation?

VNC

You are working as a network engineer for an ISP. A ticket has been raised that there has been severe attenuation, which has decreased the transmission speed significantly. On inspection, you notice that the reason for this issue is that the transmissions are optimized for one type of cable but sent over a different type of cable. You are now required to send this analysis to the head office for further instructions. Under which of the following common fiber connection problems will you associate this issue?

Wavelength mismatch

One of the users in your organization has just re-installed the operating system on his system. He notices that the email software can be accessed after the reinstallation, but all the old emails have disappeared. What could be the cause of this problem?

POP3 was used on the mail client software

To be able to remotely manage a Windows device securely, which of the following protocols can be used?

RDP

The IT department of Maddison Corporates has complained about a faulty fiber-optic cable as a result of which it is having connectivity issues within the organization. As a network engineer, you want to detect the faulty cable by searching for electrical signals in the cables located within the racks in the data room. Which of the following instruments will you need in this scenario?

Tone locator

The University of Bethesda has requested your professional help in giving a masterclass on how to use Telnet ports for interacting with remote computers. Which of the following ports will you open to teach students how to establish an unencrypted connection with a remote computer?

23

Your employer has sent you to establish a private IP address for the devices used in Infoglobal Ltd. with the help of a router. Your employer has instructed you to implement the address ranging from 172.16.0.0 to 172.31.255.255 as per IANA's RFC1918 document. Which class of classful addressing will you apply in this scenario?

Class B

While configuring a new VPN client, which Role service needs to be installed for the Remote Access role on a Windows server?

Direct Access and VPN (RAS)

You are working as a network administrator for an ISP. A ticket has been raised by a consumer complaining about fluctuations in network speed despite using a fiber-optic cable. The inner wiring of the cable needs to be checked for which you have decided to strip off the outer layer of the fiber cable. Which of the following tools will you carry for this purpose?

Fiber stripper

Which of the following transmissions allows a signal to travel in both directions simultaneously?

Full-duplex

Your client has hired you to troubleshoot a network error. The client is complaining of an extremely limited network connection on most days and a failed network connection on certain days. Which of the following network configuration issues do you think is at play in this case?

Incorrect subnet mask

You work as a network administrator in a domain environment. You have a new firewall and need to configure it. You are asked to create web filtering and firewall rules based on domain groups. Which of the following protocol will you use to integrate your firewall directly with Active Directory?

LDAP

You are the DNS administrator and have been tasked to identify an email server in a DNS zone file. Which of the following resource records would you apply as a DNS administrator in this case?

MX record

Which type of crosstalk occurs between wire pairs near the source of a signal?

NEXT

Mr. Yoda is a network engineer who has been working on setting up a data delivery service. While creating the TCP segment for this purpose, the network administrator has requested Mr. Yoda to set up a command requesting a synchronization of the sequence numbers between two nodes so that it can indicate to the receiving node that there is no payload attached to the data packet. Analyze which of the following statements will best fit the situation for Mr. Yoda.

Set the SYN to 1 byte in the flag segment of the TCP segment

You have been hired to fix an issue related to the booting up of a computer using a Linux operating system. Before fixing any error, you want to check the history of the previous warning messages that were generated by the system. Which of the following utilities will you use in this scenario?

Syslog

Frank has been appointed as a network engineer with an Internet service provider firm. His first assignment as an engineer is to set up a 1000BASE-T standard Fast Ethernet for Horizon Corporates. While doing so, the ISP has specifically requested him to concentrate on installing the necessary twisted-cable pairs as all the other specified standards will be looked after by the other members of the team, which has been allocated for this project. Analyze which of the following pairs of twisted cables Frank should use in this scenario.

Use a Category 5e cable for this scenario

You have been hired as a security professional for a firm, and you would like to analyze the traffic that crosses the computer's network interface. Which of the following command-line interfaces will help you in achieving this?

tcpdump

HTTP and HTTPS are TCP-based protocols. Which of the following ports do they use?

80 and 443

Which permission needs to be assigned to a user to be able to connect to a VPN connection?

Network Access permissions

Which of the following protocols is used for encrypted control of remote Windows computers?

RDP

You work as a network administrator and are responsible for configuring network firewalls, routers and switches. You have configured rules between the user and server VLANs. You received a request from your development team to create a new rule that allows port TCP 1433 to the database server. Based on the port number, which database is installed on the server.

SQL

You have recently been hired to complete a pending networking project where the cabling procedure providing Fast Ethernet has already been completed. On inspection, you realize that TIA/EIA-568 Category 5 twisted pair has been used for the cabling procedure. What is the maximum bandwidth that you will allot with such a pair of wires in this scenario?

100 Mbps (Fast Ethernet)

You have been appointed as the network administrator of an ISP. Your first project requires you to develop a protocol that can transmit IP and other kinds of messages through a tunnel so that you can connect two VPN endpoints. Which of the following will you choose in this scenario?

GRE

Hypervile Solutions has hired Joseph to establish a multimedia session so that it can preview its products to a list of potential clients. Joseph has to ensure that the session is properly encrypted so that there is no loss or theft of data as it will be a closed meeting. Analyze which of the following ports should be opened in this case.

Port 5061

RCB Logistics wants to upgrade the cabling of its network as it was still running on older fiber networks. It has outsourced the cabling project to Bear & Co. that appointed Watson as a network engineer. On inspection, it gets to know that the older fiber networks were connected using an ST connector. Watson decides that he will replace the SMF cables with MMF cables in order for the signaling to be in full-duplex mode. Analyze which of the following connectors would be most ideal in this situation for Watson to replace the cables.

Replace the cables using an MT-RJ connector

What transport protocol/ports do DNS and DHCP use?

UDP 53 / UDP 67 and 68

You have just installed a network at the Jamieson Hydro Power Plant, and you want to test the basic connectivity of the network. Which of the following utilities will you use first in such a situation so that you get to verify that the TCP/IP is configured correctly and is communicating with the network?

ping

The University of Zotto wants to upgrade its network so that the dean of the university can deliver important information related to students and teachers directly to the campus monitors located in the vicinity. The university has hired a firm named Internet Solutions for this purpose. The firm has come up with a solution where it will use a central receiver to distribute video signals to multiple monitors within a building. However, the firm is still not sure about the kind of cables it will be using as the allocated budget is not extensive. Analyze which of the following should be ideal in such a scenario.

RG-59 cables

Rodriguez has been hired as a network administrator by MJF Tires to create an IPsec suite wherein a definitive set of rules are laid down for encryption, authentication, and key management of TCP/IP transmissions. After accessing the basic network traffic, Rodriguez wants to create a secure channel so that the IP packet's data payload can be authenticated through public key techniques. Analyze which of the following steps Rodriguez must complete after establishing a secure channel.

Renegotiate and reestablish the connection before the current session gets timed out


Ensembles d'études connexes

Comparative Management and Leadership Ch. 12-14

View Set

BM133 Introduction to Small Business Management - Ch 2

View Set

Securities Industry Essentials Exam Part 1 (Capital Markets)

View Set

Foundation of nutrition chapter 5

View Set

Individual Differences FHS 1 MCQs

View Set

How To Read Literature Like A Professor Chapters 14-26

View Set

Chapter 3: Psychosocial Theories and Therapy

View Set

MISY 5350 E- Commerce Chapter 1-5

View Set

Capstone Chap.2 The Business Vision and Mission

View Set

Unit 5 - Ch. 18 | Eating + Feeding Disorders

View Set