Network+ Ch.4 Quiz
Robert is the network administrator for JP Morgan. He made a hardware upgrade, which involved him bringing in new hard disks and NICs for the entire facility. Despite all this, he notices that the web server is taking twice as long to respond to HTTP requests. He has an impression that the reason for this might be the traffic going into and out of each NIC. Analyze which of the following utilities should Robert use to determine the traffic going in and out of each NIC. arp traceroute tcpdump netstat
netstat
Which of the following utilities would you use to display TCP/IP components and connections on a host? tcpdump netstat arp tracert
netstat
As a network administrator in Wright Elementary School, it is your job to monitor all the devices used by the staff and students. Which of the following commands would you employ to be able to detect, identify, and monitor devices on a network? tcpdump ping netstat nmap
nmap
You, as a network administrator, want to set up an FTP for remote file access. You also want to add an added layer of protection so that you can encrypt both the data and control channels. Which of the following technologies will you apply in such a case? TFTP FTPS RDP SFTP
FTPS
Which of the following would you use to provide a set of rules for encryption, authentication, and key management for TCP/IP transmissions? IPsec Key pair Public key encryption Private key encryption
IPsec
While programming an IP packet, Kiara, a network programmer, gets to know that the packet has not reached the destination and has been sent back because the allotted TTL has expired. Now, as the device was running on an IPv6 packet, analyze which of the following protocols should Kiara opt for so that such errors do not arise in the future? ICMP NDP Ethernet ARP
NDP
JV Enterprises is currently using terminal emulation software to remotely control the devices for its employees. The administration however wants to build a dedicated network connection that will allow network administrators to remotely troubleshoot boot problems. Analyze which of the following options should JV consider for its needs. In-band management Telnet Out-of-band management SSH
Out-of-band management
Which of the following protocols is not a terminal emulation protocol? Remote Desktop Telnet TFTP SSH
TFTP
You have been recently appointed by Jaylabs Internet Solutions to verify the TCP/IP protocols that have been set up at Heroku Industries for inter-organizational purposes. On examining the TCP header segment, you want to get a sense of the limit of the maximum bytes of data that a computer can receive before returning an acknowledgment. Which of the following fields in a TCP segment should you check in such a situation? Options Destination port Header length Window size
Window size
As a network engineer, you are noticing inconsistent connectivity issues related to certain addresses. After examining the errors, you have decided to flush the ARP table on any device experiencing a similar problem. Which of the following commands will you apply to enable this action? arp -a arp -d arp -s IHL
arp -d
Barney is the owner of Venture Capitals Internet Solutions. Venture's client Riverdale Union High has many remote users, who are school students, and they regularly need access to desktops. The school wants to offer a consistent desktop experience with installed applications that the students commonly need. However, they don't want to purchase dozens of physical computers for these students to connect to. What should Barney do in such a scenario? A. Barney should use VDI (Virtual Desktop Infrastructure). B. Barney should use SSH (Secure Shell). C. Barney should use Telnet. D. Barney should use RDP (Remote Desktop Protocol).
A
Barney is the owner of Venture Capitals Internet Solutions. Venture's client Riverdale Union High has many remote users, who are school students, and they regularly need access to desktops. The school wants to offer a consistent desktop experience with installed applications that the students commonly need. However, they don't want to purchase dozens of physical computers for these students to connect to. What should Barney do in such a scenario? A. Barney should use SSH (Secure Shell). B. Barney should use VDI (Virtual Desktop Infrastructure). C. Barney should use Telnet. D. Barney should use RDP (Remote Desktop Protocol).
B
While analyzing an intermittent error, James, an independent contractor for HKV Infrastructures, finds that the destination host is constantly asking the source to retransmit the data. He finds that the bug might be related to the transport layer of the OSI model. Since the TCP provides reliable delivery protocols, analyze which of the following characteristics of the TCP protocol James should check to fix this error. Sequencing Checksum Flow control Source port
Checksum
You are a network engineer who is keen to develop a secure TCP/IP transmission so that you can not only add security information to the headers of the IP packets but also encrypt the entire IP package for added security. Which of the following IPsec encryptions will you apply to your program in such a scenario? ISAKMP ESP AH IKE
ESP
Which of the following protocols creates a frame around the payload by adding both a header and a trailer to the payload? ICMP NDP TCP Ethernet
Ethernet
As a network engineer for Orior Telecommunications, you are programming an IPv4 header. You decide to put additional routing and timing information to the header as a result of which the header is no longer a multiple of 32 bits. Which of the following IPv4 fields will you use in such a situation? Data Padding Option Protocol
Padding
The University of Oklahoma has hired you as a network engineer, and you are required to remote into a LINUX server of the legal department building, which is located on the same block. Which of the following protocols will you apply in this case? VPN RDP SFTP SSH
SSH
You, as a network engineer, are working on setting up a data delivery service. While creating the TCP segment for this purpose, you wish to set up a command requesting a synchronization of the sequence numbers between two nodes. Which of the following flags will you apply with a 1-bit field so that you can set this up? SYN URG FIN PSH
SYN
Raqeeb is an employee working for Deloitte Corporation. He has been allowed to work from home because of the COVID-19 outbreak. You have been asked to establish a VPN so that Raqeeb can access a file server from the office while he operates from his workstation at home. It also has to be kept in mind that Raqeeb wants to stream music alongside when he does this. Which of the following VPN types will you apply so that the necessary requirements are met? Host-to-host VPN Site-to-site VPN Split tunnel VPN Full tunnel
Split tunnel VPN
What is a small file containing verified users' identification information and public key known as? Asymmetric encryption Public-key infrastructure Digital certificate Key pair
Digital certificate
Which of the following protocols are used to transmit IP and other kinds of messages through a tunnel? OpenVPN GRE IKEv2 L2TP
GRE
You, as a network administrator, want to set up a file transfer version of SSH so that you can use a single channel to control both inbound and outbound communications. Which of the following ports will you use to carry out this operation? Port 69 Port 20 Port 22 Port 989
Port 22
Which of the following is a collection of protocols that performs both authentication and encryption? RDP Telnet VNC SSH
SSH
Meredith and Co. provides ISP services to a bulk of the corporates in the Silicon Valley. However, due to the recent COVID outbreak, a lot of the firms have started to allow their employees to work from home. Ceratrix is one such company that wants to allow its employees to work from home; however, certain features are only available to the employees when they have access to their workstations in the organization. This basically means that they would have to command the host computer. What remote access method should be provided to Ceratrix to fulfill this requirement? VPN FTPS Remote file access Terminal emulation
Terminal emulation
Which of the following layer's header identifies the IP address of the destination host? The physical layer The transport layer The network Layer The data link layer
The network Layer
You have just managed to send a fragmented IP packet across a network as the IP packets are larger than what the network allows. Which of the following bits in the flags section of an IPV4 field will you apply so that you can send a clear message across to the receiving host that there are more fragments on the way? The first bit The fourth bit The second bit The third bit
The third bit
The State of Nevada has organized a gaming championship for which you have been contracted to set up the network connection. The championship is a seven-day long affair with a heavy influx of participants. Which of the following protocols would you choose in setting up such a network? ICMP IP UDP TCP
UDP
Mr. Yen has been working as a network technician for Goldyear Tyres. Recently, a couple of routers were reported for hardware failure. As the organization is large, it will take a lot of time to track down and identify the malfunctioning routers. What would be the most feasible option for Mr. Yen in this situation to solve the issue? Use Mac spoofing Use ping to test for network connectivity Use tracert to target a node instead of the router Use traceroute or tracert to track down the malfunctioning routers
Use tracert to target a node instead of the router
Which of the following remote access methods requires a virtual connection to remotely access resources between a client and a network? VPN Remote file access Remote Desktop Protocol Terminal emulator
VPN
Which of the following utilities is also known as a packet sniffer? traceroute netstat ping tcpdump
tcpdump
Your client has hired you to extract details about the port on which the TCP/IP connections are running. You, as a network engineer, have decided to use the netstat utility for this purpose. Which of the following commands will you apply to list all current TCP connections and an all listening TCP and UDP ports? netstat -n netstat -f netstat -r netstat -a
netstat -a
You are running the netstat command to list all active TCP/IP connections of the local machine. However, you now want to have access to the routes used by the network hosts to reach the particular network destinations. Which of the following commands will you apply in such a situation? netstat -r netstat -n netstat -f netstat -b
netstat -r
Computer A started a communication sequence with Computer B that has a sequencing number of 300070. Computer B accepted the request and sent an acknowledgment number of 300071. Until this point, no payload has been exchanged. So far, the sequence numbers have increased by exactly 1 in each acknowledgment. Now, Computer A sends a payload data that is 800 bits long. According to you, what will be the acknowledgment number for the return message in this case? 300870 300072 300871 300800
300871
Which of the following remote access methods allows a remote client to take over and command a host computer? Terminal emulation VPN RAS Remote file access
Terminal emulation
Hilary has been working on a pilot project for a start-up on which she has been testing the maximum bytes for the length of an IP packet. As her intended IP packets are larger than what the network allows, she has to break them up into smaller packets for transmission. Analyze and suggest which of the following fields Hilary should use in an IPv4 packet so that the receiving host is able to identify and reassemble the fragmented messages. Flags Fragment offset Version Identification
Identification
Joffrey plans on installing a terminal emulator for a small organization so that he can control the office computers for troubleshooting issues. Joffrey is working as an intern for IVP Internet Solutions, which is an ISP. Analyze which of the following terminal emulators will be more suitable for James as he is new to his job and not well-equipped to handle complex layers of programming. RDP Telnet Remote desktop gateway SSH
RDP
Glenn Infosys has successfully managed to set up VPN tunnels between branch locations for Syndicate Bank across India, ensuring that it protects the company's data, network, and liability. However, the top management wants Rahul, a network engineer for Glenn Infosys, to examine the network connection so that there are no bugs within the system. On inspection, he found that even though there are multiple points for connecting branch offices to the main office, certain branches have been left out. Analyze which of the following VPN protocols Rahul should use in such a situation. L2TP OpenVPN mGRE GRE
mGRE
Which of the following layers in an Open System Interconnection (OSI) model adds a header in front of the payload? Layer 3 Layer 4 Layer 2 Layer 1
Layer 4