Network + Unit 2 Test Exam

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

What is the purpose of the checksum TCP field? It identifies the data segment's position in the stream of data segments being sent. It confirms receipt of data via a return message to the sender. It specifies special options, such as the maximum segment size a network can handle. It allows the receiving node to determine whether the TCP segment became corrupted during transmission.

It allows the receiving node to determine whether the TCP segment became corrupted during transmission.

What does the MX record do in a forward DNS zone? It identifies the e-mail server to be used for e-mail traffic for the domain. It holds the alternative names for a host. It identifies the authoritative name server for a domain. It identifies the hostname and port of a computer that hosts a specific network service, such as FTP or SIP.

It identifies the e-mail server to be used for e-mail traffic for the domain

What is routing protocol convergence time defined as? It is the time it takes for the protocol to recognize that a change has occurred. It is the amount of time involved in configuration of the routing protocol. It is the amount of time it takes after initial configuration of the protocol for all routes to become known. It is the time it takes for the protocol to recognize the best path in the event of a network change.

It is the time it takes for the protocol to recognize the best path in the event of a network change.

What statement regarding the Server Message Block protocol is accurate? It is used by Windows and UNIX-based operating systems to share files. It is a signaling protocol used to make a connection between hosts prior to data transfer. It is a simple protocol used to synchronize block messages written to iSCSI drives on a network. It is a protocol used for accessing network-based LDAP directories.

It is used by Windows and UNIX-based operating systems to share files

What is the ARPA domain suffix utilized for? It is a private TLD used for synchronization of zones between servers. It is used for reverse DNS queries, and holds PTR records. It is used to announce records for other TLDs such as .com and .net. It is a specialized government restricted TLD.

It is used for reverse DNS queries, and holds PTR records.

You are troubleshooting a network issue on a client computer and discover that the network card has an IP address of 169.254.196.200. What does this mean? The computer has been assigned a routed public IP address. The computer is configured to use DHCP, but was unable to lease an address. The network card has been erroneously assigned a loopback address. The network card is set up for multicast communication.

The computer is configured to use DHCP, but was unable to lease an address.

How can you determine the manufacturer of a NIC card based on the MAC address? The first 24 bits, known as the Organizationally Unique Identifier, identify the manufacturer. The middle 24 bits, known as the Organization Universal Identifier, identify the manufacturer. The first 12 bits and last 12 bits combined are known as the Organizationally Unique Identifier. The last 24 bits, known as the Organizationally Unique Identifier, identify the manufacturer.

The first 24 bits, known as the Organizationally Unique Identifier, identify the manufacturer.

MAC address spoofing is the impersonation of an MAC address by an attacker. True False

True

Routing paths are determined by either static routing or dynamic routing. True False

True

The Border Gateway Protocol is considered to be a hybrid routing protocol. False True

True

The Class E IPv4 address range is not available for general use because Class E addresses, which begin with 240 through 254, are reserved for research. False True

True

The TTL field indicates the maximum duration that the packet can remain on the network before it is discarded. False True

True

The two types of DNS requests include recursive query and iterative query. True False

True

UDP port 123 is utilized by the Network Time Protocol service. False True

True

A Windows computer on your network is having issues resolving queries for a specific domain, but not other domains. Other computers on the same network resolve the name just fine. What command can you issue that might fix the problem? ipconfig /renew ipconfig /refresh ipconfig /release ipconfig /flushdns

ipconfig /flushdns

What type of IPv6 address is fe80::8cf1:2c42:ffde:da1c? global address multicast address anycast address link local address

link local address

With a FQDN of ftp1.dallas.mycompany.com, what part is the domain name? ftp1.dallas.mycompany. ftp1 mycompany.com ftp1.dallas

mycompany.com

What command can be used to check a domain computer's time source from a Command Prompt window? time --source date /source ntpd show source w32tm /query /source

w32tm /query /source

On a Linux-based system, what command can be used to display TCP/IP information associated with every interface on the system? ip show ipconfig /all if status ifconfig -a

ifconfig -a

What command can you utilize to display TCP/IP configuration information for each network adapter installed? ipconfig /full ipconfig /list ipconfig /show ipconfig /all

ipconfig /all

Which of the following is NOT a range of IP addresses recommended for use in private networks? 127.0.0.0 through 127.255.255.255 192.168.0.0 through 192.168.255.255 172.16.0.0 through 172.31.255.255 10.0.0.0 through 10.255.255.255

127.0.0.0 through 127.255.255.255

By default, what is the MTU size on a typical Ethernet network? 1522 bytes 1492 bytes 1500 bytes 1518 bytes

1500 bytes

If the VLAN tag is present in an Ethernet frame, what is the maximum frame size? 1522 bytes 1518 bytes 1492 bytes 1500 bytes

1522 bytes

Which of the following IPv6 addresses represents a global unicast address? FC00::/7 2000::/3 FD00::/8 FE80::10

2000::/3

Which of the following is a correct statement? An singlecast address can identify multiple destinations, with packets delivered to the closest destination. An anycast address can identify multiple destinations, with packets delivered to the closest destination. A singlecast address is delivered to all nodes in a targeted, multicast group. An anycast address specifies a single node on a network.

An anycast address can identify multiple destinations, with packets delivered to the closest destination.

What happens when a router receives a packet with a TTL of 0? The router attempts to forward the traffic on a local network. The router drops the packet and sends an ICMP TTL expired message back to the host. The router marks the packet as corrupted and forwards it to the next hop. The router resets the TTL to 128.

The router drops the packet and sends an ICMP TTL expired message back to the host.

What IPv6 field is similar to the TTL field in IPv4 packets? flow label hop limit distance vector next header

hop limit

The three different types of port number ranges as defined by IANA include all of the following EXCEPT what type of port range? public ports registered ports well-known ports dynamic and private ports

public ports

What tcpdump command can be used to filter out all traffic except SSH traffic? tcpdump port 22 tcpdump only ssh tcpdump -p 22 tcpdump -f +ssh

tcpdump port 22

When using DHCP for IPv6 (i.e. DHCPv6), what port do clients receive responses on? port 68 port 546 port 67 port 547

port 547

Which traceroute command will perform a trace using ICMP echo requests instead of UDP datagrams to the host srv1.mycompany.com? traceroute -w srv1.mycompany.com traceroute -I srv1.mycompany.com traceroute -i srv1.mycompany.com traceroute -o ICMP srv1.mycompany.com

traceroute -I srv1.mycompany.com

An organization might utilize any of the following common types of DNS server configurations EXCEPT what server configuration? primary DNS server caching DNS server tracking DNS server secondary DNS server

tracking DNS server

A subnet mask is a 32-bit number that helps one computer find another. False True

True

Which statement regarding the Border Gateway Protocol (BGP) is accurate? BGP is limited to a single autonomous system. BGP is exclusively a distance-vector protocol. BGP utilizes TCP for communicating updates. BGP is a more advanced version of OSPF.

BGP utilizes TCP for communicating updates.

What is by far the most popular DNS server software available? Microsoft DNS BIND Dnsmasq Oracle Resolver

BIND

Your supervisor has asked you to configure a new prototype network with a dual stack configuration. What does this mean? The router serving the network will have a redundant spare. Two different IPv4 address spaces will exist on the same network segment. Both IPv4 and IPv6 protocols will be used on the network. The network will exist on two separate segments, separated by a proxy.

Both IPv4 and IPv6 protocols will be used on the network.

What statement regarding the differences between the Windows tracert utility and the Linux/UNIX/macOS traceroute utility is accurate? Only tracert can send UDP messages for tracing a path. By default, the tracert utility uses ICMP echo requests, while traceroute uses UDP datagrams or TCP SYN messages. The tracert utility expects an ICMP port unreachable error message as the final reply to a trace. The Windows tracert utility does not place limits on the TTL of repeated trial messages.

By default, the tracert utility uses ICMP echo requests, while traceroute uses UDP datagrams or TCP SYN messages.

What field in an IPv4 packet informs routers the level of precedence they should apply when processing an incoming packet? Differentiated Services (DiffServ) Internet header length (IHL) Time to Live (TTL) Padding

Differentiated Services (DiffServ)

You have been tasked with the replacement of OSPF with EIGRP throughout your organization, which consists of a mixture of Cisco routers and routers from other vendors. What statement is accurate? Increased traffic will result from the switch to EIGRP. EIGRP will increase CPU utilization on core routers. EIGRP may not be available on non-Cisco routers. Convergence time will be increased with EIGRP.

EIGRP may not be available on non-Cisco routers.

What occurs when a collision happens on a network? Each node on the network waits a random amount of time and then resends the transmission. The collision goes undetected, and data transmission continues. Each node on the network stops transmitting, until manually told to reconnect and transmit. The collision will create an error in the network switch, but otherwise, no issues will occur as a result.

Each node on the network waits a random amount of time and then resends the transmission.

ARP tables might contain two different types of entries, multi-variable and functional. True False

False

An IPv6 address consists of 128 bits that are written as 10 blocks of hexadecimal numbers separated by colons. True False

False

Neighbor Discovery Protocol is less resistant to hacking attempts than ARP. False True

False

Routing Information Protocol (RIP) is an interior gateway protocol that uses a link-state algorithm. True False

False

The Linear Pathway Protocol is the only current exterior gateway protocol, and has been dubbed the "protocol of the Internet." False True

False

The two different variations of network address translation (NAT) include SNAT and ANAT. True False

False

You are setting up a DNS zone and have been asked to create SPF and DKIM records. What type of DNS record will hold this information? SRV record TXT record PTR record CNAME record

TXT record

You have been tasked with maintaining a network that is jumbo frame enabled. What does this mean? The MTU for the network is set at 65,535 bytes. The MTU for the network can be as high as 9198 bytes. The network is not based on the Ethernet standard. Fragmented frames will be consolidated into whole frames before being sent.

The MTU for the network can be as high as 9198 bytes.

In the event of a duplicate MAC address shared by two hosts on a switched network, what statement is accurate? The network switch will eventually crash due to being unable to properly forward traffic. The hosts that share the same MAC addresses will be completely unable to communicate with any other devices. The hosts will still send and receive traffic, but traffic may not always reach the correct destination. The hosts will generate new MAC addresses until the conflict is resolved.

The hosts will still send and receive traffic, but traffic may not always reach the correct destination.

How do routers create a broadcast domain boundary? They listen to and direct broadcast traffic. They only forward broadcasts that are intended for multiple subnets. They forward broadcasts only to necessary segments. They do not forward broadcast traffic.

They do not forward broadcast traffic.

A port is a number assigned to a process, such as an application or a service, that can receive data. A socket consists of both a host's IP address and a process's TCP or UDP port, with a colon separating the two values. False True

True

At the root level of the DNS hierarchical structure, 13 clusters of root servers hold information used to locate TLD servers. True False

True


Ensembles d'études connexes

Practice Questions for Epithelium Tissues

View Set

Lesson 11: Spread Spectrum Technology

View Set

the three types of cartilage and their location

View Set

Public Speaking Resume Questions

View Set

AP Computer Science A Unit 7 Progress Check: MCQ

View Set