Quiz 2

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

Which of the following is not a task handled by a router? a. A router can interpret Layer 3 and often Layer 4 addressing. b. A router forwards broadcasts over the network. c. A router can reroute traffic if the path of first choice is down but a second path is available. d. A router can connect dissimilar networks.

b. A router forwards broadcasts over the network.

What statement regarding the Server Message Block protocol is accurate? a. It is a simple protocol used to synchronize block messages written to iSCSI drives on a network. b. It is used by Windows and UNIX-based operating systems to share files. c. It is a signaling protocol used to make a connection between hosts prior to data transfer. d. It is a protocol used for accessing network-based LDAP directories.

b. It is used by Windows and UNIX-based operating systems to share files.

Which statement does NOT accurately describe characteristics of the OSPF protocol? a. OSPF has no hop limits on a transmission path. b. OSPF requires very little CPU or memory resources. c. OSPF maintains a database of other routers' links. d. OSPF provides low network overhead.

b. OSPF requires very little CPU or memory resources.

What part of a MAC address serves as the extension identifier, or device ID? a. The first 24 bits of the MAC address. b. The last 24 bits of the MAC address. c. The first 12 bits of the MAC address. d. The last 12 bits of the MAC address.

b. The last 24 bits of the MAC address.

What IPv6 field is similar to the TTL field in IPv4 packets? a. flow label b. hop limit c. distance vector d. next header

b. hop limit

On a Linux-based system, what command can be used to display TCP/IP information associated with every interface on the system? a. ipconfig /all b. ifconfig -a c. if status d. ip show

b. ifconfig -a

What command will list only current connections, including IP addresses and port numbers? a. portstat b. netstat -n c. netstat -s d. show ip stats

b. netstat -n

Which command will produce statistics about each message transmitted by a host, separated according to protocol type? a. netstat -an b. netstat -s c. ipstat -a d. ipconfig -s

b. netstat -s

What tcpdump command can be used to filter out all traffic except SSH traffic? a. tcpdump -f +ssh b. tcpdump port 22 c. tcpdump -p 22 d. tcpdump only ssh

b. tcpdump port 22

A hexadecimal number is a number written in the base 16 number system. True False

True

At the root level of the DNS hierarchical structure, 13 clusters of root servers hold information used to locate TLD servers. True False

True

Each organization that provides host services on the public Internet is responsible for providing and maintaining DNS authoritative servers for public access. True False

True

IP is an unreliable, connectionless protocol, as it does not establish a session to send its packets. True False

True

In general, a Layer 3 or Layer 4 switch is still optimized for fast Layer 2 data handling. True False

True

The Border Gateway Protocol is considered to be a hybrid routing protocol. True False

True

The cost of upgrading infrastructure has been a major factor in the slow adoption of IPv6. True False

True

UDP port 123 is utilized by the Network Time Protocol service. True False

True

When using IPv6, two or more nodes on the same link are said to be neighbors. True False

True

Which traceroute command will perform a trace using ICMP echo requests instead of UDP datagrams to the host srv1.mycompany.com? a. traceroute -i srv1.mycompany.com b. traceroute -I srv1.mycompany.com c. traceroute -o ICMP srv1.mycompany.com d. traceroute -w srv1.mycompany.com

b. traceroute -I srv1.mycompany.com

What text editor can be used on Linux to view and edit the contents of a configuration file? a. Notepad b. vim c. edit d. Microsoft Word

b. vim

What command can be used to check a domain computer's time source from a Command Prompt window? a. ntpd show source b. w32tm /query /source c. time --source d. date /source

b. w32tm /query /source

When using the Routing Information Protocol (RIP), what is the maximum number of hops a message can take between its source and its destination before the destination is considered unreachable? a. 8 b. 20 c. 15 d. 32

c. 15

In a DNS zone, what type of record holds the name-to-address mapping for IPv6 addresses? a. TXT record b. A record c. AAAA record d. PTR record

c. AAAA record

Which routing protocol started as a Cisco proprietary protocol and combines some of the features of a link-state protocol with that of distance-vector protocols? a. BGP b. OSPF c. EIGRP d. IS-IS

c. EIGRP

You have been tasked with the replacement of OSPF with EIGRP throughout your organization, which consists of a mixture of Cisco routers and routers from other vendors. What statement is accurate? a. EIGRP will increase CPU utilization on core routers. b. Convergence time will be increased with EIGRP. c. EIGRP may not be available on non-Cisco routers. d. Increased traffic will result from the switch to EIGRP.

c. EIGRP may not be available on non-Cisco routers.

What is NOT one of the three characteristics of TCP in its role as a reliable delivery protocol? a. Sequencing and checksums b. Flow Control c. Framing d. Connection-oriented Protocol

c. Framing

What is the purpose of the checksum TCP field? a. It confirms receipt of data via a return message to the sender. b. It specifies special options, such as the maximum segment size a network can handle. c. It allows the receiving node to determine whether the TCP segment became corrupted during transmission. d. It identifies the data segment's position in the stream of data segments being sent.

c. It allows the receiving node to determine whether the TCP segment became corrupted during transmission.

What is the ARPA domain suffix utilized for? a. It is a specialized government restricted TLD. b. It is a private TLD used for synchronization of zones between servers. c. It is used for reverse DNS queries, and holds PTR records. d. It is used to announce records for other TLDs such as .com and .net.

c. It is used for reverse DNS queries, and holds PTR records.

The IP connectionless protocol relies on what other protocol to guarantee delivery of data? a. UDP b. ARP c. TCP d. ICMP

c. TCP

In IPv6, what field is used to indicate what sequence of packets from one source to one or multiple destinations a packet belongs to? a. traffic exchange b. traffic class c. flow label d. group ID

c. flow label

What type of IPv6 address is fe80::8cf1:2c42:ffde:da1c? a. multicast address b. anycast address c. link local address d. global address

c. link local address

Routing protocols that enable routers to communicate beyond neighboring routers, allowing each router to independently map the network, are known as which type of protocols? a. distance vector protocols b. border gateway protocols c. link-state protocols d. interior gateway protocols

c. link-state protocols

What utility is used to verify that TCP/IP installed, bound to the NIC, configured correctly, and communicating with the network? a. traceroute b. ifconfig c. ping d. route

c. ping

At the Transport layer of the OSI, what is used to find and communicate with a particular application running on a host? a. domain names b. IP addresses c. port numbers d. MAC addresses

c. port numbers

In a TCP segment, what field indicates how many bytes the sender can issue to a receiver before acknowledgment is received? a. PSH flag b. urgent pointer c. sliding-window d. URG flag

c. sliding-window

In the classful addressing scheme, what range of network addresses is considered a Class B? a. 1.x.y.z to 126.x.y.z b. 224.x.y.z to 255.x.y.z c. 192.0.0.x to 223.255.255.x d. 128.0.x.y to 191.255.x.y

d. 128.0.x.y to 191.255.x.y

By default, what is the MTU size on a typical Ethernet network? a. 1492 bytes b. 1518 bytes c. 1522 bytes d. 1500 bytes

d. 1500 bytes

Originally codified by ISO, what does the "intermediate system" in IS-IS (Intermediate System to Intermediate System) stand for? a. An IS-IS capable network router. b. The administrative boundaries of an organization. c. The autonomous systems used by an organization. d. An entire network consisting of various network devices.

a. An IS-IS capable network router.

What does the MX record do in a forward DNS zone? a. It identifies the authoritative name server for a domain. b. It identifies the hostname and port of a computer that hosts a specific network service, such as FTP or SIP. c. It holds the alternative names for a host. d. It identifies the e-mail server to be used for e-mail traffic for the domain.

d. It identifies the e-mail server to be used for e-mail traffic for the domain.

Which statement regarding the Border Gateway Protocol (BGP) is accurate? a. BGP utilizes TCP for communicating updates. b. BGP is a more advanced version of OSPF. c. BGP is limited to a single autonomous system. d. BGP is exclusively a distance-vector protocol.

a. BGP utilizes TCP for communicating updates.

What is by far the most popular DNS server software available? a. BIND b. Microsoft DNS c. Dnsmasq d. Oracle Resolver

a. BIND

If a host's IPv6 address contains the network adapter's MAC address within the last 64 bits of the IPv6 address, what standard is being used? a. EUI-64 b. IEEE 802.36 c. MACin6 d. UUID-128

a. EUI-64

What happens when a router receives a packet with a TTL of 0? a. The router drops the packet and sends an ICMP TTL expired message back to the host. b. The router attempts to forward the traffic on a local network. c. The router resets the TTL to 128. d. The router marks the packet as corrupted and forwards it to the next hop.

a. The router drops the packet and sends an ICMP TTL expired message back to the host.

What command can you utilize to display TCP/IP configuration information for each network adapter installed? a. ipconfig /all b. ipconfig /full c. ipconfig /show d. ipconfig /list

a. ipconfig /all

A Windows computer on your network is having issues resolving queries for a specific domain, but not other domains. Other computers on the same network resolve the name just fine. What command can you issue that might fix the problem? a. ipconfig /flushdns b. ipconfig /release c. ipconfig /renew d. ipconfig /refresh

a. ipconfig /flushdns

What routing metric affects a path's potential performance due to delay? a. latency b. load c. MTU d. theoretical bandwidth

a. latency

What utility is the equivalent to the pathping command on a Linux system? a. mtr b. hping c. tracepath d. traceroute

a. mtr

With a FQDN of ftp1.dallas.mycompany.com, what part is the domain name? a. mycompany.com b. ftp1 c. ftp1.dallas d. ftp1.dallas.mycompany.

a. mycompany.com

Which of the following IP addresses would be a loopback IP address? a. 224.0.0.1 b. 127.0.0.1 c. 169.254.0.1 d. 192.168.1.1

b. 127.0.0.1

In the DNS hierarchy, where is information about how to find the top-level domain servers held? a. On DNS caching-only servers. b. In the organization's forward lookup zone. c. In the hosts file on the local machine. d. On the DNS root servers.

d. On the DNS root servers.

Which of the following protocols is used as a signaling protocol for the initial connection between hosts, but does not participate in data transfer during the session? a. TFTP b. NTP c. LDAP d. SIP

d. SIP

In the event of a duplicate MAC address shared by two hosts on a switched network, what statement is accurate? a. The hosts that share the same MAC addresses will be completely unable to communicate with any other devices. b. The hosts will generate new MAC addresses until the conflict is resolved. c. The network switch will eventually crash due to being unable to properly forward traffic. d. The hosts will still send and receive traffic, but traffic may not always reach the correct destination.

d. The hosts will still send and receive traffic, but traffic may not always reach the correct destination.

You are troubleshooting a DNS issue on a Linux system, and need to test the resolution of your domain mycompany.com MX record using Google's DNS server with the IP address of 8.8.8.8. What dig command will accomplish this? a. dig --server 8.8.8.8 --type=mx mycompany.com b. dig -s 8.8.8.8 -t mx mycompany.com c. dig query 8.8.8.8 domain mycompany.com type mx d. dig @8.8.8.8 mycompany.com MX

d. dig @8.8.8.8 mycompany.com MX

When using DHCP for IPv6 (i.e. DHCPv6), what port do clients receive responses on? a. port 546 b. port 67 c. port 68 d. port 547

d. port 547

You are connected to your network's Cisco router, and need to verify the route table. What command should you enter? a. route print b. show route-table c. route -a d. show ip route

d. show ip route

An IPv6 address consists of 128 bits that are written as 10 blocks of hexadecimal numbers separated by colons. True False

False

DNS follows a centralized database model, allowing for easier management of DNS records. True False

False

ICANN is responsible for restrictions on use of the .com, .org, and .net TLDs. True False

False

IPv4 and IPv6 use the same packet format. True False

False

Routing Information Protocol (RIP) is an interior gateway protocol that uses a link-state algorithm. True False

False

TCP uses a four-step process called a four-way handshake to establish a TCP connection. True False

False

The 1024 - 65535 range of ports is also known as the "well-known" range. True False

False

The CTRL + S key combination can be used to stop an actively running command. True False

False

The FTP protocol utilizes UDP, while TFTP uses TCP for data transmission. True False

False

The pathping utility sends 10 pings per hop by default. True False

False

UDP provides error checking, but not sequencing. True False

False

Which of the following is NOT a range of IP addresses recommended for use in private networks? a. 127.0.0.0 through 127.255.255.255 b. 192.168.0.0 through 192.168.255.255 c. 10.0.0.0 through 10.255.255.255 d. 172.16.0.0 through 172.31.255.255

a. 127.0.0.0 through 127.255.255.255

If the VLAN tag is present in an Ethernet frame, what is the maximum frame size? a. 1522 bytes b. 1518 bytes c. 1500 bytes d. 1492 bytes

a. 1522 bytes

Which of the following IPv6 addresses represents a global unicast address? a. 2000::/3 b. FC00::/7 c. FD00::/8 d. FE80::10

a. 2000::/3

What is routing protocol convergence time defined as? a. It is the time it takes for the protocol to recognize the best path in the event of a network change. b. It is the amount of time it takes after initial configuration of the protocol for all routes to become known. c. It is the time it takes for the protocol to recognize that a change has occurred. d. It is the amount of time involved in configuration of the routing protocol.

a. It is the time it takes for the protocol to recognize the best path in the event of a network change.

Encrypted control of remote computers using the RDP protocol is accomplished using what port number? a. TCP 3389 b. UDP 161 c. UDP 10000 d. TCP 22

a. TCP 3389

You are setting up a DNS zone and have been asked to create SPF and DKIM records. What type of DNS record will hold this information? a. TXT record b. CNAME record c. PTR record d. SRV record

a. TXT record

You have been tasked with maintaining a network that is jumbo frame enabled. What does this mean? a. The MTU for the network can be as high as 9198 bytes. b. Fragmented frames will be consolidated into whole frames before being sent. c. The network is not based on the Ethernet standard. d. The MTU for the network is set at 65,535 bytes.

a. The MTU for the network can be as high as 9198 bytes.

You are troubleshooting a network issue on a client computer and discover that the network card has an IP address of 169.254.196.200. What does this mean? a. The computer is configured to use DHCP, but was unable to lease an address. b. The network card has been erroneously assigned a loopback address. c. The network card is set up for multicast communication. d. The computer has been assigned a routed public IP address.

a. The computer is configured to use DHCP, but was unable to lease an address.

Your supervisor has asked you to configure a new prototype network with a dual stack configuration. What does this mean? a. The router serving the network will have a redundant spare. b. Both IPv4 and IPv6 protocols will be used on the network. c. The network will exist on two separate segments, separated by a proxy. d. Two different IPv4 address spaces will exist on the same network segment.

b. Both IPv4 and IPv6 protocols will be used on the network.

What statement regarding the differences between the Windows tracert utility and the Linux/UNIX/macOS traceroute utility is accurate? a. The Windows tracert utility does not place limits on the TTL of repeated trial messages. b. By default, the tracert utility uses ICMP echo requests, while traceroute uses UDP datagrams or TCP SYN messages. c. The tracert utility expects an ICMP port unreachable error message as the final reply to a trace. d. Only tracert can send UDP messages for tracing a path.

b. By default, the tracert utility uses ICMP echo requests, while traceroute uses UDP datagrams or TCP SYN messages.

What field in an IPv4 packet informs routers the level of precedence they should apply when processing an incoming packet? a. Time to Live (TTL) b. Differentiated Services (DiffServ) c. Padding d. Internet header length (IHL)

b. Differentiated Services (DiffServ)

What occurs when a collision happens on a network? a. Each node on the network stops transmitting, until manually told to reconnect and transmit. b. Each node on the network waits a random amount of time and then resends the transmission. c. The collision goes undetected, and data transmission continues. d. The collision will create an error in the network switch, but otherwise, no issues will occur as a result.

b. Each node on the network waits a random amount of time and then resends the transmission.

How can you determine the manufacturer of a NIC card based on the MAC address? a. The first 12 bits and last 12 bits combined are known as the Organizationally Unique Identifier. b. The last 24 bits, known as the Organizationally Unique Identifier, identify the manufacturer. c. The first 24 bits, known as the Organizationally Unique Identifier, identify the manufacturer. d. The middle 24 bits, known as the Organization Universal Identifier, identify the manufacturer.

c. The first 24 bits, known as the Organizationally Unique Identifier, identify the manufacturer

How do routers create a broadcast domain boundary? a. They only forward broadcasts that are intended for multiple subnets. b. They listen to and direct broadcast traffic. c. They do not forward broadcast traffic. d. They forward broadcasts only to necessary segments.

c. They do not forward broadcast traffic.


Ensembles d'études connexes

MRI Registry Review-Data Acquisition and Processing

View Set

Operations Test 3 Practice Problems

View Set

Chapter 4: Contracts and Agency Law - Sample Questions

View Set

Course 4: Process Data from Dirty to Clean

View Set