CET 215- Lesson 13 Network protocols (Quiz)
Which of the following is a non-routable address?
0.0.0.0
A user asks a technician to set up emails on his mobile device. The user also wants the server to retain a copy of the email. Which of the following ports should be the best for the technician to use for this purpose?
143
Which IPv4 address range is reserved for APIPA?
169.254.0.0/16
Which of the following is a valid IP address assigned through APIPA?
169.254.1.221
Which of the following ports are used for secure sessions? Each correct answer represents a complete solution. Choose all that apply.
22 443
A technician wants to block remote logins to a server. Which of the following ports should be blocked?
23
A junior network technician is setting up a new email server on the company network. Which of the following default ports should the technician ensure is open on the firewall so the new email server can relay email?
25
What is the subnet mask of the address 144.201.5.32?
255.255.0.0
What is the default subnet mask for IP address 196.132.74.10?
255.255.255.0
Which of the following is the maximum number of IP addresses that can be assigned to hosts on a local subnet that uses the 255.255.255.224 subnet mask?
30
A technician would like to connect to a computer using remote desktop. Which of the following ports does remote desktop use by default?
3389
James, a technician, is tasked to configure a SOHO router to ensure that the network computer can only use secured protocols on the Internet. Which of the following ports will be open?
443
Which of the following ports is used for a secure browser connection to do online shopping?
443
Which of the following ports is used by the Server Message Block (SMB) protocol?
445
John, a network administrator, is setting up a new server for the company's network. Which port and service should he open to allow the newly installed server to assign IP addresses for the devices connecting with the network? Each correct answer represents a part of the solution. Choose two.
67 DHCP
Which of the following servers examines the credentials of anyone trying to access the network, and also determines if network access is granted?
Authentication server
Maria, a system engineer, is required to implement a solution to handle data-at-rest encryption requirements for a database. Which of the following would be the best to satisfy these requirements?
Create a virtual encrypted disk, add it to the virtual server, and have the database write to it.
Maria, a network administrator, diagnoses that port 68 is not open. Which of the following protocols is being blocked?
DHCP
Which of the following servers manages a record of all the IP addresses allocated to network nodes?
DHCP
You are working as a network administrator in an organization. Few employees inform you that they are receiving duplicate IP address notifications on their workstations and they are unable to browse the Internet. Which of the following server types should you use to resolve the problem?
DHCP
A server administrator is setting up a new server for the company's network. Which port and service should be open to allow the newly installed server to assign IP addresses for the devices connecting with the network? Each correct answer represents a part of the solution. Choose two.
DHCP 67
Ann, a technician, wants to automatically assign IP addresses to client stations logging on to a TCP/IP network so that he need not manually assign IP addresses. Which of the following server roles should he use?
DHCP server
Jennifer, a network administrator, wants to use a server that automatically assigns IP addresses to client stations logging on to a TCP/IP network. Which of the following servers will she use?
DHCP server
Joe, a user, contacts the network administrator to request a list of all static IP addresses in the building. Which of the following server roles would the network administrator most likely examine to find that information?
DHCP server
A technician has been informed that multiple users are receiving duplicate IP address warnings on their workstations, and they are unable to browse the Internet. Which of the following server types should the technician log in to in order to resolve the problem?
DHCP serverq
Which is an Internet service that translates domain names into IP addresses?
DNS
Which type of server provides the ability to resolve UNC to appropriate IP addresses?
DNS
Maria, a network administrator, wants to use a server that can provide name resolution services for users accessing Internet resources. Which of the following servers offers this service?
DNS server
James, a technician, wants to transfer files between two systems. Which of the following protocols will help him?Each correct answer represents a complete solution. Choose two.
FTP SCP
Maria, an employee, is on a business trip. She connects her laptop to a hotel's wireless network to send emails to customers. Next day she notices that emails have been sent from her account without her consent. Which protocol is used to compromise her email password utilizing a network sniffer?
HTTP
Which of the following protocols is considered stateless and uses TCP when communicating between a server and a client?
HTTP
While configuring a firewall, a system engineer accidentally blocked port 443. Which of the following will be unavailable?
HTTPS
Which protocol is used to retrieve email from mail servers?
IMAP
Which of the following protocols and port combinations is used for retrieving emails from a mail server?
IMAP4, 143
An IT vendor gives a technician the following address on a support call: 192.168.15.2/32. Which of the following best describes the address provided by the vendor?
IPv4 address in CIDR format
An incorrectly configured firewall on a company's network results in an inability to access the company's server using the FTP protocol. Which of the following is the most likely cause?
Incoming traffic on port 21 is blocked.
James, a security analyst, is hardening an authentication server. One of the primary requirements is to ensure there is mutual authentication and delegation. Given these requirements, which of the following technologies should he recommend and configure?
Kerberos
Which of the following provides a single sign-on solution for users and also provides protection for login credentials?
Kerberos
Which protocol is designed to provide strong authentication for client/server applications by using secret-key cryptography?
Kerberos
Which of the following is a directory service protocol that defines how a client can access information and perform operations?
LDAP
Which of the following stores information about authorized users and their privileges as well as other organizational information?
LDAP
Which of the following does IPv6 use to autoconfigure nodes?
NDP
A user reports the inability to access a company server using the FTP protocol. A technician finds other ports to the server seem to work normally. The technician has determined the problem is an incorrectly configured software firewall on the user's machine. Which of the following is most likely the cause?
Outgoing connections on port 21 are blocked.
Which of the following TCP ports are used by the File Transfer Protocol (FTP) for data transfer and to control commands? Each correct answer represents a complete solution. Choose two.
Port 20 Port 21
Jennifer, a network administrator, wants to block external SSH connections from reaching internal machines. Which of the following ports should she block on the firewall?
Port 22
What type of server is responsible for blocking the sender's identity while passing the information to the destination to prevent security-related issues?
Proxy
Which of the following server roles isolates internal clients from the servers by downloading and storing files on behalf of the clients?
Proxy server
Which network card property allows NICs to prioritize and manage data traffic to fully support the networking needs for all connected devices?
QoS
Which of the following enables a server to provide standardized and centralized authentication for remote users?
RADIUS
Which of the following allows a user to remotely log in to a networked device and uses port 3389 as the default port?
RDP
Which of the following protocols is used for file sharing between MAC OS and Windows OS workstations on a LAN?
SMB
Which resource sharing protocol allows folders or hard drives to be shared over a network?
SMB
Which protocol is used to remotely manage and monitor network devices like routers and switches?
SNMP
A technician wants to remotely and securely access the desktop of a Linux workstation. The desktop is running remote control software without encryption. Which of the following should the technician use to secure the connection?
SSH
Maria, a technician, needs to check the running configuration of a remote router securely. For this, she needs an application that utilizes which of the following protocols?
SSH
Which of the following is a program that enables a user or an application to log on to another device over a network, execute commands, and manage files?
SSH
Maria, a network administrator, gets a call regarding intermittent network outages across the country. Which of the following should be used to connect to the network so the administrator can troubleshoot this issue from home? Each correct answer represents a complete solution. Choose all that apply.
SSH VPN
Which of the following is a security protocol that combines digital certificates for authentication with public key data encryption?
SSL
James, a technician, needs to extend the organization's remote access functionality to be used by staff while travelling. He needs to maintain separate access control functionalities for internal, external, and VoIP services. Which of the following represents the best access technology for him to use?
TACACS+
Andrew, a network administrator, wants to enable users at one site to simulate a session on a remote host as if the terminal were directly attached. Which of the following protocols will he use?
Telnet
John, a technician, is trying to connect to another computer on the LAN remotely, but the connection fails. He opens the command prompt and types "telnet computername 3389" but still he is unable to connect to another computer. Which of the following is the most likely cause of this error, assuming that the OS firewall has been disabled?
The RDP connection has been configured to use a non-standard port.
A technician has installed an IPS appliance on the network. Which of the following is the purpose of that installation?
To check and stop unwanted activity
Andrew, a network administrator, wants to use network-based operating system administration tools to manage the network. Which of the following tools will he use? Each correct answer represents a complete solution. Choose two.
VNC RDP
Andrew, a technician, is tasked to provide outside access to a server within the company network so that sensitive documents can be worked on from home. Which of the following will help him to accomplish the task?
VPN
You want to connect to resources from an offsite location while ensuring the traffic is secured. Which of the following will you use to gain access to the secure network?
VPN
Which of the following addresses is equivalent to fe80:0000:0000:0000:c249:3765:00c0:9b22?
fe80::c249:3765:c0:9b22
A client's computer is not connecting to a website. Which of the following commands will allow the technician to view the route/number of hops between the host and remote systems?
tracert