Network+ Ch3 quiz

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

A hexadecimal number is a number written in the base 16 number system. A. True b. False

A

At the root level of the DNS hierarchical structure, 13 clusters of root servers hold information used to locate TLD servers. A. True b. False

A

Each organization that provides host services on the public Internet is responsible for providing and maintaining DNS authoritative servers for public access. A. True b. False

A

UDP port 123 is utilized by the Network Time Protocol service A. True b. False

A

When using IPv6, two or more nodes on the same link are said to be neighbors. A. True b. False

A

An IPv6 address consists of 128 bits that are written as 10 blocks of hexadecimal numbers separated by colons. A. True b. False

B

DNS follows a centralized database model, allowing for easier management of DNS records. A. True b. False

B

ICANN is responsible for restrictions on use of the .com, .org, and .net TLDs A. True b. False

B

If a host's IPv6 address contains the network adapter's MAC address within the last 64 bits of the IPv6 address, what standard is being used? a. EU1-64 b. IEEE 802.36 c. UUID-128 d. MACin6

B

On a Linux-based system, what command can be used to display TCP/IP information associated with every interface on the system? a. ipconfig /all b. ifconfig -a c. ip show d. if status

B

The 1024 - 65535 range of ports is also known as the "well-known" range. A. True b. False

B

The FTP protocol utilizes UDP, while TFTP uses TCP for data transmission. A. True b. False

B

What command can be used to check a domain computer's time source from a Command Prompt window? a. date /source b.w32tm/query /source c. ntpd show source d. time --source

B

What statement regarding the Server Message Block protocol is accurate? a. It is a simple protocol used to synchronize block messages written to iSCSI drives on a network. b. It is used by Windows and UNIX-based operating systems to share files. c. It is a signaling protocol used to make a connection between hosts prior to data transfer. d. It is a protocol used for accessing network-based LDAP directories.

B

Your supervisor has asked you to configure a new prototype network with a dual stack configuration. What does this mean? a. Two different IPv4 address spaces will exist on the same network segment. b. Both IPv4 and IPv6 protocols will be used on the network. c. The router serving the network will have a redundant spare. d. The network will exist on two separate segments, separated by a proxy.

B

Encrypted control of remote computers using the RDP protocol is accomplished using what port number? a. TCP 22 b. UDP 161 C. TCP 3389 d. UDP 10000

C

What utility is used to verify that TCP/IP installed, bound to the NIC, configured correctly, and communicating with the network? a. traceroute b. ifconfig C. ping d. route

C

You are troubleshooting a network issue on a client computer and discover that the network card has an IP address of 169.254.196.200. What does this mean? a. The computer has been assigned a routed public IP address. b. The network card has been erroneously assigned a loopback address. c. The computer is configured to use DHCP, but was unable to lease an address. d. The network card is set up for multicast communication.

C

What is by far the most popular DNS server software available? a.Microsoft DNS b. Dnsmasq c. Oracle Resolver d. BIND

D

When using DHCP for IPv6 (i.e. DHCPv6), what port do clients receive responses on? a. port 67 b. port 68 c. port 546 d. port 547

D


संबंधित स्टडी सेट्स

Child, Older Adult, & Intimate Partner Violence

View Set

Organizational Behavior Assignment 1

View Set

Abeka 4th Grade, Science Quiz 15, (pp. 131 - 136)

View Set

COMM175 Chapter 1 - Communication Process

View Set

Hi In Other Languages (Hi Not Hello)

View Set

41: Imaging of the Elbow (CRMTOL)

View Set

Insurance Life and Health Exam FX

View Set