Network+ chapter 3 review
Which of the following IPv4 and IPv6 addresses are correctly portrayed using CIDR notation? [Choose all that apply]. 192.168.2.0/34 192.168.2.0/24 2001:db8::/132 2001:db8::/32 2001:db8::\32 192.168.2.0\24 Correct
192.168.2.0/24 2001:db8::/32
You are a network administrator for an organization. You are asked to create a shared folder on a Microsoft Windows system so that other users on the same network are able to access its contents. To be able to meet this requirement, which protocol is likely to be used? FTP NetBIOS SMBP SMB
SMB
Which type of DNS record identifies an email server? PTR record MX record AAAA record CNAME record
mx record
Suppose you send data to the 11111111 11111111 11111111 11111111 IP address on an IPv4 network. To which device(s) are you transmitting? The one device that is configured with this IP address All devices on your local network No devices All devices on the Internet
all devices on local network
While troubleshooting a network connection problem for a coworker, you discover the computer is querying a nonexistent DNS server. What command-line utility can you use to assign the correct DNS server IP address?
nslookup
You issue a transmission from your workstation to the following socket on your LAN: 10.1.1.145:110. Assuming your network uses standard port designations, what Application layer protocol handles your transmission?
pop3
FTP sometimes uses a random port for data transfer, but an FTP server always, unless programmed otherwise, listens to the same port for session requests from clients. What port does an FTP server listen on?
port 21
Suppose you want to change the default port for RDP as a security precaution. What port does RDP use by default, and from what range of numbers should you select a private port number?
3389, 49152 to 65535
You want to display the cache entries for 192.168.1.101. Which parameter should you use with the arp command? -k -s -a -d -p
-p
You suspect that the Webserver, which is located on your network and hosts multiple Internet facing Websites. The Webserver runs on Windows Server 2008. After receiving complaints from the users of Webserver occasionally being unavailable, you investigate and find that it is getting flooded with many ping requests. What should you do to immediately handle this situation? Perform a windows Update on the Webserver Block all incoming ICMP requests Install an antivirus on the Webserver and immediately perform a signature update Update the Windows operating system to 2012 or later
Block all incoming ICMP requests
You are planning to implement dual stack of IPv4 and IPv6 in your network. Currently, your network runs of servers, routers, and switches that have not been upgraded for several years. You are still running the Windows Server 2003. When implementing dual stack, which of the following will be your primary concerns? Keeping the hardware and software costs under control Ensuring that the hardware and software support the implementation Ensuring the same service-levels for the dual stack Ensuring that Internet Service Providers (ISPs) work with IPv6
Ensuring that Internet Service Providers (ISPs) work with IPv6
Which of the following describes the configuring of MAC reservation in a DHCP server? Manually configure the IP parameters of the host Dynamically allocate the MAC address to a range of desired IP addresses in the DHCP server Exclude the MAC address of the host in question from DHCP allocation Manually allocate the MAC address to a desired IP address in the DHCP server
Manually allocate the MAC address to a desired IP address in the DHCP server
DNS clients can use this zone to obtain information such as IP address that correspond to DNS domain names or services. What type of DNS zone is this? A NS AAA SOA
NS/SOA
What method of IP network configuration would you use for devices such as servers and printers so that all users on a network will always be able to reach these resources using the same network address? Dynamic IP address allocation SLAAC DNS DHCPv6 Static IP address allocation
Static IP address allocation
Your network firewall currently allows only HTTP traffic to pass through. You need to allow FTP traffic to pass through the firewall. Which of the following should be allowed?[Choose all that apply]. UDP port 21 TCP port 20 TCP port 21 UDP port 20
TCP port 20 TCP port 21
Which part of a MAC address is unique to each manufacturer? The physical address The device identifier The OUI The network identifier
The OUI
When running a scan on your computer, you find that a session has been established with a host at the address 208.85.40.44:80. Which Application layer protocol is in use for this session? What command-line utility might you use to determine which computer is the host?
http, nslookup
You have just set up a new wireless network at your house, and you want to determine whether your Linux laptop has connected to it and obtained a valid IP address. What command will give you the information you need?
ifconfig
Which computers are the highest authorities in the Domain Name System hierarchy? Primary DNS servers Authoritative name servers Top-level domain servers Root servers
root servers
You have been asked to host a new e-commerce Website. Your manager has asked you to configure the Website with a certificate. After hosting the Website with the certificate, which security protocol have you use? SSL/TLS SSH VMC/VMS RDP
ssl/tls
You are a network administrator and you need to access the secure command line interface access of an edge router on your network. The router uses cryptography for remote authentication. Which protocol is the router configured with for this purpose? Telnet HTTPS RDP SSH
SSH
f you are connected to a network that uses DHCP, and you need to terminate your Windows workstation's DHCP lease, which command would you use? ipconfig /release ifconfig /renew ipconfig /renew ifconfig /release
ipconfig/ release
What is the range of addresses that might be assigned by APIPA?
169.254.0.1 through 169.254.255.254
You have configured a DHCP pool to allocate the IP addresses to the system for 3 days. What have you defined? Lease time DHCP Timer IP Expiry Timer DHCP Hold Timer
Lease time
Which of these commands is available only in Linux? ipconfig nslookup dig ping
dig
You have decided to use SNAT and PAT on your small office network. At minimum, how many IP addresses must you obtain from your ISP for all five clients in your office to be able to access servers on the Internet?
1 ip address
How many bits does an IPv6 address contain?
128 bits
Which of the following format can be considered a valid IPv6 address? 2001:0db8:0000:0003:0000:jk00:0042:8329 192.168.45.72 2001:0db8:0000:ff00:0042:8329 2001:0db8:0000:0003:0000:ff00:0042:8329
2001:0db8:0000:0003:0000:ff00:0042:8329
When your computer first joins an IPv6 network, what is the prefix of the IPv6 address the computer first configures for itself? 2001::/3 FE80::/10 FF00::/8 2001::/64
FE80::/10
What type of device does a computer turn to first when attempting to make contact with a host with a known IP address on another network? Root server Default gateway DHCP server DNS server
default gateway
You are the network administrator for a small organization of 100 users. Users till now were freely browsing the Internet. You want to put a provision in place where you can monitor their visits to the different Websites and block all unwanted Websites. Which of the following should you install and configure? IDS server Proxy server Web server Firewall
proxy server
You have just brought online a new secondary DNS server and notice your network-monitoring software reports a significant increase in network traffic. Which two hosts on your network are likely to be causing the increased traffic and why? The root and primary DNS servers, because the primary server is requesting zone transfers from the root server The web server and primary DNS server, because the web server is requesting zone transfers from the primary DNS server The caching and primary DNS servers, because the caching server is requesting zone transfers from the primary server The secondary and primary DNS servers, because the secondary server is requesting zone transfers from the primary server
The secondary and primary DNS servers, because the secondary server is requesting zone transfers from the primary server
What is the first thing you should check if you discover that domain names are not resolving into IP addresses on a PC or workstation? Check connectivity to the default gateway Check connectivity to the device loopback address Check connectivity to the default DNS server Check connectivity to the Webserver
Check connectivity to the default DNS server
If you use the ping command to send an echo request from one host to the other, then which of the following protocols have you used? SMTP ICMP SNMP SSH
ICMP
A network engineer is configuring a network to be able to relay IPv6 packets. The network only supports IPv4 and does not have dual-stack support. Which of the following can be used to successfully relay IPv6 packets over this network? IPv6 tunneling OSPFv3 Dual-stack Lite GREv3 tunneling
IPV6 TUNNELING
What decimal number corresponds to the binary number 11111111? 255 11,111,111 127 256
255
You need to connect to a colleague's system using the default Microsoft Windows remote desktop application to troubleshoot an application issue. Which port should be opened on the colleague's system firewall to ensure successful remote connection? 89 3389 22 33 389
3389
Users on a network are complaining that they cannot connect to a Webserver by its name in the Web browser. You can access the Webserver using its IP address. You discover an access list is blocking several UDP ports. Which port should you remove from the access list to allow users to connect to the Webserver? 443 530 22 53
53
A computer is configured with a subnet mask of 255.255.255.192. How many IP addresses, including the network and broadcast addresses, are available in the subnet the computer is in? 64 32 128 16
64
You need to block all unsecured web traffic using its default port from a specific network segment of the enterprise network. Which port would you block to achieve this? 81 8080 45 88 80
80
Refer to the exhibit. Which of the pictured software is a port scanner?
A port scanner is an application designed to probe a server or host for open transport layer ports. This is often used by administrators to verify security policies of their networks and by attackers to identify network services running on a host and exploit vulnerabilities. A port scanner will indicate open ports on specific servers (IP addresses) as well as those that are blocked.
Refer to the exhibit. Which of the pictured software is a protocol analyzer?
A protocol analyzer is a software tool used to capture and analyze signals and data traffic over a communication channel. Such a channel varies from a local computer bus to a satellite link, that provides a means of communication using a standard communication protocol (networked or point-to-point). Ethernet and IP protocol analyzers usually organize data based on the OSI or the TCP/IP model.
The network administrator has configured the enterprise firewall to permit port 21 to allow FTP transfers to occur from outside the enterprise. Users can connect to the FTP server that is located on the enterprise network. However, file transfers fails. Why could this be? Port 20 along with port 21 must also be permitted Open the inbound port 25 along with port 21 Port 69 must also be permitted Both inbound and outbound port 21 and 22 must be permitted
Port 20 along with port 21 must also be permitted
Your organization has multiple remote offices. The users at the remote office often remotely connect to the application servers. Which of the protocols should you enforce for encrypted communication?[Choose all that apply]. SSH HTTP Interface Telnet RDP
SSH RDP
You are the network manager for a computer training center that allows students to bring their own laptops to class for learning and taking notes. Students need access to the Internet, so you have configured your network's DHCP server to issue IP addresses automatically. Which DHCP option should you modify to make sure you are not wasting addresses used by students who have left for the day?
dhcp lease