Quiz 3 Notes

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

Telnet, SSH, and VNC are which type of software?

Terminal Emulation

Which of the following command can be used to display the local routing table for a Windows device?

route print The ipconfig command displays the IP configuration for a Windows device. The dig command is used in Linux to display DNS information, and the nslookup command is used to resolve IP addresses to DNS names. The route add command will add a route to the local routing table but will not display the local routing table.

Which of the following utilities uses ICMP echo requests to trace the path from one networked node to another, identifying all intermediate hops between the two nodes?

tracert

You are the network administrator for Jungle Technologies, and you have to create a data stream within an application that will mark a certain section of the data stream to be more urgent than the normal stream. In which of the following fields of TCP segment will you specify this information?

Urgent pointer

Frank has been appointed as a network engineer with an Internet service provider firm. His first assignment as an engineer is to set up a 1000BASE-T standard Fast Ethernet for Horizon Corporates. While doing so, the ISP has specifically requested him to concentrate on installing the necessary twisted-cable pairs as all the other specified standards will be looked after by the other members of the team, which has been allocated for this project. Analyze which of the following pairs of twisted cables Frank should use in this scenario.

Use a Category 5e cable for this scenario

You are working as a network engineer for an ISP. A ticket has been raised that there has been severe attenuation, which has decreased the transmission speed significantly. On inspection, you notice that the reason for this issue is that the transmissions are optimized for one type of cable but sent over a different type of cable. You are now required to send this analysis to the head office for further instructions. Under which of the following common fiber connection problems will you associate this issue?

Wavelength mismatch

You have been hired to fix an issue related to the booting up of a computer using a Linux operating system. Before fixing any error, you want to check the history of the previous warning messages that were generated by the system. Which of the following utilities will you use in this scenario?

Syslog

Which protocol's header would a Layer 4 device read and process? HTTP ARP TCP IP

TCP

dig

Suppose your office's only DNS server was down, and you wanted to view the DNS address record for your company's domain. Which of the following TCP/IP utilities would allow you to do this?

You are the DNS administrator and have been tasked to identify an email server in a DNS zone file. Which of the following resource records would you apply as a DNS administrator in this case?

MX record

Which permission needs to be assigned to a user to be able to connect to a VPN connection?

Network Access permissions To ensure a user can connect using a VPN connection, the user must be assigned the Network Access permissions in Active Directory. Assigning Network Administrator or Local Administrator permissions will not ensure that the user can access the VPN connection. VPN permissions do not exist.

While configuring a new VPN client, which Role service needs to be installed for the Remote Access role on a Windows server?

Direct Access and VPN (RAS) Routing and Web application Proxy is an additional service that can be added for extra configurations. .Net framework 4.5 is not needed for the installation.

What is the arp -a command used for on a Windows device?

Displays address resolution table for the device

How can you tell this is an APIPA address?

169.254.0.1 - 169.254.255.254

The University of Bethesda has requested your professional help in giving a masterclass on how to use Telnet ports for interacting with remote computers. Which of the following ports will you open to teach students how to establish an unencrypted connection with a remote computer?

23

AS (autonomous system)

A group of networks, often on the same domain, that are operated by the same organization.

Your computer has auto configured another IP address. What type of address did your computer resort to?

APIPA

Which permission allows a user access to a resource?

Authentication Authorization specifies what a user can access. Using a password or username only does not specify what the user can access.

By default, which of the following components of the composite metric are considered for Enhanced Interior Gateway Routing Protocol (EIGRP) ?

Bandwidth and delay

Your client has hired you to change the command-line tool from nslookup to dig since it provides more detailed domain information than nslookup. Which of the following commands will you use to perform a DNS lookup on a domain name?

dig google.com

When a router can't determine a path to a message's destination, where does it send the message? Gateway of last resort Default gateway Administrative distance Routing table

gateway of last resort

What is the combination of a public key and a private key known as?

key pair

It allows users to review and delete mail without downloading it from the mail server. AND It enables multiple users to easily share a central mailbox.

Which two of the following are benefits of using IMAP4 relative to POP3?

Which command must be used on a Linux device to determine the IP configuration of the eth0 network interface? [Choose all that apply]

ifconfig eth0 ip address show eth0

ARP (Address Resolution Protocol)

A core protocol in the TCP/IP suite that belongs in the Data Link layer of the OSI model. ARP works in conjunction with IPv4 to discover the MAC address of a node on the local network and to maintain a database that maps local IP addresses to MAC addresses.

1

You have decided to use PAT on your small office network. At minimum, how many IP addresses must you obtain from your ISP in order for all five clients in your office to be able to access servers on the Internet?

Which parameter can be used with the ping command to send a constant stream of packets when using a Windows device?

-t

What is the Internet standard MTU? 65,535 bytes 1,522 bytes 1,500 bytes 9,198 bytes

1500 bytes

Which protocol can be used to connect to and control Microsoft computers?

Both choices will work

If you have a small Routing Information Protocol (RIP) network of 10 hops, how will RIP prevent routing loops?

By implementing a limit on the number of hops allowed in a path

Your employer has sent you to establish a private IP address for the devices used in Infoglobal Ltd. with the help of a router. Your employer has instructed you to implement the address ranging from 172.16.0.0 to 172.31.255.255 as per IANA's RFC1918 document. Which class of classful addressing will you apply in this scenario?

Class B

255.255.248.0

Convert the following subnet mask into its dotted-decimal equivalent: 11111111 11111111 11111000 00000000.

While configuring a new VPN client, which Role service needs to be installed for the Remote Access role on a Windows server?

Direct Access and VPN (RAS)

You have been appointed as the network administrator of an ISP. Your first project requires you to develop a protocol that can transmit IP and other kinds of messages through a tunnel so that you can connect two VPN endpoints. Which of the following will you choose in this scenario?

GRE

In which of the following applications can a virtual IP address be used?

Gateway Redundancy Protocols NAT

Which permission needs to be assigned to a user to be able to connect to a VPN connection?

Network Access permissions

Which of the following protocols is used for encrypted control of remote Windows computers?

RDP

When executing the tracert 192.168.0.10 command, what can be determined from the output?

The route it will take to reach the destination IP address

When executing the tracert 192.168.0.10 command, what can be determined from the output?

The route it will take to reach the destination IP address Executing the tracert command with a specified IP address can be used to determine the route it will take to reach the specified IP address expressed in hops. It can not be used to determine a DNS name, MAC address or the default gateway.

HTTP and HTTPS are TCP-based protocols. Which of the following ports do they use?

80 and 443

ARP table

A database of records that maps MAC addresses to IP addresses. The ARP table is stored on a computer's hard disk where it is used by the ARP utility to supply the MAC addresses of network nodes, given their IP addresses.

supernetting

A node on a network has an IP address of 140.133.28.72 and its subnet mask is 255.248.0.0. What type of subnetting has been used on this network?

AD (administrative distance)

A number indicating a protocol's reliability, with lower values being given higher priority. This assignment can be changed by a network administrator.

A routing protocol's reliability and priority are rated by what measurement? AD Routing table MTU Latency

AD

6

As a networking consultant, you've been asked to help expand a client's TCP/IP network. The network administrator tells you that the network ID is subnetted as 185.27.54.0/26. On this network, how many bits of each IP address are devoted to host information?

Which permission allows a user access to a resource?

Authentication

Telnet, SSH, RDP and VNC all rely on which type of management?

In-Band

You manage a small stub network that has a router configured with static routing. If the connection to the next hop goes down, what action will the router perform?

It will continue to route traffic on the same path.

To be able to remotely manage a Windows device securely, which of the following protocols can be used?

RDP To securely manage a Windows device remotely, the Remote Desktop Protocol (RDP) needs to be used. An SSH connection will be used to remotely manage a Linux device. Remote Desktop Gateway (RDG) is used to remotely connect to resources on a corporate network, not to securely manage the device. A VPN connection is used to connect to a corporate network remotely, not to securely manage devices.

When implementing secure remote file access which choices will be incompatible with each other?

SFTP / FTPS

Mr. Yoda is a network engineer who has been working on setting up a data delivery service. While creating the TCP segment for this purpose, the network administrator has requested Mr. Yoda to set up a command requesting a synchronization of the sequence numbers between two nodes so that it can indicate to the receiving node that there is no payload attached to the data packet. Analyze which of the following statements will best fit the situation for Mr. Yoda.

Set the SYN to 1 byte in the flag segment of the TCP segment

Which of the following connection methods can be used to connect a company's offices which are located in different geographical areas?

Site-to-Site VPN

Which of the following terms refer to the number of data bits (0s and 1s) that are actually received across a connection each second?

Throughput

What transport protocol/ports do DNS and DHCP use?

UDP 53 / UDP 67 and 68

netstat -r & route

Which of the following commands allows you to view the routing table on your Linux workstation? (Choose all that apply.)

10.35.88.1

Your workstation's IP address is 10.35.88.12, and your supervisor's workstation's IP address is 10.35.91.4. When you send data from your workstation to your supervisor's workstation, what is the most likely IP address of the first default gateway that will accept and interpret your transmission?

What field in a TCP segment is used to determine if an arriving data unit exactly matches the data unit sent by the source? Checksum DiffServ Acknowledgment number Source port

checksum

A router receives a packet with a destination address that is not found within its routing table. The router is configured to send all such packets to a specific next hop address. What is this next hop address called?

default route

Which of the following command-line tools is used to query DNS name servers for information about host addresses and other DNS records?

dig

What kind of route is created when a network administrator configures a router to use a specific path between nodes? Best path Trace route Default route Static route

static route

Which of the following is true about the OSPF routing protocol? An OSPF maintains a network topology with only its directly connected networks. Each router is informed of the network topology up to its immediately adjacent neighbors. Each router has a partial knowledge of the network topology. Each router has complete knowledge of the network topology.

Each router has complete knowledge of the network topology.

What is the new IP address?

169.254.183.21

Which routing protocol does an exterior router use to collect data to build its routing tables? OSPF IP RIPv2 BGP

BGP

What is the arp -a command used for on a Windows device?

Displays address resolution table for the device The arp -a command is used to display the address resolution table for the device. This command resolves IP addresses to MAC addresses. It cannot be used for any of the other listed options.

Which two protocols manage neighbor discovery processes on IPv4 networks? BGP and OSPF IPv4 and IPv6 ICMP and ARP TCP and UDP

ICMP and ARP

When examining tunneling protocols, which choice is a component of the IPsec protocol suite?

IKEv2

nslookup jsmith

If you know that your colleague's TCP/IP host name is JSMITH, and you need to find out his IP address, which of the following commands should you type at your shell prompt or command prompt?

254

If you subdivide your Class B network into 254 subnets, what is the maximum number of hosts you can assign to any single subnet?

254

If you worked on an older network that could not interpret classless addressing, and your network ID was 145.27.0.0, what is the theoretical maximum number of different subnets you could create on this network?

Your client has hired you to troubleshoot a network error. The client is complaining of an extremely limited network connection on most days and a failed network connection on certain days. Which of the following network configuration issues do you think is at play in this case?

Incorrect subnet mask

After manually changing your IP address your computer identified the duplicate IP address problem. How can you tell?

It displays a duplicate address warning

Hypervile Solutions has hired Joseph to establish a multimedia session so that it can preview its products to a list of potential clients. Joseph has to ensure that the session is properly encrypted so that there is no loss or theft of data as it will be a closed meeting. Analyze which of the following ports should be opened in this case.

Port 5061

You, as a network administrator, want to open up a port that will allow you to send data using the file transfer protocol. However, the files you wish to transfer are boot files. Which of the following ports will you open up to carry out this operation?

Port 69

To be able to remotely manage a Windows device securely, which of the following protocols can be used?

RDP

The University of Zotto wants to upgrade its network so that the dean of the university can deliver important information related to students and teachers directly to the campus monitors located in the vicinity. The university has hired a firm named Internet Solutions for this purpose. The firm has come up with a solution where it will use a central receiver to distribute video signals to multiple monitors within a building. However, the firm is still not sure about the kind of cables it will be using as the allocated budget is not extensive. Analyze which of the following should be ideal in such a scenario.

RG-59 cables

SMTP server name

You have offered to help a friend set up her e-mail client software. She knows the e-mail address that her ISP assigned her. Which of the following pieces of information will you need to configure her e-mail software to successfully send messages?

Which of the following uses the cross-platform protocol RFB (remote frame buffer) to remotely control a workstation?

VNC

ICMP

What Network layer protocol does the traceroute utility use to obtain its information about paths between a source and destination?

255.0.0.0

What is the default subnet mask for a Class A network?

mtr

What utility might you use to find out whether your ISP's router is responsible for the poor network performance your organization experiences on a particular afternoon?

Your default gateway's IP address

When you use the mtr command to assess the path from your office workstation to a server on your company's WAN that's located in Spain, what is the first hop the mtr command will display?

205.61.128.79

Your company has leased a Class C network whose network ID is 205.61.128.0. You want to create 16 subnets within this network. One of the subnets will have an extended network prefix of 205.61.128.64. What will be the broadcast address for this subnet? (Hint: If you know the number of hosts per subnet, you can easily determine the broadcast address.)

You are asked to install a device that will combine several connections to the Internet and provide the sum of the available network speeds to an internal network while equally sharing the data traffic among all the Internet connections. Which of the following devices are you asked to install? Wired controller Dual modem Multilayer router Multilayer switch Load balancer

load balancer

255.255.255.0

You have decided to create 254 subnets on your Class B network. What subnet mask will you use to accomplish this?

You work as a network administrator in a domain environment. You have a new firewall and need to configure it. You are asked to create web filtering and firewall rules based on domain groups. Which of the following protocol will you use to integrate your firewall directly with Active Directory?

LDAP

Which of the following fields in a TCP segment identifies the data segment's position in the stream of data segments being sent?

Sequence number

Which of the following connection methods can be used to connect a company's offices which are located in different geographical areas?

Site-to-Site VPN A Client-to-Site VPN is used to connect a client to the company's internal network through a device such as a laptop. SSH and RDP cannot be used to connect different offices.

route

Which of the following commands reveals the default gateway addresses for all the hosts to which a router is connected?

At which OSI layer does IP operate? Transport layer Application layer Data Link layer Network layer

network layer

Which OSI layer is responsible for directing data from one LAN to another? Physical layer Network layer Transport layer Data Link layer

network layer

You have just installed a network at the Jamieson Hydro Power Plant, and you want to test the basic connectivity of the network. Which of the following utilities will you use first in such a situation so that you get to verify that the TCP/IP is configured correctly and is communicating with the network?

ping

Which of the following command can be used to display the local routing table for a Windows device?

route print

You have been hired as a security professional for a firm, and you would like to analyze the traffic that crosses the computer's network interface. Which of the following command-line interfaces will help you in achieving this?

tcpdump

Which command must be used on a Linux device to determine the IP configuration of the eth0 network interface? [Choose all that apply]

ifconfig eth0, ip address show eth0 Ipconfig /all command is used on Windows devices to display all the IP address configuration for the device. The ifconfig command executed on its own on a Linux device will display all the IP configurations for the device. Ifconfig executed with the /all command is not possible to be executed.

One of the users in your organization has just re-installed the operating system on his system. He notices that the email software can be accessed after the reinstallation, but all the old emails have disappeared. What could be the cause of this problem?

POP3 was used on the mail client software

Rodriguez has been hired as a network administrator by MJF Tires to create an IPsec suite wherein a definitive set of rules are laid down for encryption, authentication, and key management of TCP/IP transmissions. After accessing the basic network traffic, Rodriguez wants to create a secure channel so that the IP packet's data payload can be authenticated through public key techniques. Analyze which of the following steps Rodriguez must complete after establishing a secure channel.

Renegotiate and reestablish the connection before the current session gets timed out

RCB Logistics wants to upgrade the cabling of its network as it was still running on older fiber networks. It has outsourced the cabling project to Bear & Co. that appointed Watson as a network engineer. On inspection, it gets to know that the older fiber networks were connected using an ST connector. Watson decides that he will replace the SMF cables with MMF cables in order for the signaling to be in full-duplex mode. Analyze which of the following connectors would be most ideal in this situation for Watson to replace the cables.

Replace the cables using an MT-RJ connector

You work as a network administrator and are responsible for configuring network firewalls, routers and switches. You have configured rules between the user and server VLANs. You received a request from your development team to create a new rule that allows port TCP 1433 to the database server. Based on the port number, which database is installed on the server.

SQL

Which of the following statements is true about Fault tolerance?1) It is a direct result of the design of the network itself.2) It is the name of the feature that allows for dual layer 2 connections between switches.3) Enables a network to continue functioning normally in case of a partial failure.

Statements 1 and 3 are true


संबंधित स्टडी सेट्स

figures of speech (unit: chance and choice)

View Set

LUOA World Geography: Module 8: Sub Saharan Africa

View Set

World Regional Geography: Chapter 6

View Set