1. Chapter 3 & 4 Study Set
Review Q7: Which of these commands has no parameters in Windows?
hostname
12. Which command disables a computer's connection to the network?
ipconfig /release
A routing protocol's reliability and priority are rated by what measurement? AD Routing table MTU Latency
AD
While configuring a new VPN client, which Role service needs to be installed for the Remote Access role on a Windows server?
Direct Access and VPN (RAS) Routing and Web application Proxy is an additional service that can be added for extra configurations. .Net framework 4.5 is not needed for the installation.
Rodriguez has been hired as a network administrator by MJF Tires to create an IPsec suite wherein a definitive set of rules are laid down for encryption, authentication, and key management of TCP/IP transmissions. After accessing the basic network traffic, Rodriguez wants to create a secure channel so that the IP packet's data payload can be authenticated through public key techniques. Analyze which of the following steps Rodriguez must complete after establishing a secure channel.
Renegotiate and reestablish the connection before the current session gets timed out
When implementing secure remote file access which choices will be incompatible with each other?
SFTP / FTPS
Review Q1: Which part of a MAC address is unique to each manufacturer?
The OUI
Which of the following command-line tools is used to query DNS name servers for information about host addresses and other DNS records?
dig
Which OSI layer is responsible for directing data from one LAN to another? Physical layer Network layer Transport layer Data Link layer
network layer
What is the new IP address?
169.254.183.21
5. Which IPv6 prefix can be routed on the Internet?
2000::/3
7. Which port should be open so you can remote into the corporate office's Linux server from a branch office?
22
The University of Bethesda has requested your professional help in giving a masterclass on how to use Telnet ports for interacting with remote computers. Which of the following ports will you open to teach students how to establish an unencrypted connection with a remote computer?
23
6. When hosting a secure email server for access from the Internet, which port should be open on the corporate firewall?
587
ARP (Address Resolution Protocol)
A core protocol in the TCP/IP suite that belongs in the Data Link layer of the OSI model. ARP works in conjunction with IPv4 to discover the MAC address of a node on the local network and to maintain a database that maps local IP addresses to MAC addresses.
ARP table
A database of records that maps MAC addresses to IP addresses. The ARP table is stored on a computer's hard disk where it is used by the ARP utility to supply the MAC addresses of network nodes, given their IP addresses.
AS (autonomous system)
A group of networks, often on the same domain, that are operated by the same organization.
AD (administrative distance)
A number indicating a protocol's reliability, with lower values being given higher priority. This assignment can be changed by a network administrator.
Your computer has auto configured another IP address. What type of address did your computer resort to?
APIPA
Review Q4: Suppose you send data to the 11111111 11111111 11111111 11111111 IP address on an IPv4 network. To which device(s) are you transmitting?
All devices on your local network
Which permission allows a user access to a resource?
Authentication Authorization specifies what a user can access. Using a password or username only does not specify what the user can access.
Which routing protocol does an exterior router use to collect data to build its routing tables? OSPF IP RIPv2 BGP
BGP
By default, which of the following components of the composite metric are considered for Enhanced Interior Gateway Routing Protocol (EIGRP) ?
Bandwidth and delay
What field in a TCP segment is used to determine if an arriving data unit exactly matches the data unit sent by the source?
Checksum
Which of the following is true about the OSPF routing protocol? An OSPF maintains a network topology with only its directly connected networks. Each router is informed of the network topology up to its immediately adjacent neighbors. Each router has a partial knowledge of the network topology. Each router has complete knowledge of the network topology.
Each router has complete knowledge of the network topology.
Review Q5: When your computer first joins an IPv6 LAN, what is the prefix of the IPv6 address the computer configures for itself?
FE80::/64
You have been appointed as the network administrator of an ISP. Your first project requires you to develop a protocol that can transmit IP and other kinds of messages through a tunnel so that you can connect two VPN endpoints. Which of the following will you choose in this scenario?
GRE
In which of the following applications can a virtual IP address be used?
Gateway Redundancy Protocols NAT
11. What protocol does ping use?
ICMP
Which two protocols manage neighbor discovery processes on IPv4 networks
ICMP and ARP
Which two protocols manage neighbor discovery processes on IPv4 networks? BGP and OSPF IPv4 and IPv6 ICMP and ARP TCP and UDP
ICMP and ARP
When examining tunneling protocols, which choice is a component of the IPsec protocol suite?
IKEv2
Which encryption does GRE use to increase the security of its transmission?
IPsec
You manage a small stub network that has a router configured with static routing. If the connection to the next hop goes down, what action will the router perform?
It will continue to route traffic on the same path.
You work as a network administrator in a domain environment. You have a new firewall and need to configure it. You are asked to create web filtering and firewall rules based on domain groups. Which of the following protocol will you use to integrate your firewall directly with Active Directory?
LDAP
You are the DNS administrator and have been tasked to identify an email server in a DNS zone file. Which of the following resource records would you apply as a DNS administrator in this case?
MX record
13. What problem will "ping google.com" check for that ping 8.8.8.8 will not?
Name resolution issues
Which permission needs to be assigned to a user to be able to connect to a VPN connection?
Network Access permissions To ensure a user can connect using a VPN connection, the user must be assigned the Network Access permissions in Active Directory. Assigning Network Administrator or Local Administrator permissions will not ensure that the user can access the VPN connection. VPN permissions do not exist.
One of the users in your organization has just re-installed the operating system on his system. He notices that the email software can be accessed after the reinstallation, but all the old emails have disappeared. What could be the cause of this problem?
POP3 was used on the mail client software POP3 is an email protocol used for communication between a client and a mail server. When using the POP3 protocol, emails are downloaded from the server and deleted from the server. If you do not perform a backup, you could lose your emails after PC reinstallation. SMTP and SMTPS protocols are mostly used today for communication between mail servers (mail relaying). IMAP and IMAP over SSL(IMAPS) protocol are also used for client-mail server communication, but email messages are not deleted from the server.
10. Which DNS record type is used to find an FQDN from a given IP address?
PTR
Hypervile Solutions has hired Joseph to establish a multimedia session so that it can preview its products to a list of potential clients. Joseph has to ensure that the session is properly encrypted so that there is no loss or theft of data as it will be a closed meeting. Analyze which of the following ports should be opened in this case.
Port 5061
You, as a network administrator, want to open up a port that will allow you to send data using the file transfer protocol. However, the files you wish to transfer are boot files. Which of the following ports will you open up to carry out this operation?
Port 69
8. When your computer requests a DNS lookup, which DNS server holds the most reliable information for that DNS record?
Primary DNS server
Which of the following protocols is used for encrypted control of remote Windows computers?
RDP
To be able to remotely manage a Windows device securely, which of the following protocols can be used?
RDP To securely manage a Windows device remotely, the Remote Desktop Protocol (RDP) needs to be used. An SSH connection will be used to remotely manage a Linux device. Remote Desktop Gateway (RDG) is used to remotely connect to resources on a corporate network, not to securely manage the device. A VPN connection is used to connect to a corporate network remotely, not to securely manage devices.
Which remote file access protocol is an extension of SSH?
SFTP
9. Which DNS record type is listed 1st in a zone file?
SOA (service-oriented architecture)
Which of the following fields in a TCP segment identifies the data segment's position in the stream of data segments being sent?
Sequence number
Which of the following connection methods can be used to connect a company's offices which are located in different geographical areas?
Site-to-Site VPN A Client-to-Site VPN is used to connect a client to the company's internal network through a device such as a laptop. SSH and RDP cannot be used to connect different offices.
You have been hired to fix an issue related to the booting up of a computer using a Linux operating system. Before fixing any error, you want to check the history of the previous warning messages that were generated by the system. Which of the following utilities will you use in this scenario?
Syslog
Which protocol header would a layer 4 device read and process
TCP
Which protocol's header would a Layer 4 device read and process? HTTP ARP TCP IP
TCP
Telnet, SSH, and VNC are which type of software?
Terminal Emulation
What transport protocol/ports do DNS and DHCP use?
UDP 53 / UDP 67 and 68 DNS (Domain Name Server) is used to translate domain names to IP addresses. It uses UDP port 53 for transport. DHCP (Dynamic Host Configuration Protocol) is used for automatic IP address assignments. Client and server use UDP ports 67 and 68 for exchanging DHCP messages.
You are the network administrator for Jungle Technologies, and you have to create a data stream within an application that will mark a certain section of the data stream to be more urgent than the normal stream. In which of the following fields of TCP segment will you specify this information?
Urgent pointer
Which of the following uses the cross-platform protocol RFB (remote frame buffer) to remotely control a workstation?
VNC
You're getting a duplicate IP address error on your computer and need to figure out what other device on your network is using the IP address 192.168..156. What command will show which MAC Address is mapped to that IP address?
arp -a
What field in a TCP segment is used to determine if an arriving data unit exactly matches the data unit sent by the source? Checksum DiffServ Acknowledgment number Source port
checksum
A router receives a packet with a destination address that is not found within its routing table. The router is configured to send all such packets to a specific next hop address. What is this next hop address called?
default route
Your client has hired you to change the command-line tool from nslookup to dig since it provides more detailed domain information than nslookup. Which of the following commands will you use to perform a DNS lookup on a domain name?
dig google.com
When a router can't determine a path to a message's destination, where does it send the message? Gateway of last resort Default gateway Administrative distance Routing table
gateway of last resort
1. What numbering system do people use to write MAC addresses?
hexadecimal
Review Q6: If you are connected to a network that uses DHCP, and you need to terminate your Windows workstation's DHCP lease, which command would you use?
ipconfig /release
At which OSI layer does IP operate? Transport layer Application layer Data Link layer Network layer
network layer
You have just installed a network at the Jamieson Hydro Power Plant, and you want to test the basic connectivity of the network. Which of the following utilities will you use first in such a situation so that you get to verify that the TCP/IP is configured correctly and is communicating with the network?
ping
Which of the following command can be used to display the local routing table for a Windows device?
route print The ipconfig command displays the IP configuration for a Windows device. The dig command is used in Linux to display DNS information, and the nslookup command is used to resolve IP addresses to DNS names. The route add command will add a route to the local routing table but will not display the local routing table.
What kind of route is created when a network administrator configures a router to use a specific path between nodes? Best path Trace route Default route Static route
static route
Which of the following utilities uses ICMP echo requests to trace the path from one networked node to another, identifying all intermediate hops between the two nodes?
tracert
Which parameter can be used with the ping command to send a constant stream of packets when using a Windows device?
-t
How can you tell this is an APIPA address?
169.254.0.1 - 169.254.255.254
HTTP and HTTPS are TCP-based protocols. Which of the following ports do they use?
80 and 443
HTTP and HTTPS are TCP-based protocols. Which of the following ports do they use?
80 and 443 HTTP and HTTPS protocols use port numbers 80 and 443. HTTPS is an example of a secure protocol because it runs over SSL. Port 81 is not one of the well-known ports but can be used as a custom port for applications. Port 25 is a well-known port used by SMTP protocol. UDP port number 514 is used by the SYSLOG protocol.
Which protocol can be used to connect to and control Microsoft computers?
Both choices will work
If you have a small Routing Information Protocol (RIP) network of 10 hops, how will RIP prevent routing loops?
By implementing a limit on the number of hops allowed in a path
Your employer has sent you to establish a private IP address for the devices used in Infoglobal Ltd. with the help of a router. Your employer has instructed you to implement the address ranging from 172.16.0.0 to 172.31.255.255 as per IANA's RFC1918 document. Which class of classful addressing will you apply in this scenario?
Class B
Which of the following statements is true about Fault tolerance?1) It is a direct result of the design of the network itself.2) It is the name of the feature that allows for dual layer 2 connections between switches.3) Enables a network to continue functioning normally in case of a partial failure.
Statements 1 and 3 are true
Which command must be used on a Linux device to determine the IP configuration of the eth0 network interface? [Choose all that apply]
ifconfig eth0, ip address show eth0 Ipconfig /all command is used on Windows devices to display all the IP address configuration for the device. The ifconfig command executed on its own on a Linux device will display all the IP configurations for the device. Ifconfig executed with the /all command is not possible to be executed.
3. What command shows you a computer's TCP/IP configuration?
ipconfig
2. What Windows Command outputs a computer's MAC address?
ipconfig /all
When executing the tracert 192.168.0.10 command, what can be determined from the output?
The route it will take to reach the destination IP address Executing the tracert command with a specified IP address can be used to determine the route it will take to reach the specified IP address expressed in hops. It can not be used to determine a DNS name, MAC address or the default gateway.
What is the Internet standard MTU? 65,535 bytes 1,522 bytes 1,500 bytes 9,198 bytes
1500 bytes
What is the internet standard MTU
1,500 bytes.
4. Which of the following IPv4 addresses is a public IP address?
64.233.177.189
Review Q3: What decimal number corresponds to the binary number 11111111?
255
Review Q2: What type of device does a computer turn to when attempting to connect with a host with a known ip address on another network?
Default gateway
What is the arp -a command used for on a Windows device?
Displays address resolution table for the device The arp -a command is used to display the address resolution table for the device. This command resolves IP addresses to MAC addresses. It cannot be used for any of the other listed options.
Telnet, SSH, RDP and VNC all rely on which type of management?
In-Band
Your client has hired you to troubleshoot a network error. The client is complaining of an extremely limited network connection on most days and a failed network connection on certain days. Which of the following network configuration issues do you think is at play in this case?
Incorrect subnet mask
Which encryption benchmark ensures data is not modified after its transmitted and before it's received?
Integrity
After manually changing your IP address your computer identified the duplicate IP address problem. How can you tell?
It displays a duplicate address warning
At which OSI layer does IP operate?
Network Layer
What is one advantage offered by VDI over RDS and VNC
Offers access to multiple OS's in VMs
You work as a network administrator and are responsible for configuring network firewalls, routers and switches. You have configured rules between the user and server VLANs. You received a request from your development team to create a new rule that allows port TCP 1433 to the database server. Based on the port number, which database is installed on the server.
SQL
What is the combination of a public key and a private key known as?
key pair
You are asked to install a device that will combine several connections to the Internet and provide the sum of the available network speeds to an internal network while equally sharing the data traffic among all the Internet connections. Which of the following devices are you asked to install? Wired controller Dual modem Multilayer router Multilayer switch Load balancer
load balancer
Mr. Yoda is a network engineer who has been working on setting up a data delivery service. While creating the TCP segment for this purpose, the network administrator has requested Mr. Yoda to set up a command requesting a synchronization of the sequence numbers between two nodes so that it can indicate to the receiving node that there is no payload attached to the data packet. Analyze which of the following statements will best fit the situation for Mr. Yoda.
Set the SYN to 1 byte in the flag segment of the TCP segment
You have been hired as a security professional for a firm, and you would like to analyze the traffic that crosses the computer's network interface. Which of the following command-line interfaces will help you in achieving this?
tcpdump
You work as a network administrator in a domain environment. You have a new firewall and need to configure it. You are asked to create web filtering and firewall rules based on domain groups. Which of the following protocol will you use to integrate your firewall directly with Active Directory?
LDAP LDAP is a Lightweight Directory Access protocol used to authenticate and authorize users. This protocol is used to integrate the firewall with Active Directory. OpenLDAP is not a protocol but software that also uses LDAP. FTP(File Transfer Protocol) is used for data transfer between hosts. RADIUS (Remote Authentication Dial-in User Service) is also used for user authentication and authorization but uses a client/server model where the RADIUS server defines rules for RADIUS clients (usually network devices) and authenticate users.
You work as a network administrator and are responsible for configuring network firewalls, routers and switches. You have configured rules between the user and server VLANs. You received a request from your development team to create a new rule that allows port TCP 1433 to the database server. Based on the port number, which database is installed on the server.
SQL SQL is Microsoft's relational database that is used in this case because, by default, it uses TCP port 1433 for client connections. Oracle database uses TCP port 1521 for listener. MySQL is one of the open-source databases that uses TCP port 3306. PostgreSQL is another open-source database that uses TCP port 5421 by default. OrientDB is yet another open-source database that, by default, uses port 2424.