CIT 370 - Chapter 3

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

Which of the following format can be considered a valid IPv6 address?

2001:0db8:0000:0003:0000:ff00:0042:8329

What decimal number corresponds to the binary number 11111111?

255

Which of the following describes the configuring of MAC reservation in a DHCP server?

MAC reservation is a method of implementing DHCP such that a DHCP server will always give a preassigned IP address to the same host. In other words, the DHCP server assigns a specific IP address based on the MAC address of the client. This is also known as DHCP reservation or static DHCP.

What method of IP network configuration would you use for devices such as servers and printers so that all users on a network will always be able to reach these resources using the same network address?

Static IP address allocation

Your network firewall currently allows only HTTP traffic to pass through. You need to allow FTP traffic to pass through the firewall. Which of the following should be allowed? [Choose all that apply].

TCP port 20 and 21

A computer is configured with a subnet mask of 255.255.255.192. How many IP addresses, including the network and broadcast addresses, are available in the subnet the computer is in?

64

You need to block all unsecured web traffic using its default port from a specific network segment of the enterprise network. Which port would you block to achieve this?

80

You want to display the cache entries for 192.168.1.101. Which parameter should you use with the arp command?

-a

Users on a network are complaining that they cannot connect to a Webserver by its name in the Web browser. You can access the Webserver using its IP address. You discover an access list is blocking several UDP ports. Which port should you remove from the access list to allow users to connect to the Webserver?

53

A network engineer is configuring a network to be able to relay IPv6 packets. The network only supports IPv4 and does not have dual-stack support. Which of the following can be used to successfully relay IPv6 packets over this network?

IPv6 tunneling

When your computer first joins an IPv6 network, what is the prefix of the IPv6 address the computer first configures for itself?

FE80::/10

The network administrator has configured the enterprise firewall to permit port 21 to allow FTP transfers to occur from outside the enterprise. Users can connect to the FTP server that is located on the enterprise network. However, file transfers fails. Why could this be?

Port 20 along with port 21 must also be permitted

Your organization has multiple remote offices. The users at the remote office often remotely connect to the application servers. Which of the protocols should you enforce for encrypted communication? [Choose all that apply].

RDP and SSH

You are a network administrator for an organization. You are asked to create a shared folder on a Microsoft Windows system so that other users on the same network are able to access its contents. To be able to meet this requirement, which protocol is likely to be used?

SMB

You are a network administrator and you need to access the secure command line interface access of an edge router on your network. The router uses cryptography for remote authentication. Which protocol is the router configured with for this purpose?

SSH

You have been asked to host a new e-commerce Website. Your manager has asked you to configure the Website with a certificate. After hosting the Website with the certificate, which security protocol have you use?

SSL/ TLS

Suppose you send data to the 11111111 11111111 11111111 11111111 IP address on an IPv4 network. To which device(s) are you transmitting?

all devices on your local network

You suspect that the Webserver, which is located on your network and hosts multiple Internet facing Websites. The Webserver runs on Windows Server 2008. After receiving complaints from the users of Webserver occasionally being unavailable, you investigate and find that it is getting flooded with many ping requests. What should you do to immediately handle this situation?

block all incoming ICMP requests

What is the first thing you should check if you discover that domain names are not resolving into IP addresses on a PC or workstation?

check connectivity to the default DNS server

What type of device does a computer turn to first when attempting to make contact with a host with a known IP address on another network?

default gateway

DNS clients can use this zone to obtain information such as IP address that correspond to DNS domain names or services. What type of DNS zone is this?

forward lookup zone

Which of the following IPv4 and IPv6 addresses are correctly portrayed using CIDR notation? [Choose all that apply].

2001:db8::/32 192.168.2.0/24

You need to connect to a colleague's system using the default Microsoft Windows remote desktop application to troubleshoot an application issue. Which port should be opened on the colleague's system firewall to ensure successful remote connection?

3389

Refer to the exhibit. Which of the pictured software is a port scanner?

A port scanner is an application designed to probe a server or host for open transport layer ports. This is often used by administrators to verify security policies of their networks and by attackers to identify network services running on a host and exploit vulnerabilities. A port scanner will indicate open ports on specific servers (IP addresses) as well as those that are blocked. (C)

Refer to the exhibit. Which of the pictured software is a protocol analyzer?

A protocol analyzer helps you capture and analyze the traffic over a network connection. You could install a protocol analyzer, such as Wireshark, and capture the traffic that is being sent and received over the network connection. Depending on the applications running on the local computer or over the network and the network adapter configuration, such as in the promiscuous mode, you may see different protocols being captured as a response. (A)

You are planning to implement dual stack of IPv4 and IPv6 in your network. Currently, your network consists of servers, routers, and switches that have not been upgraded for several years. You are still running the Windows Server 2003. When implementing dual stack, which of the following will be your primary concerns? [Choose all that apply].

Ensuring that the hardware and software support the implementation AND Keeping the hardware and software costs under control A Dual-stack IP implementation provides complete IPv4 and IPv6 protocol stacks in the same network interface of a host or device over a common physical layer infrastructure, such as Ethernet. This permits dual-stack hosts to participate in IPv6 and IPv4 networks simultaneously.Even though all are concerns, ensuring that the hardware and software support the implementation and keeping the hardware and software costs under control are the most important factors as the networks hardware is severly outdated.

If you use the ping command to send an echo request from one host to the other, then which of the following protocols have you used?

ICMP

Which type of DNS record identifies an email server?

MX record

Which part of a MAC address is unique to each manufacturer?

OUI

If you are connected to a network that uses DHCP, and you need to terminate your Windows workstation's DHCP lease, which command would you use?

ipconfig/release

You have configured a DHCP pool to allocate the IP addresses to the system for 3 days. What have you defined?

lease time

Refer to the exhibit. Which of the following command is likely to show the required output?

nslookup

Refer to the exhibit. Which of the following command is likely to show the required output?

ping

You are the network administrator for a small organization of 100 users. Users till now were freely browsing the Internet. You want to put a provision in place where you can monitor their visits to the different Websites and block all unwanted Websites. Which of the following should you install and configure?

proxy server

Which computers are the highest authorities in the Domain Name System hierarchy?

root servers

You have just brought online a new secondary DNS server and notice your network-monitoring software reports a significant increase in network traffic. Which two hosts on your network are likely to be causing the increased traffic and why?

the secondary and primary DNS servers, because the secondary server is requesting zone transfers from the primary server

Refer to the exhibit. Which of the following command is likely to show the required output?

traceroute


Set pelajaran terkait

Chapter 2 - Perspectives on Conflict

View Set

NUR 306 Ch. 24 Assessing Older Adults : PrepU

View Set

Chapter 13 Blended Competencies, Clinical Reasoning, and Processes of Person-Centered Care

View Set