05-10 Network Fundamentals Exam

Ace your homework & exams now with Quizwiz!

What addresses are mapped by ARP? A. IPv4 address to a destination MAC address. B. Destination IPv4 address to the destination host name. C. Destination IPv4 address to the source MAC address. D. Destination IPv4 address to the source MAC address. E. Destination MAC address to the source IPv4 address.

A. IPv4 address to a destination MAC address. ARP works by mapping a dest MAC addr to a dest IPv4 addr. The host knows the dest IPv4 addr and uses ARP to resolve the corresponding dest MAC addr.

What is a function of the tracert command that differs from the ping command when they are used on a workstation? A. The tracert command shows the information of routers in the path. B. The tracert command sends one ICMP message to each hop in the path. C. The tracert command reaches the destination faster. D. The tracert command is used to test the connectivity between two devices.

A. The tracert command shows the information of routers in the path.

What are the three responsibilities of the transport layer? (Choose three) A. Conducting error detection of the contents in frames. B. Multiplexing multiple communication streams from many users or applications on the same network. C. Directing packets towards the destination network. D. Meeting the reliability requirements of applications, if any. E. Identifying the applications and services on the client and server that should handle transmitted data. F. Formatting data into a compatible form for receipt by the destination devices.

B, D, and E.

What network service uses the WHOIS protocol? A. FTP B. DNS C. HTTPS D. SMTP

B. DNS

What three application layer protocols are part of the TCP/IP protocol suite? (Choose three) A. ARP B. FTP C. NAT D. DHCP E. DNS F. PPP

B. FTP, D. DHCP, and E. DNS

A user issues a ping 192.168.250.103 command and receives a response that includes a code of 1. What does this code represent? A. Protocol unreachable B. Host unreachable C. Network unreachable D. Port unreachable

B. Host unreachable

A PC is downloading a large file from a server. The TCP window is 1000 bytes. The server is sending the file using 100-byte segments. How many segments will the server send before it requires an acknowledgment from the PC? A. 1000 segments B. 100 segments C. 10 segments D. 1 segment

C. 10 segments

A large corporation has modified its network to allow users to access network resources from their personal laptops and smartphones. Which networking trend does this describe? A. Online collaboration B. Cloud computing C. Bring your own device D. Video conferencing

C. Bring your own device

Which field in an IPv4 packet header will typically stay the same during its transmission? A. Packet length B. Flag C. Destination Address D. Time-to-Live

C. Destination Access

A tech is configuring email on a mobile device. The user wants to be able to keep the original email on the server, organize it into folders, and synchronize the folders between the mobile device and the server. Which email protocol should the tech use? A. MIME B. POP3 C. IMAP D. SMTP

C. IMAP

What mechanism is used by a router to prevent a received IPv4 packet from traveling endlessly on a network. A. It checks the value of the TTL field and if it is 100, it discards the packet and sends a Destination Unreachable message to the source host. B. It checks the value of the TTL field and if it is 0, it discards the packet and sends a Destination Unreachable message to the source host. C. It decrements the value of the TTL field by 1 and if the result is 0, it discards the packet and sends a Time Exceeded message to the source host. D. It increments the value of the TTL field by 1 and if the result is 100, it discards the packet and sends a Parameter Problem message to the source host.

C. It decrements the value of the TTL field by 1 and if the result is 0, it discards the packet and sends a Time Exceeded message to the source host.

Which two parts are components of an IPv4 address? (Choose two) A. Physical portion B. Broadcast portion C. Network portion D. Subnet portion E. Logical portion F. Host portion

C. Network portion and F. Host portion

A computer can access devices on the same network but cannot access devices on other networks. What is the probable cause of this problem? A. The computer has an incorrect subnet mask. B. The computer has an invalid IP address. C. The computer has an invalid default gateway address. D. The cable is not connected properly to the NIC.

C. The computer has an invalid default gateway address

A user who is unable to connect to the file server contacts the help desk. The helpdesk technician asks the user to ping the IP address of the default gateway that is configured on the workstation. What is the purpose for this ping command? A. To resolve the domain name of the file server to its IP address. B. To obtain a dynamic IP address from the server. C. To test that the host has the capability to reach hosts on other networks. D. To request that gateway forward the connection request to the file server.

C. To test that the host has the capability to reach hosts on other networks.

What is the result of an ARP poisoning attack? A. Client memory buffers are overwhelmed. B. Network clients are infected with a virus. C. Network clients experience a denial of service. D. Client information is stolen.

D. Client information is stolen. ARP poisoning is a technique used by an attacker to reply to an ARP request for an IPv4 addr belonging to another device, such as the default gateway. The attacker, who is effectively doing an MITM attack, pretends to be the default gateway and sends an ARP reply to the transmitter of the ARP request. The receiver of the ARP reply will add the wrong MAC address to the ARP table and will send the packets to the attacker. Therefore, all traffic to the default gateway will funnel through the attacker device.

Which networking model is being used when an author uploads one chapter document to a file server of a book publisher? A. peer-to-peer B. point-to-point C. primary-secondary D. client/server

D. Client/server

A host PC is attempting to lease an address through DHCP. What message is sent by the server to let the client know it is able to use the provided IP info? A. DHCPDISCOVER B. DHCPOFFER C. DHCPREQUEST D. DHCPACK E. DHCPNACK

D. DHCPACK: When a host uses DHCP to automatically config an IP address, typically sends two messages DHCPDISCOVER/DHCPREQUEST messages. These two messages are usually sent as broadcasts to ensure that all DHCP servers receive them. The servers respond to these messages using DHCPOFFER/DHCPACK/DHCPNACK messages, depending on the circumstances.

What is done to an IP packet before it is transmitted over the physical medium? A. It is tagged with information guaranteeing reliable delivery. B. It is encapsulated into a TCP segment. C. It is segmented into smaller individual pieces. D. It is encapsulated in a Layer 2 frame.

D. It is encapsulated in a Layer 2 frame.


Related study sets

Saunders NCLEX Review Endocrine content

View Set

Unfair Claim Settlement Practices class3

View Set

CGSS Chapter 1: Governance and Enforcement

View Set