Chapter 3 & 4 Study Set

Ace your homework & exams now with Quizwiz!

Telnet, SSH, and VNC are which type of software?

Terminal Emulation

Your client has hired you to change the command-line tool from nslookup to dig since it provides more detailed domain information than nslookup. Which of the following commands will you use to perform a DNS lookup on a domain name?

dig google.com

Which command must be used on a Linux device to determine the IP configuration of the eth0 network interface? [Choose all that apply]

ifconfig eth0 ip address show eth0

Which command must be used on a Linux device to determine the IP configuration of the eth0 network interface? [Choose all that apply]

ifconfig eth0, ip address show eth0 Ipconfig /all command is used on Windows devices to display all the IP address configuration for the device. The ifconfig command executed on its own on a Linux device will display all the IP configurations for the device. Ifconfig executed with the /all command is not possible to be executed.

What is the combination of a public key and a private key known as?

key pair

You are asked to install a device that will combine several connections to the Internet and provide the sum of the available network speeds to an internal network while equally sharing the data traffic among all the Internet connections. Which of the following devices are you asked to install? Wired controller Dual modem Multilayer router Multilayer switch Load balancer

load balancer

At which OSI layer does IP operate? Transport layer Application layer Data Link layer Network layer

network layer

You have just installed a network at the Jamieson Hydro Power Plant, and you want to test the basic connectivity of the network. Which of the following utilities will you use first in such a situation so that you get to verify that the TCP/IP is configured correctly and is communicating with the network?

ping

Which of the following command can be used to display the local routing table for a Windows device?

route print

How can you tell this is an APIPA address?

169.254.0.1 - 169.254.255.254

What is the new IP address?

169.254.183.21

The University of Bethesda has requested your professional help in giving a masterclass on how to use Telnet ports for interacting with remote computers. Which of the following ports will you open to teach students how to establish an unencrypted connection with a remote computer?

23

ARP (Address Resolution Protocol)

A core protocol in the TCP/IP suite that belongs in the Data Link layer of the OSI model. ARP works in conjunction with IPv4 to discover the MAC address of a node on the local network and to maintain a database that maps local IP addresses to MAC addresses.

ARP table

A database of records that maps MAC addresses to IP addresses. The ARP table is stored on a computer's hard disk where it is used by the ARP utility to supply the MAC addresses of network nodes, given their IP addresses.

AS (autonomous system)

A group of networks, often on the same domain, that are operated by the same organization.

Your computer has auto configured another IP address. What type of address did your computer resort to?

APIPA

By default, which of the following components of the composite metric are considered for Enhanced Interior Gateway Routing Protocol (EIGRP) ?

Bandwidth and delay

Which type of crosstalk occurs between wire pairs near the source of a signal?

NEXT

You are the network administrator for Jungle Technologies, and you have to create a data stream within an application that will mark a certain section of the data stream to be more urgent than the normal stream. In which of the following fields of TCP segment will you specify this information?

Urgent pointer

Which parameter can be used with the ping command to send a constant stream of packets when using a Windows device?

-t

What is the internet standard MTU

1,500 bytes.

You have recently been hired to complete a pending networking project where the cabling procedure providing Fast Ethernet has already been completed. On inspection, you realize that TIA/EIA-568 Category 5 twisted pair has been used for the cabling procedure. What is the maximum bandwidth that you will allot with such a pair of wires in this scenario?

100 Mbps (Fast Ethernet)

What is the Internet standard MTU? 65,535 bytes 1,522 bytes 1,500 bytes 9,198 bytes

1500 bytes

Which protocol can be used to connect to and control Microsoft computers?

Both choices will work

If you have a small Routing Information Protocol (RIP) network of 10 hops, how will RIP prevent routing loops?

By implementing a limit on the number of hops allowed in a path

What field in a TCP segment is used to determine if an arriving data unit exactly matches the data unit sent by the source?

Checksum

Your employer has sent you to establish a private IP address for the devices used in Infoglobal Ltd. with the help of a router. Your employer has instructed you to implement the address ranging from 172.16.0.0 to 172.31.255.255 as per IANA's RFC1918 document. Which class of classful addressing will you apply in this scenario?

Class B

While configuring a new VPN client, which Role service needs to be installed for the Remote Access role on a Windows server?

Direct Access and VPN (RAS)

Which of the following transmissions allows a signal to travel in both directions simultaneously?

Full-duplex

You have been appointed as the network administrator of an ISP. Your first project requires you to develop a protocol that can transmit IP and other kinds of messages through a tunnel so that you can connect two VPN endpoints. Which of the following will you choose in this scenario?

GRE

In which of the following applications can a virtual IP address be used?

Gateway Redundancy Protocols NAT

Which two protocols manage neighbor discovery processes on IPv4 networks

ICMP and ARP

Which two protocols manage neighbor discovery processes on IPv4 networks? BGP and OSPF IPv4 and IPv6 ICMP and ARP TCP and UDP

ICMP and ARP

When examining tunneling protocols, which choice is a component of the IPsec protocol suite?

IKEv2

Which encryption does GRE use to increase the security of its transmission?

IPsec

Which permission needs to be assigned to a user to be able to connect to a VPN connection?

Network Access permissions

Which permission needs to be assigned to a user to be able to connect to a VPN connection?

Network Access permissions To ensure a user can connect using a VPN connection, the user must be assigned the Network Access permissions in Active Directory. Assigning Network Administrator or Local Administrator permissions will not ensure that the user can access the VPN connection. VPN permissions do not exist.

When executing the tracert 192.168.0.10 command, what can be determined from the output?

The route it will take to reach the destination IP address

HTTP and HTTPS are TCP-based protocols. Which of the following ports do they use?

80 and 443

HTTP and HTTPS are TCP-based protocols. Which of the following ports do they use?

80 and 443 HTTP and HTTPS protocols use port numbers 80 and 443. HTTPS is an example of a secure protocol because it runs over SSL. Port 81 is not one of the well-known ports but can be used as a custom port for applications. Port 25 is a well-known port used by SMTP protocol. UDP port number 514 is used by the SYSLOG protocol.

AD (administrative distance)

A number indicating a protocol's reliability, with lower values being given higher priority. This assignment can be changed by a network administrator.

A routing protocol's reliability and priority are rated by what measurement? AD Routing table MTU Latency

AD

Which permission allows a user access to a resource?

Authentication

Which permission allows a user access to a resource?

Authentication Authorization specifies what a user can access. Using a password or username only does not specify what the user can access.

Which routing protocol does an exterior router use to collect data to build its routing tables? OSPF IP RIPv2 BGP

BGP

While configuring a new VPN client, which Role service needs to be installed for the Remote Access role on a Windows server?

Direct Access and VPN (RAS) Routing and Web application Proxy is an additional service that can be added for extra configurations. .Net framework 4.5 is not needed for the installation.

What is the arp -a command used for on a Windows device?

Displays address resolution table for the device

What is the arp -a command used for on a Windows device?

Displays address resolution table for the device The arp -a command is used to display the address resolution table for the device. This command resolves IP addresses to MAC addresses. It cannot be used for any of the other listed options.

Which of the following is true about the OSPF routing protocol? An OSPF maintains a network topology with only its directly connected networks. Each router is informed of the network topology up to its immediately adjacent neighbors. Each router has a partial knowledge of the network topology. Each router has complete knowledge of the network topology.

Each router has complete knowledge of the network topology.

Telnet, SSH, RDP and VNC all rely on which type of management?

In-Band

Your client has hired you to troubleshoot a network error. The client is complaining of an extremely limited network connection on most days and a failed network connection on certain days. Which of the following network configuration issues do you think is at play in this case?

Incorrect subnet mask

Which encryption benchmark ensures data is not modified after its transmitted and before it's received?

Integrity

You manage a small stub network that has a router configured with static routing. If the connection to the next hop goes down, what action will the router perform?

It will continue to route traffic on the same path.

You work as a network administrator in a domain environment. You have a new firewall and need to configure it. You are asked to create web filtering and firewall rules based on domain groups. Which of the following protocol will you use to integrate your firewall directly with Active Directory?

LDAP

What is one advantage offered by VDI over RDS and VNC

Offers access to multiple OS's in VMs

One of the users in your organization has just re-installed the operating system on his system. He notices that the email software can be accessed after the reinstallation, but all the old emails have disappeared. What could be the cause of this problem?

POP3 was used on the mail client software

Hypervile Solutions has hired Joseph to establish a multimedia session so that it can preview its products to a list of potential clients. Joseph has to ensure that the session is properly encrypted so that there is no loss or theft of data as it will be a closed meeting. Analyze which of the following ports should be opened in this case.

Port 5061

To be able to remotely manage a Windows device securely, which of the following protocols can be used?

RDP To securely manage a Windows device remotely, the Remote Desktop Protocol (RDP) needs to be used. An SSH connection will be used to remotely manage a Linux device. Remote Desktop Gateway (RDG) is used to remotely connect to resources on a corporate network, not to securely manage the device. A VPN connection is used to connect to a corporate network remotely, not to securely manage devices.

Which remote file access protocol is an extension of SSH?

SFTP

When implementing secure remote file access which choices will be incompatible with each other?

SFTP / FTPS

You work as a network administrator and are responsible for configuring network firewalls, routers and switches. You have configured rules between the user and server VLANs. You received a request from your development team to create a new rule that allows port TCP 1433 to the database server. Based on the port number, which database is installed on the server.

SQL

You work as a network administrator and are responsible for configuring network firewalls, routers and switches. You have configured rules between the user and server VLANs. You received a request from your development team to create a new rule that allows port TCP 1433 to the database server. Based on the port number, which database is installed on the server.

SQL SQL is Microsoft's relational database that is used in this case because, by default, it uses TCP port 1433 for client connections. Oracle database uses TCP port 1521 for listener. MySQL is one of the open-source databases that uses TCP port 3306. PostgreSQL is another open-source database that uses TCP port 5421 by default. OrientDB is yet another open-source database that, by default, uses port 2424.

Which of the following connection methods can be used to connect a company's offices which are located in different geographical areas?

Site-to-Site VPN

Which of the following connection methods can be used to connect a company's offices which are located in different geographical areas?

Site-to-Site VPN A Client-to-Site VPN is used to connect a client to the company's internal network through a device such as a laptop. SSH and RDP cannot be used to connect different offices.

Which of the following terms refer to the number of data bits (0s and 1s) that are actually received across a connection each second?

Throughput

What transport protocol/ports do DNS and DHCP use?

UDP 53 / UDP 67 and 68

Frank has been appointed as a network engineer with an Internet service provider firm. His first assignment as an engineer is to set up a 1000BASE-T standard Fast Ethernet for Horizon Corporates. While doing so, the ISP has specifically requested him to concentrate on installing the necessary twisted-cable pairs as all the other specified standards will be looked after by the other members of the team, which has been allocated for this project. Analyze which of the following pairs of twisted cables Frank should use in this scenario.

Use a Category 5e cable for this scenario

Which of the following uses the cross-platform protocol RFB (remote frame buffer) to remotely control a workstation?

VNC

You are working as a network engineer for an ISP. A ticket has been raised that there has been severe attenuation, which has decreased the transmission speed significantly. On inspection, you notice that the reason for this issue is that the transmissions are optimized for one type of cable but sent over a different type of cable. You are now required to send this analysis to the head office for further instructions. Under which of the following common fiber connection problems will you associate this issue?

Wavelength mismatch

You're getting a duplicate IP address error on your computer and need to figure out what other device on your network is using the IP address 192.168..156. What command will show which MAC Address is mapped to that IP address?

arp -a

What field in a TCP segment is used to determine if an arriving data unit exactly matches the data unit sent by the source? Checksum DiffServ Acknowledgment number Source port

checksum

A router receives a packet with a destination address that is not found within its routing table. The router is configured to send all such packets to a specific next hop address. What is this next hop address called?

default route

Which of the following command-line tools is used to query DNS name servers for information about host addresses and other DNS records?

dig

Which of the following command can be used to display the local routing table for a Windows device?

route print The ipconfig command displays the IP configuration for a Windows device. The dig command is used in Linux to display DNS information, and the nslookup command is used to resolve IP addresses to DNS names. The route add command will add a route to the local routing table but will not display the local routing table.

What kind of route is created when a network administrator configures a router to use a specific path between nodes? Best path Trace route Default route Static route

static route

You are working as a network administrator for an ISP. A ticket has been raised by a consumer complaining about fluctuations in network speed despite using a fiber-optic cable. The inner wiring of the cable needs to be checked for which you have decided to strip off the outer layer of the fiber cable. Which of the following tools will you carry for this purpose?

Fiber stripper

After manually changing your IP address your computer identified the duplicate IP address problem. How can you tell?

It displays a duplicate address warning

You work as a network administrator in a domain environment. You have a new firewall and need to configure it. You are asked to create web filtering and firewall rules based on domain groups. Which of the following protocol will you use to integrate your firewall directly with Active Directory?

LDAP LDAP is a Lightweight Directory Access protocol used to authenticate and authorize users. This protocol is used to integrate the firewall with Active Directory. OpenLDAP is not a protocol but software that also uses LDAP. FTP(File Transfer Protocol) is used for data transfer between hosts. RADIUS (Remote Authentication Dial-in User Service) is also used for user authentication and authorization but uses a client/server model where the RADIUS server defines rules for RADIUS clients (usually network devices) and authenticate users.

You are the DNS administrator and have been tasked to identify an email server in a DNS zone file. Which of the following resource records would you apply as a DNS administrator in this case?

MX record

At which OSI layer does IP operate?

Network Layer

One of the users in your organization has just re-installed the operating system on his system. He notices that the email software can be accessed after the reinstallation, but all the old emails have disappeared. What could be the cause of this problem?

POP3 was used on the mail client software POP3 is an email protocol used for communication between a client and a mail server. When using the POP3 protocol, emails are downloaded from the server and deleted from the server. If you do not perform a backup, you could lose your emails after PC reinstallation. SMTP and SMTPS protocols are mostly used today for communication between mail servers (mail relaying). IMAP and IMAP over SSL(IMAPS) protocol are also used for client-mail server communication, but email messages are not deleted from the server.

You, as a network administrator, want to open up a port that will allow you to send data using the file transfer protocol. However, the files you wish to transfer are boot files. Which of the following ports will you open up to carry out this operation?

Port 69

To be able to remotely manage a Windows device securely, which of the following protocols can be used?

RDP

Which of the following protocols is used for encrypted control of remote Windows computers?

RDP

Rodriguez has been hired as a network administrator by MJF Tires to create an IPsec suite wherein a definitive set of rules are laid down for encryption, authentication, and key management of TCP/IP transmissions. After accessing the basic network traffic, Rodriguez wants to create a secure channel so that the IP packet's data payload can be authenticated through public key techniques. Analyze which of the following steps Rodriguez must complete after establishing a secure channel.

Renegotiate and reestablish the connection before the current session gets timed out

When executing the tracert 192.168.0.10 command, what can be determined from the output?

The route it will take to reach the destination IP address Executing the tracert command with a specified IP address can be used to determine the route it will take to reach the specified IP address expressed in hops. It can not be used to determine a DNS name, MAC address or the default gateway.

RCB Logistics wants to upgrade the cabling of its network as it was still running on older fiber networks. It has outsourced the cabling project to Bear & Co. that appointed Watson as a network engineer. On inspection, it gets to know that the older fiber networks were connected using an ST connector. Watson decides that he will replace the SMF cables with MMF cables in order for the signaling to be in full-duplex mode. Analyze which of the following connectors would be most ideal in this situation for Watson to replace the cables.

Replace the cables using an MT-RJ connector

Which of the following fields in a TCP segment identifies the data segment's position in the stream of data segments being sent?

Sequence number

Which of the following statements is true about Fault tolerance?1) It is a direct result of the design of the network itself.2) It is the name of the feature that allows for dual layer 2 connections between switches.3) Enables a network to continue functioning normally in case of a partial failure.

Statements 1 and 3 are true

You have been hired to fix an issue related to the booting up of a computer using a Linux operating system. Before fixing any error, you want to check the history of the previous warning messages that were generated by the system. Which of the following utilities will you use in this scenario?

Syslog

Which protocol header would a layer 4 device read and process

TCP

Which protocol's header would a Layer 4 device read and process? HTTP ARP TCP IP

TCP

You have been hired as a security professional for a firm, and you would like to analyze the traffic that crosses the computer's network interface. Which of the following command-line interfaces will help you in achieving this?

tcpdump

The University of Zotto wants to upgrade its network so that the dean of the university can deliver important information related to students and teachers directly to the campus monitors located in the vicinity. The university has hired a firm named Internet Solutions for this purpose. The firm has come up with a solution where it will use a central receiver to distribute video signals to multiple monitors within a building. However, the firm is still not sure about the kind of cables it will be using as the allocated budget is not extensive. Analyze which of the following should be ideal in such a scenario.

RG-59 cables

Mr. Yoda is a network engineer who has been working on setting up a data delivery service. While creating the TCP segment for this purpose, the network administrator has requested Mr. Yoda to set up a command requesting a synchronization of the sequence numbers between two nodes so that it can indicate to the receiving node that there is no payload attached to the data packet. Analyze which of the following statements will best fit the situation for Mr. Yoda.

Set the SYN to 1 byte in the flag segment of the TCP segment

What transport protocol/ports do DNS and DHCP use?

UDP 53 / UDP 67 and 68 DNS (Domain Name Server) is used to translate domain names to IP addresses. It uses UDP port 53 for transport. DHCP (Dynamic Host Configuration Protocol) is used for automatic IP address assignments. Client and server use UDP ports 67 and 68 for exchanging DHCP messages.

When a router can't determine a path to a message's destination, where does it send the message? Gateway of last resort Default gateway Administrative distance Routing table

gateway of last resort

Which of the following utilities uses ICMP echo requests to trace the path from one networked node to another, identifying all intermediate hops between the two nodes?

tracert

Which OSI layer is responsible for directing data from one LAN to another? Physical layer Network layer Transport layer Data Link layer

network layer


Related study sets

Pharmacology Prep U Ch. 25 Muscle Relaxants

View Set

HDFS 4500: Final, HDFS 4500: Test 4, HDFS 4500 TEST 3, HDFS 4500 Test 1, HDFS 4500 TEST 2

View Set

Med-Surge Nursing Cardio Prep U ch 28

View Set

OS Hardening - SEC340 chapter 1 & 2

View Set

Intro to Biology Evolution and Natural Selection

View Set