Ethical Hacking: Module 7-10

Ace your homework & exams now with Quizwiz!

Which statement is true about the TCP/IP and OSI models?​ The TCP/IP network access layer has similar functions to the OSI network layer.​ The OSI Layer 7 and the TCP/IP application layer provide identical functions. The TCP/IP transport layer and OSI Layer 4 provide similar services and functions.​ The first three OSI layers describe general services that are also provided by the TCP/IP internet layer

The TCP/IP transport layer and OSI Layer 4 provide similar services and functions.​

What is the purpose of the TCP sliding window? to end communication when data transmission is complete to request that a source decrease the rate at which it transmits data to inform a source to retransmit data from a specific point forward to ensure that segments arrive in order at the destination

What happens if part of an FTP message is not delivered to the destination? The message is lost because FTP does not use a reliable delivery method. The part of the FTP message that was lost is re-sent. The entire FTP message is re-sent. The FTP source host sends a query to the destination host.

On a home network, which device is most likely to provide dynamic IP addressing to clients on the home network? a home router an ISP DHCP server a DNS server a dedicated file server

a home router

A host is transmitting a broadcast. Which host or hosts will receive it? the closest neighbor on the same network all hosts on the Internet all hosts in the same network a specially defined group of hosts

all hosts in the same network

Which OSI model layer contains protocols for process-to-process communication? session transport application network

application

What type of server would use IMAP? email Telnet DHCP FTP DNS

email

What process involves placing one PDU inside of another PDU? segmentation flow control encoding encapsulation

encapsulation

What method can be used by two computers to ensure that packets are not dropped because too much data is being sent too quickly? flow control response timeout encapsulation access method

flow control

In NAT translation for internal hosts, what address would be used by external users to reach internal hosts? outside global inside global inside local outside local

inside global

A particular website does not appear to be responding on a Windows 7 computer. What command could the technician use to show any cached DNS entries for this web page? ipconfig /all nslookup arp -a ipconfig /displaydns

ipconfig /displaydns

Refer to the exhibit. Which three lines represent the TCP three-way handshake? lines 6, 7, and 8 lines 2, 3, and 4 lines 2, 8, and 9 lines 1, 2, and 3 lines 4, 5, and 6

lines 2, 3, and 4

What message is sent by a host to check the uniqueness of an IPv6 address before using that address? ARP request echo request router solicitation neighbor solicitation

neighbor solicitation

A user issues a ping 192.168.219.8 command and receives a response that includes a code of 0. What does this code represent? protocol unreachable network unreachable host unreachable port unreachable

network unreachable

A user issues a ping 2001:db8:3040:114::88 command and receives a response that includes a code of 3. What does this code represent? port unreachable host unreachable protocol unreachable network unreachable

port unreachable

Which two fields are included in the TCP header but not in the UDP header? (Choose two.) destination port checksum sequence number window source port

sequence number window

During a TCP session, a destination device sends an acknowledgment number to the source device. What does the acknowledgment number represent? the last sequence number that was sent by the source one number more than the sequence number the total number of bytes that have been received the next byte that the destination expects to receive

the next byte that the destination expects to receive

Which ICMPv6 message is sent when the IPv6 hop limit field of a packet is decremented to zero and the packet cannot be forwarded? network unreachable port unreachable protocol unreachable time exceeded

time exceeded

In computer communication, what is the purpose of message encoding? to negotiate correct timing for successful communication to break large messages into smaller frames to interpret information to convert information to the appropriate form for transmission

to convert information to the appropriate form for transmission

Why would a manager need to use the tracert command? to display a list of the near-side router interfaces between the source device and the destination device to query the Domain Name System (DNS) to get domain names and mapping information to quickly verify connectivity by sending echo-request messages to the destination and receiving a series of echo-reply messages from that destination to display a list of current processes running on a local or a remote computer

to display a list of the near-side router interfaces between the source device and the destination device

A user complains that the workstation cannot access the network. The network technician asks the user to issue the ping 127.0.0.1 command. What is the purpose of using this command? to test the reachability of a remote network to check that the workstation can reach a DHCP server to verify that the TCP/IP stack is operational to verify that the NIC is configured with a static address

to verify that the TCP/IP stack is operational

A network administrator can successfully ping the server at www.cisco.com, but cannot ping the company web server located at an ISP in another city. Which tool or command would help identify the specific router where the packet was lost or delayed? ipconfig netstat telnet traceroute

traceroute

A network administrator can successfully ping the server at www.cisco.com, but cannot ping the company web server located at an ISP in another city. Which tool or command would help identify the specific router where the packet was lost or delayed? telnet netstat ipconfig traceroute

traceroute

What are two roles of the transport layer in data communication on a network? (Choose two.) tracking the individual communication between applications on the source and destination hosts performing a cyclic redundancy check on the frame for errors identifying the proper application for each communication stream providing the interface between applications and the underlying network over which messages are transmitted providing frame delimiting to identify bits making up a frame

tracking the individual communication between applications on the source and destination hosts identifying the proper application for each communication stream

At which OSI layer is a destination port number added to a PDU during the encapsulation process? data link layer transport layer network layer application layer

transport layer

A user executes a traceroute over IPv6. At what point would a router in the path to the destination device drop the packet? when the value of the Hop Limit field reaches 255 when the target host responds with an ICMP echo reply message when the value of the Hop Limit field reaches zero when the router receives an ICMP time exceeded message

when the value of the Hop Limit field reaches zero

What is an example of a top-level domain? root.cisco.com ww​w.cisco.com .com cisco.com

.com

Which protocol automates assignment of IP addresses on a network, and which port number does it use? (Choose two.) 80 SMB DNS 67 53 DHCP

67 DHCP

Which statement describes a characteristic of cloud computing? A business can connect directly to the Internet without the use of an ISP. Investment in new infrastructure is required in order to access the cloud. Applications can be accessed over the Internet by individual users or businesses using any device, anywhere in the world. Devices can connect to the Internet through existing electrical wiring.

Applications can be accessed over the Internet by individual users or businesses using any device, anywhere in the world.

How does BYOD change the way in which businesses implement networks?​ BYOD devices are more expensive than devices that are purchased by an organization. BYOD provides flexibility in where and how users can access network resources. BYOD users are responsible for their own network security, thus reducing the need for organizational security policies. BYOD requires organizations to purchase laptops rather than desktops.How does BYOD change the way in which businesses implement networks?​ BYOD devices are more expensive than devices that are purchased by an organization. BYOD provides flexibility in where and how users can access network resources. BYOD users are responsible for their own network security, thus reducing the need for organizational security policies. BYOD requires organizations to purchase laptops rather than desktops.

BYOD provides flexibility in where and how users can access network resources.

What process is used in ICMPv6 for a host to verify that an IPv6 address is unique before configuring it on an interface? SLAAC EUI-64 DAD ARP

DAD

Which message does an IPv4 host use to reply when it receives a DHCPOFFER message from a DHCP server? DHCPREQUEST DHCPACK DHCPOFFER DHCPDISCOVER

DHCPREQUEST

Which two services or protocols use the preferred UDP protocol for fast transmission and low overhead? (Choose two) DNS HTTP FTP POP3 VoIP

DNS VoIP

Which protocol supports Stateless Address Autoconfiguration (SLAAC) for dynamic assignment of IPv6 addresses to a host? UDP ICMPv6 ARPv6 DHCPv6

ICMPv6

What is indicated by a successful ping to the ::1 IPv6 address? All hosts on the local link are available. The link-local address is correctly configured. The default gateway address is correctly configured. IP is properly installed on the host. The host is cabled properly.

IP is properly installed on the host.

What characterizes a traceroute utility? It is primarily used to test connectivity between two hosts. It identifies the routers in the path from a source host to a destination host. It sends four Echo Request messages. It utilizes the ICMP Route Redirection messages

It identifies the routers in the path from a source host to a destination host.

Which tool is used to provide a list of open ports on network devices? Tracert Nmap Whois Ping

Nmap

Which protocol enables mail to be downloaded from an email server to a client and then deletes the email from the server? IMAP SMTP POP3 HTTP

POP3

What application layer protocol describes the services that are used for file sharing in Microsoft networks? SMB SMTP Telnet DHCP DNS

SMB

Which two flags in the TCP header are used in a TCP three-way handshake to establish connectivity between two network devices? (Choose two.) FIN SYN ACK PSH RST URG

SYN ACK

Which statement accurately describes a TCP/IP encapsulation process when a PC is sending data to the network? Packets are sent from the network access layer to the transport layer. Data is sent from the internet layer to the network access layer. Frames are sent from the network access layer to the internet layer. Segments are sent from the transport layer to the internet layer.

Segments are sent from the transport layer to the internet layer.

Which transport layer feature is used to guarantee session establishment? TCP port number UDP ACK flag TCP 3-way handshake UDP sequence number

TCP 3-way handshake

What is a benefit of using DDNS? DDNS has a service called ICANN Lookup used to obtain the registration record of a URL. DDNS is a more secure version of DNS and has a robust security profile. DDNS is a starting point for identifying potentially dangerous internet locations that may have been reached through the network. The DDNS provider detects a change to the client IP address and immediately updates the mapping change.

The DDNS provider detects a change to the client IP address and immediately updates the mapping change.

A web client is receiving a response for a web page from a web server. From the perspective of the client, what is the correct order of the protocol stack that is used to decode the received transmission? HTTP, TCP, IP, Ethernet Ethernet, IP, TCP, HTTP Ethernet, TCP, IP, HTTP HTTP, Ethernet, IP, TCP

Ethernet, IP, TCP, HTTP

Which application layer protocol uses message types such as GET, PUT, and POST? HTTP DNS POP3 SMTP DHCP

HTTP

Which protocol is used by ping to test connectivity between network hosts? ARP DHCP ICMP TCP

ICMP

Data is being sent from a source PC to a destination server. Which three statements correctly describe the function of TCP or UDP in this situation? (Choose three.) The TCP source port number identifies the sending host on the network. The source port field identifies the running application or service that will handle data returning to the PC. UDP segments are encapsulated within IP packets for transport across the network. The UDP destination port number identifies the application or service on the server which will handle the data. TCP is the preferred protocol when a function requires lower network overhead. The TCP process running on the PC randomly selects the destination port when establishing a session with the server.

The source port field identifies the running application or service that will handle data returning to the PC. UDP segments are encapsulated within IP packets for transport across the network. The UDP destination port number identifies the application or service on the server which will handle the data.

What is a characteristic of a TCP server process? A host running two different applications can have both configured to use the same server port. There can be many ports open simultaneously on a server, one for each active server application. An individual server can have two services assigned to the same port number within the same transport layer services. Every application process running on the server has to be configured to use a dynamic port number.

There can be many ports open simultaneously on a server, one for each active server application.


Related study sets

Chapter 8: Disorders of Fluid, Electrolyte, and Acid-Base Balance - ML4

View Set

Chapter 17: Heart and Neck Vessels Assessment

View Set

Number the Stars Section 3 Quiz Questions

View Set

MEDSURG II: Saunders End of Life Care

View Set