Intro to TCP/IP Part 1

Ace your homework & exams now with Quizwiz!

A technician wants to block remote logins to a server. Which of the following ports should be blocked?

(Telnet) port 23

Which of the following is a valid IP address assigned through APIPA?

169.254.1.221

Which IP addresses are from a private IP address pool?

A. 10.1.202.11 B. 192.168.1.202 C. 172.16.22.1

John, a network administrator, is setting up a new server for the company's network. Which port and service should he open to allow the newly installed server to assign IP addresses for the devices connecting with the network?

A. DHCP B. 67

A junior network technician is setting up a new email server on the company network. Which of the following default ports should the technician ensure is open on the firewall so the new email server can relay email?

A. Simple Mail Transfer Protocol (SMTP) B. TCP port 25

What are the two TCP channels FTP works on?

A. TCP port 20 for data transfer B. TCP port 21 for control command

Maria, a network administrator, gets a call regarding intermittent network outages across the country. Which of the following should be used to connect to the network so the administrator can troubleshoot this issue from home?

A. VPN B. SSH

What are the three parts DNS name composed of and give an example of one?

A. computer name-www (Or an alias) B. domain name-ucertify C. top-level domain name-com D. Example-www.ucertify.com

What is the key function of APIPA?

A. to allow resources to be available even if the DHCP server is offline B. 169.254.0.1 and 169.254.255.254 and use a subnet mask of 255.255.0.0.

A technician has been informed that multiple users are receiving duplicate IP address warnings on their workstations, and they are unable to browse the Internet. Which of the following server types should the technician log in to in order to resolve the problem?

DHCP server

What maintains a database of domain and host names, and their corresponding IP addresses?

DNS server

In most implementations, What does LDAP relies on?

DNS service

Ann, a user, contacts a technician to request a list of all static IP addresses in the building. Which of the following server roles would the technician most likely review to find that information?

Dynamic Host Configuration Protocol (DHCP) server

What is a TCP/IP protocol that enables the transfer of files between a user's workstation and a remote host?

File Transfer Protocol (FTP)

What is the practice of tricking an attacker into accessing an isolated network?

Honeypot

What is a software that monitors the device on which it is installed to identify deviations from an established security policy?

Host intrusion detection system (HIDS)

What can be used to manage access control to several services by using one centralized authentication server?

Kerberos

What is an authentication service that is based on a time-sensitive ticket-granting system?

Kerberos

What provides confidentiality and integrity for authentication traffic using end-to-end security and helps to prevent eavesdropping and replay attacks?

Kerberos

What relies upon symmetric-key cryptography using the Advanced Encryption Standard (AES) symmetric encryption protocol?

Kerberos

Which of the following provides a single sign-on solution for users and also provides protection for login credentials?

Kerberos

Which of the following is a directory service protocol that defines how a client can access information and perform operations?

Lightweight Directory Access Protocol (LDAP)

What is a subset of dynamic NAT functionality that maps either one or multiple unregistered addresses to a single registered address using multiple ports?

Port Address Translation (PAT)

What is a protocol that enables a server to provide standardized, centralized authentication for remote users?

Remote Authentication Dial-In User Service (RADIUS)

Which of the following enables a server to provide standardized and centralized authentication for remote users?

Remote Authentication Dial-In User Service (RADIUS)

which is a proprietary protocol created by Microsoft for connecting to and managing computers that are not necessarily located at the same place as the administrator?

Remote Desktop Protocol (RDP)

What is a protocol that enables a user or an application to log on to another device over a network, execute commands, and manage file?

Secure Shell (SSH)

Which is a UNIX/Linux-based protocol that enables a user or application to log on to another computer over a network, execute commands, and manage files?

Secure Shell (SSH)

What is a security protocol that combines digital certificates for authentication with public key data encryption?

Secure Sockets Layer (SSL)

What provides security of a message transmission on the Internet?

Secure Sockets Layer (SSL)

Which of the following protocols is used for file sharing between MAC OS and Windows OS workstations on a LAN?

Server Message Block (SMB)

which is a terminal emulation protocol that enables users at one site to simulate a session on a remote host as if the terminal were directly attached?

Telecommunications Network (Telnet)

What is an authentication protocol that provides centralized authentication and authorization services for remote users?

Terminal Access Controller Access Control System Plus (TACACS+)

Andrew, a technician, is tasked to provide outside access to a server within the company network so that sensitive documents can be worked on from home. Which of the following will help him to accomplish the task?

Virtual Private Network (VPN)

You want to connect to resources from an offsite location while ensuring the traffic is secured. Which of the following will you use to gain access to the secure network?

Virtual Private Network (VPN)

What is a private network configured by tunneling through a public network, such as the Internet?

Virtual private network (VPN)

What is used to reduce the number of NetBIOS name resolution broadcasts on networks that use NetBIOS naming?

Windows Internet Name Service (WINS)

What is a specification for a suite of high-level communication protocols using small and low-power digital radio?

Zigbee

what provides access to shared applications, including data warehousing, data processing, and other applications shared among multiple users?

application server

What rovides access to databases, including those for customer information, provided by database software such as Oracle or SQL Server?

database server

Which of the following is a hierarchical scheme of databases that map computer names to their associated IP addresses?

domain name system (DNS)

What provides a central repository for users to store, manage, and access files on the network?

file server

What is a device that isolates internal networks from the servers by downloading and storing files on behalf of clients?

proxy server

What provides access to personal, corporate, or education website content?

web server


Related study sets

Mitral stenosis and mitral regurgitation

View Set

representations; material misrepresentations; fraud

View Set

Chapter 3- Void and Voidable Marriages Overview

View Set