NetAcad Quizzes Modules 12-15
Which protocol is used by IPv4 and IPv6 to provide error messaging? A. ICMP B. DHCP C. NDP D. ARP
A - Topic 13.1.0 - ICMP is used by IPv4 and IPv6 to provide for messages to be sent in the event of certain errors and for informational purposes.
Which command can be used to test connectivity between two devices using echo request and echo reply messages? A. ping B. ICMP C. netstat D. ipconfig
A - Topic 13.2.0 - Ping is used to test connectivity between end devices. It can be used with both IPv4 and IPv6. Ping uses the ICMP protocol which issues an echo request/echo reply. The ipconfig command is used at the command line of a Windows computer to display IP addressing information. Netstat is used to display the local routing table.
A network administrator can successfully ping the server at www.cisco.com, but cannot ping the company web server located at an ISP in another city. Which tool or command would help identify the specific router where the packet was lost or delayed? A. traceroute B. telnet C. netstat D. ipconfig
A - Topic 13.2.0 - The traceroute command provides connectivity information about the path a packet takes to reach the destination and about every router (hop) along the way. It also indicates how long a packet takes to get from the source to each hop and back.
What is the purpose of using a source port number in a TCP communication? A. To keep track of multiple conversations between devices B. To assemble the segments that arrived out of order C. To notify the remote device that the conversation is over D. To inquire for a nonreceived segment
A - Topic 14.4.0 - The source port number in a segment header is used to keep track of multiple conversations between devices. It is also used to keep an open entry for the response from the server. The incorrect options are more related to flow control and guaranteed delivery.
What is the complete range of TCP and UDP well-known ports? A. 0 to 1023 B. 256 - 1023 C. 1024 - 49151 D. 0 to 255
A - Topic 14.4.0 - There are three ranges of TCP and UDP ports. The well-know range of port numbers is from 0 - 1023.
Which protocol uses encryption? A. HTTPS B. DNS C. FTP D. DHCP
A - Topic 15.1.0 - HTTPS uses Secure Socket Layer (SSL) to encrypt traffic accessed from a web server.
What is the interface ID of the IPv6 address 2001:DB8::1000:A9CD:47FF:FE57:FE94/64? A. FE57:FE94 B. 47FF:FE57:FE94 C. A9CD:47FF:FE57:FE94 D. 1000:47FF:FE57:FE94 E. FE94
C - Topic 12.2.0 - The interface ID of an IPv6 address is the rightmost 64 bits, or last four hextets, of the address if no interface ID bits have been used for subnets.
What is the valid most compressed format possible of the IPv6 address 2001:0DB8:0000:AB00:0000:0000:0000:1234? A. 2001:DB8:0:AB:0:1234 B. 2001:DB8::AB00::1234 C. 2001:DB8:0:AB00::1234 D. 2001:DB8:0:AB:0::1234
C - Topic 12.2.0 - There are two rules defining how an IPv6 address can be compressed. The first rule states that leading zeros in a hextet can be eliminated. The second rule states that a single :: can be used to represent one or more contiguous all zero hextets. There can be one and only one :: in an IPv6 address.
Which address type is not supported in IPv6? A. unicast B. private C. broadcast D. multicast
C - Topic 12.3.0 - IPv6 supports unicast, private, and multicast addresses but does not support Layer 3 broadcasts.
Which utility uses the Internet Control Messaging Protocol (ICMP)? A. RIP B. DNS C. ping D. NTP
C - Topic 13.1.0 - ICMP is used by network devices to send error messages.
What field content is used by ICMPv6 to determine that a packet has expired? A. CRC field B. Time Exceeded field C. Hop Limit field D. TTL field
C - Topic 13.1.0 - ICMPv6 sends a Time Exceeded message if the router cannot forward an IPv6 packet because the packet expired. The router uses a hop limit field to determine if the packet has expired, and does not have a TTL field.
Which protocol provides feedback from the destination host to the source host about errors in packet delivery? A. DNS B. ARP C. ICMP D. BOOTP
C - Topic 13.1.0 - The ICMP protocol operates at Layer 3 of the OSI model, which is the Internet layer of the TCP/IP model. ICMP encapsulates the ping and traceroute commands.
A user calls to report that a PC cannot access the internet. The network technician asks the user to issue the command ping 127.0.0.1 in a command prompt window. The user reports that the result is four positive replies. What conclusion can be drawn based on this connectivity test? A. The PC can access the Internet. However, the web browser may not work. B. The IP address obtained from the DHCP server is correct. C. The TCP/IP implementation is functional D. The PC can access the network. The problem exists beyond the local network.
C - Topic 13.2.0 - The ping 127.0.0.1 command is used to verify that the TCP/IP stack is functional. It verifies the proper operation of the protocol stack from the network layer to physical layer, without sending a signal on the media. That is, this test does not go beyond the PC itself. For example, it does not detect whether a cable is connected to the PC or not.
What is indicated by a successful ping to the ::1 IPv6 address? A. The default gateway is correctly configured. B. The host is cabled properly. C. All hosts at the local link are available. D. The link-local address is correctly configured. E. IP is properly installed on the host.
E - Topic 12.2.0 - The IPv6 address ::1 is the loopback address. A successful ping to this address means that the TCP/IP stack is correctly installed. It does not mean that any addresses are correctly configured.
Which two flags in the TCP header are used in a TCP three-way handshake to establish connectivity between two network devices? (Choose two.) A. FIN B. PSH C. RST D. SYN E. URG F. ACK
D,F - Topic 14.5.0 - TCP uses the SYN and ACK flags in order to establish connectivity between two network devices.
Which type of IPv6 address is not routable and used only for communication on a single subnet? A. unique local address B. loopback address C. unspecified address D. global unicast address E. link-local address
E - Topic 12.3.0 - Link-local addresses have relevance only on the local link. Routers will not forward packets that include a link-local address as either the source or destination address.
What is the prefix associated with the IPv6 address 2001:DB8:D15:EA:CC44::1/64? A.2001:DB8:D15:EA::1/64 B. 2001::/64 C.2001:DB8:D15:EA:CC44::/64 D.2001:DB8::1/64
A - Topic 12.3.0 - The /64 represents the network and subnet IPv6 fields. The fourth field of hexadecimal digits is referred to as the subnet ID. The subnet ID for this address is 2001:DB8:D15:EA::0/64.
Your organization is issued the IPv6 prefix of 2001:db8:130f::/48 by your service provider. With this prefix, how many bits are available for your organization to create /64 subnetworks if interface ID bits are not borrowed? A. 16 B. 128 C. 80 D. 8
A - Topic 12.8.0 - The global routing prefix that is assigned to the organization has 48 bits. The next 16 bits are used for the subnet ID. This makes up the first 64 bits of the address, which is typically the network portion of the address. The remaining 64 bits of the 128-bit IPv6 address are for the interface ID (or host) portion of the address.
What are two characteristics of the application layer of the TCP/IP model? (Choose two.) A. closest to the end user B. responsible for physical addressing C. the creation and maintenance of dialogue between source and application destinations D. B. responsible for logical addressing
A, C - Topic 15.1.0 - The application layer of the TCP/IP model is the layer that is closest to the end user, providing the interface between the applications. It is responsible for formatting, compressing, and encrypting data, and is used to create and maintain dialog between source and destination applications.
Which three protocols or standards are used at the application layer of the TCP/IP model? (Choose three.) A. HTTP B. UDP C. GIF D. IP E. TCP F. MPEG
A, C, F - Topic 15.1.0 - HTTP, MPEG, and GIF operate at the application layer of the TCP/IP model. TCP and UDP operate at the transport layer. IP operates at the internet layer.3
What are three parts of an IPv6 global unicast address? (Choose three.) A. an interface ID that is used to identify the local host on the network B. a global routing prefix that is used to identify the portion of the network address provided by a local administrator C. an interface ID that is used to identify the local network for a particular network D. a subnet ID that is used to identify networks inside of the local enterprise network E. a global routing prefix that is used to identify the portion of the network address provided by an ISP
A, D, E - Topic 12.3.0 - There are three elements that make up an IPv6 global unicast address. A global routing prefix which is provided by an ISP, a subnet ID which is determined by the organization, and an interface ID which uniquely identifies the interface interface of a host.
Which two things can be determined by using the ping command? (Choose two.) A. the average time it takes a packet to reach a destination and the response to return to the source B. the number of routers between the source and destination device C. the average time it takes each router in the path between source and destination to respond D. the destination device is reachable through the network E. the IP address of the router nearest the destination device
A,D - Topic 13.2.0 - A ping command provides feedback on the time between when an echo request was sent to a remote host and when the echo reply was received. This can be a measure of network performance. A successful ping also indicates that the destination host was reachable through the network.
What is the most compressed representation of the IPv6 address 2001:0db8:0000:abcd:0000:0000:0000:0001? A. 2001:0db8:abcd::0001 B. 2001:db8:0:abcd::1 C. 2001:0db8:0000:abcd::1 D. 2001:0db8:abcd::1 E. 2001:db8::abcd:0:1
B - Topic 12.2.0 - The IPv6 address 2001:0db8:0000:abcd:0000:0000:0000:0001 in its most compressed format would be 2001:db8:0:abcd::1. The one leading zero in the second hextet can be removed. The first hextet of zeros would be compressed to a single zero. The three consecutive hextets of zeros can be compressed to a double colon ::. The three leading zeros in the last hextet can be removed. The double colon :: can only be used once in an address.
At a minimum, which address is required on IPv6-enabled interfaces? A. global unicast B. link-local C. unique local D. site local
B - Topic 12.3.0 - All IPv6 enabled interfaces must at minimum have a link-local address. Other IPv6 addresses can be assigned to the interface as required.
Which IPv6 network prefix is only intended for local links and can not be routed? A. 2001::/3 B. FE80::/10 C. FC00::/7 D. FF00::/12
B - Topic 12.3.0 - FE80::/10 is a link-local prefix. Devices with only link-local addresses can communicate with other devices on the same network but not with devices on any other network.
Which ICMP message is used by the traceroute utility during the process of finding the path between two end hosts? A. ping B. time exceeded C. destination unreachable D. redirect
B - Topic 13.1.0 - Traceroute progressively increments the TTL (IPv4) or hop limit (IPv6) field (1, 2, 3, 4...) for sending sequence of ping commands. When a router senses that the TTL or hop limit is 0, it will discard the packet and send a time exceeded message to the source of the traceroute. The returned message contains the IP address of the router that discarded the packet. Hence the traceroute utility learns the address of the router. This process continues and provides the trace with the address of each hop (router) as the packets continue traveling through routers to reach the destination.
What is a function of the tracert command that differs from the ping command when they are used on a workstation? A. The tracert command sends one ICMP message to each hop in the path. B. The tracert command shows the information of routers in the path. C. The tracert command is used to test the connectivity between two devices. D. The tracert command reaches the destination faster.
B - Topic 13.2.0 - The tracert command sends three pings to each hop (router) in the path toward the destination and displays the domain name and IP address of hops from their responses. Because tracert uses the ping command, the travel time is the same as a standalone ping command. The primary function of a standalone ping command is to test the connectivity between two hosts.
What is a socket? A. the combination of the source and destination IP addresses and destination Ethernet address B. the combination of the source IP address and port number or destination IP address and port number C. the combination of the source and destination sequence and acknowledgement numbers D. the combination of the source and destination sequence numbers and port numbers
B - Topic 14.4.0 - A socket is a combination of the source IP address and source port or the destination IP address and the destination port number.
What TCP mechanism is used to enhance performance by allowing a device to continuously send a steady stream of segments as long as the device is also receiving necessary acknowledgements? A. two-way handshake B. sliding window C. three-way handshake D. socket pair
B - Topic 14.6.0 - TCP uses windows to attempt to manage the rate of transmission to the maximum flow that the network and destination device can support while minimizing loss and retransmissions. When overwhelmed with data, the destination can send a request to reduce the of the window. The process of the destination sending acknowledgments as it processes bytes received and the continual adjustment of the source send window is known as sliding windows.
Which action is performed by a client when establishing communication with a server via the use of UDP at the transport layer? A. The client randomly sends a synchronization segment to start the session B. The client randomly selects a source port number C. The client sets the window size for the session D. The client sends an ISN to the server to start the 3-way-handshake
B - Topic 14.7.0 - Because a session does not have to be established for UDP, the client selects a random source port to begin a connection. The random port number selected is inserted into the source port field of the UDP header.
When retrieving email messages, which protocol allows for easy, centralized storage and backup of emails that would be desirable for a small- to medium-sized business? A. HTTP B. IMAP C. SMTP D. POP
B - Topic 15.3.0 - IMAP is preferred for small-to medium-sized businesses as IMAP allows centralized storage and backup of emails, with copies of the emails being forwarded to clients. POP delivers the emails to the clients and deletes them on the email server. SMTP is used to send emails and not to receive them. HTTPS is not used for secure web browsing.
Why is DHCP for IPv4 preferred for use on large networks? A. Hosts on large networks require more IPv4 addressing configuration settings than hosts on small networks B. It is a more efficient way to manage IPv4 addresses than static address assignment is C. Large networks send more requests from domain to IP address resolution than do smaller networks D. It prevents sharing of files that are copyrighted E. DHCP uses a reliable transport layer protocol
B - Topic 15.4.0 - Static IPv4 address assignment requires personnel to configure each network host with addresses manually. Large networks can change frequently and have many more hosts to configure than do small networks. DHCP provides a much more efficient means of configuring and managing IPv4 addresses on large networks than does static address assignment.
What part of the URL, http://www.cisco.com/index.html, represents the top-level DNS domain? A. http B. .com C. index D. www
B - Topic 15.4.0 - The components of the URL http://www.cisco.com/index.html are as follows: http = protocol www = part of the server name cisco = part of the domain name index = file name com = the top-level domain
Which application layer protocol is used to provide file-sharing and print services to Microsoft applications? A. HTTP B. SMB C. DHCP D. SMTP
B - Topic 15.5.0 - SMB is used in Microsoft networking for file-sharing and print services. The Linux operating system provides a method of sharing resources with Microsoft networks by using a version of SMB called SAMBA.
Which two operations are provided by TCP but not by UDP? (Choose two.) A. reconstructing data in the order received B. acknowledging received data C. identifying the applications D. identifying individual conversations E. retransmitting any unacknowledged data
B, E - Topic 14.1.0 - Numbering and tracking data segments, acknowledging received data, and retransmitting any unacknowledged data are reliability operations to ensure that all of the data arrives at the destination. UDP does not provide reliability. Both TCP and UDP identify the applications and track individual conversations. UDP does not number data segments and reconstructs data in the order that it is received.
A user who is unable to connect to the file server contacts the help desk. The helpdesk technician asks the user to ping the IP address of the default gateway that is configured on the workstation. What is the purpose for this ping command? A. to resolve the domain name of the file server to its IP address B. to request that gateway forward the connection request to the file server C. to test that the host has the capability to reach hosts on other networks D. to obtain a dynamic IP address from the server
C - Topic 13.2.0 - The ping command is used to test connectivity between hosts. The other options describe tasks not performed by ping. Pinging the default gateway will test whether the host has the capability to reach hosts on its own network and on other networks.
A technician is troubleshooting a network where it is suspected that a defective node in the network path is causing packets to be dropped. The technician only has the IP address of the end point device and does not have any details of the intermediate devices. What command can the technician use to identify the faulty node? A. ipconfig /flushdns B. ping C. tracert D. ipconfig /displaydns
C - Topic 13.2.0 - The ping command is used to verify connectivity to a device,the commands ipconfig /flushdns will cause the adapter to flush the DNS cache, while ipconfig /displaydns will result in the display of the DNS information in the cache.
A network administrator is testing network connectivity by issuing the ping command on a router. Which symbol will be displayed to indicate that a time expired during the wait for an ICMP echo reply message? A. U B. ! C. . D. $
C - Topic 13.2.0 - When the ping command is issued on a router, the most common indicators are as follows: ! - indicates receipt of an ICMP echo reply message . - indicates a time expired while waiting for an ICMP echo reply message U - an ICMP message of unreachability was received
How does a networked server manage requests from multiple clients for different services? A. Each request is tracked through the physical address of the client B. The server uses IP addresses to identify different services C. Each request has a combination of source and destination port numbers, coming from a unique IP address D. The server sends all requests through a default gateway
C - Topic 14.4.0 - Each service provided by a server, such as email or file transfers, uses a specific port number. The source port number of a service request identifies the client that is requesting services. The destination port number identifies the specific service. Servers do not use address information to provide services. Routers and switches use addressing information to move traffic through the network.
Which transport layer feature is used to establish a connection-oriented session? A. UDP ack flag B. UDP sequence number C. TCP 3-way handshake D. TCP port number
C - Topic 14.5.0 - TCP uses the 3-way handshake. UDP does not use this feature. The 3-way handshake ensures there is connectivity between the source and destination devices before transmission occurs.
What happens if part of an FTP message is not delivered to the destination? A. The FTP source host sends a query to the destination host. B. The entire FTP message is re-sent. C. The part of the FTP message that was lost is re-sent. D. The message is lost because FTP does not use a reliable delivery method
C - Topic 14.6.0 - Because FTP uses TCP as its transport layer protocol, sequence and acknowledgment numbers will identify the missing segments, which will be re-sent to complete the message.
Which TCP/IP model layer is closest to the end user? A. network access B. internet C. application D. transport
C - Topic 15.1.0 - End users use applications to interact with and use the network. The application layer of the TCP/IP model is closest to the end user. Application layer protocols are used to communicate and exchange messages with other network devices and applications. The layers of the TCP/IP model are from top to bottom (memory aid - ATIN): application, transport, internet, network access
What message type is used by an HTTP client to request data from a web server? A. ACK B. PUT C. GET D. POST
C - Topic 15.3.0 - HTTP clients send GET messages to request data from web servers.
A wireless host needs to request an IPv4 address. What protocol would be used to process the request? A. SNMP B. ICMP C. DHCP D. HTTP E. FTP
C - Topic 15.4.0 - The DHCP protocol is used to request, issue, and manage IP addressing information. CSMA/CD is the access method used with wired Ethernet. ICMP is used to test connectivity. SNMP is used with network management and FTP is used for file transfer.
Which statement is true about FTP? A. The client can choose if FTP is going to establish one or two connections with the server B. FTP does not provide reliability during data transmission C. The client can download data from or upload data to the server D. FTP is a peer-to-peer application
C - Topic 15.5.0 - FTP is a client/server protocol. FTP requires two connections between the client and the server and uses TCP to provide reliable connections. With FTP, data transfer can happen in either direction. The client can download (pull) data from the server or upload (push) data to the server.
What is the purpose of the command ping ::1? A. It tests the reachability of the default gateway for the network. B. It tests the broadcast capability of all hosts on the subnet. C. It tests the multicast capability of all hosts on the subnet. D. It tests the internal configuration of an IPv6 host.
D - Topic 12.2.0 - The address ::1 is an IPv6 loopback address. Using the command ping ::1 tests the internal IP stack to ensure that it is configured and functioning correctly. It does not test reachability to any external device, nor does it confirm that IPv6 addresses are properly configured on the host.
What type of address is automatically assigned to an interface when IPv6 is enabled on that interface? A. global unicast B. loopback C. unique local D. link-local
D - Topic 12.3.0 - When IPv6 is enabled on any interface, that interface will automatically generate an IPv6 link-local address.
What is the minimum configuration for a router interface that is enabled for IPv6? A. to have both an IPv4 and an IPv6 address B. to have a self-generated loopback address C. to have both a link-local and a global unicast IPv6 address D. to have a link-local IPv6 address
D - Topic 12.3.0 - With IPv6, a router interface typically has more than one IPv6 address. The router will at least have a link-local address that can be automatically generated, but the router commonly has an global unicast address also configured.
What is the network address for the IPv6 address 2001:DB8:AA04:B5::1/64? A. 2001:DB8::1/64 B. 2001:DB8:AA04::/64 C. 2001::/64 D. 2001:DB8:AA04:B5::/64
D - Topic 12.8.0 - The /64 represents the network and subnet IPv6 fields which are the first four groups of hexadecimal digits. The first address within that range is the subnetwork address of 2001:DB8:AA04:B5::/64.
What message is sent by a host to check the uniqueness of an IPv6 address before using that address? A. router solicitation B. echo request C. ARP request D. neighbor solicitation
D - Topic 13.1.0 - In IPv6, Duplicate Address Detection (DAD) is used in place of ARP. An IPv6 host performs DAD by sending a neighbor solicitation (NS) message to its own IPv6 address to ensure the uniqueness of the address prior to using it.
What type of applications are best suited for using UDP? A. applications that need reliable delivery B. applications that are sensitive to packet loss C. applications that require retransmission of lost segments D. applications that are sensitive to delay
D - Topic 14.3.0 - UDP is not a connection-oriented protocol and does not provide retransmission, sequencing, or flow control mechanisms. It provides basic transport layer functions with a much lower overhead than TCP. Lower overhead makes UDP suitable for applications which are sensitive to delay.
Which number or set of numbers represents a socket? A. 01-23-45-67-89-AB B. 21 C. 10.1.1.15 D. 192.168.1.1:80
D - Topic 14.4.0 - A socket is defined by the combination of an IP address and a port number, and uniquely identifies a particular communication.
Network congestion has resulted in the source learning of the loss of TCP segments that were sent to the destination. What is one way that the TCP protocol addresses this? A. The destination decreases the window size. B. The destination sends fewer acknowledgement messages in order to conserve bandwidth. C. The source decreases the window size to decrease the rate of transmission from the destination. D. The source decreases the amount of data that it transmits before receiving an acknowledgement from the destination.
D - Topic 14.6.0 - If the source determines that the TCP segments are either not being acknowledged or are not acknowledged in a timely manner, then it can reduce the number of bytes it sends before receiving an acknowledgment. This does not involve changing the window in the segment header. The source does not decrease the window that is sent in the segment header. The window in the segment header is adjusted by the destination host when it is receiving data faster than it can process it, not when network congestion is encountered.
An author is uploading one chapter document from a personal computer to a file server of a book publisher. What role is the personal computer assuming in this network model? A. transient B. slave C. master D. client E. server
D - Topic 15.2.0 - In the client/server network model, a network device assumes the role of server in order to provide a particular service such as file transfer and storage. The device requesting the service assumes the role of client. In the client/server network model, a dedicated server does not have to be used, but if one is present, the network model being used is the client/server model. In contrast, the peer-to-peer network model does not have a dedicated server.
Which protocol can be used to transfer messages from an email server to an email client? A. SNMP B. HTTP C. POP3 D. SMTP
D - Topic 15.3.0 - SMTP is used to send mail from the client to the server but POP3 is used to download mail from the server to the client. HTTP and SNMP are protocols that are unrelated to email.
On a home network, which device is most likely to provide dynamic IPv4 addressing to clients on the home network? A. an ISP DHCP server B. a DNS server C. a dedicated file server D. a home router
D - Topic 15.4.0 - On a home network, a home router usually serves as the DHCP server. The home router is responsible for dynamically assigning IPv4 addresses to clients on the home network. ISPs also use DHCP, but it usually assigns an IPv4 address to the Internet interface of the home router, not the clients on the home network. In businesses, it is common to have a file or other dedicated server provide DHCP services to the network. Finally, a DNS server is responsible for finding the IP address for a URL, not for providing dynamic addressing to network clients.
Which two services or protocols use the preferred UDP protocol for fast transmission and low overhead? (Choose two) A. FTP B. POP3 C. HTTP D. VoIP E. DNS
D, E - Topic 14.3.0 - Both DNS and VoIP use UDP to provide low overhead services within a network implementation.
Which two tasks can be performed by a local DNS server? (Choose two.) A. providing IP addresses to local hosts B. retrieving email addresses C. allowing data transfer between two network devices D. forwarding name resolution requests between servers E. mapping name-to-IP addresses for internal hosts
D,E - Topic 15.4.0 - Two important functions of DNS are to (1) provide IP addresses for domain names such as www.cisco.com, and (2) forward requests that cannot be resolved to other servers in order to provide domain name to IP address translation. DHCP provides IP addressing information to local devices. A file transfer protocol such as FTP, SFTP, or TFTP provides file sharing services. IMAP or POP can be used to retrieve an email message from a server.
What is a responsibility of transport layer protocols? A. translating private IP addresses into public IP addresses B. tracking individual conversations C. determining the best path forward to a packet D. providing network access
Topic 14.1.0 - There are three main responsibilities for transport layer protocols TCP and UDP: Tracking individual conversations Segmenting data and reassembling segments Identifying the applications