Network Questions

Ace your homework & exams now with Quizwiz!

Which of the following ports is in the registered port range?

3389

At what rate is data transmitted using 40GBASE-T?

40Gbits/s

Which of the following ports is in the well-known port range?

443

Which parameter can be used with the ping command to send a constant stream of packets when using a Windows device? -f -p /all -g -t

-t

HTTP and HTTPS are TCP-based protocols. Which of the following ports do they use?

80 and 443 HTTP and HTTPS protocols use port numbers 80 and 443. HTTPS is an example of a secure protocol because it runs over SSL. Port 81 is not one of the well-known ports but can be used as a custom port for applications. Port 25 is a well-known port used by SMTP protocol. UDP port number 514 is used by the SYSLOG protocol.

Which of the following causes an evident loss of decibel?

Increased attenuation

What address range is used for APIPA?

169.254.0.1 through 169.254.255.254

Which DNS record type maps FQDN's to an IPv4 address?

A

Which permission allows a user access to a resource but not resources? Username Password Authentication Authorization

Authentication

Which protocol can be used to connect to and control Microsoft computers?

Both choices will work

Which tool is used to connect a media connector to the end of a cable?

Cable Crimper

Which tool is used to test an Ethernet cable and creates a loopback connection?

Cable Tester

When implementing an organized cable management solution, which of the following are required to help keep the system organized? [Choose all that apply]

Cable ties, Cable labels, Color-coded cables Cable Hub is not a component used to keep cables organized. It is an adapter used to transmit data signals from one device to the other.

How do you obtain a socket used for communication on a computer network?

Combining an IP address and port separated by a colon

While configuring a new VPN client, which Role service needs to be installed for the Remote Access role on a Windows server? Direct Access and VPN (RAS) .Net Framework 4.5 Web Application Proxy Routing

Direct Access and VPN (RAS)

What is the arp -a command used for on a Windows device? Displays address resolution table for the device Displays the DNS configuration for the device Displays the IP configuration for the device Resolves IP addresses to hostname Displays the local routing table for the device

Displays address resolution table for the device

What numbering system do humans use to write MAC addresses?

Hexadecimal

Which two protocols manage neighbor discovery processes on IPv4 networks? a. NDP and Ethernet b. IPv4 and IPv6 c. TCP and UDP d. ICMP and ARP

ICMP and ARP

To which IEEE standard is Ethernet cabling specifications measured against?

IEEE Standard 802.3

When examining tunneling protocols, which choice is a component of the IPsec protocol suite?

IKEv2

What is the combination of a public key and a private key known as? Private key encryption IPsec Key pair Public key encryption

Key pair

You work as a network administrator in a domain environment. You have a new firewall and need to configure it. You are asked to create web filtering and firewall rules based on domain groups. Which of the following protocol will you use to integrate your firewall directly with Active Directory? OpenLDAP LDAP FTP RADIUS RDP

LDAP

Which is a hardware device that is used for troubleshooting network transmission issues?

Loopback Adapter

Which tool uses red and black probes to measure voltage?

Multimeter

Which permission needs to be assigned to a user to be able to connect to a VPN connection? Network Administrator permissions VPN permissions Network Access permissions Local administrator permissions

Network Access permissions

You, as a network administrator, want to open up a port that will allow you to send data using the file transfer protocol. However, the files you wish to transfer are boot files. Which of the following ports will you open up to carry out this operation? Port 20 Port 22 Port 69 Port 989

Port 69

To be able to remotely manage a Windows device securely, which of the following protocols can be used? RDP SSH RDG VPN

RDP

Rodriguez has been hired as a network administrator by MJF Tires to create an IPsec suite wherein a definitive set of rules are laid down for encryption, authentication, and key management of TCP/IP transmissions. After accessing the basic network traffic, Rodriguez wants to create a secure channel so that the IP packet's data payload can be authenticated through public key techniques. Analyze which of the following steps Rodriguez must complete after establishing a secure channel. Use IPsec initiation for completion Use the IKE to establish security parameters Use ISAKMP for managing keys Renegotiate and reestablish the connection before the current session gets timed out

Renegotiate and reestablish the connection before the current session gets timed out

Which types of cables are mainly used in elevator shafts that can prevent fire?

Riser-rated

When implementing secure remote file access which choices will be incompatible with each other?

SFTP / FTPS

You work as a network administrator and are responsible for configuring network firewalls, routers and switches. You have configured rules between the user and server VLANs. You received a request from your development team to create a new rule that allows port TCP 1433 to the database server. Based on the port number, which database is installed on the server. MySQL SQL PostgreSQL OrientDB Oracle

SQL

Which of the following fields in a TCP segment identifies the data segment's position in the stream of data segments being sent? Reserved Sequence number Source port Acknowledgment number

Sequence number

Which of the following connection methods can be used to connect a company's offices which are located in different geographical areas? RDP SSH Client-to-Site VPN Site-to-Site VPN

Site-to-Site VPN

Telnet, SSH, and VNC are which type of software?

Terminal Emulation

When executing the tracert 192.168.0.10 command, what can be determined from the output? The MAC address for the specified IP address The default gateway for the local device The DNS name for the specific IP address The route it will take to reach the destination IP address

The route it will take to reach the destination IP address

Which of the following is the data rate that defines the amount of data transmitted in a specific time?

Throughput

You are the network administrator for Jungle Technologies, and you have to create a data stream within an application that will mark a certain section of the data stream to be more urgent than the normal stream. In which of the following fields of TCP segment will you specify this information? Urgent pointer Checksum Source port Acknowledgment number

Urgent pointer

What protocol must be allowed through a firewall for tracert to work correctly? a. ICMP b. SSH c. TLS d. NDP

a. ICMP The Windows tracert utility sends an ICMP (Internet Control Message Protocol) echo request to the destination node and listens for an ICMP echo reply from that node.

Which kind of crosstalk occurs between wire pairs near the source of the signal?

a. NEXT

Which cable is best suited for ultra-high-speed connections between a router and a switch on the same rack?

a. Passive twinaxial cable

Which remote file access protocol is an extension of SSH? a. SFTP b. HTTPS c. TFTP d. FTPS

a. SFTP

What is the Internet standard MTU?

b. 1,500 bytes

Which transmission characteristic is never fully achieved?

b. Bandwidth

Which two protocols manage neighbor discovery processes on IPv4 networks?

b. ICMP and ARP

Which encryption protocol does GRE use to increase the security of its transmissions?

b. IPsec

Which of these protocols does not include some kind of integrity check field in its header? a. IPv4 b. IPv6 c. TCP d. ICMP

b. IPv6 IPv6 does not include its own checksum field. Instead, IPv6 requires that the transport layer header (TCP or UDP) include a checksum field. IPv4 and ICMP both include a checksum field as well, either for the header or for the entire packet.

Which encryption benchmark ensures data is not modified after it's transmitted and before it's received?

b. Integrity

Which fiber connector contains two strands of fiber in each ferrule?

b. MT-RJ

What is one advantage offered by VDI over RDS and VNC? a. Supports remote access to mobile devices b. Offers access to multiple OSs in VMs c. Provides open source flexibility d. Allows multiple users to sign in at once

b. Offers access to multiple OSs in VMs VDI (virtual desktop infrastructure)

Which remote file access protocol is an extension of SSH?

b. SFTP

Suppose you're creating patch cables to be used in a government office. What color wire goes in the first pin?

b. White/green

You're getting a duplicate IP address error on your computer and need to figure out what other device on your network is using the IP address 192.168.1.56. What command will show you which MAC address is mapped to that IP address?

b. arp -a

What is the Internet standard MTU? a. 1,522 bytes b. 65,535 bytes c. 1,500 bytes d. 9,198 bytes

c. 1,500 bytes

Which protocol's header would a layer 4 device read and process? a. HTTP b. IP c. TCP d. ARP

c. TCP

Which of these categories of twisted-pair cable can support Gigabit Ethernet?

d. Cat 5e, cat 6a, cat 7

Which IPsec encryption type encrypts the IP header? a. ISAKMP b. AH c. IKE d. ESP

d. ESP IPsec (internet protocol security) - encryption protocol Either AH (authentication header) encryption or ESP (Encapsulating Security Payload) encryption may be used in IPsec. Both types of encryption provide authentication of the IP packet's data payload through public key techniques. In addition, ESP encrypts the entire IP packet, including the IP header.

An ARP table maps MAC addresses to what information? a. Physical interfaces b. IPv6 addresses c. TCP or UDP ports d. IPv4 addresses

d. IPv4 addresses

Which encryption benchmark ensures data is not modified after it's transmitted and before it's received? a. Confidentiality b. Symmetric c. Availability d. Integrity

d. Integrity

At which OSI layer does IP operate?

d. Network layer

At which OSI layer does IP operate? a. Data link layer b. Application layer c. Transport layer d. Network layer

d. Network layer

You're working from home and need to access a file server at the office while working in an application from your work desktop. At the same time, you often stream music in your browser. Which VPN type will be most efficient while still meeting your needs? a. Site-to-site VPN b. Full tunnel VPN c. Host-to-host VPN d. Split tunnel VPN

d. Split tunnel VPN A split tunnel VPN will only capture traffic destined for the corporate network, such as communication with the file server and the work desktop, and the client can use local network resources to stream music from the Internet, which will result in lower latency and will use fewer corporate network resources. A full tunnel VPN captures all network traffic, whether destined for the Internet or for the corporate network. A host-to-host VPN creates a VPN tunnel directly between two devices and would not provide access to other resources, such as music streaming. A site-to-site VPN connects multiple sites across a WAN and requires more expensive equipment than a client-to-site VPN for the split tunnel configuration.

Which protocol's header would a layer 4 device read and process?

d. TCP

Which command must be used on a Linux device to determine the IP configuration of the eth0 network interface? [Choose all that apply] ip address show eth0 ifconfig eth0 ifconfig ipconfig /all ifconfig /all

ifconfig eth0 ip address show eth0

Which of the following cable uses light-emitting diodes to transmit multiple signals at a time?

Multimode fiber-optic cable(MMF)

Which type of cable has an RJ45 (male) at one end and a DB9 (female) connector at the other end? [Choose all that apply]

Rollover Cable Console Cable

Which two components of the CIA triad are ensured by adequate encryption methods? Choose two. a. Availability b. Accountability c. Confidentiality d. Integrity

c. Confidentiality d. Integrity confidentiality - can only be viewed by intended recipient integrity - Data not modified in route availability - data available when needed

Which protocol's header includes the source MAC address? a. TCP b. UDP c. Ethernet d. IP

c. Ethernet Mac sublayer (data link layer) ID's the two macs. The Physical layer adds them to the payload

Which of the following command can be used to display the local routing table for a Windows device? dig route print route add nslookup ipconfig

route print

What transport protocol/ports do DNS and DHCP use? UDP 53 / TCP 67 and 68 TCP 161 / TCP 67 UDP 53 / UDP 67 and 68 UDP 161 / UDP 67

UDP 53 / UDP 67 and 68

What is the maximum speed of the CAT1 cable?

Up to 1 Mbps

Which of the following uses the cross-platform protocol RFB (remote frame buffer) to remotely control a workstation? RDP Telnet VNC SSH

VNC ( virtual network computing )

What is the earliest twisted-pair cabling standard that meets the minimum requirements for 10GBASE-T transmissions at 100 meters?

a. Cat 6a

Which of the following utilities uses ICMP echo requests to trace the path from one networked node to another, identifying all intermediate hops between the two nodes? tcpdump tracert arp netstat

tracert

Which of the following are the two major parts of a BIX punchdown block system? [Choose two that apply]

Mount, Connector A receiver is an electronic device or decoder that receives signal waves and converts them to a usable form, while a transmitter encodes data and sends the signal to the receiver.

What problem will ping google.com check for that ping 8.8.8.8 will not?

Name resolution issues

Which of the following devices is used to test a fiber cable to determine a fault and its length?

Optical Time-Domain Reflectometer (OTDR)

One of the users in your organization has just re-installed the operating system on his system. He notices that the email software can be accessed after the reinstallation, but all the old emails have disappeared. What could be the cause of this problem?

POP3 was used on the mail client software POP3 is an email protocol used for communication between a client and a mail server. When using the POP3 protocol, emails are downloaded from the server and deleted from the server. If you do not perform a backup, you could lose your emails after PC reinstallation. SMTP and SMTPS protocols are mostly used today for communication between mail servers (mail relaying). IMAP and IMAP over SSL(IMAPS) protocol are also used for client-mail server communication, but email messages are not deleted from the server.

You work as a network administrator and are responsible for configuring network firewalls, routers and switches. You have configured rules between the user and server VLANs. You received a request from your development team to create a new rule that allows port TCP 1433 to the database server. Based on the port number, which database is installed on the server.

SQL SQL is Microsoft's relational database that is used in this case because, by default, it uses TCP port 1433 for client connections. Oracle database uses TCP port 1521 for listener. MySQL is one of the open-source databases that uses TCP port 3306. PostgreSQL is another open-source database that uses TCP port 5421 by default. OrientDB is yet another open-source database that, by default, uses port 2424.

Mr. Yoda is a network engineer who has been working on setting up a data delivery service. While creating the TCP segment for this purpose, the network administrator has requested Mr. Yoda to set up a command requesting a synchronization of the sequence numbers between two nodes so that it can indicate to the receiving node that there is no payload attached to the data packet. Analyze which of the following statements will best fit the situation for Mr. Yoda. Set the RST to 1 byte in the flag segment of the TCP segment Set the PSH to 1 byte in the flag segment of the TCP segment Set the SYN to 1 byte in the flag segment of the TCP segment Set the FIN to 1 byte in the flag segment of the TCP segment

Set the SYN to 1 byte in the flag segment of the TCP segment

What transport protocol/ports do DNS and DHCP use?

UDP 53 / UDP 67 and 68 DNS (Domain Name Server) is used to translate domain names to IP addresses. It uses UDP port 53 for transport. DHCP (Dynamic Host Configuration Protocol) is used for automatic IP address assignments. Client and server use UDP ports 67 and 68 for exchanging DHCP messages.

You're getting a duplicate IP address error on your computer and need to figure out what other device on your network is using the IP address 192.168.1.56. What command will show you which MAC address is mapped to that IP address? a. netstat -n b. telnet 192.168.1.56 c. tracert 192.168.1.56 d. arp -a

d. arp -a

You have been hired as a security professional for a firm, and you would like to analyze the traffic that crosses the computer's network interface. Which of the following command-line interfaces will help you in achieving this? netstat ping nmap tcpdump

tcpdump (netstat - displays tcip stats ) (ping - sends echo to a source and waits for response) (nmap - maps network)

One of the users in your organization has just re-installed the operating system on his system. He notices that the email software can be accessed after the reinstallation, but all the old emails have disappeared. What could be the cause of this problem? SMTP was used on the mail client software IMAPS was used on the mail client software IMAP was used on the mail client software POP3 was used on the mail client software SMTPS was used on the mail client software

POP3 was used on the mail client software (email is downloaded to client) (IMAP manages emails on a server)

HTTP and HTTPS are TCP-based protocols. Which of the following ports do they use? 443 and 514 25 and 80 80 and 81 80 and 443

80 and 443

What type of fiber-cable problem is caused when pairing a 50-micron core cable with a 62.5-micron core cable?

a. Fiber type mismatch

What field in a TCP segment is used to determine if an arriving data unit exactly matches the data unit sent by the source?

a. Checksum

You need to determine which device on your network is sending excessive messages to your Ubuntu Server. Which utility will give you this information? a. tcpdump b. arp c. traceroute d. netstat

a. tcpdump he tcpdump utility captures traffic that crosses a computer's network interface, which can then be analyzed to determine which devices are transmitting traffic across each interface. The traceroute utility traces the path from one networked node to another, identifying all intermediate hops between the two nodes. The netstat utility displays TCP/IP statistics and details about TCP/IP components and connections on a host. This ARP utility, accessed via the arp command in both Windows and Linux, provides a way of obtaining information from and manipulating a device's ARP table.

Which kind of multiplexing assigns slots to nodes according to priority and need?

b. STDM (statistical time division multiplexing)

Which part of a toner and probe kit emits an audible tone when it detects electrical activity on a wire pair?

b. Tone locator

What is one advantage offered by VDI over RDS and VNC?

d. Offers access to multiple OSs in VMs

Which remote file access protocol uses port 22? a. FTP b. FTPS c. TFTP d. SFTP

d. SFTP Unlike FTP (File Transfer Protocol) or FTPS (FTP Secure), which use a control channel on port 21 and one or two data channels on port 20, SFTP (Secure FTP) uses only a single connection—both inbound and outbound communications are usually configured to cross SSH's port 22. TFTP (Trivial FTP) listens at port 69.

You need to remote into a Linux server in another building on your network. Which of the following protocols should you use? a. SFTP b. VPN c. RDP d. SSH

d. SSH

You work as a network administrator in a domain environment. You have a new firewall and need to configure it. You are asked to create web filtering and firewall rules based on domain groups. Which of the following protocol will you use to integrate your firewall directly with Active Directory?

LDAP LDAP is a Lightweight Directory Access protocol used to authenticate and authorize users. This protocol is used to integrate the firewall with Active Directory. OpenLDAP is not a protocol but software that also uses LDAP. FTP(File Transfer Protocol) is used for data transfer between hosts. RADIUS (Remote Authentication Dial-in User Service) is also used for user authentication and authorization but uses a client/server model where the RADIUS server defines rules for RADIUS clients (usually network devices) and authenticate users.

What protocol does ping use?

ICMP

Which of the following IPv6 addresses is similar to an APIPA address used in IPv4?

FE80::/64

You have been appointed as the network administrator of an ISP. Your first project requires you to develop a protocol that can transmit IP and other kinds of messages through a tunnel so that you can connect two VPN endpoints. Which of the following will you choose in this scenario? L2TP GRE OpenVPN IKEv2

GRE

Telnet, SSH, RDP and VNC all rely on which type of management?

In-Band

Which encryption protocol does GRE use to increase the security of its transmissions? a. SSH b. SFTP c. IPsec d. SSL

c. IPsec

What Windows command will display the MAC address for an installed network adapter?

ipconfig /all


Related study sets

Psychology (Stress and Heart Disease)

View Set

Another set bc im stupid 🙋🏻‍♂️

View Set

ОИТ. 25. Проблематика ИИ.

View Set

APICS CPIM BSCM Session 4 Master Planning

View Set

Diabetes and Nutrition Nursing 1 Lone Star North Harris

View Set

Chapter 12: Hardware and Network Troubleshooting

View Set

Anatomy & Physiology Chapter 1 & 2 Review

View Set