Network terms and mod questions

Ace your homework & exams now with Quizwiz!

Which transmission characteristic is never fully achieved?

Bandwidth

To be able to remotely manage a Windows device securely, which of the following protocols can be used?

RDP

Which part of a toner and probe kit emits an audible tone when it detects electrical activity on a wire pair?

Tone locator

Suppose you're creating patch cables to be used in a government office. What color wire goes in the first pin?

White/green

Which kind of multiplexing assigns slots to nodes according to priority and need?

STDM (statistical time division multiplexing)

You, as a network administrator, want to open up a port that will allow you to send data using the file transfer protocol. However, the files you wish to transfer are boot files. Which of the following ports will you open up to carry out this operation?

Port 69

The University of Bethesda has requested your professional help in giving a masterclass on how to use Telnet ports for interacting with remote computers. Which of the following ports will you open to teach students how to establish an unencrypted connection with a remote computer?

23

HTTP and HTTPS are TCP-based protocols. Which of the following ports do they use?

80 and 443

Which permission allows a user access to a resource?

Authentication

Which of these categories of twisted-pair cable can support Gigabit Ethernet?

Cat 5e, cat 6a, cat 7

What is the earliest twisted-pair cabling standard that meets the minimum requirements for 10GBASE-T transmissions at 100 meters?

Cat 6a

Your employer has sent you to establish a private IP address for the devices used in Infoglobal Ltd. with the help of a router. Your employer has instructed you to implement the address ranging from 172.16.0.0 to 172.31.255.255 as per IANA's RFC1918 document. Which class of classful addressing will you apply in this scenario?

Class B

While configuring a new VPN client, which Role service needs to be installed for the Remote Access role on a Windows server?

Direct Access and VPN (RAS)

You work as a network administrator in a domain environment. You have a new firewall and need to configure it. You are asked to create web filtering and firewall rules based on domain groups. Which of the following protocol will you use to integrate your firewall directly with Active Directory?

LDAP

Which fiber connector contains two strands of fiber in each ferrule?

MT-RJ

You are the DNS administrator and have been tasked to identify an email server in a DNS zone file. Which of the following resource records would you apply as a DNS administrator in this case?

MX record

Which kind of crosstalk occurs between wire pairs near the source of the signal?

NEXT

Which permission needs to be assigned to a user to be able to connect to a VPN connection?

Network Access permissions

One of the users in your organization has just re-installed the operating system on his system. He notices that the email software can be accessed after the reinstallation, but all the old emails have disappeared. What could be the cause of this problem?

POP3 was used on the mail client software

Which cable is best suited for ultra-high-speed connections between a router and a switch on the same rack?

Passive twinaxial cable

Hypervile Solutions has hired Joseph to establish a multimedia session so that it can preview its products to a list of potential clients. Joseph has to ensure that the session is properly encrypted so that there is no loss or theft of data as it will be a closed meeting. Analyze which of the following ports should be opened in this case.

Port 5061

Which of the following protocols is used for encrypted control of remote Windows computers?

RDP

Rodriguez has been hired as a network administrator by MJF Tires to create an IPsec suite wherein a definitive set of rules are laid down for encryption, authentication, and key management of TCP/IP transmissions. After accessing the basic network traffic, Rodriguez wants to create a secure channel so that the IP packet's data payload can be authenticated through public key techniques. Analyze which of the following steps Rodriguez must complete after establishing a secure channel.

Renegotiate and reestablish the connection before the current session gets timed out

You work as a network administrator and are responsible for configuring network firewalls, routers and switches. You have configured rules between the user and server VLANs. You received a request from your development team to create a new rule that allows port TCP 1433 to the database server. Based on the port number, which database is installed on the server.

SQL

Mr. Yoda is a network engineer who has been working on setting up a data delivery service. While creating the TCP segment for this purpose, the network administrator has requested Mr. Yoda to set up a command requesting a synchronization of the sequence numbers between two nodes so that it can indicate to the receiving node that there is no payload attached to the data packet. Analyze which of the following statements will best fit the situation for Mr. Yoda.

Set the SYN to 1 byte in the flag segment of the TCP segment

Which of the following connection methods can be used to connect a company's offices which are located in different geographical areas?

Site-to-Site VPN

You have been hired to fix an issue related to the booting up of a computer using a Linux operating system. Before fixing any error, you want to check the history of the previous warning messages that were generated by the system. Which of the following utilities will you use in this scenario?

Syslog

What transport protocol/ports do DNS and DHCP use?

UDP 53 / UDP 67 and 68

You are the network administrator for Jungle Technologies, and you have to create a data stream within an application that will mark a certain section of the data stream to be more urgent than the normal stream. In which of the following fields of TCP segment will you specify this information?

Urgent pointer

Your client has hired you to change the command-line tool from nslookup to dig since it provides more detailed domain information than nslookup. Which of the following commands will you use to perform a DNS lookup on a domain name?

dig google.com

Which of the following utilities uses ICMP echo requests to trace the path from one networked node to another, identifying all intermediate hops between the two nodes?

tracert

Which of the following uses the cross-platform protocol RFB (remote frame buffer) to remotely control a workstation?

VNC

What is the combination of a public key and a private key known as?

key pair

What type of fiber-cable problem is caused when pairing a 50-micron core cable with a 62.5-micron core cable?

Fiber type mismatch

You have been appointed as the network administrator of an ISP. Your first project requires you to develop a protocol that can transmit IP and other kinds of messages through a tunnel so that you can connect two VPN endpoints. Which of the following will you choose in this scenario?

GRE

Your client has hired you to troubleshoot a network error. The client is complaining of an extremely limited network connection on most days and a failed network connection on certain days. Which of the following network configuration issues do you think is at play in this case?

Incorrect subnet mask

Which of the following fields in a TCP segment identifies the data segment's position in the stream of data segments being sent?

Sequence number

Which of the following command-line tools is used to query DNS name servers for information about host addresses and other DNS records?

dig

You have just installed a network at the Jamieson Hydro Power Plant, and you want to test the basic connectivity of the network. Which of the following utilities will you use first in such a situation so that you get to verify that the TCP/IP is configured correctly and is communicating with the network?

ping

You have been hired as a security professional for a firm, and you would like to analyze the traffic that crosses the computer's network interface. Which of the following command-line interfaces will help you in achieving this?

tcpdump


Related study sets

5 riconoscimento - prassi sulla rilevanza del riconoscimento

View Set

CSD 405- Test 2 Study Guide (Mod 4-6)

View Set

QC2 U4 Naturaleza y Detalles, QC2 U4 Los Animales con FOTOS

View Set

CRIM 332- juvenile Delinquency Exam 1

View Set

Chapter 10 - JAVA PROGRAMMING Object-Oriented Thinking

View Set

Exam #3 - Cognitive Psychology - Dr. Klein - University of North Alabama

View Set