Test 2 MC Questions

Ace your homework & exams now with Quizwiz!

What are the three different types of port number ranges as defined by IANA?

Well-known ports have the port range of 0-1023. Registered ports have the port range of 1024-49151. Dynamic and private ports have the port range of 49152-65535

What utility is used to verify that TCP/IP installed, bound to the NIC, configured correctly, and communicating with the network? a. traceroute b. ping c. ifconfig d. route

b. ping

At the Transport layer of the OSI, what is used to find and communicate with a particular application running on a host? a. domain names b. port numbers c. IP addresses d. MAC addresses

b. port numbers

In a TCP segment, what field indicates how many bytes the sender can issue to a receiver before acknowledgment is received? a. PSH flag b. sliding-window c. urgent pointer d. URG flag

b. sliding-window

What command can be used to check a domain computer's time source from a Command Prompt window? a. ntpd show source b. w32tm /query /source c. time --source d. date /source

b. w32tm /query /source

What routing metric affects a path's potential performance due to delay? a. load b. theoretical bandwidth c. latency d. MTU

c. latency

What tcpdump command can be used to filter out all traffic except SSH traffic? a. tcpdump -f +ssh b. tcpdump only ssh c. tcpdump port 22 d. tcpdump -p 22

c. tcpdump port 22

What text editor can be used on Linux to view and edit the contents of a configuration file? a. edit b. Microsoft Word c. vim d. Notepad

c. vim

What are some examples of routing metrics that can be used to determine the best path for a network?

- latency, which is the delay on a route between technology sending and receiving of a network transmission. - hops, or the number of routers or other networking devices the network transmission must be sent through to reach its destination. - MTU (maximum transmission unit), or the maximum size in bytes of an IP packet that is capable of crossing a network route. - the theoretical bandwidth, or potential maximum network transmission speed, and the actual throughput, or the real transmission speed a network is capable of based on things such as cabling, hardware, routing protocols, and so on.

IPv6 has two different types of unicast addresses. How do these two types differ from each other?

A link local unicast IPv6 address is used by a computer to communicate with other computers within a local link or LAN. This address cannot be routed for use or communication on the Internet and is restricted to it's local network. A global unicast IPv6 address is used by a computer to communicate with computers outside of the local link or LAN and can be routed for use and communication on the Internet.

What is the difference between a port and a socket?

A port is a number assigned to a process, such as an application or service, and is used to inform other computers which process a certain computer is using. A socket is a number sequence that includes a host computer's IP address along with the port number of the process being used, with a colon separating the IP address from the port number. This is used as a sort of wireless circuit to establish communication sessions between two computers. When a session is established between two computers, the socket is said to be open.

What is a subnet mask, and how is it used?

A subnet mask is a 32 bit number used in IPv4 addressing that is used to located computers on a network. It helps a computer to locate the host portion and network portion of a computer's IPv4 address and can be used to determine if a computer seeking information is connected to the local network the host computer is a part of or if it is from an outside network.

ARP tables might contain two different types of entries. What are they, and how are they created?

ARP (address resolution protocol) tables are databases stored on a computer's hard drive that contains MAC to IP address mappings of computers or nodes on a network. A static ARP entry is created manually by a person such as a network administrator when making an ARP request in order to either inspect the MAC to IP address mappings of the network devices or to input new information into the table to update it. A dynamic ARP entry is created by a client when making an ARP request concerning information that is not stored within the computer's ARP table. This causes the computer to make a request to other computers on the network for the information, and once found, the computer updates its ARP table for future reference.

What are the two different variations of network address translation (NAT)?

SNAT (static network address translation) is a variation of NAT in which the gateway or router applies the same public IP address to computer's that are trying to reach outside of the local network and communicate on the Internet. Any requests or information coming from outside the network is then routed back to the gateway or router through the public IP address and is then translated by the gateway or router to the appropriate private IP address of the computer in the local network. DNAT (destination network address translation) is a variation of NAT in which the gateway or router has a list of public IP addresses that are given to each computer within the local network. Whenever a computer within the network wants to communicate outside of the network on the Internet, the gateway or router translates the computer's specific private IP address to its designated public IP address for Internet use. Any requests or information that comes form outside the network is then routed back to the gateway or router through the public IP address and using a table of associated private to public IP addresses translates the public IP address back into the appropriate private IP address so that the information is sent to the correct computer within the local network.

There are several interior gateway protocols, but only one current exterior gateway protocol. What is this protocol, and what characteristics does it have?

The only exterior gateway protocol is BGP, or border gateway protocol. This protocol works with exterior and edge routers and is essentially the gateway protocol of the Internet itself. It is a hybrid protocol capable of traversing many different routers while also keeping important network metrics about many if not all of the routers along its path. It is very customizable and can be programmed to do things such as avoid certain routers or paths and prefer certain routers or paths to send data through. Lastly, it is also extremely efficient as it has low network overhead and convergence times, or time it takes to locate a new path if a known path becomes down or unreachable for a given time.

What is NOT one of the three characteristics of TCP in its role as a reliable delivery protocol? a. Framing b. Flow Control c. Connection-oriented Protocol d. Sequencing and checksums

a. Framing

What is the purpose of the checksum TCP field? a. It allows the receiving node to determine whether the TCP segment became corrupted during transmission. b. It specifies special options, such as the maximum segment size a network can handle. c. It identifies the data segment's position in the stream of data segments being sent. d. It confirms receipt of data via a return message to the sender.

a. It allows the receiving node to determine whether the TCP segment became corrupted during transmission.

In the DNS hierarchy, where is information about how to find the top-level domain servers held? a. On the DNS root servers. b. In the organization's forward lookup zone. c. In the hosts file on the local machine. d. On DNS caching-only servers.

a. On the DNS root servers.

Which of the following protocols is used as a signaling protocol for the initial connection between hosts, but does not participate in data transfer during the session? a. SIP b. NTP c. LDAP d. TFTP

a. SIP (session initiation protocol)

You are troubleshooting a DNS issue on a Linux system, and need to test the resolution of your domain mycompany.com MX record using Google's DNS server with the IP address of 8.8.8.8. What dig command will accomplish this? a. dig @8.8.8.8 mycompany.com MX b. dig query 8.8.8.8 domain mycompany.com type mx c. dig -s 8.8.8.8 -t mx mycompany.com d. dig --server 8.8.8.8 --type=mx mycompany.com

a. dig @8.8.8.8 mycompany.com MX

What type of IPv6 address is fe80::8cf1:2c42:ffde:da1c? a. link local address b. multicast address c. anycast address d. global address

a. link local address

Which of the following is NOT a range of IP addresses recommended for use in private networks? a. 172.16.0.0 through 172.31.255.255 b. 127.0.0.0 through 127.255.255.255 c. 192.168.0.0 through 192.168.255.255 d. 10.0.0.0 through 10.255.255.255

b. 127.0.0.0 through 127.255.255.255

Which of the following IPv6 addresses represents a global unicast address? a. FD00::/8 b. 2000::/3 c. FC00::/7 d. FE80::10

b. 2000::/3

In a DNS zone, what type of record holds the name-to-address mapping for IPv6 addresses? a. PTR record b. AAAA record c. A record d. TXT record

b. AAAA record

Which statement does NOT accurately describe characteristics of the OSPF (Open Shortest Path First) protocol? a. OSPF has no hop limits on a transmission path. b. OSPF requires very little CPU or memory resources. c. OSPF maintains a database of other routers' links. d. OSPF provides low network overhead.

b. OSPF requires very little CPU or memory resources.

You are troubleshooting a network issue on a client computer and discover that the network card has an IP address of 169.254.196.200. What does this mean? a. The network card is set up for multicast communication. b. The computer is configured to use DHCP, but was unable to lease an address. c. The network card has been erroneously assigned a loopback address. d. The computer has been assigned a routed public IP address.

b. The computer is configured to use DHCP, but was unable to lease an address.

In the event of a duplicate MAC address shared by two hosts on a switched network, what statement is accurate? a. The hosts will generate new MAC addresses until the conflict is resolved. b. The hosts will still send and receive traffic, but traffic may not always reach the correct destination. c. The network switch will eventually crash due to being unable to properly forward traffic. d. The hosts that share the same MAC addresses will be completely unable to communicate with any other devices.

b. The hosts will still send and receive traffic, but traffic may not always reach the correct destination.

In IPv6, what field is used to indicate what sequence of packets from one source to one or multiple destinations a packet belongs to? a. group ID b. flow label c. traffic class d. traffic exchange

b. flow label

When using the Routing Information Protocol (RIP), what is the maximum number of hops a message can take between its source and its destination before the destination is considered unreachable? a. 32 b. 8 c. 15 d. 20

c. 15

Which of the following is NOT a task handled by a router? a. A router can interpret Layer 3 and often Layer 4 addressing. b. A router can connect dissimilar networks. c. A router forwards broadcasts over the network. d. A router can reroute traffic if the path of first choice is down but a second path is available.

c. A router forwards broadcasts over the network.

Which statement regarding the Border Gateway Protocol (BGP) is accurate? a. BGP is exclusively a distance-vector protocol. b. BGP is limited to a single autonomous system. c. BGP utilizes TCP for communicating updates. d. BGP is a more advanced version of OSPF.

c. BGP utilizes TCP for communicating updates.

Your supervisor has asked you to configure a new prototype network with a dual stack configuration. What does this mean? a. Two different IPv4 address spaces will exist on the same network segment. b. The network will exist on two separate segments, separated by a proxy. c. Both IPv4 and IPv6 protocols will be used on the network. d. The router serving the network will have a redundant spare.

c. Both IPv4 and IPv6 protocols will be used on the network.

What field in an IPv4 packet informs routers the level of precedence they should apply when processing an incoming packet? a. Padding b. Internet header length (IHL) c. Differentiated Services (DiffServ) d. Time to Live (TTL)

c. Differentiated Services (DiffServ)

What statement regarding the Server Message Block protocol is accurate? a. It is a simple protocol used to synchronize block messages written to iSCSI drives on a network. b. It is a signaling protocol used to make a connection between hosts prior to data transfer. c. It is used by Windows and UNIX-based operating systems to share files. d. It is a protocol used for accessing network-based LDAP directories.

c. It is used by Windows and UNIX-based operating systems to share files.

What occurs when a collision happens on a network? a. Each node on the network stops transmitting, until manually told to reconnect and transmit. b. The collision goes undetected, and data transmission continues. c. The collision will create an error in the network switch, but otherwise, no issues will occur as a result. d. Each node on the network waits a random amount of time and then resends the transmission.

d. Each node on the network waits a random amount of time and then resends the transmission.

How can you determine the manufacturer of a NIC card based on the MAC address? a. The first 12 bits and last 12 bits combined are known as the Organizationally Unique Identifier. b. The last 24 bits, known as the Organizationally Unique Identifier, identify the manufacturer. c. The middle 24 bits, known as the Organization Universal Identifier, identify the manufacturer. d. The first 24 bits, known as the Organizationally Unique Identifier, identify the manufacturer.

d. The first 24 bits, known as the Organizationally Unique Identifier, identify the manufacturer.

Routing protocols that enable routers to communicate beyond neighboring routers, allowing each router to independently map the network, are known as which type of protocols? a. distance vector protocols b. interior gateway protocols c. border gateway protocols d. link-state protocols

d. link-state protocols

Which traceroute command will perform a trace using ICMP echo requests instead of UDP datagrams to the host srv1.mycompany.com? a. traceroute -o ICMP srv1.mycompany.com b. traceroute -w srv1.mycompany.com c. traceroute -i srv1.mycompany.com d. traceroute -I srv1.mycompany.com

d. traceroute -I srv1.mycompany.com capital i (I)


Related study sets

The Sound and the Fury Quotes Review

View Set

Under the Mesquite Vocabulary Words

View Set