click below
click below
Normal Size Small Size show me how
Chap 3 and 4 quiz
god dammit god dammit god daMMIT
Question | Answer |
---|---|
T/F: A hexadecimal number is a number written in the base 16 number system. | True |
T/F: DNS follows a centralized database model, allowing for easier management of DNS records. | False |
T/F: ICANN is responsible for restrictions on use of the .com, .org, and .net TLDs. | False |
T/F: Each organization that provides host services on the public Internet is responsible for providing and maintaining DNS authoritative servers for public access. | True |
T/F: An IPv6 address consists of 128 bits that are written as 10 blocks of hexadecimal numbers separated by colons. | False |
T/F: At the root level of the DNS hierarchical structure, 13 clusters of root servers hold information used to locate TLD servers. | True |
T/F: The 1024 - 65535 range of ports is also known as the "well-known" range. | False |
T/F: UDP port 123 is utilized by the Network Time Protocol service. | True |
T/F: When using IPv6, two or more nodes on the same link are said to be neighbors. | True |
T/F: The FTP protocol utilizes UDP, while TFTP uses TCP for data transmission. | False |
At the Transport layer of the OSI, what is used to find and communicate with a particular application running on a host? | port numbers |
With a FQDN of ftp1.dallas.mycompany.com, what part is the domain name? | mycompany.com |
How can you determine the manufacturer of a NIC card based on the MAC address? | The first 24 bits, known as the Organizationally Unique Identifier, identify the manufacturer. |
What command can you utilize to display TCP/IP configuration information for each network adapter installed? | ipconfig /all |
Which of the following IP addresses would be a loopback IP address? | 127.0.0.1 |
What text editor can be used on Linux to view and edit the contents of a configuration file? | vim |
On a Linux-based system, what command can be used to display TCP/IP information associated with every interface on the system? | ifconfig -a |
Which of the following IPv6 addresses represents a global unicast address? | 2000::/3 |
Which of the following protocols is used as a signaling protocol for the initial connection between hosts, but does not participate in data transfer during the session? | SIP |
What is by far the most popular DNS server software available? | BIND |
Your supervisor has asked you to configure a new prototype network with a dual stack configuration. What does this mean? | Both IPv4 and IPv6 protocols will be used on the network. |
What utility is used to verify that TCP/IP installed, bound to the NIC, configured correctly, and communicating with the network? | ping |
You are troubleshooting a network issue on a client computer and discover that the network card has an IP address of 169.254.196.200. What does this mean? | The computer is configured to use DHCP, but was unable to lease an address. |
What part of a MAC address serves as the extension identifier, or device ID? | The last 24 bits of the MAC address. |
In the classful addressing scheme, what range of network addresses is considered a Class B? | 128.0.x.y to 191.255.x.y |
How do routers create a broadcast domain boundary? | They do not forward broadcast traffic. |
Which of the following is NOT a range of IP addresses recommended for use in private networks? | 10.0.0.0 through 10.255.255.255 |
When using DHCP for IPv6 (i.e. DHCPv6), what port do clients receive responses on? | port 547 |
What type of IPv6 address is fe80::8cf1:2c42:ffde:da1c? | link local address |
If a host's IPv6 address contains the network adapter's MAC address within the last 64 bits of the IPv6 address, what standard is being used? | EUI-64 |
Encrypted control of remote computers using the RDP protocol is accomplished using what port number? | TCP 3389 |
What statement regarding the Server Message Block protocol is accurate? | It is used by Windows and UNIX-based operating systems to share files. |
What is the ARPA domain suffix utilized for? | It is used for reverse DNS queries, and holds PTR records. |
In a DNS zone, what type of record holds the name-to-address mapping for IPv6 addresses? | AAAA record |
You are setting up a DNS zone and have been asked to create SPF and DKIM records. What type of DNS record will hold this information? | TXT record |
What does the MX record do in a forward DNS zone? | It identifies the e-mail server to be used for e-mail traffic for the domain. |
You are troubleshooting a DNS issue on a Linux system, and need to test the resolution of your domain mycompany.com MX record using Google's DNS server with the IP address of 8.8.8.8. What dig command will accomplish this? | dig @8.8.8.8 mycompany.com MX |
What command can be used to check a domain computer's time source from a Command Prompt window? | w32tm /query /source |
A Windows computer on your network is having issues resolving queries for a specific domain, but not other domains. Other computers on the same network resolve the name just fine. What command can you issue that might fix the problem? | ipconfig /flushdns |
In the DNS hierarchy, where is information about how to find the top-level domain servers held? | On the DNS root servers. |
T/F: UDP provides error checking, but not sequencing. | False |
T/F: IP is an unreliable, connectionless protocol, as it does not establish a session to send its packets. | True |
T/F: IPv4 and IPv6 use the same packet format. | False |
T/F: TCP uses a four-step process called a four-way handshake to establish a TCP connection. | False |
T/F: The cost of upgrading infrastructure has been a major factor in the slow adoption of IPv6. | True |
T/F: In general, a Layer 3 or Layer 4 switch is still optimized for fast Layer 2 data handling. | True |
T/F: Routing Information Protocol (RIP) is an interior gateway protocol that uses a link-state algorithm. | False |
T/F: The Border Gateway Protocol is considered to be a hybrid routing protocol. | True |
T/F: The pathping utility sends 10 pings per hop by default. | False |
T/F: The CTRL + S key combination can be used to stop an actively running command | False |
What is NOT one of the three characteristics of TCP in its role as a reliable delivery protocol? | Framing |
What field in an IPv4 packet informs routers the level of precedence they should apply when processing an incoming packet? | Differentiated Services (DiffServ) |
What command will list only current connections, including IP addresses and port numbers? | netstat -n |
What utility is the equivalent to the pathping command on a Linux system? | mtr |
Which statement regarding the Border Gateway Protocol (BGP) is accurate? | BGP utilizes TCP for communicating updates. |
In a TCP segment, what field indicates how many bytes the sender can issue to a receiver before acknowledgment is received? | sliding-window |
Which of the following is not a task handled by a router? | A router forwards broadcasts over the network. |
The IP connectionless protocol relies on what other protocol to guarantee delivery of data? | TCP |
You are connected to your network's Cisco router, and need to verify the route table. What command should you enter? | show ip route |
Which traceroute command will perform a trace using ICMP echo requests instead of UDP datagrams to the host srv1.mycompany.com? | traceroute -I srv1.mycompany.com |
What is the purpose of the checksum TCP field? | It allows the receiving node to determine whether the TCP segment became corrupted during transmission. |
What happens when a router receives a packet with a TTL of 0? | The router drops the packet and sends an ICMP TTL expired message back to the host. |
In IPv6, what field is used to indicate what sequence of packets from one source to one or multiple destinations a packet belongs to? | flow label |
What is routing protocol convergence time defined as? | It is the time it takes for the protocol to recognize the best path in the event of a network change. |
Routing protocols that enable routers to communicate beyond neighboring routers, allowing each router to independently map the network, are known as which type of protocols? | link-state protocols |
Which routing protocol started as a Cisco proprietary protocol and combines some of the features of a link-state protocol with that of distance-vector protocols? | EIGRP |
You have been tasked with the replacement of OSPF with EIGRP throughout your organization, which consists of a mixture of Cisco routers and routers from other vendors. What statement is accurate? | EIGRP may not be available on non-Cisco routers. |
What tcpdump command can be used to filter out all traffic except SSH traffic? | tcpdump port 22 |
Which command will produce statistics about each message transmitted by a host, separated according to protocol type? | netstat -s |
When using the Routing Information Protocol (RIP), what is the maximum number of hops a message can take between its source and its destination before the destination is considered unreachable? | 15 |
What occurs when a collision happens on a network? | Each node on the network waits a random amount of time and then resends the transmission. |
You have been tasked with maintaining a network that is jumbo frame enabled. What does this mean? | The MTU for the network can be as high as 9198 bytes. |
What IPv6 field is similar to the TTL field in IPv4 packets? | hop limit |
If the VLAN tag is present in an Ethernet frame, what is the maximum frame size? | 1522 bytes |
By default, what is the MTU size on a typical Ethernet network? | 1500 bytes |
What routing metric affects a path's potential performance due to delay? | latency |
Which statement does NOT accurately describe characteristics of the OSPF protocol? | OSPF requires very little CPU or memory resources. |
Originally codified by ISO, what does the "intermediate system" in IS-IS (Intermediate System to Intermediate System) stand for? | An IS-IS capable network router. |
What statement regarding the differences between the Windows tracert utility and the Linux/UNIX/macOS traceroute utility is accurate? | By default, the tracert utility uses ICMP echo requests, while traceroute uses UDP datagrams or TCP SYN messages. |
In the event of a duplicate MAC address shared by two hosts on a switched network, what statement is accurate? | The hosts will still send and receive traffic, but traffic may not always reach the correct destination. |