click below
click below
Normal Size Small Size show me how
Chap 3 and 4 quiz
god dammit god dammit god daMMIT
| Question | Answer |
|---|---|
| T/F: A hexadecimal number is a number written in the base 16 number system. | True |
| T/F: DNS follows a centralized database model, allowing for easier management of DNS records. | False |
| T/F: ICANN is responsible for restrictions on use of the .com, .org, and .net TLDs. | False |
| T/F: Each organization that provides host services on the public Internet is responsible for providing and maintaining DNS authoritative servers for public access. | True |
| T/F: An IPv6 address consists of 128 bits that are written as 10 blocks of hexadecimal numbers separated by colons. | False |
| T/F: At the root level of the DNS hierarchical structure, 13 clusters of root servers hold information used to locate TLD servers. | True |
| T/F: The 1024 - 65535 range of ports is also known as the "well-known" range. | False |
| T/F: UDP port 123 is utilized by the Network Time Protocol service. | True |
| T/F: When using IPv6, two or more nodes on the same link are said to be neighbors. | True |
| T/F: The FTP protocol utilizes UDP, while TFTP uses TCP for data transmission. | False |
| At the Transport layer of the OSI, what is used to find and communicate with a particular application running on a host? | port numbers |
| With a FQDN of ftp1.dallas.mycompany.com, what part is the domain name? | mycompany.com |
| How can you determine the manufacturer of a NIC card based on the MAC address? | The first 24 bits, known as the Organizationally Unique Identifier, identify the manufacturer. |
| What command can you utilize to display TCP/IP configuration information for each network adapter installed? | ipconfig /all |
| Which of the following IP addresses would be a loopback IP address? | 127.0.0.1 |
| What text editor can be used on Linux to view and edit the contents of a configuration file? | vim |
| On a Linux-based system, what command can be used to display TCP/IP information associated with every interface on the system? | ifconfig -a |
| Which of the following IPv6 addresses represents a global unicast address? | 2000::/3 |
| Which of the following protocols is used as a signaling protocol for the initial connection between hosts, but does not participate in data transfer during the session? | SIP |
| What is by far the most popular DNS server software available? | BIND |
| Your supervisor has asked you to configure a new prototype network with a dual stack configuration. What does this mean? | Both IPv4 and IPv6 protocols will be used on the network. |
| What utility is used to verify that TCP/IP installed, bound to the NIC, configured correctly, and communicating with the network? | ping |
| You are troubleshooting a network issue on a client computer and discover that the network card has an IP address of 169.254.196.200. What does this mean? | The computer is configured to use DHCP, but was unable to lease an address. |
| What part of a MAC address serves as the extension identifier, or device ID? | The last 24 bits of the MAC address. |
| In the classful addressing scheme, what range of network addresses is considered a Class B? | 128.0.x.y to 191.255.x.y |
| How do routers create a broadcast domain boundary? | They do not forward broadcast traffic. |
| Which of the following is NOT a range of IP addresses recommended for use in private networks? | 10.0.0.0 through 10.255.255.255 |
| When using DHCP for IPv6 (i.e. DHCPv6), what port do clients receive responses on? | port 547 |
| What type of IPv6 address is fe80::8cf1:2c42:ffde:da1c? | link local address |
| If a host's IPv6 address contains the network adapter's MAC address within the last 64 bits of the IPv6 address, what standard is being used? | EUI-64 |
| Encrypted control of remote computers using the RDP protocol is accomplished using what port number? | TCP 3389 |
| What statement regarding the Server Message Block protocol is accurate? | It is used by Windows and UNIX-based operating systems to share files. |
| What is the ARPA domain suffix utilized for? | It is used for reverse DNS queries, and holds PTR records. |
| In a DNS zone, what type of record holds the name-to-address mapping for IPv6 addresses? | AAAA record |
| You are setting up a DNS zone and have been asked to create SPF and DKIM records. What type of DNS record will hold this information? | TXT record |
| What does the MX record do in a forward DNS zone? | It identifies the e-mail server to be used for e-mail traffic for the domain. |
| You are troubleshooting a DNS issue on a Linux system, and need to test the resolution of your domain mycompany.com MX record using Google's DNS server with the IP address of 8.8.8.8. What dig command will accomplish this? | dig @8.8.8.8 mycompany.com MX |
| What command can be used to check a domain computer's time source from a Command Prompt window? | w32tm /query /source |
| A Windows computer on your network is having issues resolving queries for a specific domain, but not other domains. Other computers on the same network resolve the name just fine. What command can you issue that might fix the problem? | ipconfig /flushdns |
| In the DNS hierarchy, where is information about how to find the top-level domain servers held? | On the DNS root servers. |
| T/F: UDP provides error checking, but not sequencing. | False |
| T/F: IP is an unreliable, connectionless protocol, as it does not establish a session to send its packets. | True |
| T/F: IPv4 and IPv6 use the same packet format. | False |
| T/F: TCP uses a four-step process called a four-way handshake to establish a TCP connection. | False |
| T/F: The cost of upgrading infrastructure has been a major factor in the slow adoption of IPv6. | True |
| T/F: In general, a Layer 3 or Layer 4 switch is still optimized for fast Layer 2 data handling. | True |
| T/F: Routing Information Protocol (RIP) is an interior gateway protocol that uses a link-state algorithm. | False |
| T/F: The Border Gateway Protocol is considered to be a hybrid routing protocol. | True |
| T/F: The pathping utility sends 10 pings per hop by default. | False |
| T/F: The CTRL + S key combination can be used to stop an actively running command | False |
| What is NOT one of the three characteristics of TCP in its role as a reliable delivery protocol? | Framing |
| What field in an IPv4 packet informs routers the level of precedence they should apply when processing an incoming packet? | Differentiated Services (DiffServ) |
| What command will list only current connections, including IP addresses and port numbers? | netstat -n |
| What utility is the equivalent to the pathping command on a Linux system? | mtr |
| Which statement regarding the Border Gateway Protocol (BGP) is accurate? | BGP utilizes TCP for communicating updates. |
| In a TCP segment, what field indicates how many bytes the sender can issue to a receiver before acknowledgment is received? | sliding-window |
| Which of the following is not a task handled by a router? | A router forwards broadcasts over the network. |
| The IP connectionless protocol relies on what other protocol to guarantee delivery of data? | TCP |
| You are connected to your network's Cisco router, and need to verify the route table. What command should you enter? | show ip route |
| Which traceroute command will perform a trace using ICMP echo requests instead of UDP datagrams to the host srv1.mycompany.com? | traceroute -I srv1.mycompany.com |
| What is the purpose of the checksum TCP field? | It allows the receiving node to determine whether the TCP segment became corrupted during transmission. |
| What happens when a router receives a packet with a TTL of 0? | The router drops the packet and sends an ICMP TTL expired message back to the host. |
| In IPv6, what field is used to indicate what sequence of packets from one source to one or multiple destinations a packet belongs to? | flow label |
| What is routing protocol convergence time defined as? | It is the time it takes for the protocol to recognize the best path in the event of a network change. |
| Routing protocols that enable routers to communicate beyond neighboring routers, allowing each router to independently map the network, are known as which type of protocols? | link-state protocols |
| Which routing protocol started as a Cisco proprietary protocol and combines some of the features of a link-state protocol with that of distance-vector protocols? | EIGRP |
| You have been tasked with the replacement of OSPF with EIGRP throughout your organization, which consists of a mixture of Cisco routers and routers from other vendors. What statement is accurate? | EIGRP may not be available on non-Cisco routers. |
| What tcpdump command can be used to filter out all traffic except SSH traffic? | tcpdump port 22 |
| Which command will produce statistics about each message transmitted by a host, separated according to protocol type? | netstat -s |
| When using the Routing Information Protocol (RIP), what is the maximum number of hops a message can take between its source and its destination before the destination is considered unreachable? | 15 |
| What occurs when a collision happens on a network? | Each node on the network waits a random amount of time and then resends the transmission. |
| You have been tasked with maintaining a network that is jumbo frame enabled. What does this mean? | The MTU for the network can be as high as 9198 bytes. |
| What IPv6 field is similar to the TTL field in IPv4 packets? | hop limit |
| If the VLAN tag is present in an Ethernet frame, what is the maximum frame size? | 1522 bytes |
| By default, what is the MTU size on a typical Ethernet network? | 1500 bytes |
| What routing metric affects a path's potential performance due to delay? | latency |
| Which statement does NOT accurately describe characteristics of the OSPF protocol? | OSPF requires very little CPU or memory resources. |
| Originally codified by ISO, what does the "intermediate system" in IS-IS (Intermediate System to Intermediate System) stand for? | An IS-IS capable network router. |
| What statement regarding the differences between the Windows tracert utility and the Linux/UNIX/macOS traceroute utility is accurate? | By default, the tracert utility uses ICMP echo requests, while traceroute uses UDP datagrams or TCP SYN messages. |
| In the event of a duplicate MAC address shared by two hosts on a switched network, what statement is accurate? | The hosts will still send and receive traffic, but traffic may not always reach the correct destination. |