Ch4 Flashcards
Barney is the owner of Venture Capitals Internet Solutions. Venture’s client Riverdale Union High has many remote users, who are school students, and they regularly need access to desktops. The school wants to offer a consistent desktop experience with installed applications that the students commonly need. However, they don’t want to purchase dozens of physical computers for these students to connect to.
What should Barney do in such a scenario?
A. Barney should use VDI (Virtual Desktop Infrastructure).
B. Barney should use SSH (Secure Shell).
C. Barney should use Telnet.
D. Barney should use RDP (Remote Desktop Protocol).
A
Which of the following protocols creates a frame around the payload by adding both a header and a trailer to the payload?
ICMP
NDP
TCP
Ethernet
Ethernet
As a network engineer for Orior Telecommunications, you are programming an IPv4 header. You decide to put additional routing and timing information to the header as a result of which the header is no longer a multiple of 32 bits. Which of the following IPv4 fields will you use in such a situation?
Data
Padding
Option
Protocol
Padding
Which of the following protocols is not a terminal emulation protocol?
Remote Desktop
Telnet
TFTP
SSH
TFTP
Joffrey plans on installing a terminal emulator for a small organization so that he can control the office computers for troubleshooting issues. Joffrey is working as an intern for IVP Internet Solutions, which is an ISP. Analyze which of the following terminal emulators will be more suitable for James as he is new to his job and not well-equipped to handle complex layers of programming.
RDP
Telnet
Remote desktop gateway
SSH
RDP
Which of the following utilities would you use to display TCP/IP components and connections on a host?
tcpdump
netstat
arp
tracert
netstat
Which of the following is a collection of protocols that performs both authentication and encryption?
RDP
Telnet
VNC
SSH
SSH
Glenn Infosys has successfully managed to set up VPN tunnels between branch locations for Syndicate Bank across India, ensuring that it protects the company’s data, network, and liability. However, the top management wants Rahul, a network engineer for Glenn Infosys, to examine the network connection so that there are no bugs within the system. On inspection, he found that even though there are multiple points for connecting branch offices to the main office, certain branches have been left out. Analyze which of the following VPN protocols Rahul should use in such a situation.
L2TP
OpenVPN
mGRE
GRE
mGRE
Raqeeb is an employee working for Deloitte Corporation. He has been allowed to work from home because of the COVID-19 outbreak. You have been asked to establish a VPN so that Raqeeb can access a file server from the office while he operates from his workstation at home. It also has to be kept in mind that Raqeeb wants to stream music alongside when he does this. Which of the following VPN types will you apply so that the necessary requirements are met?
Host-to-host VPN
Site-to-site VPN
Split tunnel VPN
Full tunnel
Split tunnel VPN
You are a network engineer who is keen to develop a secure TCP/IP transmission so that you can not only add security information to the headers of the IP packets but also encrypt the entire IP package for added security. Which of the following IPsec encryptions will you apply to your program in such a scenario?
ISAKMP
ESP
AH
IKE
ESP
As a network administrator in Wright Elementary School, it is your job to monitor all the devices used by the staff and students. Which of the following commands would you employ to be able to detect, identify, and monitor devices on a network?
tcpdump
ping
netstat
nmap
nmap
You, as a network administrator, want to set up a file transfer version of SSH so that you can use a single channel to control both inbound and outbound communications. Which of the following ports will you use to carry out this operation?
Port 69
Port 20
Port 22
Port 989
Port 22
You, as a network administrator, want to set up an FTP for remote file access. You also want to add an added layer of protection so that you can encrypt both the data and control channels. Which of the following technologies will you apply in such a case?
TFTP
FTPS
RDP
SFTP
FTPS
What is a small file containing verified users’ identification information and public key known as?
Asymmetric encryption
Public-key infrastructure
Digital certificate
Key pair
Digital certificate
Which of the following utilities is also known as a packet sniffer?
traceroute
netstat
ping
tcpdump
tcpdump