Ch4 Flashcards

1
Q

Barney is the owner of Venture Capitals Internet Solutions. Venture’s client Riverdale Union High has many remote users, who are school students, and they regularly need access to desktops. The school wants to offer a consistent desktop experience with installed applications that the students commonly need. However, they don’t want to purchase dozens of physical computers for these students to connect to.

What should Barney do in such a scenario?

A. Barney should use VDI (Virtual Desktop Infrastructure).
B. Barney should use SSH (Secure Shell).
C. Barney should use Telnet.
D. Barney should use RDP (Remote Desktop Protocol).

A

A

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Which of the following protocols creates a frame around the payload by adding both a header and a trailer to the payload?

ICMP
NDP
TCP
Ethernet

A

Ethernet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

As a network engineer for Orior Telecommunications, you are programming an IPv4 header. You decide to put additional routing and timing information to the header as a result of which the header is no longer a multiple of 32 bits. Which of the following IPv4 fields will you use in such a situation?

Data
Padding
Option
Protocol

A

Padding

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Which of the following protocols is not a terminal emulation protocol?

Remote Desktop
Telnet
TFTP
SSH

A

TFTP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Joffrey plans on installing a terminal emulator for a small organization so that he can control the office computers for troubleshooting issues. Joffrey is working as an intern for IVP Internet Solutions, which is an ISP. Analyze which of the following terminal emulators will be more suitable for James as he is new to his job and not well-equipped to handle complex layers of programming.

RDP
Telnet
Remote desktop gateway
SSH

A

RDP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Which of the following utilities would you use to display TCP/IP components and connections on a host?

tcpdump
netstat
arp
tracert

A

netstat

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Which of the following is a collection of protocols that performs both authentication and encryption?

RDP
Telnet
VNC
SSH

A

SSH

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Glenn Infosys has successfully managed to set up VPN tunnels between branch locations for Syndicate Bank across India, ensuring that it protects the company’s data, network, and liability. However, the top management wants Rahul, a network engineer for Glenn Infosys, to examine the network connection so that there are no bugs within the system. On inspection, he found that even though there are multiple points for connecting branch offices to the main office, certain branches have been left out. Analyze which of the following VPN protocols Rahul should use in such a situation.

L2TP
OpenVPN
mGRE
GRE

A

mGRE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Raqeeb is an employee working for Deloitte Corporation. He has been allowed to work from home because of the COVID-19 outbreak. You have been asked to establish a VPN so that Raqeeb can access a file server from the office while he operates from his workstation at home. It also has to be kept in mind that Raqeeb wants to stream music alongside when he does this. Which of the following VPN types will you apply so that the necessary requirements are met?

Host-to-host VPN
Site-to-site VPN
Split tunnel VPN
Full tunnel

A

Split tunnel VPN

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

You are a network engineer who is keen to develop a secure TCP/IP transmission so that you can not only add security information to the headers of the IP packets but also encrypt the entire IP package for added security. Which of the following IPsec encryptions will you apply to your program in such a scenario?

ISAKMP
ESP
AH
IKE

A

ESP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

As a network administrator in Wright Elementary School, it is your job to monitor all the devices used by the staff and students. Which of the following commands would you employ to be able to detect, identify, and monitor devices on a network?

tcpdump
ping
netstat
nmap

A

nmap

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

You, as a network administrator, want to set up a file transfer version of SSH so that you can use a single channel to control both inbound and outbound communications. Which of the following ports will you use to carry out this operation?

Port 69
Port 20
Port 22
Port 989

A

Port 22

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

You, as a network administrator, want to set up an FTP for remote file access. You also want to add an added layer of protection so that you can encrypt both the data and control channels. Which of the following technologies will you apply in such a case?

TFTP
FTPS
RDP
SFTP

A

FTPS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is a small file containing verified users’ identification information and public key known as?

Asymmetric encryption
Public-key infrastructure
Digital certificate
Key pair

A

Digital certificate

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Which of the following utilities is also known as a packet sniffer?

traceroute
netstat
ping
tcpdump

A

tcpdump

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Mr. Yen has been working as a network technician for Goldyear Tyres. Recently, a couple of routers were reported for hardware failure. As the organization is large, it will take a lot of time to track down and identify the malfunctioning routers. What would be the most feasible option for Mr. Yen in this situation to solve the issue?

Use Mac spoofing
Use ping to test for network connectivity
Use tracert to target a node instead of the router
Use traceroute or tracert to track down the malfunctioning routers

A

Use tracert to target a node instead of the router

17
Q

JV Enterprises is currently using terminal emulation software to remotely control the devices for its employees. The administration however wants to build a dedicated network connection that will allow network administrators to remotely troubleshoot boot problems. Analyze which of the following options should JV consider for its needs.

In-band management
Telnet
Out-of-band management
SSH

A

Out-of-band management

18
Q

Which of the following protocols are used to transmit IP and other kinds of messages through a tunnel?

OpenVPN
GRE
IKEv2
L2TP

A

GRE

19
Q

Your client has hired you to extract details about the port on which the TCP/IP connections are running. You, as a network engineer, have decided to use the netstat utility for this purpose. Which of the following commands will you apply to list all current TCP connections and an all listening TCP and UDP ports?

netstat -n
netstat -f
netstat -r
netstat -a

A

netstat -a

20
Q

Which of the following layers in an Open System Interconnection (OSI) model adds a header in front of the payload?

Layer 3
Layer 4
Layer 2
Layer 1

A

Layer 4

21
Q

You, as a network engineer, are working on setting up a data delivery service. While creating the TCP segment for this purpose, you wish to set up a command requesting a synchronization of the sequence numbers between two nodes. Which of the following flags will you apply with a 1-bit field so that you can set this up?

SYN
URG
FIN
PSH

A

SYN

22
Q

Computer A started a communication sequence with Computer B that has a sequencing number of 300070. Computer B accepted the request and sent an acknowledgment number of 300071. Until this point, no payload has been exchanged. So far, the sequence numbers have increased by exactly 1 in each acknowledgment. Now, Computer A sends a payload data that is 800 bits long. According to you, what will be the acknowledgment number for the return message in this case?

300870
300072
300871
300800

A

300871

23
Q

While programming an IP packet, Kiara, a network programmer, gets to know that the packet has not reached the destination and has been sent back because the allotted TTL has expired. Now, as the device was running on an IPv6 packet, analyze which of the following protocols should Kiara opt for so that such errors do not arise in the future?

ICMP
NDP
Ethernet
ARP

A

NDP

24
Q

You have just managed to send a fragmented IP packet across a network as the IP packets are larger than what the network allows. Which of the following bits in the flags section of an IPV4 field will you apply so that you can send a clear message across to the receiving host that there are more fragments on the way?

The first bit
The fourth bit
The second bit
The third bit

A

The third bit

25
Q

You are running the netstat command to list all active TCP/IP connections of the local machine. However, you now want to have access to the routes used by the network hosts to reach the particular network destinations. Which of the following commands will you apply in such a situation?

netstat -r
netstat -n
netstat -f
netstat -b

A

netstat -r

26
Q

Meredith and Co. provides ISP services to a bulk of the corporates in the Silicon Valley. However, due to the recent COVID outbreak, a lot of the firms have started to allow their employees to work from home. Ceratrix is one such company that wants to allow its employees to work from home; however, certain features are only available to the employees when they have access to their workstations in the organization. This basically means that they would have to command the host computer. What remote access method should be provided to Ceratrix to fulfill this requirement?

VPN
FTPS
Remote file access
Terminal emulation

A

Terminal emulation

27
Q

The State of Nevada has organized a gaming championship for which you have been contracted to set up the network connection. The championship is a seven-day long affair with a heavy influx of participants. Which of the following protocols would you choose in setting up such a network?

ICMP
IP
UDP
TCP

A

UDP

28
Q

You have been recently appointed by Jaylabs Internet Solutions to verify the TCP/IP protocols that have been set up at Heroku Industries for inter-organizational purposes. On examining the TCP header segment, you want to get a sense of the limit of the maximum bytes of data that a computer can receive before returning an acknowledgment. Which of the following fields in a TCP segment should you check in such a situation?

Options
Destination port
Header length
Window size

A

Window size

29
Q

As a network engineer, you are noticing inconsistent connectivity issues related to certain addresses. After examining the errors, you have decided to flush the ARP table on any device experiencing a similar problem. Which of the following commands will you apply to enable this action?

arp -a
arp -d
arp -s
IHL

A

arp -d

30
Q

Which of the following layer’s header identifies the IP address of the destination host?

The physical layer
The transport layer
The network Layer
The data link layer

A

The network Layer

31
Q

Which of the following would you use to provide a set of rules for encryption, authentication, and key management for TCP/IP transmissions?

IPsec
Key pair
Public key encryption
Private key encryption

A

IPsec

32
Q

Barney is the owner of Venture Capitals Internet Solutions. Venture’s client Riverdale Union High has many remote users, who are school students, and they regularly need access to desktops. The school wants to offer a consistent desktop experience with installed applications that the students commonly need. However, they don’t want to purchase dozens of physical computers for these students to connect to. What should Barney do in such a scenario?

A. Barney should use SSH (Secure Shell).
B. Barney should use VDI (Virtual Desktop Infrastructure).
C. Barney should use Telnet.
D. Barney should use RDP (Remote Desktop Protocol).

A

B

33
Q

The University of Oklahoma has hired you as a network engineer, and you are required to remote into a LINUX server of the legal department building, which is located on the same block. Which of the following protocols will you apply in this case?

VPN
RDP
SFTP
SSH

A

SSH

34
Q

Hilary has been working on a pilot project for a start-up on which she has been testing the maximum bytes for the length of an IP packet. As her intended IP packets are larger than what the network allows, she has to break them up into smaller packets for transmission. Analyze and suggest which of the following fields Hilary should use in an IPv4 packet so that the receiving host is able to identify and reassemble the fragmented messages.

Flags
Fragment offset
Version
Identification

A

Identification

35
Q

Which of the following remote access methods allows a remote client to take over and command a host computer?

Terminal emulation
VPN
RAS
Remote file access

A

Terminal emulation

36
Q

While analyzing an intermittent error, James, an independent contractor for HKV Infrastructures, finds that the destination host is constantly asking the source to retransmit the data. He finds that the bug might be related to the transport layer of the OSI model. Since the TCP provides reliable delivery protocols, analyze which of the following characteristics of the TCP protocol James should check to fix this error.

Sequencing
Checksum
Flow control
Source port

A

Checksum

37
Q

Robert is the network administrator for JP Morgan. He made a hardware upgrade, which involved him bringing in new hard disks and NICs for the entire facility. Despite all this, he notices that the web server is taking twice as long to respond to HTTP requests. He has an impression that the reason for this might be the traffic going into and out of each NIC. Analyze which of the following utilities should Robert use to determine the traffic going in and out of each NIC.

arp
traceroute
tcpdump
netstat

A

netstat

38
Q

Which of the following remote access methods requires a virtual connection to remotely access resources between a client and a network?

VPN
Remote file access
Remote Desktop Protocol
Terminal emulator

A

VPN