Chapter 3 Flashcards
T or F: A hexadecimal number is a number written in the base 16 number system.
T
T or F: DNS follows a centralized database model, allowing for easier management of DNS records.
F
T or F: ICANN is responsible for restrictions on use of the .com, .org, and .net TLDs
F
T or F: Each organization that provides host services on the public Internet is responsible for providing and maintaining DNS authoritative servers for public access.
T
T or F: An IPv6 address consists of 128 bits that are written as 10 blocks of hexadecimal numbers separated by colons.
F
T or F: At the root level of the DNS hierarchical structure, 13 clusters of root servers hold information used to locate TLD servers.
T
T or F: The 1024 - 65535 range of ports is also known as the “well-known” range.
F
T or F: UDP port 123 is utilized by the Network Time Protocol service.
T
T or F: When using IPv6, two or more nodes on the same link are said to be neighbors.
T
T or F: The FTP protocol utilizes UDP, while TFTP uses TCP for data transmission
F
At the Transport layer of the OSI, what is used to find and communicate with a particular application running on a host?
A. IP addresses
B. MAC addresses
C. port numbers
D. domain names
Port numbers
With a FQDN of ftp1.dallas.mycompany.com, what part is the domain name?
A. ftp1
B. ftp1.dallas.mycompany.
C. ftp1.dallas
D. mycompany.com
mycompany.com
How can you determine the manufacturer of a NIC card based on the MAC address?
A. The first 24 bits, known as the Organizationally Unique Identifier, identify the manufacturer.
B. The middle 24 bits, known as the Organization Universal Identifier, identify the manufacturer.
C. The first 12 bits and last 12 bits combined are known as the Organizationally Unique Identifier.
D. The last 24 bits, known as the Organizationally Unique Identifier, identify the manufacturer.
The first 24 bits, known as the Organizationally Unique Identifier, identify the manufacturer.
What command can you utilize to display TCP/IP configuration information for each network adapter installed?
A. ipconfig /all
B. ipconfig /list
C. ipconfig /show
D. ipconfig /full
ipconfig /all
Which of the following IP addresses would be a loopback IP address?
A. 224.0.0.1
B. 192.168.1.1
C. 127.0.0.1
D. 169.254.0.1
127.0.0.1
What text editor can be used on Linux to view and edit the contents of a configuration file?
A. vim
B. Microsoft Word
C. edit
D. Notepad
Vim
On a Linux-based system, what command can be used to display TCP/IP information associated with every interface on the system?
A. ip show
B. if status
C. ipconfig /all
D. ifconfig -a
ifconfig -a
Which of the following IPv6 addresses represents a global unicast address?
A. FD00::/8
B. FE80::10
C. FC00::/7
D. 2000::/3
2000::/3
Which of the following protocols is used as a signaling protocol for the initial connection between hosts, but does not participate in data transfer during the session?
A. NTP
B. LDAP
C. SIP
D. TFTP
SIP
What is by far the most popular DNS server software available?
A. Oracle Resolver
B. Dnsmasq
C. Microsoft DNS
D. BIND
BIND
Your supervisor has asked you to configure a new prototype network with a dual stack configuration. What does this mean?
A. The router serving the network will have a redundant spare.
B. The network will exist on two separate segments, separated by a proxy.
C. Both IPv4 and IPv6 protocols will be used on the network.
D. Two different IPv4 address spaces will exist on the same network segment.
Both IPv4 and IPv6 protocols will be used on the network.
What utility is used to verify that TCP/IP installed, bound to the NIC, configured correctly, and communicating with the network?
A. ifconfig
B. traceroute
C. ping
D. route
Ping
You are troubleshooting a network issue on a client computer and discover that the network card has an IP address of 169.254.196.200. What does this mean?
A. The network card has been erroneously assigned a loopback address.
B. The computer has been assigned a routed public IP address.
C. The network card is set up for multicast communication.
D. The computer is configured to use DHCP, but was unable to lease an address.
The computer is configured to use DHCP, but was unable to lease an address.
What part of a MAC address serves as the extension identifier, or device ID?
A. The last 24 bits of the MAC address.
B. The first 24 bits of the MAC address.
C. The last 12 bits of the MAC address.
D. The first 12 bits of the MAC address.
The last 24 bits of the MAC address.
In the classful addressing scheme, what range of network addresses is considered a Class B?
A. 1.x.y.z to 126.x.y.z
B. 128.0.x.y to 191.255.x.y
C. 224.x.y.z to 255.x.y.z
D. 192.0.0.x to 223.255.255.x
128.0.x.y to 191.255.x.y
How do routers create a broadcast domain boundary?
A. They forward broadcasts only to necessary segments.
B. They listen to and direct broadcast traffic.
C. They do not forward broadcast traffic.
D. They only forward broadcasts that are intended for multiple subnets.
They do not forward broadcast traffic.
Which of the following is NOT a range of IP addresses recommended for use in private networks?
A. 127.0.0.0 through 127.255.255.255
B. 192.168.0.0 through 192.168.255.255
C. 10.0.0.0 through 10.255.255.255
D. 172.16.0.0 through 172.31.255.255
127.0.0.0 through 127.255.255.255
When using DHCP for IPv6 (i.e. DHCPv6), what port do clients receive responses on?
A. port 547
B. port 67
C. port 68
D. port 546
Port 547
What type of IPv6 address is fe80::8cf1:2c42:ffde:da1c?
A. multicast address
B. global address
C. link local address
D. anycast address
Link Local Address
If a host’s IPv6 address contains the network adapter’s MAC address within the last 64 bits of the IPv6 address, what standard is being used?
A. MACin6
B. IEEE 802.36
C. UUID-128
D. EUI-64
EUI-64
Encrypted control of remote computers using the RDP protocol is accomplished using what port number?
A. TCP 22
B. UDP 10000
C. UDP 161
D. TCP 3389
TCP 3389
What statement regarding the Server Message Block protocol is accurate?
A. It is a signaling protocol used to make a connection between hosts prior to data transfer.
B. It is a protocol used for accessing network-based LDAP directories.
C. It is a simple protocol used to synchronize block messages written to iSCSI drives on a network.
D. It is used by Windows and UNIX-based operating systems to share files.
It is used by Windows and UNIX-based operating systems to share files.
What is the ARPA domain suffix utilized for?
A. It is used for reverse DNS queries, and holds PTR records.
B. It is a specialized government restricted TLD.
C. It is used to announce records for other TLDs such as .com and .net.
D. It is a private TLD used for synchronization of zones between servers.
It is used for reverse DNS queries, and holds PTR records.
In a DNS zone, what type of record holds the name-to-address mapping for IPv6 addresses?
A. AAAA record
B. TXT record
C. PTR record
D. A record
AAAA record
You are setting up a DNS zone and have been asked to create SPF and DKIM records. What type of DNS record will hold this information?
A. SRV record
B. CNAME record
C. TXT record
D. PTR record
TXT record
What does the MX record do in a forward DNS zone?
A. It identifies the hostname and port of a computer that hosts a specific network service, such as FTP or SIP.
B. It identifies the authoritative name server for a domain.
C. It identifies the e-mail server to be used for e-mail traffic for the domain.
D. It holds the alternative names for a host.
It identifies the e-mail server to be used for e-mail traffic for the domain.
You are troubleshooting a DNS issue on a Linux system, and need to test the resolution of your domain mycompany.com MX record using Google’s DNS server with the IP address of 8.8.8.8. What dig command will accomplish this?
A. dig –server 8.8.8.8 –type=mx mycompany.com
B. dig query 8.8.8.8 domain mycompany.com type mx
C. dig -s 8.8.8.8 -t mx mycompany.com
D. dig @8.8.8.8 mycompany.com MX
dig @8.8.8.8 mycompany.com MX
What command can be used to check a domain computer’s time source from a Command Prompt window?
A. date /source
B. ntpd show source
C. w32tm /query /source
D. time –source
w32tm /query /source
A Windows computer on your network is having issues resolving queries for a specific domain, but not other domains. Other computers on the same network resolve the name just fine. What command can you issue that might fix the problem?
A. ipconfig /release
B. ipconfig /renew
C. ipconfig /refresh
D. ipconfig /flushdns
ipconfig /flushdns
In the DNS hierarchy, where is information about how to find the top-level domain servers held?
A. On DNS caching-only servers.
B. In the organization’s forward lookup zone.
C. On the DNS root servers.
D. In the hosts file on the local machine.
On the DNS root servers.