Modules 5-10: Networking Fundamentals Flashcards

1
Q

When a wireless network in a small office is being set up, which type of IP addressing is typically used on the networked devices?

private
public
network
wireless

A

private

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Which two parts are components of an IPv4 address? (Choose two.)

logical portion
host portion
broadcast portion
subnet portion
network portion
physical portion

A

host portion
network portion

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is the full decompressed form of the IPv6 address 2001:420:59:0:1::a/64?

2001:4200:5900:0:1:0:0:a000
2001:0420:0059:0000:0001:0000:000a
2001:0420:0059:0000:0001:000a
2001:0420:0059:0000:0001:0000:0000:000a
2001:420:59:0:1:0:0:a
2001:4200:5900:0000:1000:0000:0000:a000

A

2001:0420:0059:0000:0001:0000:000a

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

A cybersecurity analyst believes an attacker is spoofing the MAC address of the default gateway to perform a man-in-the-middle attack. Which command should the analyst use to view the MAC address a host is using to reach the default gateway?

route print
ipconfig /all
netstat -r
arp -a

A

arp -a

ARP is a protocol used with IPv4 to map a MAC address to an associated specific IP address.

The command arp -a will display the MAC address table on a Windows PC.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What addresses are mapped by ARP?

destination IPv4 address to the source MAC address
destination MAC address to a destination IPv4 address
destination MAC address to the source IPv4 address
destination IPv4 address to the destination host name

A

destination MAC address to a destination IPv4 address

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What type of information is contained in an ARP table?

domain name to IP address mappings
switch ports associated with destination MAC addresses
routes to reach destination networks
IP address to MAC address mappings

A

IP address to MAC address mappings

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What type of information is contained in a DNS MX record?
the IP address of an authoritative name server
the FQDN of the alias used to identify a service
the domain name mapped to mail exchange servers
the IP address for an FQDN entry

A

the domain name mapped to mail exchange servers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Match the application protocols to the correct transport protocols

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

A PC is downloading a large file from a server. The TCP window is 1000 bytes. The server is sending the file using 100-byte segments. How many segments will the server send before it requires an acknowledgment from the PC?

1000 segments
100 segments
1 segment
10 segments

A

10 segments

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

A user issues a ping 192.168.250.103 command and receives a response that includes a code of 1 . What does this code represent?

port unreachable
network unreachable
protocol unreachable
host unreachable

A

host unreachable

0 : net unreachable
1 : host unreachable
2 : protocol unreachable
3 : port unreachable

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

A user issues a ping 2001:db8:FACE:39::10 command and receives a response that includes a code of 2 . What does this code represent?

host unreachable
port unreachable
network unreachable
protocol unreachable

A

protocol unreachable

0 : net unreachable
1 : host unreachable
2 : protocol unreachable
3 : port unreachable

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is the purpose of ICMP messages?

to monitor the process of a domain name to IP address resolution
to provide feedback of IP packet transmissions
to inform routers about network topology changes
to ensure the delivery of an IP packet

A

to provide feedback of IP packet transmissions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What network service uses the WHOIS protocol?

HTTPS
DNS
SMTP
FTP

A

DNS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Which type of transmission is used to transmit a single video stream such as a web-based video conference to a select number of users?
anycast
broadcast
unicast
multicast

A

multicast

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is the result of an ARP poisoning attack?
Network clients are infected with a virus.
Network clients experience a denial of service.
Client memory buffers are overwhelmed.
Client information is stolen.

A

Client information is stolen.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Which protocol is a client/server file sharing protocol and also a request/response protocol?

FTP
UDP
TCP
SMB

A

SMB

The Server Message Block (SMB) is a client/server file sharing protocol that describes the structure of shared network resources such as directories, files, printers, and serial ports. SMB is also a request/response protocol.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What are the two sizes (minimum and maximum) of an Ethernet frame? (Choose two.)

128 bytes
64 bytes
1024 bytes
56 bytes
1518 bytes

A

64 bytes
1518 bytes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Which process failed if a computer cannot access the internet and received an IP address of 169.254.142.5?

DNS
IP
HTTP
DHCP

A

DHCP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

How does network scanning help assess operations security?

It can detect open TCP ports on network systems.
It can detect weak or blank passwords.
It can simulate attacks from malicious sources.
It can log abnormal activity.

A

It can detect open TCP ports on network systems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Which two operations are provided by TCP but not by UDP? (Choose two.)

retransmitting any unacknowledged data
acknowledging received data
reconstructing data in the order received
identifying the applications
tracking individual conversations

A

retransmitting any unacknowledged data
acknowledging received data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

A network administrator is testing network connectivity by issuing the ping command on a router. Which symbol will be displayed to indicate that a time expired during the wait for an ICMP echo reply message?

U
.
!
$

A

.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

A technician is configuring email on a mobile device. The user wants to be able to keep the original email on the server, organize it into folders, and synchronize the folders between the mobile device and the server. Which email protocol should the technician use?

SMTP
MIME
POP3
IMAP

A

IMAP

The IMAP protocol allows email data to be synchronized between a client and server.

23
Q

A device has been assigned the IPv6 address of 2001:0db8:cafe:4500:1000:00d8:0058:00ab/64. Which is the host identifier of the device?

2001:0db8:cafe:4500:1000:00d8:0058:00ab
00ab
2001:0db8:cafe:4500
1000:00d8:0058:00ab

A

1000:00d8:0058:00ab

24
Q

How many usable IP addresses are available on the 192.168.1.0/27 network?

Use the following formula

A

/27 = 27 1’s and 5 0’s
h = number of usable IPs
x = number of 0’s
2^5 = 32
h = 32 -2
h = 30

25
Q

What is the command netstat -r used for?

to display the TCP sockets
to release the assigned IP address
to display the host routing table
to renew the default gateway

A

to display the host routing table

26
Q

Which three IP addresses are private ? (Choose three.)

172.32.5.2
192.167.10.10
172.16.4.4
192.168.5.5
10.1.1.1
224.6.6.6

A

Private IP addresses are within these three ranges:

10.0.0.0 – 10.255.255.255
172.16.0.0 – 172.31.255.255
192.168.0.0 – 192.168.255.255

172.16.4.4
192.168.5.5
10.1.1.1

27
Q

What three application layer protocols are part of the TCP/IP protocol suite? (Choose three.)

DHCP
PPP
FTP
DNS
NAT
ARP

A

DHCP
FTP
DNS

28
Q

A computer can access devices on the same network but cannot access devices on other networks. What is the probable cause of this problem?

The computer has an invalid IP address.
The cable is not connected properly to the NIC.
The computer has an incorrect subnet mask.
The computer has an invalid default gateway address.

A

The computer has an invalid default gateway address.

29
Q

A user who is unable to connect to the file server contacts the help desk. The helpdesk technician asks the user to ping the IP address of the default gateway that is configured on the workstation. What is the purpose for this ping command?

to resolve the domain name of the file server to its IP address
to request that gateway forward the connection request to the file server
to obtain a dynamic IP address from the server
to test that the host has the capability to reach hosts on other networks

A

to test that the host has the capability to reach hosts on other networks

30
Q

What are the three ranges of IP addresses that are reserved for internal private use? (Choose three.)

64.100.0.0/14
192.168.0.0/16
192.31.7.0/24
172.16.0.0/12
10.0.0.0/8
127.16.0.0/12

A

192.168.0.0/16
172.16.0.0/12
10.0.0.0/8

31
Q

An employee complains that a Windows PC cannot connect to the Internet. A network technician issues the ipconfig command on the PC and is shown an IP address of 169.254.10.3. Which two conclusions can be drawn? (Choose two.)

The PC is configured to obtain an IP address automatically.
The default gateway address is not configured.
The DNS server address is misconfigured.
The enterprise network is misconfigured for dynamic routing.
The PC cannot contact a DHCP server.

A

The PC cannot contact a DHCP server.

32
Q

What is a function of the tracert command that differs from the ping command when they are used on a workstation?

The tracert command is used to test the connectivity between two devices.
The tracert command reaches the destination faster.
The tracert command shows the information of routers in the path.
The tracert command sends one ICMP message to each hop in the path.

A

The tracert command shows the information of routers in the path.

33
Q

Which value, that is contained in an IPv4 header field, is decremented by each router that receives a packet?

Time-to-Live
Fragment Offset
Header Length
Differentiated Services

A

Time-to-Live

34
Q

A user is executing a tracert to a remote device. At what point would a router, which is in the path to the destination device, stop forwarding the packet?

when the router receives an ICMP Time Exceeded message
when the RTT value reaches zero
when the values of both the Echo Request and Echo Reply messages reach zero
when the host responds with an ICMP Echo Reply message
when the value in the TTL field reaches zero

A

when the value in the TTL field reaches zero

35
Q

What is DHCPDISCOVER?

A

Sent by the client as the first step of the DHCP client/server interaction.

The purpose of the DHCPDISCOVER is for the client to “discover” what servers are out there and what network parameters they have to offer.

36
Q

What is DHCPOFFER?

A

Sent by the server to the client in response to a DHCPDISCOVER.

The server uses the DHCPOFFER message to “offer” an IP address, lease time, and network configuration parameters to the client.

37
Q

What is DHCPREQUEST?

A

Sent by the client to the server in response to a DHCPOFFER. The “server identifier” field of the DHCPREQUEST indicates which server the client has chosen to further interact with.

38
Q

What is DHCPACK?

A

Sent by the server to the client in response to a DHCPREQUEST.

The DHCPACK indicates that the server “acknowledges” the request, and the DHCPACK message contains fields which indicate the IP address, lease time, and network configuration parameters that the client is being configured with.

39
Q

What is DHCPNAK?

A

Sent by the server to the client in response to a DHCPREQUEST.

The DHCPNAK indicates that the server does not acknowledge the request, and does not agree to lease the specified IP address.

40
Q

What is DHCPRELEASE?

A

Sent by the client to the server to give up an IP address lease. If the client knows that it no longer needs an IP address, it should send the server a DHCPRELEASE.

41
Q

What is DHCPDECLINE?

A

Sent by the client to the server in response to a DHCPACK. If the client receives a DHCPACK, but, for some reason, is not satisfied with the lease time and/or network parameters in the message, it can send the server a DHCPDECLINE indicating that it refuses to use the IP address.

42
Q

What is an Inside Local Address?

A

Private addresses that the company can control. This is the IP address assigned to an end host on the inside

43
Q

What is an Inside Global Address?

A

Inside global address represents one or more inside local addresses that are translated to addresses that can be seen by the outside world

44
Q

What is an Outside Local Address?

A

Private Addresses that are outside of company/organization control.

45
Q

What is indicated by a successful ping to the ::1 IPv6 address?

All hosts on the local link are available.
The link-local address is correctly configured.
The default gateway address is correctly configured.
IP is properly installed on the host.
The host is cabled properly.

A

IP is properly installed on the host.

46
Q

What process is used in ICMPv6 for a host to verify that an IPv6 address is unique before configuring it on an interface?

SLAAC
EUI-64
DAD
ARP

A

To verify that no other hosts are using the IPv6 address, the host performs the duplicate address detection (DAD) process by sending a Neighbor Solicitation (NS) message to the IPv6 address.

47
Q

Which ICMPv6 message is sent when the IPv6 hop limit field of a packet is decremented to zero and the packet cannot be forwarded?

network unreachable
port unreachable
time exceeded
protocol unreachable

A

time exceeded

48
Q

Which protocol is used by ping to test connectivity between network hosts?

ARP
ICMP
DHCP
TCP

A

ICMP

49
Q

What message is sent by a host to check the uniqueness of an IPv6 address before using that address?

ARP request
echo request
router solicitation
neighbor solicitation

A

neighbor solicitation

50
Q

A user issues a ping 2001:db8:3040:114::88 command and receives a response that includes a code of 3. What does this code represent?

port unreachable
host unreachable
protocol unreachable
network unreachable

A

port unreachable

0 : net unreachable
1 : host unreachable
2 : protocol unreachable
3 : port unreachable

51
Q

A host is transmitting a broadcast. Which host or hosts will receive it?

the closest neighbor on the same network
all hosts on the Internet
all hosts in the same network
a specially defined group of hosts

A

all hosts in the same network

52
Q

Which statement describes a characteristic of cloud computing?

A business can connect directly to the Internet without the use of an ISP.
Investment in new infrastructure is required in order to access the cloud.
Applications can be accessed over the Internet by individual users or businesses using any device, anywhere in the world.
Devices can connect to the Internet through existing electrical wiring.

A

Applications can be accessed over the Internet by individual users or businesses using any device, anywhere in the world.

53
Q

A network administrator can successfully ping the server at www.cisco.com, but cannot ping the company web server located at an ISP in another city. Which tool or command would help identify the specific router where the packet was lost or delayed?

ipconfig
netstat
telnet
traceroute

A

traceroute