Modules 5-10: Networking Fundamentals Flashcards
When a wireless network in a small office is being set up, which type of IP addressing is typically used on the networked devices?
private
public
network
wireless
private
Which two parts are components of an IPv4 address? (Choose two.)
logical portion
host portion
broadcast portion
subnet portion
network portion
physical portion
host portion
network portion
What is the full decompressed form of the IPv6 address 2001:420:59:0:1::a/64?
2001:4200:5900:0:1:0:0:a000
2001:0420:0059:0000:0001:0000:000a
2001:0420:0059:0000:0001:000a
2001:0420:0059:0000:0001:0000:0000:000a
2001:420:59:0:1:0:0:a
2001:4200:5900:0000:1000:0000:0000:a000
2001:0420:0059:0000:0001:0000:000a
A cybersecurity analyst believes an attacker is spoofing the MAC address of the default gateway to perform a man-in-the-middle attack. Which command should the analyst use to view the MAC address a host is using to reach the default gateway?
route print
ipconfig /all
netstat -r
arp -a
arp -a
ARP is a protocol used with IPv4 to map a MAC address to an associated specific IP address.
The command arp -a will display the MAC address table on a Windows PC.
What addresses are mapped by ARP?
destination IPv4 address to the source MAC address
destination MAC address to a destination IPv4 address
destination MAC address to the source IPv4 address
destination IPv4 address to the destination host name
destination MAC address to a destination IPv4 address
What type of information is contained in an ARP table?
domain name to IP address mappings
switch ports associated with destination MAC addresses
routes to reach destination networks
IP address to MAC address mappings
IP address to MAC address mappings
What type of information is contained in a DNS MX record?
the IP address of an authoritative name server
the FQDN of the alias used to identify a service
the domain name mapped to mail exchange servers
the IP address for an FQDN entry
the domain name mapped to mail exchange servers
Match the application protocols to the correct transport protocols
A PC is downloading a large file from a server. The TCP window is 1000 bytes. The server is sending the file using 100-byte segments. How many segments will the server send before it requires an acknowledgment from the PC?
1000 segments
100 segments
1 segment
10 segments
10 segments
A user issues a ping 192.168.250.103 command and receives a response that includes a code of 1 . What does this code represent?
port unreachable
network unreachable
protocol unreachable
host unreachable
host unreachable
0 : net unreachable
1 : host unreachable
2 : protocol unreachable
3 : port unreachable
A user issues a ping 2001:db8:FACE:39::10 command and receives a response that includes a code of 2 . What does this code represent?
host unreachable
port unreachable
network unreachable
protocol unreachable
protocol unreachable
0 : net unreachable
1 : host unreachable
2 : protocol unreachable
3 : port unreachable
What is the purpose of ICMP messages?
to monitor the process of a domain name to IP address resolution
to provide feedback of IP packet transmissions
to inform routers about network topology changes
to ensure the delivery of an IP packet
to provide feedback of IP packet transmissions
What network service uses the WHOIS protocol?
HTTPS
DNS
SMTP
FTP
DNS
Which type of transmission is used to transmit a single video stream such as a web-based video conference to a select number of users?
anycast
broadcast
unicast
multicast
multicast
What is the result of an ARP poisoning attack?
Network clients are infected with a virus.
Network clients experience a denial of service.
Client memory buffers are overwhelmed.
Client information is stolen.
Client information is stolen.
Which protocol is a client/server file sharing protocol and also a request/response protocol?
FTP
UDP
TCP
SMB
SMB
The Server Message Block (SMB) is a client/server file sharing protocol that describes the structure of shared network resources such as directories, files, printers, and serial ports. SMB is also a request/response protocol.
What are the two sizes (minimum and maximum) of an Ethernet frame? (Choose two.)
128 bytes
64 bytes
1024 bytes
56 bytes
1518 bytes
64 bytes
1518 bytes
Which process failed if a computer cannot access the internet and received an IP address of 169.254.142.5?
DNS
IP
HTTP
DHCP
DHCP
How does network scanning help assess operations security?
It can detect open TCP ports on network systems.
It can detect weak or blank passwords.
It can simulate attacks from malicious sources.
It can log abnormal activity.
It can detect open TCP ports on network systems.
Which two operations are provided by TCP but not by UDP? (Choose two.)
retransmitting any unacknowledged data
acknowledging received data
reconstructing data in the order received
identifying the applications
tracking individual conversations
retransmitting any unacknowledged data
acknowledging received data
A network administrator is testing network connectivity by issuing the ping command on a router. Which symbol will be displayed to indicate that a time expired during the wait for an ICMP echo reply message?
U
.
!
$
.