Unit 5-10 Exam I Flashcards

1
Q
  1. When a wireless network in a small office is being set up, which type of IP addressing is typically used on the networked devices?

private
public
network
wireless

A

Private

Explanation: In setting up the wireless network in a small office, it is a best practice to use private IP addressing because of the flexibility and easy management it offers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q
  1. Which two parts are components of an IPv4 address? (Choose two.)
logical portion
host portion
broadcast portion
subnet portion
network portion
physical portion
A

Host
Network

Explanation: An IPv4 address is divided into two parts: a network portion – to identify the specific network on which a host resides, and a host portion – to identify specific hosts on a network. A subnet mask is used to identify the length of each portion.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q
  1. What is the full decompressed form of the IPv6 address 2001:420:59:0:1::a/64?

2001: 4200:5900:0:1:0:0:a000
2001: 0420:0059:0000:0001:0000:000a
2001: 0420:0059:0000:0001:000a
2001: 0420:0059:0000:0001:0000:0000:000a
2001: 420:59:0:1:0:0:a
2001: 4200:5900:0000:1000:0000:0000:a000

A

2001:0420:0059:0000:0001:0000:0000:000a

Explanation: To decompress an IPv6 address, the two rules of compression must be reversed. Any 16-bit hextet that has less than four hex characters is missing the leading zeros that were removed. An IPv6 address should have a total of 8 groups of 16-bit hextets, a (::) can be replaced with consecutive zeros that were removed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q
  1. A cybersecurity analyst believes an attacker is spoofing the MAC address of the default gateway to perform a man-in-the-middle attack. Which command should the analyst use to view the MAC address a host is using to reach the default gateway?

route print
ipconfig /all
netstat -r
arp -a

A

arp -a

Explanation: ARP is a protocol used with IPv4 to map a MAC address to an associated specific IP address. The command arp -a will display the MAC address table on a Windows PC.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q
  1. A user sends an HTTP request to a web server on a remote network. During encapsulation for this request, what information is added to the address field of a frame to indicate the destination?

the network domain of the destination host

the MAC address of the destination host

the IP address of the default gateway

the MAC address of the default gateway

A

the MAC address of the default gateway

Explanation: A frame is encapsulated with source and destination MAC addresses. The source device will not know the MAC address of the remote host. An ARP request will be sent by the source and will be responded to by the router. The router will respond with the MAC address of its interface, the one which is connected to the same network as the source.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q
  1. What addresses are mapped by ARP?

destination IPv4 address to the source MAC address

destination MAC address to a destination IPv4 address

destination MAC address to the source IPv4 address

destination IPv4 address to the destination host name

A

destination MAC address to a destination IPv4 address

Explanation: ARP, or the Address Resolution Protocol, works by mapping a destination MAC address to a destination IPv4 address. The host knows the destination IPv4 address and uses ARP to resolve the corresponding destination MAC address.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q
  1. What type of information is contained in an ARP table?

domain name to IP address mappings

switch ports associated with destination MAC addresses

routes to reach destination networks

IP address to MAC address mappings

A

IP address to MAC address mappings

Explanation: ARP tables are used to store mappings of IP addresses to MAC addresses. When a network device needs to forward a packet, the device knows only the IP address. To deliver the packet on an Ethernet network, a MAC address is needed. ARP resolves the MAC address and stores it in an ARP table.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q
  1. What type of information is contained in a DNS MX record?

the IP address of an authoritative name server

the FQDN of the alias used to identify a service

the domain name mapped to mail exchange servers

the IP address for an FQDN entry

A

Explanation: MX, or mail exchange messages, are used to map a domain name to several mail exchange servers that all belong to the same domain.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q
  1. A PC is downloading a large file from a server. The TCP window is 1000 bytes. The server is sending the file using 100-byte segments. How many segments will the server send before it requires an acknowledgment from the PC?

1000 segments
100 segments
1 segment
10 segments

A

10 segments

Explanation: With a window of 1000 bytes, the destination host accepts segments until all 1000 bytes of data have been received. Then the destination host sends an acknowledgment.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q
  1. A user issues a ping 192.168.250.103 command and receives a response that includes a code of 1 . What does this code represent?

port unreachable
network unreachable
protocol unreachable
host unreachable

A

host unreachable

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q
  1. Which two commands can be used on a Windows host to display the routing table? (Choose two.)
netstat -r
show ip route
netstat -s
route print
tracert
A

netstat -r
route print

Explanation: On a Windows host, the route print or netstat -r commands can be used to display the host routing table. Both commands generate the same output. On a router, the show ip route command is used to display the routing table. The netstat -s command is used to display per-protocol statistics. The tracert command is used to display the path that a packet travels to its destination.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q
  1. A user issues a ping 2001:db8:FACE:39::10 command and receives a response that includes a code of 2 . What does this code represent?

host unreachable
port unreachable
network unreachable
protocol unreachable

A

protocol unreachable

Explanation: When a host or gateway receives a packet that it cannot deliver, it can use an ICMP Destination Unreachable message to notify the source that the destination or service is unreachable. The message will include a code that indicates why the packet could not be delivered. These are some of the Destination Unreachable codes for ICMPv4:

0 : net unreachable
1 : host unreachable
2 : protocol unreachable
3 : port unreachable

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q
  1. What message informs IPv6 enabled interfaces to use stateful DHCPv6 for obtaining an IPv6 address?

the ICMPv6 Router Solicitation
the DHCPv6 Advertise message
the DHCPv6 Reply message
the ICMPv6 Router Advertisement

A

the ICMPv6 Router Advertisement

Explanation: Before an IPv6 enabled interface will use stateful DHCPv6 to obtain an IPv6 address, the interface must receive an ICMPv6 Router Advertisement with the managed configuration flag (M flag) set to 1.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q
  1. What is the purpose of ICMP messages?

to inform routers about network topology changes
to ensure the delivery of an IP packet
to provide feedback of IP packet transmissions
to monitor the process of a domain name to IP address resolution

A

to provide feedback of IP packet transmissions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is the HTTP status code group for client error?

A

4xx

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is the HTTP status code group for redirection?

A

3xx

17
Q

What is the HTTP status code group for success?

A

2xx

18
Q

What is the HTTP status code group for informational?

A

1xx

19
Q

What is the HTTP status code group for server error?

A

5xx

20
Q
  1. What network service uses the WHOIS protocol?

HTTPS
DNS
SMTP
FTP

A

DNS

Explanation: WHOIS is a TCP-based protocol that is used to identify the owners of internet domains through the DNS system.

21
Q
  1. What action does a DHCPv4 client take if it receives more than one DHCPOFFER from multiple DHCP servers?

It sends a DHCPNAK and begins the DHCP process over again.

It accepts both DHCPOFFER messages and sends a DHCPACK.

It discards both offers and sends a new DHCPDISCOVER.

It sends a DHCPREQUEST that identifies which lease offer the client is accepting.

A

It sends a DHCPREQUEST that identifies which lease offer the client is accepting.

Explanation: If there are multiple DHCP servers in a network, it is possible for a client to receive more than one DHCPOFFER. In this scenario, the client will only send one DHCPREQUEST, which includes the server from which the client is accepting the offer.

22
Q
  1. Refer to the exhibit. From the perspective of users behind the NAT router, what type of NAT address is 209.165.201.1?

inside global
inside local
outside global
outside local

A

inside global

23
Q

Three characteristics of POP?

A
  • Desirable for an ISP or large business.
  • Mail is deleted as it is downloaded.
  • Does not require a centralized backup solution.
24
Q

Three characteristics of IMAP?

A
  • Downloads copies of email messages to the client.
  • Requires a larger amount of disk space.
  • Original messages must be manually deleted.
25
Q
  1. What is done to an IP packet before it is transmitted over the physical medium?

It is tagged with information guaranteeing reliable delivery.

It is segmented into smaller individual pieces.

It is encapsulated in a Layer 2 frame.

It is encapsulated into a TCP segment.

A

It is encapsulated in a Layer 2 frame.

Explanation: When messages are sent on a network, the encapsulation process works from the top of the OSI or TCP/IP model to the bottom. At each layer of the model, the upper layer information is encapsulated into the data field of the next protocol. For example, before an IP packet can be sent, it is encapsulated in a data link frame at Layer 2 so that it can be sent over the physical medium.

26
Q
  1. Which PDU is processed when a host computer is de-encapsulating a message at the transport layer of the TCP/IP model?

segment
packet
frame
bits

A

segment

Explanation: At the transport layer, a host computer will de-encapsulate a segment to reassemble data to an acceptable format by the application layer protocol of the TCP/IP model.

27
Q
  1. Which networking model is being used when an author uploads one chapter document to a file server of a book publisher?

peer-to-peer
client/server
master-slave
point-to-point

A

client/server

Explanation: In the client/server network model, a network device assumes the role of server in order to provide a particular service such as file transfer and storage. In the client/server network model, a dedicated server does not have to be used, but if one is present, the network model being used is the client/server model. In contrast, a peer-to-peer network does not have a dedicated server.

28
Q
  1. Which type of transmission is used to transmit a single video stream such as a web-based video conference to a select number of users?

anycast
broadcast
unicast
multicast

A

multicast

Explanation: An anycast is used with IPv6 transmissions. A unicast is a transmission to a single host destination. A broadcast is a transmission sent to all hosts on a destination network.

29
Q
  1. What is the result of an ARP poisoning attack?

Network clients are infected with a virus.
Network clients experience a denial of service.
Client memory buffers are overwhelmed.
Client information is stolen.

A

Client information is stolen.

Explanation: ARP poisoning is a technique used by an attacker to reply to an ARP request for an IPv4 address belonging to another device, such as the default gateway. The attacker, who is effectively doing an MITM attack, pretends to be the default gateway and sends an ARP reply to the transmitter of the ARP request. The receiver of the ARP reply will add the wrong MAC address to the ARP table and will send the packets to the attacker. Therefore, all traffic to the default gateway will funnel through the attacker device.

30
Q
  1. What is the function of the HTTP GET message?
    to upload content to a web server from a web client
    to retrieve client email from an email server using TCP port 110
    to request an HTML page from a web server
    to send error information from a web server to a web client
A

to request an HTML page from a web server

31
Q
  1. Which protocol is a client/server file sharing protocol and also a request/response protocol?

FTP
UDP
TCP
SMB

A

SMB

Explanation:The Server Message Block (SMB) is a client/server file sharing protocol that describes the structure of shared network resources such as directories, files, printers, and serial ports. SMB is also a request/response protocol.

32
Q
  1. How is a DHCPDISCOVER transmitted on a network to reach a DHCP server?

A DHCPDISCOVER message is sent with the broadcast IP address as the destination address.
A DHCPDISCOVER message is sent with a multicast IP address that all DHCP servers listen to as the destination address.
A DHCPDISCOVER message is sent with the IP address of the default gateway as the destination address.
A DHCPDISCOVER message is sent with the IP address of the DHCP server as the destination address.

A

A DHCPDISCOVER message is sent with the broadcast IP address as the destination address.

33
Q
  1. What is a description of a DNS zone transfer?

transferring blocks of DNS data from a DNS server to another server

the action taken when a DNS server sends a query on behalf of a DNS resolver

forwarding a request from a DNS server in a subdomain to an authoritative source

finding an address match and transferring the numbered address from a DNS server to the original requesting client

A

transferring blocks of DNS data from a DNS server to another server

Explanation: When a server requires data for a zone, it will request a transfer of that data from an authoritative server for that zone. The process of transferring blocks of DNS data between servers is known as a zone transfer.

34
Q
  1. What are the two sizes (minimum and maximum) of an Ethernet frame? (Choose two.)
128 bytes
64 bytes
1024 bytes
56 bytes
1518 bytes
A

64 bytes

1518 bytes

35
Q
  1. Which process failed if a computer cannot access the internet and received an IP address of 169.254.142.5?

DNS
IP
HTTP
DHCP

A

DHCP