Modules 5-10: Network Fundamentals

0.0(0)
studied byStudied by 0 people
full-widthCall with Kai
GameKnowt Play
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/88

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

89 Terms

1
New cards

When a wireless network in a small office is being set up, which type of IP addressing is typically used on the networked devices?

Private

2
New cards

Which two parts are components of an IPv4 address?

Host & Network

3
New cards

What type of address is 192.168.100.161/25?

Host address

4
New cards

What type of address is 203.0.113.100/24

Host Address

5
New cards

What type of address is 10.10.10.128/25?

Network Address

6
New cards

What type of address is 172.110.12.64/28?

Network Address

7
New cards

What type of address is 192.168.1.191/26?

Broadcast address

8
New cards

What type of address is 10.0.0.159/27

Broadcast address

9
New cards

What is the full decompressed form of the IPv6 address 2001:420:59:0:1::a/64

2001:0420:0059:0000:0001:0000:0000:000a

10
New cards

A cybersecurity analyst believes an attacker is spoofing the MAC address of the default gateway to perform a man-in-the-middle attack. Which command should the analyst use to view the MAC address a host is using to reach the default gateway?

arp -a

11
New cards

A user sends an HTTP request to a web server on a remote network. During encapsulation for this request, what information is added to the address field of a frame to indicate the destination?

the mac address of the default gateway

12
New cards

What addresses are mapped by ARP?

IPv4 address to a destination MAC address

13
New cards

What type of information is contained in an ARP table?

IPv4 address to MAC address mappings

14
New cards

Match the characteristic to the protocol category: TCP

-Window Size

-Checksum

-Port Number

-Connectionless

Window Size

15
New cards

Match the characteristic to the protocol category: TCP

3-way handshake

16
New cards

Match the characteristic to the protocol category: UDP

Best for VoIP

17
New cards

Match the characteristic to the protocol category: UDP

connectionless

18
New cards

Match the characteristic to the protocol category: Both UDP and TCP

Port number

19
New cards

Match the characteristic to the protocol category: Both UDP and TCP

Checksum

20
New cards

What type of information is contained in a DNS MX record?

the domain name mapped to mail exchange servers

21
New cards

Match the application protocols to the correct transport protocols: TCP : DHCP / FTP / HTTP / SMTP / TFTP

FTP / HTTP / SMTP

22
New cards

Match the application protocols to the correct transport protocols: UDP : DHCP / FTP / HTTP / SMTP / TFTP

DHCP / TFTP

23
New cards

A PC is downloading a large file from a server. The TCP window is 1000 bytes. The server is sending the file using 100-byte segments. How many segments will the server send before it requires an acknowledgment from the PC?

10 segments

24
New cards

A user issues a ping 192.168.250.103 command and receives a response that includes a code of 1 . What does this code represent?

Host unreachable

25
New cards

Which two commands can be used on a Windows host to display the routing table? (Choose two)

netstat -r / route print

26
New cards

A user issues a ping 2001:db8:FACE:39::10 command and receives a response that includes a code of 2 . What does this code represent?

Protocol unreachable

27
New cards

What message informs IPv6 enabled interfaces to use stateful DHCPv6 for obtaining an IPv6 address?

the ICMPv6 Router Advertisement

28
New cards

What is the purpose of ICMP messages?

to provide feedback of IP packet transmissions

29
New cards

Match the HTTP status code group to the type of message generated by the HTTP server: Client Error

1xx

2xx

3xx

4xx

5xx

4xx

30
New cards

Match the HTTP status code group to the type of message generated by the HTTP server: Redirection

1xx

2xx

3xx

4xx

5xx

3xx

31
New cards

Match the HTTP status code group to the type of message generated by the HTTP server: Success

1xx

2xx

3xx

4xx

5xx

2xx

32
New cards

Match the HTTP status code group to the type of message generated by the HTTP server: Informational

1xx

2xx

3xx

4xx

5xx

1xx

33
New cards

Match the HTTP status code group to the type of message generated by the HTTP server: Server error

1xx

2xx

3xx

4xx

5xx

5xx

34
New cards

What network service uses the WHOIS protocol?

DNS

35
New cards

What action does a DHCPv4 client take if it receives more than one DHCPOFFER from multiple DHCP servers?

It sends a DHCPREQUEST that identifies which lease offer the client is accepting

36
New cards
<p><strong>Refer to the exhibit. From the perspective of users behind the NAT router, what type of NAT address is 209.165.201.1?</strong></p>

Refer to the exhibit. From the perspective of users behind the NAT router, what type of NAT address is 209.165.201.1?

inside global

37
New cards

Match each characteristic to the appropriate email protocol: POP

-desirable for an ISP or large business

-mail is deleted as it is downloaded

-can be used to send and receive email

-downloads copies of email messages ot the client

-requires a larger amount of disk space

-original messages must be manually deleted

-does not require a centralized backup solution

-Desirable for an ISP or large business

-Mail is deleted as it is donwloaded

-Does not required a centralized backup

38
New cards

Match each characteristic to the appropriate email protocol: IMAP

-desirable for an ISP or large business

-mail is deleted as it is downloaded

-can be used to send and receive email

-downloads copies of email messages ot the client

-requires a larger amount of disk space

-original messages must be manually deleted

-does not require a centralized backup solution

downloads copies of email messages ot the client

requires a larger amount of disk space

original messages must be manually deleted

39
New cards

23. What is done to an IP packet before it is transmitted over the physical medium?

It is encapsulated in a Layer 2 frame

40
New cards

Which PDU is processed when a host computer is de-encapsulating a message at the transport layer of the TCP/IP model?

segment

41
New cards

Which networking model is being used when an author uploads one chapter document to a file server of a book publisher?

client/server

42
New cards

Which type of transmission is used to transmit a single video straem such as a web-based video conference to a select number of users?

multicast

43
New cards
<p><strong>Refer to the exhibit. PC1 attempts to connect to File_server1 and sends an ARP request to obtain a destination MAC address. Which MAC address will PC1 receive in the ARP reply?</strong></p>

Refer to the exhibit. PC1 attempts to connect to File_server1 and sends an ARP request to obtain a destination MAC address. Which MAC address will PC1 receive in the ARP reply?

the MAC address of the G0/0 interface on R1

44
New cards

What is the result of an ARP poisoning attack?

Client information is stolen

45
New cards

What is the function of the HTTP GET message?

To request an HTML page from a web server

46
New cards

What is the function of the HTTP POST message?

Used by client to upload data to a web server

47
New cards

Which protocol is a client/server file sharing protocol and also a request/response protocol?

  • FTP

  • UDP

  • TCP

  • SMB

SMB

48
New cards

How is a DHCPDISCOVER transmitted on a network to reach a DHCP server?

  • A DHCPDISCOVER message is sent with the broadcast IP address as the destination address.

  • A DHCPDISCOVER message is sent with a multicast IP address that all DHCP servers listen to as the destination address.

  • A DHCPDISCOVER message is sent with the IP address of the default gateway as the destination address.

  • A DHCPDISCOVER message is sent with the IP address of the DHCP server as the destination address.

A DHCPDISCOVER message is sent with the broadcast IP address as the destination address.

49
New cards

What is a description of a DNS zone transfer?

  • transferring blocks of DNS data from a DNS server to another server

  • the action taken when a DNS server sends a query on behalf of a DNS resolver

  • forwarding a request from a DNS server in a subdomain to an authoritative source

  • finding an address match and transferring the numbered address from a DNS server to the original requesting client

transferring blocks of DNS data from a DNS server to another server

50
New cards

What are the two sizes (minimum and maximum) of an Ethernet frame? (Choose two.)

  • 128 bytes

  • 64 bytes

  • 1024 bytes

  • 56 bytes

  • 1518 bytes

64 bytes and 1518 bytes

51
New cards

34. Which process failed if a computer cannot access the internet and received an IP address of 169.254.142.5?

  • DNS

  • IP

  • HTTP

  • DHCP

DHCP

52
New cards

Which statement describes a feature of the IP protocol?

  • IP relies on Layer 2 protocols for transmission error control.

  • MAC addresses are used during the IP packet encapsulation.

  • IP relies on upper layer services to handle situations of missing or out-of-order packets.

  • IP encapsulation is modified based on network media.

IP relies on upper layer services to handle situations of missing or out-of-order packets.

53
New cards

What is a basic characteristic of the IP protocol?

  • connectionless

  • media dependent

  • user data segmentation

  • reliable end-to-end delivery

connectionless

54
New cards

Which statement describes the ping and tracert commands?

  • Both ping and tracert can show results in a graphical display.

  • Ping shows whether the transmission is successful; tracert does not.

  • Tracert shows each hop, while ping shows a destination reply only.

  • Tracert uses IP addresses; ping does not.

Tracert shows each hop, while ping shows a destination reply only

55
New cards

A large corporation has modified its network to allow users to access network resources from their personal laptops and smart phones. Which networking trend does this describe?

  • cloud computing

  • video conferencing

  • online collaboration

  • bring your own device

bring your own device

56
New cards

Match each description to its corresponding term: message encoding

the process of converting information from one format into another acceptable for transmission

57
New cards

Match each description to its corresponding term: message sizing

the process of breaking up a long message into individual pieces before being sent over the network

58
New cards

Match each description to its corresponding term: message encapsulation

the process of placing one message format inside another message format

59
New cards
<p><strong>Refer to the exhibit. This PC is unable to communicate with the host at 172.16.0.100. What information can be gathered from the displayed output?</strong></p><p></p><ul><li><p>The target host is turned off.</p></li><li><p><span>The communication fails after the default gateway.</span></p></li><li><p>172.16.0.100 is only a single hop away.</p></li><li><p>This PC has the wrong subnet configured on its NIC</p></li></ul><p></p>

Refer to the exhibit. This PC is unable to communicate with the host at 172.16.0.100. What information can be gathered from the displayed output?

  • The target host is turned off.

  • The communication fails after the default gateway.

  • 172.16.0.100 is only a single hop away.

  • This PC has the wrong subnet configured on its NIC

The communication fails after the default gateway.

60
New cards

A user issues a ping 192.168.250.103 command and receives a response that includes a code of 1. What does this code represent?

  • network unreachable

  • port unreachable

  • protocol unreachable

  • host unreachable

  • host unreachable

61
New cards

What are three responsibilities of the transport layer? (Choose three.)

  • identifying the applications and services on the client and server that should handle transmitted data

  • conducting error detection of the contents in frames

  • meeting the reliability requirements of applications, if any

  • directing packets towards the destination network

  • formatting data into a compatible form for receipt by the destination devices

  • multiplexing multiple communication streams from many users or applications on the same network

identifying the applications and services on the client and server that should handle transmitted data

meeting the reliability requirements of applications, if any

multiplexing multiple communication streams from many users or applications on the same network

62
New cards

How does network scanning help assess operations security?

  • It can detect open TCP ports on network systems.

  • It can detect weak or blank passwords.

  • It can simulate attacks from malicious sources.

  • It can log abnormal activity

It can detect open TCP ports on network systems.

63
New cards
<p><strong>Refer to the exhibit. A network security analyst is examining captured data using Wireshark. The captured frames indicate that a host is downloading malware from a server. Which source port is used by the host to request the download?</strong></p><p></p><ul><li><p>66</p></li><li><p>1514</p></li><li><p>6666</p></li><li><p><span>48598</span></p></li></ul><p></p>

Refer to the exhibit. A network security analyst is examining captured data using Wireshark. The captured frames indicate that a host is downloading malware from a server. Which source port is used by the host to request the download?

  • 66

  • 1514

  • 6666

  • 48598

48598

64
New cards

Which two operations are provided by TCP but not by UDP? (Choose two.)

  • retransmitting any unacknowledged data

  • acknowledging received data

  • reconstructing data in the order received

  • identifying the applications

  • tracking individual conversations

retransmitting any unacknowledged data

acknowledging received data

65
New cards

A user is executing a tracert to a remote device. At what point would a router, which is in the path to the destination device, stop forwarding the packet?

  • when the router receives an ICMP Time Exceeded message

  • when the RTT value reaches zero

  • when the values of both the Echo Request and Echo Reply messages reach zero

  • when the host responds with an ICMP Echo Reply message

  • when the value in the TTL field reaches zero

when the value in the TTL field reaches zero

66
New cards

A network administrator is testing network connectivity by issuing the ping command on a router. Which symbol will be displayed to indicate that a time expired during the wait for an ICMP echo reply message?

  • U

  • .

  • !

  • $

.

67
New cards

A technician is configuring email on a mobile device. The user wants to be able to keep the original email on the server, organize it into folders, and synchronize the folders between the mobile device and the server. Which email protocol should the technician use?

  • SMTP

  • MIME

  • POP3

  • IMAP

IMAP

68
New cards

At which OSI layer is a source MAC address added to a PDU during the encapsulation process?

  • application layer

  • presentation layer

  • data link layer

  • transport layer

data link layer

69
New cards

Which value, that is contained in an IPv4 header field, is decremented by each router that receives a packet?

  • Time-to-Live

  • Fragment Offset

  • Header Length

  • Differentiated Services

Time-to-Live

70
New cards

What are three responsibilities of the transport layer? (Choose three.)

  • identifying the applications and services on the client and server that should handle transmitted data

  • conducting error detection of the contents in frames

  • meeting the reliability requirements of applications, if any

  • directing packets towards the destination network

  • formatting data into a compatible form for receipt by the destination devices

  • multiplexing multiple communication streams from many users or applications on the same network

identifying the applications and services on the client and server that should handle transmitted data

meeting the reliability requirements of applications, if any

multiplexing multiple communication streams from many users or applications on the same network

71
New cards

Which two ICMP messages are used by both IPv4 and IPv6 protocols? (Choose two.)​

  • route redirection

  • neighbor solicitation

  • router solicitation

  • router advertisement

  • protocol unreachable

protocol unreachable

route redirection

72
New cards

What mechanism is used by a router to prevent a received IPv4 packet from traveling endlessly on a network?

  • It checks the value of the TTL field and if it is 100, it discards the packet and sends a Destination Unreachable message to the source host.

  • It decrements the value of the TTL field by 1 and if the result is 0, it discards the packet and sends a Time Exceeded message to the source host.

  • It checks the value of the TTL field and if it is 0, it discards the packet and sends a Destination Unreachable message to the source host.

  • It increments the value of the TTL field by 1 and if the result is 100, it discards the packet and sends a Parameter Problem message to the source host.

It decrements the value of the TTL field by 1 and if the result is 0, it discards the packet and sends a Time Exceeded message to the source host.

73
New cards

A device has been assigned the IPv6 address of 2001:0db8:cafe:4500:1000:00d8:0058:00ab/64. Which is the host identifier of the device?

  • 2001:0db8:cafe:4500:1000:00d8:0058:00ab

  • 00ab

  • 2001:0db8:cafe:4500

  • 1000:00d8:0058:00ab

1000:00d8:0058:00ab

74
New cards

What three application layer protocols are part of the TCP/IP protocol suite? (Choose three.)

  • DHCP

  • PPP

  • FTP

  • DNS

  • NAT

  • ARP

DHCP

FTP

DNS

75
New cards

A computer can access devices on the same network but cannot access devices on other networks. What is the probable cause of this problem?

  • The computer has an invalid IP address.

  • The cable is not connected properly to the NIC.

  • The computer has an incorrect subnet mask.

  • The computer has an invalid default gateway address.

The computer has an invalid default gateway address.

76
New cards
<p><strong>Refer to the exhibit. PC1 issues an ARP request because it needs to send a packet to PC3. In this scenario, what will happen next?</strong></p><ul><li><p>RT1 will send an ARP reply with its own Fa0/1 MAC address.</p></li><li><p>SW1 will send an ARP reply with its Fa0/1 MAC address.</p></li><li><p>RT1 will send an ARP reply with the PC3 MAC address.</p></li><li><p>RT1 will forward the ARP request to PC3.</p></li><li><p><span>RT1 will send an ARP reply with its own Fa0/0 MAC address.</span></p></li></ul><p></p>

Refer to the exhibit. PC1 issues an ARP request because it needs to send a packet to PC3. In this scenario, what will happen next?

  • RT1 will send an ARP reply with its own Fa0/1 MAC address.

  • SW1 will send an ARP reply with its Fa0/1 MAC address.

  • RT1 will send an ARP reply with the PC3 MAC address.

  • RT1 will forward the ARP request to PC3.

  • RT1 will send an ARP reply with its own Fa0/0 MAC address.

RT1 will send an ARP reply with its own Fa0/0 MAC address.

77
New cards

A user who is unable to connect to the file server contacts the help desk. The helpdesk technician asks the user to ping the IP address of the default gateway that is configured on the workstation. What is the purpose for this ping command?

  • to resolve the domain name of the file server to its IP address

  • to request that gateway forward the connection request to the file server

  • to obtain a dynamic IP address from the server

  • to test that the host has the capability to reach hosts on other networks

to test that the host has the capability to reach hosts on other networks

78
New cards

A user gets an IP address of 192.168.0.1 from the company network administrator. A friend of the user at a different company gets the same IP address on another PC. How can two PCs use the same IP address and still reach the Internet, send and receive email, and search the web?

  • ISPs use Domain Name Service to change a user IP address into a public IP address that can be used on the Internet.

  • Both users must be using the same Internet Service Provider.

  • Both users must be on the same network.

  • ISPs use Network Address Translation to change a user IP address into an address that can be used on the Internet.

ISPs use Network Address Translation to change a user IP address into an address that can be used on the Internet.

79
New cards

How many host addresses are available on the 192.168.10.128/26 network?

  • 30

  • 32

  • 60

  • 62

  • 64

62

80
New cards

What are the three ranges of IP addresses that are reserved for internal private use? (Choose three.)

  • 64.100.0.0/14

  • 192.168.0.0/16

  • 192.31.7.0/24

  • 172.16.0.0/12

  • 10.0.0.0/8

  • 127.16.0.0/12

192.168.0.0/16

172.16.0.0/12

10.0.0.0/8

81
New cards
<p><strong>Refer to the exhibit. A cybersecurity analyst is viewing captured packets forwarded on switch S1. Which device has the MAC address 50:6a:03:96:71:22?</strong></p><ul><li><p>PC-A</p></li><li><p><span>router DG</span></p></li><li><p>DSN server</p></li><li><p>router ISP</p></li><li><p>web server</p></li></ul><p></p>

Refer to the exhibit. A cybersecurity analyst is viewing captured packets forwarded on switch S1. Which device has the MAC address 50:6a:03:96:71:22?

  • PC-A

  • router DG

  • DSN server

  • router ISP

  • web server

router DG

82
New cards

A host PC is attempting to lease an address through DHCP. What message is sent by the server to let the client know it is able to use the provided IP information?

  • DHCPDISCOVER

  • DHCPOFFER

  • DHCPREQUEST

  • DHCPACK

  • DHCPNACK

DHCPACK

83
New cards

An employee complains that a Windows PC cannot connect to the Internet. A network technician issues the ipconfig command on the PC and is shown an IP address of 169.254.10.3. Which two conclusions can be drawn? (Choose two.)

  • The PC is configured to obtain an IP address automatically.

  • The default gateway address is not configured.

  • The DNS server address is misconfigured.

  • The enterprise network is misconfigured for dynamic routing.

  • The PC cannot contact a DHCP server.

The PC cannot contact a DHCP server.

The PC is configured to obtain an IP address automatically.

84
New cards

What is a function of the tracert command that differs from the ping command when they are used on a workstation?

  • The tracert command is used to test the connectivity between two devices.

  • The tracert command reaches the destination faster.

  • The tracert command shows the information of routers in the path.

  • The tracert command sends one ICMP message to each hop in the path.

The tracert command shows the information of routers in the path.

85
New cards

Which two functions or operations are performed by the MAC sublayer? (Choose two.)

  • It is responsible for Media Access Control.

  • It performs the function of NIC driver software.

  • It adds a header and trailer to form an OSI Layer 2 PDU.

  • It handles communication between upper and lower layers.

  • It adds control information to network protocol layer data.

It is responsible for Media Access Control.

It adds a header and trailer to form an OSI Layer 2 PDU

86
New cards

Which field in an IPv4 packet header will typically stay the same during its transmission?

  • Flag

  • Time-to-Live

  • Packet Length

  • Destination Address

Destination Address

87
New cards

Match each statement about FTP communications to the connection it describes: first connection established

-from client to server via TCP port 20

-from server to client via TCP port 21

-from server to client via TCP port 20

used for actual file transfer

from client to server via TCP port 21

used for commands and replies

from client to server via TCP port 21

used for commands and replies

88
New cards

Match each statement about FTP communications to the connection it describes: first connection established: Second connection established

-from client to server via TCP port 20

-from server to client via TCP port 21

-from server to client via TCP port 20

-used for actual file transfer

-from client to server via TCP port 21

--used for commands and replies

from client to server via TCP port 20

used for actual file transfer

89
New cards

What are the two sizes (minimum and expected maximum) of an Ethernet frame? (Choose two.)

  • 128 bytes

  • 1024 bytes

  • 1518 bytes

  • 64 bytes

  • 56 bytes

1518 bytes

64 bytes