Cyber Test

studied byStudied by 0 people
0.0(0)
learn
LearnA personalized and smart learning plan
exam
Practice TestTake a test on your terms and definitions
spaced repetition
Spaced RepetitionScientifically backed study method
heart puzzle
Matching GameHow quick can you match all your cards?
flashcards
FlashcardsStudy terms and definitions

1 / 44

encourage image

There's no tags or description

Looks like no one added any tags here yet for you.

45 Terms

1

Which destination IPv4 address does a DHCPv4 client use to send the initial DHCP Discover packet when the client is looking for a DHCP server?

A. the IP address of the default gateway

B. 244.0.0.1

C. 255.255.255.255

D. 127.0.0.1

C. 255.255.255.255

New cards
2

Which is a DHCPv4 address allocation method that assigns IPv4 addresses for a limited lease period?

A. dynamic allocation

B. automatic allocation

C. manual allocation

D. pre-allocation

A. dynamic allocation

New cards
3

Which DHCPv4 message will a client send to accept an IPv4 address that is offered by a DHCP server?

A. broadcast DHCPACK

B. unicast DHCPREQUEST

C. broadcast DHCPREQUEST

D. unicast DHCPACK

C. broadcast DHCPREQUEST

New cards
4
<p><span>Refer to the exhibit. A user is configuring a PC with the IP settings as displayed, but the operating system will not accept them. What is the problem?</span></p><p><span>A. The subnet mask is wrong.</span></p><p><span>B. The DNS settings are not configured.</span></p><p><span>C. The IP address is not a usable host address.</span></p><p><span>D. The gateway address is not configured.</span></p>

Refer to the exhibit. A user is configuring a PC with the IP settings as displayed, but the operating system will not accept them. What is the problem?

A. The subnet mask is wrong.

B. The DNS settings are not configured.

C. The IP address is not a usable host address.

D. The gateway address is not configured.

C. The IP address is not a usable host address.

New cards
5

Which two types of devices are typically assigned static IP addresses? (Choose two.)

A. laptops

B. hubs

C. printers

D. workstations

E. web servers

C. printers

E. web servers

New cards
6

A DHCP-enabled client PC has just booted. During which two steps will the client PC use broadcast messages when communicating with a DHCP server? (Choose two.)

A. DHCPACK

B. DHCPOFFER

C. DHCPNAK

D. DHCPDISCOVER

E. DHCPREQUEST

D. DHCPDISCOVER

E. DHCPREQUEST

New cards
7

Which two reasons generally make DHCP the preferred method of assigning IP addresses to hosts on large networks? (Choose two.)

A. It reduces the burden on network support staff.

B. It guarantees that every device that needs an address will get one.

C. It provides an address only to devices that are authorized to be connected to the network.

D. It ensures that addresses are only applied to devices that require a permanent address.

E. It eliminates most address configuration errors.

A. It reduces the burden on network support staff.

E. It eliminates most address configuration errors.

New cards
8

If more than one DHCP server is available on the local network, in which order will DHCP messages be sent between a host and a DHCP server?

A. request, acknowledgement, discover, offer

B. acknowledgement, request, offer, discover

C. request, discover, offer, acknowledgement

D. discover, offer, request, acknowledgement

D. discover, offer, request, acknowledgement

New cards
9

A DHCP server is used to assign IP addresses dynamically to the hosts on a network. The address pool is configured with 192.168.10.0/24. There are 3 printers on this network that need to use reserved static IP addresses from the pool. How many IP addresses in the pool are left to be assigned to other hosts?

A. 252

B. 254

C. 251

D. 253

C. 251

New cards
10

Which statement is true about DHCP operation?​

A. The DHCPDISCOVER message contains the IP address and subnet mask to be assigned, the IP address of the DNS server, and the IP address of the default gateway.

B. If the client receives several DHCPOFFER messages from different servers, it sends a unicast DHCPREQUEST message to the server from which it chooses to obtain the IP information.

C. When a device is configured to use DHCP boots, the client broadcasts a DHCPDISCOVER message to identify any available DHCP servers on the network.

D. A client must wait for lease expiration before it sends another DHCPREQUEST message.

C. When a device is configured to use DHCP boots, the client broadcasts a DHCPDISCOVER message to identify any available DHCP servers on the network.

New cards
11

Which two statements are correct about IPv4 and IPv6 addresses? (Choose two.)

A. IPv4 addresses are 32 bits in length.

B. IPv6 addresses are 64 bits in length.

C. IPv4 addresses are 128 bits in length.

D. IPv6 addresses are 32 bits in length.

E. IPv4 addresses are represented by hexadecimal numbers.

F. IPv6 addresses are represented by hexadecimal numbers.

A. IPv4 addresses are 32 bits in length.

F. IPv6 addresses are represented by hexadecimal numbers.

New cards
12

Which network technology allows devices to communicate using both IPv4 and IPv6 addressing at the same time?

A. NAT64

B. SLAAC

C. dual stack

D. tunneling

C. dual stack

New cards
13

What is an advantage of using IPv6 ?

A. faster connectivity

B. higher bandwidth

C. more frequencies

D. more addresses for networks and hosts

D. more addresses for networks and hosts

New cards
14

Which characteristic describes the default gateway of a host computer?

A. the logical address assigned to the switch interface connected to the router

B. the physical address of the router interface on the same network as the host computer

C. the physical address of the switch interface connected to the host computer

D. the logical address of the router interface on the same network as the host computer

D. the logical address of the router interface on the same network as the host computer

New cards
15

Which number grouping is a valid IPv6 address?

A. 12aa::1298:1200::129b

B. 1b10::1100::2001::2900::ab11::1102::0000::2900

C. 1234:1230::1238::1299:1000::

D. 2001:0db8:3c55:0015:1010:0000:abcd:ff13

D. 2001:0db8:3c55:0015:1010:0000:abcd:ff13

New cards
16

Which method of IPv6 prefix assignment relies on the prefix contained in RA messages?

A. EUI-64

B. SLAAC

C. static

D. stateful DHCPv6

B. SLAAC

New cards
17

Which IPv6 address notation is valid?

A. 2001:DB8:0:1111::200

B. 2001::ABCD::

C. ABCD:160D::4GAB:FFAB

D. 2001:0DB8::ABCD::1234

A. 2001:DB8:0:1111::200

New cards
18

Typically, which network device would be used to perform NAT for a corporate environment?

A. server

B. DHCP server

C. router

D. host device

E. switch

C. router

New cards
19

What type of IPv6 address is FE80::1?

A. link-local

B. loopback

C. global unicast

D. multicast

A. link-local

New cards
20

Which network migration technique encapsulates IPv6 packets inside IPv4 packets to carry them over IPv4 network infrastructures?

A. tunneling

B. translation

C. encapsulation

D. dual-stack

A. tunneling

New cards
21

Why is UDP well suited as the transport layer protocol for video applications?

A. UDP prvides a reliable session.

B. UDP provides acknowledgement of received data.

C. UDP provides flow control using windows.

D. UDP has low overhead.

D. UDP has low overhead.

New cards
22

Which transport layer information is added to both the TCP and UDP headers?

A. acknowledgement flag

B. IP addresses

C. port numbers

D. window size

C. port numbers

New cards
23

What type of applications are best suited for using UDP?

A. applications that require retransmission of lost segments

B. applications that are sensitive to packet loss

C. applications that need reliable delivery

D. applications that are sensitive to delay

D. applications that are sensitive to delay

New cards
24

What protocol header information is used at the transport layer to identify a target application?

A. sequence number

B. port number

C. IP address

D. MAC address

B. port number

New cards
25

A client device has initiated a secure HTTP request to a web browser. Which well-known port address number is associated with the destination address?

A. 443

B. 110

C. 80

D. 404

A. 443

New cards
26

Which number or set of numbers represents a socket?

A. 01-23-45-67-89-AB 

B. 10.1.1.15      

C. 21    

D. 192.168.1.1:80

D. 192.168.1.1:80

New cards
27

What information is used by TCP to reassemble and reorder received segments?

A. sequence numbers

B. acknowledgment numbers

C. fragment numbers

D. port numbers

A. sequence numbers

New cards
28

What type of port number is assigned by IANA to commonly used services and applications?

A. registered port

B. dynamic port

C. private port

D. well-known port

D. well-known port

New cards
29

Which protocol operates at the transport layer of the TCP/IP model and ensures reliable delivery of IP packets?

A. HTTP

B. UDP

C. TCP

D. IP

C. TCP

New cards
30

What is a characteristic of UDP?

A. It uses sequence numbers to reassemble segments.

B. It provides unreliable delivery of segments.

C. It established sessions with a three-way handshake.

D. It adds 20 bytes of overhead to application layer data.

B. It provides unreliable delivery of segments.

New cards
31

What is the well-known port address number used by DNS to serve requests?

A. 53

B. 60

C. 110

D. 25

A. 53

New cards
32

Which action is performed by a client when establishing communication with a server via the use of UDP at the transport layer?

A. The client randomly selects a source port number.   

B. The clients sets the window size for the session.

C. The client sends a synchronization segment to begin the session.

D. The client sends an ISN to the server to start the 3-way handshake.

A. The client randomly selects a source port number. 

New cards
33

A new employee is attempting to configure a cell phone to connect to the email server of the company. Which port number should be selected when using the POP3 protocol to access messages stored on the email server?

A. 110     

B. 69     

C. 143      

D. 25

A. 110

New cards
34

What is the advantage of using SSH over Telnet?

A. SSH supports authentication for a connection request.

B. SSH operates faster than Telnet.

C. SSH is easier to use.

D. SSH provides secure communication to access hosts.

D. SSH provides secure communication to access hosts.

New cards
35

Which protocol retains a message in a mailbox on a server, even after the message is accessed by a user on a local client device?

A. POP3

B. DNS

C. SMTP

D. IMAP4

New cards
36

A new employee is attempting to configure a cell phone to connect to the email server of the company. Which port number should be selected when using the IMAP4 protocol to access email messages stored on the local server?

A. 143

B. 110

C. 69

D. 25

A. 143

New cards
37

Which protocol is used to transfer web pages from a server to a client device?

A. HTTP

B. SSH

C. HTML

D. POP

E. SMTP

A. HTTP

New cards
38

A new employee is configuring a cell phone for company email. Once configured, what is the destination port number used when the employee sends an email from the phone?

A. 25

B. 143

C. 23

D. 110

A. 25

New cards
39
<p><span>Refer to the exhibit. Which protocol allows a user to type </span><a target="_blank" rel="noopener noreferrer nofollow" class="link" href="http://www.cisco" download="true">www.cisco</a>.com<span>instead of an IP address to access the web server?</span></p><p><span>A. HTTP</span></p><p><span>B. FTP</span></p><p><span>C. DNS</span></p><p><span>D. HTML</span></p><p><span>E. SNMP</span></p>

Refer to the exhibit. Which protocol allows a user to type www.cisco.cominstead of an IP address to access the web server?

A. HTTP

B. FTP

C. DNS

D. HTML

E. SNMP

C. DNS

New cards
40

Which communication tool allows multiple users to communicate with each other in real time by using a smartphone application or social media site?

A. email

B. blog

C. instant messaging

D. web mail

C. instant messaging

New cards
41

An employee of a company is attempting to remotely access a computer system using a virtual terminal (vty) session via Telnet. Which destination port number should the employee put in the remote access software being used?

A. 69

B. 23

C. 110

D. 20

B. 23

New cards
42

What two characteristics describe an FTP connection? (Choose two.)

A. The server established the first connection with the client to control traffic that consists of server commands and client replies.

B. Files can be downloaded from or uploaded to the server.

C. The first connection established is for traffic control and the second connection is created to transfer a file.

D. A large file required more than two connection between the client and the server to successfully download it.

E. The client needs to run a daemon program to establish an FTP connection with a server.

B. Files can be downloaded from or uploaded to the server.

C. The first connection established is for traffic control and the second connection is created to transfer a file.

New cards
43

Which protocol is used by web servers to serve up a web page?

A. HTTP

B. FTP

C. POP

D. IMAP

A. HTTP

New cards
44

Which protocol removes messaged from the server after they have been accessed by a client?

A. SMTP

B. DNS

C. IMAP4

D. POP3

D. POP3

New cards
45

When analog voice signals are converted for use on a computer network, in what format are they encapsulated?

A. IP packets

B. bits

C. segments

D. frames

A. IP packets

New cards

Explore top notes

note Note
studied byStudied by 10 people
760 days ago
5.0(1)
note Note
studied byStudied by 2 people
91 days ago
5.0(1)
note Note
studied byStudied by 14 people
807 days ago
5.0(1)
note Note
studied byStudied by 26 people
707 days ago
5.0(1)
note Note
studied byStudied by 1 person
56 days ago
5.0(1)
note Note
studied byStudied by 20 people
843 days ago
4.5(2)
note Note
studied byStudied by 78 people
700 days ago
5.0(2)
note Note
studied byStudied by 8 people
43 days ago
5.0(1)

Explore top flashcards

flashcards Flashcard (61)
studied byStudied by 13 people
544 days ago
5.0(1)
flashcards Flashcard (37)
studied byStudied by 18 people
755 days ago
5.0(2)
flashcards Flashcard (98)
studied byStudied by 4 people
724 days ago
5.0(1)
flashcards Flashcard (81)
studied byStudied by 14 people
460 days ago
4.0(1)
flashcards Flashcard (111)
studied byStudied by 137 people
485 days ago
5.0(3)
flashcards Flashcard (44)
studied byStudied by 2 people
40 days ago
5.0(1)
flashcards Flashcard (63)
studied byStudied by 86 people
845 days ago
4.5(2)
flashcards Flashcard (20)
studied byStudied by 74 people
73 days ago
5.0(2)
robot