2.) Your workstation is having a TCP conversation with another node across TCP p
ID: 3780010 • Letter: 2
Question
2.) Your workstation is having a TCP conversation with another node across TCP port 80. Your machine receives a TCP segment with the header checksum 0x5149. Your machine calculates the checksum for that segment as 0x6372. What will your workstation do to the TCP segment?
Nothing.
The workstation will reset the TCP connection.
The segment will be discarded.
Your machine will drop the connection to the opposite server and not reestablish communication with it.
Which protocol is used by ping and tracert?
ICMP
IGMP
IMAP
HTTP
DNS
A device which forwards frames based on MAC addresses is called:
Router
Framer
Firewall
Application gateway
Switch
5.) Convert the CIDR notation /26 to dotted decimal notation?
255.255.255.0
255.255.255.128
255.255.255.192
255.255.254.0
255.255.255.224
6.) What type of DNS record is used to specify mail servers?
CNAME
Mail slots
AAAA
A
MX
mail exchange record
7.) What routing protocol would be used by an organization to connect to an ISP?
BGP
OSPF
IGMP
RIP
EIGRP
8.) What is the maximum number of hosts on the 192.168.50.0 255.255.255.252 network?
2
4
254
12
9.) RIP uses what as its metric?
MTU
Delay
Load
Cost
Bandwidth
Hops
10.) In order to communicate with other nodes, workstations need IP addresses. An automated method of assigning IP addresses to workstations is called:
POST
ARP
RARP
DHCP
DNS
11.) You have been tasked with finding a subnet mask large enough to accommodate an address space of 1000 addresses as efficiently as possible. What subnet mask do you use?
255.255.248.0
255.255.255.0
255.0.0.0
255.255.252.0
255.255.0.0
12.) A customer has called in complaining about not being able to connect to network resources on their workstation. You ask for their workstation’s hostname and try to ping it. Your pings are unsuccessful. You instruct the customer on how to find their IP address and they report it as 169.254.36.237. What issue is affecting the customer at this time?
They are not connected to the network.
They are connected to the network, but their workstation hasn’t picked up an IP address from the network’s DHCP server.
Their firewall is misconfigured to block DNS messages.
The NIC driver needs to be updated.
13.) What is the address range for a private Class A network?
8.0.0.0-8.255.255.255
192.168.0.0-192.168.255.255
172.15.0.0-172.32.255.255
10.0.0.0-10.255.255.255
Question 15 of 40
TCP is noted for which of the following: (Select all that apply)
Flow control
Connectionless communication
Connection-oriented communication
Error notification
Reliable delivery
Question 16 of 40
Why do nodes need to use ARP to communicate effectively?
ARP enables a workstation to receive IP address, subnet mask, and default gateway information automatically from a central server
ARP resolves host names to IP addresses
ARP resolves host names to MAC addresses
ARP resolves IP addresses to MAC addresses
Question 17 of 40
Which network services listed use UDP? (Select all that apply)
SMTP
SNMP
HTTPS
Network Time Protocol
DNS
Question 18 of 40
Why do nodes need to use DNS to communicate effectively?
DNS resolves host names, or fully qualified domain names, to IP addresses
DNS resolves NetBIOS names to MAC addresses
DNS resolves host names to MAC addresses
DNS enables a workstation to receive IP address, subnet mask, and default gateway information automatically from a central server
Question 19 of 40
Convert hexadecimal number FF to decimal:
128
127
255
256
512
Question 21 of 40
What is the default subnet mask for a Class A network?
255.0.0.0
255.255.0.0
255.255.255.0
255.240.0.0
Question 22 of 40
What is the protocol data unit called for layer 3 in the OSI model?
Frame
Packet
Bit
Segment
Question 23 of 40
You are assisting an application developer with filling out a load balancing request. The developer wants all http requests to be forwarded to the default https port. How would you advise the developer to fill out the request?
The load balancer should listen on tcp port 443 and forward to tcp port 80
The load balancer should listen on tcp port 80 and forward to tcp port 445
The load balancer should listen on tcp port 80 and forward to tcp port 443
The load balancer should listen on tcp port 80 and forward to tcp port 80
The load balancer should listen on udp port 80 and forward to a dynamic udp port
Question 24 of 40
Which of the following are legitimate subnet masks? (Select all that apply)
225.0.0.0
255.255.242.0
255.255.255.252
255.240.0.255
255.128.0.0
Question 25 of 40
What type of record is used for DNS reverse lookup?
A
AAAA
MX
SOA
PTR
SRV
What command(s) would be used to send a continuous stream of packets to a target IP address? (Select all that apply)
ping -t
ping -l
ping -6 -t
netstat -a
ping localhost
netstat –ano
Question 27 of 40
A customer has returned from a business trip and cannot connect to your company’s network. What command(s) would you most likely run to correct this lack of connectivity? (Select all that apply)
ping 127.0.0.1
ipconfig/release
ipconfig/flushdns
nbstat -RR
ipconfig/renew
netstat -apo
Question 28 of 40
In order to communicate on a switched network, a workstation must resolve IP addresses to MAC addresses. The protocol that is used for this is:
ARP
ICMP
DHCP
DNS
HTTP
Question 29 of 40
Convert the binary number 01101101 to decimal
111
127
108
109
Question 30 of 40
Your organization is migrating to a new email server and you are assisting an engineer with the firewall rules needed for the new infrastructure. What port needs to be open for the new email server to communicate with the outside world?
UDP 110
TCP 443
UDP 143
TCP 25
Question 31 of 40 What is the purpose of a subnet mask?
The subnet mask allows a workstation to know which part of the MAC address is the network portion and which part is the host portion
The subnet mask filters incoming packets according to a configured policy
The subnet mask divides the IP address into a network portion and a host portion
The subnet mask allows the workstation to know which part of the MAC address is the OUI and the Device ID
Question 33 of 40
RIP is an example of what kind of routing protocol?
Path vector
Static routing
Link-state
Distance vector
Strict source
Question 34 of 40
Convert 210 to binary notation
01111111
10000000
11010010
11100010
Question 35 of 40
Your colleague is having trouble converting CIDR notation to regular decimal format. He has been tasked to find the decimal format subnet mask for a /23 network. What do you tell him?
255.255.255.0
255.255.255.128
255.255.0.0
255.255.254.0
255.255.128.0
Question 37 of 40
What is the last assignable address on the 192.168.50.0 255.255.255.248 network?
192.168.50.7
192.168.50.6
192.168.50.254
192.168.50.8
192.168.50.9
Question 38 of 40
What type of DNS record is used to specify an alias?
CNAME
A
AAAA
Alias
PTR
Question 39 of 40
OSPF is an example of what kind of routing protocol?
Distance vector
Static routing
Link-state
Path vector
Loose source
Question 40 of 40
OSPF uses what as its metric?
Hops
MTU
Delay
Cost
Clicks
Explanation / Answer
Answer
(3)Which protocol is used by ping and tracert?
HTTP
(4) A device which forwards frames based on MAC addresses is called:
Firewall
(5) 255.255.255.0
(6) Mail slots
(7) IGMP
(8) 2
(9) Hops
(10) DHCP
(11) 255.255.0.0
(12) Their firewall is misconfigured to block DNS messages.
(13) Flow control
(14) ARP resolves host names to IP addresses
(17) SMTP
(19) 255
(21) 255.0.0.0
(22) Packet
(24) 225.0.0.0
(25) PTR
(29) 109
(34) 11010010
(39) Link-state
(40) Cost
Related Questions
Navigate
Integrity-first tutoring: explanations and feedback only — we do not complete graded work. Learn more.