Academic Integrity: tutoring, explanations, and feedback — we don’t complete graded work or submit on a student’s behalf.

MULTIPLE CHOICE. Choose the one alternative that best completes the statement or

ID: 3847787 • Letter: M

Question

MULTIPLE CHOICE. Choose the one alternative that best completes the statement or answers the question.

1) Which of the following is a secure protocol?   

A) SIP   

B) HTTPS          

C) H.323           

D) RTP

Answer:

2) What service allows a computer to obtain name resolution?    

A) RTP

B) FTP

C) DDNS

D) DHCP

Answer:

3) Which of the following hardware devices links multiple networks and directs traffic between networks??

A) Bridge

B) Hub

C) Repeater

D) Router

Answer:

4) An attacker sends many packets to a host opening up many TCP sessions that keep the users from accessing services. What type of an attack is this?   

A) Smurf attack

B) SYN attack

C) Spoof          

D) Directed broadcast

Answer:

5) What is the order of the four switch states of STP?      

A) Block, learn, listen, and forward         

B) Listen, block, learn, and forward

C) Block, listen, learn, and forward         

D) Block, listen, forward, and learn

Answer:

6) Which of the following are ports reserved by ICANN?  

A) Well-known ports     

B) Dynamic ports

C) Ephemeral ports       

D) Internet sockets

Answer:

7) Which port is used by secure HTTP?   

A) 443  

B) 53    

C) 143  

D) 80   

E) 161

Answer:

8) Which port is used by Simple Network Management Protocol?

A) 69    

B) 161  

C) 143  

D) 53   

E) 22

Answer:

9) Which port is used by Secure Shell?    

A) 161  

B) 20, 21           

C) 110  

D) 69   

E) 22

Answer:

10) From the Windows Command Prompt, which netstat option is for displaying all connections including listening ports?  

A) -a    

B) –sp tcp

C) -n    

D) None of the above

Answer:

11) A TCP three-way handshake is a unique sequence of three data packets exchanged at the beginning of a TCP connection between two hosts. True or False?    

A) True

B) False

Answer:

12) What is the purpose of ARP?

A) Test for connectivity

B) Request MAC address for known IP address

C) Request IP address for known MAC address

D) None of the above

Answer:

13) How does an 8 port switch learn the address of an unknown device?  

A) Send the frame out ports 2-8

B) Send the frame only out of the destination port

C) Send the frame out of all 8 ports

D) Drop the frame

Answer:

14) Which routing protocols used for Internet routing?   

A) EIGRP           

B) OSPF

C) BGP

D) Static routes

Answer:

15) What is causing a computer to be assigned an IP address in the 169.254.0.0 network?

A) The computer uses a multihomed router as the default gateway          

B) The computer has been configured to use DNS

C) The computer has been configured to use static routes           

D) The computer is unable to reach the DHCP server

Answer:

16) Which of the following devices does not provide any network segmentation?

A) Switch

B) Hub

C) Router

D) Firewall

Answer:

17) What is the broadcast address for the following IP address and subnet mask combination? 192.168.10.93/25

A) 192.168.10.0

B) 192.168.10.127          

C) 192.168.10.1

D) 192.168.10.126         

Answer:

18) How many IP addresses can be assigned to hosts in a subnet of 255.255.255.224?       

A) 30    

B) 29    

C) 14    

D) 254

Answer:

19) Which of the following is a path vector routing protocol?      

A) OSPF

B) BGP  

C) RIP   

D) AS

Answer:

20) Which of the following devices will narrow the broadcast domain to a single port?      

A) Hub

B) Switch         

C) Trunking

D) QoS

Answer:

21) You have configured switch ports using PortFast. You connect another two ports of another switch which also have all ports configured with PortFast. What is the result?     

A) Duplexing Mismatch

B) Static Routing Loop

C) Broadcast Loop        

D) LAN Isolation

Answer:

22) Which of the following operates at OSI layer 3?         

A) 802.3

B) IPSec

C) UDP

D) MAC

Answer:

23) Which of the following is a data link address?

A) IP     

B) TCP  

C) UDP

D) MAC

Answer:

24) What will allow a router to translate internal (inside local) private addresses to one or more outside (inside global, usually registered) IP addresses.?

A) NAT Pool

B) NAT Overloading

C) ALG

D) MIB

Answer:

25) What helps makes TCP a reliable protocol?

A) MTU

B) Congestion Control

C) Encryption

D) Checksum

Answer:

Explanation / Answer

Q1)The answer for first Question is Option B)HTTPS

Because HTTPS provides authentication of the website and associated web server with which one is communicating, which protects against man-in-the-middle attacks. Additionally, it provides bidirectional encryption of communications between a client and server, which protects against eavesdropping and tampering with or forging the contents of the communication.

Q2)The answer for this question is Option C)DDNS

Because Dynamic DNS (DDNS or DynDNS) is a method of automatically updating a name server in the Domain Name System (DNS), often in real time, with the active DDNS configuration of its configured hostnames, addresses or other information.

Q3)The answer for this question is Option D)Router

A router is a device that links multiple networks and directs traffic between networks. Each network linked by routers has its own unique identifier called the network number or network address.

Q4)The answer for this question is Option B)SYN attack

A SYN attack refers to the opening up of many TCP sessions to limit access to network services. Spoofing is inserting a different IP address in place of an IP packet's source address to make it appear that the packet came from another network. Smurf attacks are ways to generate a large amount of data traffic using a small packet. A directed broadcast attack sends many broadcasts to a specific subnet and used to conduct other attacks.

Q5)The answer for this question is Option C) Block, listen, learn, and forward   

Q6)The answer for this question is Option A)Well Known Ports

Also known as “reserve ports”, which are ports 1 – 1023 that are reserved by ICANN (Internet Corporation for Assigned Names and Numbers).

Port Number Assignments
Port Numbers Description
1 - 1023 The “well known” ports
1024 – 49,151 Registered ports
49,152 – 65,535 Private Ports

Q7)The answer for this question is Option A)443

You should not use a different port number, because if you do then your users will need to enter the port number in the URL when accessing the Web SSL VPN.

Q8)The answer for this question is Option B)161

Q9)The answer for this question is Option E)22

Q10)The answer for this question is Option A)-a

Because the -a parameter lists all the computer's connections and listening ports.

Q11)The answer for this question is Option A)True.

A three-way handshake is primarily used to create a TCP socket connection. It works when:

Upon completion of this process, the connection is created and the host and server can communicate.

Q12)The answer for this question is Option D)None of the above

Short for Address Resolution Protocol, a network layer protocol used to convert an IP address into a physical address (called a DLC address), such as an Ethernet address. A host wishing to obtain a physical address broadcastsan ARP request onto the TCP/IP network. The host on the network that has the IP address in the request then replies with its physical hardware address.

Q13)The answer for this question is Option C)Send the frame out of all 8 ports

To do this, the switch learns which devices, called stations in the standard, are on which segments of the network by looking at the source addresses in all of the frames it receives. When an Ethernet device sends a frame, it puts two addresses in the frame. These two addresses are the destination address of the device it is sending the frame to, and the source address, which is the address of the device sending the frame.

Q14)The answer for this question is Option B)OSPF

Open Shortest Path First (OSPF) is an active routing protocol used in internet protocol. Particularly it is a link state routing protocol and includes into the group of interior gateway protocol. Open Shortest Path First (OSPF) operating inside a distinct autonomous system. The Open Shortest Path First (OSPF) most widely used in the network of big business companies.

Like all Ethernet interfaces, every port on a switch has a unique factory-assigned MAC address. However, unlike a normal Ethernet device that accepts only frames addressed directed to it, the Ethernet interface located in each port of a switch runs in promiscuous mode. In this mode, the interface is programmed to receive all frames it sees on that port, not just the frames that are being sent to the MAC address of the Ethernet interface on that switch port.

As each frame is received on each port, the switching software looks at the source address of the frame and adds that source address to a table of addresses that the switch maintains. This is how the switch automatically discovers which stations are reachable on which ports.

Q15)The answer for this question is Option D)The computer is unable to reach the DHCP server

This is a particularly common symptom of Windows machines which have been configured for DHCP but for whatever reason are unable to contact a DHCP server. When a host fails to dynamically acquire an address, it can optionally assign itself a link-local IPv4 address in accordance with RFC 3927. The purpose of these self-assigned link-local addresses is to facilitate communication with other hosts within the subnet even in the absence of external address configuration (via manual input or DHCP).

Q16)The answer for this question is Option B)Hub

Hubs don't segment networks, they just connect network segments together.

Q17)The answer for this question is Option B)192.168.10.127

Q18)The answer for this question is Option A)30

The subnet mask 255.255.255.224 means that there are 27 network bits. The remaining 5 bits are the host bits. The maximum possible combination's with 5 bits are 25 = 32. As all zero's and all one's hosts are not allowed so, maximum number of valid hosts with the mask 255.255.255.224 are 25 -2 =32-2 = 30 Hosts.

Q19)The answer for this question is Option B)BGP

Border Gateway Protocol is an example of a path vector protocol. In BGP, the routing table maintains the autonomous systems that are traversed in order to reach the destination system.

Q20)The answer for this question is Option B)Switch

Q21)The answer for this question is Option A) Duplexing Mismatch

Q22)The asnwer for this question is Option B)IPSec

IPsec operates at Layer 3 - Network.

Q23)The answer for this question is Option B)TCP

Q24)The answer for this question is Option A)NAT Pool

Basically, NAT allows a single device, such as a router, to act as an agent between the Internet (or public network) and a local network (or private network), which means that only a single unique IP address is required to represent an entire group of computers to anything outside their network.

Q25)The answer for this question is Option B) Congestion Control

The reason that Transmission Control Protocol (TCP) is considered reliable is that the protocol itself checks to see if everything that was transmitted was delivered at the receiving end (it may not have been due to packet loss). TCP allows for the retransmission of lost packets, thereby making sure that all data transmitted is (eventually) received.

Hire Me For All Your Tutoring Needs
Integrity-first tutoring: clear explanations, guidance, and feedback.
Drop an Email at
drjack9650@gmail.com
Chat Now And Get Quote