MULTIPLE CHOICE. Choose the one alternative that best completes the statement or
ID: 3847787 • Letter: M
Question
MULTIPLE CHOICE. Choose the one alternative that best completes the statement or answers the question.
1) Which of the following is a secure protocol?
A) SIP
B) HTTPS
C) H.323
D) RTP
Answer:
2) What service allows a computer to obtain name resolution?
A) RTP
B) FTP
C) DDNS
D) DHCP
Answer:
3) Which of the following hardware devices links multiple networks and directs traffic between networks??
A) Bridge
B) Hub
C) Repeater
D) Router
Answer:
4) An attacker sends many packets to a host opening up many TCP sessions that keep the users from accessing services. What type of an attack is this?
A) Smurf attack
B) SYN attack
C) Spoof
D) Directed broadcast
Answer:
5) What is the order of the four switch states of STP?
A) Block, learn, listen, and forward
B) Listen, block, learn, and forward
C) Block, listen, learn, and forward
D) Block, listen, forward, and learn
Answer:
6) Which of the following are ports reserved by ICANN?
A) Well-known ports
B) Dynamic ports
C) Ephemeral ports
D) Internet sockets
Answer:
7) Which port is used by secure HTTP?
A) 443
B) 53
C) 143
D) 80
E) 161
Answer:
8) Which port is used by Simple Network Management Protocol?
A) 69
B) 161
C) 143
D) 53
E) 22
Answer:
9) Which port is used by Secure Shell?
A) 161
B) 20, 21
C) 110
D) 69
E) 22
Answer:
10) From the Windows Command Prompt, which netstat option is for displaying all connections including listening ports?
A) -a
B) –sp tcp
C) -n
D) None of the above
Answer:
11) A TCP three-way handshake is a unique sequence of three data packets exchanged at the beginning of a TCP connection between two hosts. True or False?
A) True
B) False
Answer:
12) What is the purpose of ARP?
A) Test for connectivity
B) Request MAC address for known IP address
C) Request IP address for known MAC address
D) None of the above
Answer:
13) How does an 8 port switch learn the address of an unknown device?
A) Send the frame out ports 2-8
B) Send the frame only out of the destination port
C) Send the frame out of all 8 ports
D) Drop the frame
Answer:
14) Which routing protocols used for Internet routing?
A) EIGRP
B) OSPF
C) BGP
D) Static routes
Answer:
15) What is causing a computer to be assigned an IP address in the 169.254.0.0 network?
A) The computer uses a multihomed router as the default gateway
B) The computer has been configured to use DNS
C) The computer has been configured to use static routes
D) The computer is unable to reach the DHCP server
Answer:
16) Which of the following devices does not provide any network segmentation?
A) Switch
B) Hub
C) Router
D) Firewall
Answer:
17) What is the broadcast address for the following IP address and subnet mask combination? 192.168.10.93/25
A) 192.168.10.0
B) 192.168.10.127
C) 192.168.10.1
D) 192.168.10.126
Answer:
18) How many IP addresses can be assigned to hosts in a subnet of 255.255.255.224?
A) 30
B) 29
C) 14
D) 254
Answer:
19) Which of the following is a path vector routing protocol?
A) OSPF
B) BGP
C) RIP
D) AS
Answer:
20) Which of the following devices will narrow the broadcast domain to a single port?
A) Hub
B) Switch
C) Trunking
D) QoS
Answer:
21) You have configured switch ports using PortFast. You connect another two ports of another switch which also have all ports configured with PortFast. What is the result?
A) Duplexing Mismatch
B) Static Routing Loop
C) Broadcast Loop
D) LAN Isolation
Answer:
22) Which of the following operates at OSI layer 3?
A) 802.3
B) IPSec
C) UDP
D) MAC
Answer:
23) Which of the following is a data link address?
A) IP
B) TCP
C) UDP
D) MAC
Answer:
24) What will allow a router to translate internal (inside local) private addresses to one or more outside (inside global, usually registered) IP addresses.?
A) NAT Pool
B) NAT Overloading
C) ALG
D) MIB
Answer:
25) What helps makes TCP a reliable protocol?
A) MTU
B) Congestion Control
C) Encryption
D) Checksum
Answer:
Explanation / Answer
Q1)The answer for first Question is Option B)HTTPS
Because HTTPS provides authentication of the website and associated web server with which one is communicating, which protects against man-in-the-middle attacks. Additionally, it provides bidirectional encryption of communications between a client and server, which protects against eavesdropping and tampering with or forging the contents of the communication.
Q2)The answer for this question is Option C)DDNS
Because Dynamic DNS (DDNS or DynDNS) is a method of automatically updating a name server in the Domain Name System (DNS), often in real time, with the active DDNS configuration of its configured hostnames, addresses or other information.
Q3)The answer for this question is Option D)Router
A router is a device that links multiple networks and directs traffic between networks. Each network linked by routers has its own unique identifier called the network number or network address.
Q4)The answer for this question is Option B)SYN attack
A SYN attack refers to the opening up of many TCP sessions to limit access to network services. Spoofing is inserting a different IP address in place of an IP packet's source address to make it appear that the packet came from another network. Smurf attacks are ways to generate a large amount of data traffic using a small packet. A directed broadcast attack sends many broadcasts to a specific subnet and used to conduct other attacks.
Q5)The answer for this question is Option C) Block, listen, learn, and forward
Q6)The answer for this question is Option A)Well Known Ports
Also known as “reserve ports”, which are ports 1 – 1023 that are reserved by ICANN (Internet Corporation for Assigned Names and Numbers).
Port Number Assignments
Port Numbers Description
1 - 1023 The “well known” ports
1024 – 49,151 Registered ports
49,152 – 65,535 Private Ports
Q7)The answer for this question is Option A)443
You should not use a different port number, because if you do then your users will need to enter the port number in the URL when accessing the Web SSL VPN.
Q8)The answer for this question is Option B)161
Q9)The answer for this question is Option E)22
Q10)The answer for this question is Option A)-a
Because the -a parameter lists all the computer's connections and listening ports.
Q11)The answer for this question is Option A)True.
A three-way handshake is primarily used to create a TCP socket connection. It works when:
Upon completion of this process, the connection is created and the host and server can communicate.
Q12)The answer for this question is Option D)None of the above
Short for Address Resolution Protocol, a network layer protocol used to convert an IP address into a physical address (called a DLC address), such as an Ethernet address. A host wishing to obtain a physical address broadcastsan ARP request onto the TCP/IP network. The host on the network that has the IP address in the request then replies with its physical hardware address.
Q13)The answer for this question is Option C)Send the frame out of all 8 ports
To do this, the switch learns which devices, called stations in the standard, are on which segments of the network by looking at the source addresses in all of the frames it receives. When an Ethernet device sends a frame, it puts two addresses in the frame. These two addresses are the destination address of the device it is sending the frame to, and the source address, which is the address of the device sending the frame.
Q14)The answer for this question is Option B)OSPF
Open Shortest Path First (OSPF) is an active routing protocol used in internet protocol. Particularly it is a link state routing protocol and includes into the group of interior gateway protocol. Open Shortest Path First (OSPF) operating inside a distinct autonomous system. The Open Shortest Path First (OSPF) most widely used in the network of big business companies.
Like all Ethernet interfaces, every port on a switch has a unique factory-assigned MAC address. However, unlike a normal Ethernet device that accepts only frames addressed directed to it, the Ethernet interface located in each port of a switch runs in promiscuous mode. In this mode, the interface is programmed to receive all frames it sees on that port, not just the frames that are being sent to the MAC address of the Ethernet interface on that switch port.
As each frame is received on each port, the switching software looks at the source address of the frame and adds that source address to a table of addresses that the switch maintains. This is how the switch automatically discovers which stations are reachable on which ports.
Q15)The answer for this question is Option D)The computer is unable to reach the DHCP server
This is a particularly common symptom of Windows machines which have been configured for DHCP but for whatever reason are unable to contact a DHCP server. When a host fails to dynamically acquire an address, it can optionally assign itself a link-local IPv4 address in accordance with RFC 3927. The purpose of these self-assigned link-local addresses is to facilitate communication with other hosts within the subnet even in the absence of external address configuration (via manual input or DHCP).
Q16)The answer for this question is Option B)Hub
Hubs don't segment networks, they just connect network segments together.
Q17)The answer for this question is Option B)192.168.10.127
Q18)The answer for this question is Option A)30
The subnet mask 255.255.255.224 means that there are 27 network bits. The remaining 5 bits are the host bits. The maximum possible combination's with 5 bits are 25 = 32. As all zero's and all one's hosts are not allowed so, maximum number of valid hosts with the mask 255.255.255.224 are 25 -2 =32-2 = 30 Hosts.
Q19)The answer for this question is Option B)BGP
Border Gateway Protocol is an example of a path vector protocol. In BGP, the routing table maintains the autonomous systems that are traversed in order to reach the destination system.
Q20)The answer for this question is Option B)Switch
Q21)The answer for this question is Option A) Duplexing Mismatch
Q22)The asnwer for this question is Option B)IPSec
IPsec operates at Layer 3 - Network.
Q23)The answer for this question is Option B)TCP
Q24)The answer for this question is Option A)NAT Pool
Basically, NAT allows a single device, such as a router, to act as an agent between the Internet (or public network) and a local network (or private network), which means that only a single unique IP address is required to represent an entire group of computers to anything outside their network.
Q25)The answer for this question is Option B) Congestion Control
The reason that Transmission Control Protocol (TCP) is considered reliable is that the protocol itself checks to see if everything that was transmitted was delivered at the receiving end (it may not have been due to packet loss). TCP allows for the retransmission of lost packets, thereby making sure that all data transmitted is (eventually) received.
Related Questions
drjack9650@gmail.com
Navigate
Integrity-first tutoring: explanations and feedback only — we do not complete graded work. Learn more.