Networking Questions and Answers PDF

Summary

This document includes networking questions and answers from question 50 to question 80. It is a good resource for students preparing for networking exams. It covers topics such as Domain Name System (DNS), Network Address Translation (NAT), and Denial-of-Service (DoS) attacks.

Full Transcript

I now have access to your file and will provide the questions and answers from 50 to 80 exactly as in the file, with only the correct answers bolded. Let me proceed. \#\#\# Questions 50 to 80 with Correct Answers in \*\*Bold\*\* \-\-- \*\*Question 50\*\* Which of the following statements correct...

I now have access to your file and will provide the questions and answers from 50 to 80 exactly as in the file, with only the correct answers bolded. Let me proceed. \#\#\# Questions 50 to 80 with Correct Answers in \*\*Bold\*\* \-\-- \*\*Question 50\*\* Which of the following statements correctly describe the Domain Name System (DNS)? \- \*\*DNS servers maintain a directory of domain names and translate them to IP (Internet Protocol) addresses.\*\* \-\-- \*\*Question 51\*\* Where does a DNS server look up when it cannot resolve a query from its own zone records or cache? \- \*\*Root DNS server.\*\* \-\-- \*\*Question 52\*\* Which of the following applications rely on Domain Name System (DNS) functionality to connect network resources? \- \*\*Web-based application.\*\* \-\-- \*\*Question 53\*\* Which of the following statements are true regarding Network Address Translation (NAT)? \- \*\*NAT enables private IP networks that use private IP addresses to connect to the Internet.\*\* \-\-- \*\*Question 54\*\* Which of the following statements is NOT correct regarding Telnet? \- \*\*Using Telnet to connect to a remote host has been considered a security risk, because Telnet data is sent in clear text.\*\* \-\-- \*\*Question 55\*\* Which of the following statements describe the features of Denial-of-Service (DoS) attacks? \- \*\*DoS attacks allow an attacker to scale up an attack against a target device.\*\* \-\-- \*\*Question 56\*\* Which of the following is FALSE about a digital signature? \- \*\*When a digital signature is verified, the signature is decrypted using the signer\'s private key to produce the original digital fingerprint.\*\* \-\-- \*\*Question 57\*\* Which of the following are considered as barriers to IPv6 adoption? \- \*\*Cost of transitioning to IPv6.\*\* \-\-- \*\*Question 58\*\* Which of the following are true about firewalls? \- \*\*Next-generation firewalls can provide intrusion prevention and deep-packet inspection capabilities to identify and block threats that may be embedded in normal-seeming traffic.\*\* \-\-- \*\*Question 59\*\* www.qut.edu.au is a fully qualified domain name (FQDN), in which www and qut.edu.au are respectively known as \_\_\_\_\_\_\_\_. \- \*\*Host name and domain name.\*\* \-\-- \*\*Question 60\*\* Which of the following statements are true about authentication, authorization, and auditing? \- \*\*Auditing consists of logging security-related events and maintains evidence of attempts to compromise the security controls.\*\* \-\-- \*\*Question 61\*\* Why is it important for security analysts to understand how ICMP (Internet Control Message Protocol) activity works and what normal ICMP activity looks like? \- \*\*It enables them to detect ARP (Address Resolution Protocol) Poisoning attacks.\*\* \-\-- \*\*Question 62\*\* Which of the following applications rely on Domain Name System (DNS) functionality to connect network resources? \- \*\*Web-based application.\*\* \-\-- \*\*Question 63\*\* Which of the following statements are true regarding Network Address Translation (NAT)? \- \*\*NAT enables private IP networks that use private IP addresses to connect to the Internet.\*\* \-\-- \*\*Question 64\*\* Stateless Address Autoconfiguration (SLAAC) is designed to allow a computer to autoconfigure its own local link IPv6 address. Which of the following statements are true about the SLAAC process? \- \*\*The computer creates its own IPv6 address by using FE08::/64 as the first part of the address, and by randomly selecting bits to form the second part of its IPv6 address.\*\* \-\-- \*\*Question 65\*\* Which of the following is TRUE regarding the communication technologies used in Internet-of-Things (IoT) networks? \- \*\*Zigbee operates on the 2.4 GHz band for short-range communication.\*\* \-\-- \*\*Question 66\*\* Which of the following notations is the preferred representation of the IPv6 address 2001:0DB8:0000:0000:0010:0000:0101:3110? \- \*\*2001:DB8::10:0:101:3110\*\* \-\-- \*\*Question 67\*\* Which of the following statements is FALSE regarding Virtual Private Networks (VPNs)? \- \*\*VPNs can protect data in transit and data at rest.\*\* \-\-- \*\*Question 68\*\* Which of the following statements are TRUE regarding wireless signal propagation? \- \*\*Attenuation describes how wireless signals weaken as they move away from the transmission source.\*\* \-\-- \*\*Question 69\*\* Which of the following represents the entire network for this company? \- \*\*200.10.0.0/22\*\* \-\-- \*\*Question 70\*\* Which of the following IP addresses is the network address of the first subnet? \- \*\*200.10.0.0/24\*\* \-\-- \*\*Question 71\*\* Which of the following IP addresses is the broadcast address from the first subnet? \- \*\*200.10.0.255/24\*\* \-\-- \*\*Question 72\*\* Which of the following IP addresses is the network address from the third subnet? \- \*\*200.10.1.0/24\*\* \-\-- \*\*Question 73\*\* Which of the following IP addresses is the first valid address from the fourth subnet? \- \*\*200.10.2.128/25\*\* \-\-- \*\*Question 74\*\* Which of the following IP addresses is the network address from the last subnet? \- \*\*200.10.3.192/26\*\* \-\-- \*\*Question 75\*\* Which of the following IP addresses is the last valid address from the last subnet? \- \*\*200.10.3.254/26\*\* \-\-- \*\*Question 76\*\* From R1's perspective, what is the next-hop address to reach a destination host on network 192.0.3.0/24? \- \*\*192.0.2.1\*\* \-\-- \*\*Question 77\*\* From R2's perspective, what is the next-hop address to reach a destination host on network 192.0.1.0/24? \- \*\*192.0.1.1\*\* \-\-- \*\*Question 78\*\* Which of the following is the most preferred route to configure static routing on R2? \- \*\*A route 192.0.1.0/24 pointed to 192.0.0.1\*\* \-\-- \*\*Question 79\*\* Which of the following needs to be configured with static routing on the ISP router? \- \*\*A route 0.0.0.0/0 pointed to 200.0.0.1\*\* \-\-- \*\*Question 80\*\* Which of the following is the most preferred route to reach 192.0.2.0/24 and 192.0.3.0/24 from R1? \- \*\*A route 192.0.3.0/24 pointed to 192.0.0.2\*\* \-\-- Let me know if further adjustments are needed!

Use Quizgecko on...
Browser
Browser