Summary

This document is a network quiz covering topics such as networking protocols, TCP/IP, OSI model, and network devices. The quiz contains multiple-choice questions and matching questions.

Full Transcript

# Network Quiz ## 1 2/2 points The following table is most likely used by what IP-related system? | Level Number | Severity Level | Description | |---|---|---| | 0 | emergencies | System is unusable. | | 1 | alert | Immediate action is needed. | | 2 | critical | Critical conditions. | | 3 | erro...

# Network Quiz ## 1 2/2 points The following table is most likely used by what IP-related system? | Level Number | Severity Level | Description | |---|---|---| | 0 | emergencies | System is unusable. | | 1 | alert | Immediate action is needed. | | 2 | critical | Critical conditions. | | 3 | error | Error conditions. | | 4 | warning | Warning conditions. | | 5 | notification | Normal but significant conditions. | | 6 | Informational | Informational messages only. | | 7 | debugging | Debugging messages only. | - RARP (513) - **Syslog (UDP 514)** - Server Message Block (TCP 445) - RSyslog (TCP 515) ## 2 2/2 points How many bits is the sequence number in a TCP header? - 24 - 256 - 18 - **32** ## 3 4/4 points Match the following services with their corresponding DoD/Network Layer. | Service | DoD/Network Layer | |---|---| | Internet | ICMP, ARP | | Process/Application | FTP, SMTP, X Windows | Network Access | Ethernet | | Host-to-Host | TCP-UDP ## 4 2/2 points What was the network that preceded the Internet? - Banyan Vines - Network Control System (NCS) - **ARPAnet** - Netbios ## 5 2/2 points The DoD/Network model's Process/Application layer is composed of what layers of the OSI 7-layer model? - Network and Internet - Session and Network - **Application, Presentation, and Session** - Presentation, Session, and Transport ## 6 4/4 points What are the four layers of the DoD/Network Model? Select four answers. - **Process/Application layer** - **Initiation layer** - **Host-to-Host layer** - **Internet layer** - Negotiation layer - Network Access layer - Infrastructure layer - Connection layer - Intersession layer ## 7 2/2 points A type of system/protocol that keeps track of all your network resources, such as devices and users, is called what? Hint: the secure version uses port 636. - OSPF - **LDAP** - CCNA - EIGRP ## 8 2/2 points When was TCP/IP authorized to be the official standard for connecting to ARPAnet, and what did it replace? - **Early 1980s: Network Control Protocol (NCP)** - Early-mid 1970s: MILNET - Late 1960s: Netbios - Early 1970s: DARPA ## 9 2/2 points Which of the following are the fields in a UDP header? - source port, destination port, window, acknowledgement number - source port, destination port, reply number, security code - **source port, destination port, length, checksum** - source port, destination port, header length, checksum ## 10 4/4 points The four-step process (the DORA process) a client takes to receive an IP address from a DHCP server is in four parts. Match the following with their correct order. - **The DHCP client broadcasts a DHCP Discover message looking for a DHCP server** 1 - **The client broadcasts to the server a DHCP Request message asking for the offered IP address** 2 - **The server issues a unicast DHCP Acknowledgment message** 3 - **The DHCP server that received the DHCP discover message sends a unicast DHCP Offer message back to the host** 4 ## 11 2/2 points What is a hierarchy that can logically locate a system based on its domain identifier? - An entity address - **A FDDN, or DNS namespace** - B Tree - An IP address ## 12 2/2 points What layer of the DoD/Network Model oversees hardware addressing and defines protocols for the physical transmission of data? - Physical layer - The device layer - Network Access layer - **Protocol layer** ## 13 2/2 points What protocol provides for email using a spooled, or queued, method of mail delivery? - **POP3** - Simple Mail Transfer Protocol - IMAP - ICMP ## 14 2/2 points What is the length in bits of a data field in a TCP header? - 256 - 255 - **32** - can vary ## 15 2/2 points What packet type and ports does Dynamic Host Configuration Protocol use? - TCP 66/86 - **UDP 67/68** - UDP 20/21 - TCP 443/444 ## 16 2/2 points What is the IP address range for APIPA? - **169.254.0.1-169.254.255.254** - 172.16.0.0 to 172.31.255.255 - 172.16.0.0-172.31.255.255 - 192.168.0.0-192.168.255.255 ## 17 2/2 points What are two cryptographic protocols used for enabling secure online data-transfer activities? (Two answers) - MD5 - SHA256SUM - **Transport Layer Security (TLS)** - Triple DES - **Secure Sockets Layer (SSL)** ## 18 2/2 points A DHCP message that looks like the following would be what? FF:FF:FF:FF:FF:FF - Session initiation message - Three-way handshake message. - **Discover broadcast message.** - AARP message ## 19 2/2 points In terms of SNMP, the Network Management System (NMS) polls the agents through what? - netstat database - **Management Information Base (MIB)** - system status control (SSC) database - syslog database ## 20 2/2 points What was the operating system developed at the University of California, Berkley, and which incorporated TCP/IP early in its development cycle? - Linux - Multics - CP/M - DEC/VMS - **BSD Unix** - Bell Labs Unix ## 21 2/2 points What protocol sets up a secure communications session over a TCP/IP connection, and what port does it use by default? - FTP - 32 - **SSH - 22** - rsh/rlogin - 24 - Telnet - 23 ## 22 2/2 points Who created the Transmission Control Protocol/Internet Protocol (TCP/IP) suite and why? - **Department of Defense (DoD): to ensure and preserve data integrity as well as to maintain communications in the event of catastrophic war.** - Massachusetts Institute of Technology: to establish protocols for communications between US east coast universities and west coast universities. - National Institute of Standards and Technology: to standardize on communications protocols for US government agencies. - The University of California @ LA: to establish protocols for communciations among their campuses. ## 23 2/2 points In terms of SNMP, a report delimiting the operational traits of a healthy network is termed what? - a baseline - **syslog report** - multi-conditional report - netstat report ## 24 2/2 points What does the Host-to-Host layer of the DoD/Network model provide? - It monitors the data exchange between the host and the network. - It provides logical addressing of hosts by giving them an IP address. - **It creates reliable end-to-end communication and ensures the error-free delivery of data.** - It assigns APIPA addresses in the absence of a DHCP server. ## 25 3/3 points From the following list, select three things the text lists that a DHCP server can provide. - **Default gateway** - **Domain name** - Directory information - Network time synchronization - **MAC address** - Subnet mask ## 26 2/2 points For the subnet address scheme to work, every machine on the network must know which part of the host address will be used as the subnet address. How is this accomplished? - **by assigning a subnet mask to each machine** - by reading the arp table and creating a configuration file - by utilizing a hosts file - By using a rarp lookup ## 27 2/2 points How many bits are in a subnet mask? - 16 - 256 - 8 - **32** ## 28 3/3 points Match the following classes with their subnet mask. | Class | Subnet Mask | |---|---| | B | 255.255.0.0 | | A | 255.0.0.0 | | C | 255.255.255.0 | ## 29 2/2 points What network class is used for multicast addresses? - A - C - **E** - B - D ## 30 2/2 points What is the method that Internet Service Providers (ISPs) use to allocate a number of addresses to a company? (What is it called). - RARP - ARP - Domain Name Service - **Classless Inter-Domain Routing** - Netstat ## 31 2/2 points What is another name for variable-length subnet masking? - dynamic domain name allocation - **CIDR** - dynamic IP allocation - ARP ## 32 2/2 points If you have an address written as: 112.18.13.32/20 How many bits would you have for the network/subnet portion and how many bits for the host portion? - 32-16 - **20-12** - 20-32 - 22-12 ## 33 2/2 points A subnet mask of 255.255.255.248 corresponds to what in CIRD notation? - /29 - 255.255.255.248 is an invalid subnet mask. - /33 - /12 ## 34 2/2 points What is the usable number of addresses (host space) for a subnet mask of 255.255.255.0? - 256 - 2 - 255 - **254** ## 35 2/2 points Given 192.168.111.5/24 (but applies to any valid network and subnet mask), what is the highest address in the host portion of the range normally (always?) reserved for? - unicast - discovery - **broadcast** - sync bit ## 36 2/2 points Why can you not use a /31 or /32 CIDR notation subnet mask? - /31 or/32 would put the network portion in an invalid class. - /31 and/32 are not resolvable in an ARP table. - **/31 and /32 are reserved for Class E addresses.** - At least 2 host bits are required for assigning IP addresses to hosts. ## 37 2/2 points Given a subnet mask in binary form, 11000000, what is the total number of subnets that can be created? - 6 - 11 - 256 - **2^2** ## 38 2/2 points Given a Class C network with a subnet mask of /27, how many subnets are possible? - 2 - 4 - 16 - **8** ## 39 2/2 points What uses an Internet Control Message Protocol (ICMP) echo request and replies to test if a host IP stack is initialized and alive on the network? - groper - grep - **ping** - syn/ack packet ## 40 2/2 points What has been/still is used to slow the depletion of available IP address space by allowing many private IP addresses to be represented by some smaller number of public IP addresses? - subnetting - **Nat** - GNAT - RARP ## 41 3/3 points What are three types of network address translation? (Select three answers). - **Overloading** - **Reversible** - RIP - **Recursive** - Static - Dynamic ## 42 2/2 points Addresses used after NAT translations are called what? - dynamic addresses - **external addresses** - internal addresses - global addresses ## 43 2/2 points What is another name for NAT overloading? - ARP - BGP - **port address translation** - RIPv2 ## 44 0/2 points **Question 1 - OSI Model - Which layer of the Open Systems Interconnect (OSI) model is responsible for the addressing of end systems and the routing of datagrams on a network?** - Application - **Data Link** *Correct Answer: Network* - Presentation - Network - Physical - Session ## 45 2/2 points **Question 2 - OSI Model - Which of the following devices typically operates at the network layer of the OSI model?** - Switch - Adaptor - Hub - **Router** ## 46 3/3 points **OSI Model - Which of the following layers of the OSI model typically have dedicated physical hardware devices associated with them? Choose all correct answers.** - Encryption - **Network** - **Physical** - Presentation - **Data Link** - Application ## 47 0/2 points **OSI Model - Which layer of the OSI model is responsible for dialogue control between two communicating end systems?** - *Network* *Correct Answer: Physical* - Physical - Presentation - Conversion - Data Link - Physical - Application ## 48 2/2 points **Topologies - Which of the following topologies provides the greatest number of redundant paths through the network?** - Bus - Ring - Wave - Star - **Mesh** ## 49 2/2 points **Topologies - Your network service company has been contracted to upgrade the network of Fried Pickle Foods to state-of-the-art fiber Ethernet. You are selected for a site survey, and discover Fried Pickle Foods is using coax-based Thin Ethernet. What change in network topology must happen to upgrade the existing coax-based network to Gigabit Ethernet using UTP?** - **Bus to Star** - No topology change--both will be bus topology. - Ring to Bus - Mesh to Star - Star to Ring ## 50 2/2 points What network topology best describes the following diagram? (Image omitted) - Bus - Can - Star - Borg - **Mesh** ## 51 2/2 points In a physical star topology, what happens when a workstation loses its physical connection to another device? - The ring is broken, so no devices can communicate. - No devices can communicate. - That workstation and the device it's connected to lose commmunication with the rest of the network. - **Only that workstation loses its ability to commmunicate.** ## 52 2/2 points What is the difference between a LAN and a WAN? (Choose the best answer). - WANs can utilize either private or public data transport. - **All of the listed answers for this question.** - WANs cover a larger geographical area. - WANs require a router. ## 53 2/2 points When designing a network and deciding which type of network topology to use, which items should be considered? Choose all that apply. - **Cost** - **Fault-tolerance requirements.** - **Ease of maintenance.** - **Ease of installation.** ## 54 2/2 points At which layer of the OSI model would you find IP? - Data Link - **Network** - Transport - Conversion - Physical ## 55 2/2 points Communications: Host 1 sent a SYN packet to Host 2. What will Host 2 send in reply? - ACK/NAK - **SYN/ACK** - SYN/SYN - ACK - ACK/ACK ## 56 0/2 points You are connected to the Internet watching Youtube videos, and then you want to get ready to watch the Dallas Cowboys beat the Miami Dolphins on ESPN. You click on ESPN in your browser and nothing happens. You get a time-out. What layer of the OSI model might be responsible for this? - Presentation - *Application* *(Correct Answer: Application)* - Data Link - Physical - Application ## 57 2/2 points On an Ethernet switched network, what address does one computer use to communicate with another? (Think of the local area network--not the Internet). - Deprecated address - Transition address - IP address - **MAC address** ## 58 2/2 points Which of the following can run full duplex and achieve 1000Mbps with UTP Cat 6 cable? (You may consult figure 4-4). - 1000BaseCR6 - **1000BaseTX** - 1000BaseCX - 1000BaseTZ ## 59 2/2 points How many devices on a collision domain have to listen when a single device transmits? - **all** - 2 - Only the receiving station - It depends on the subnet - It depends on the VLAN ## 60 2/2 points For cat 5 and 6 cable, what is the maximum transmission distance specified by the Ethernet standard? - 100 feet - 550 yards - 1000 meters - **100 meters** ## 61 2/2 points How many wire pairs are used with half duplex? (Think about the old landline telephones). - 8 - 2 - 4 - **1** ## 62 2/2 points How many wire pairs are used with 1000BaseT? - **2** - 1 - 8 - 4 ## 63 2/2 points What is binary 10101010 in decimal? - 64 - 210 - 505 - **170** ## 64 2/2 points What is decimal 17 in binary? - 101010 - 11100 - 100001 - **10001** ## 65 0/2 points **What is the standard for Ethernet over UTP?** - CompTIA 802.3 - IEEE 802.3 - None of the other answers. -*ΕΙΑ/ΤΙΑ 802.3* *(Correct Answer: IEEE 802.3)* ## 66 0/2 points **How many bits is the MAC address in the WiFi interface in your new Bosch refrigerator?** - *64* *(Correct Answer: 48)* - 24 - 128 - 48 ## 67 1/1 point Ethernet can be transmitted over power lines. (T/F) - **False** - True ## 68 1/1 point Ethernet cannot be transmitted over HDMI. (T/F) - True - **False** ## 69 (Image omitted) - A - **Preamble** - B - **Source MAC Address** - C - **4 bytes** ## 70 3/3 points Match the following agencies with their purpose. | Agency | Purpose | |---|---| | Wi-Fi Alliance | **Promotes and tests for WLAN interoperability** | | Institute of Electrical and Electronics Engineers (IEEE) | **Creates and maintains operational standards** | | Federal Communications Commission (FCC) | **Regulates the use of radio frequencies in the U.S** | ## 71 2/2 points What is the speed and frequency range for IEEE 802.11g? - 54Mbps - 5 GHz - 2024 Mbps - 900 MHz - **54Mbps - 2.4 GHz** - 1024 Mbps - 2.4 GHz ## 72 2/2 points What IEEE standard provides for throughput improvements (compared to previous standards) by utilizing multiple-input, multiple-output antennae? - IEEE 802.11g - IEEE 802.11ar - IEEE 802.11m - **IEEE 802.11n** ## 73 2/2 points If you were going to do channel planning for a wireless network operating in the 2.4GHz band, what three channels would you chose to avoid overlap? - 2, 6, 12 - 1,3,5 - 1, 5, 10 - 3,5,9 - **1, 6, 11** ## 74 2/2 points The definition "wireless NICs communicate directly without the need for a wireless access point" is termed what? - Peer-to-peer mesh network - **Ad Hoc Mode** - BSSID - Independent basic node locking ## 75 2/2 points What devices listed in the text can operate in the 2.4GHz wireless band and might cause interference with IEEE 802.11g devices? (Choose two answers). - **bluetooth devices** - **microwave ovens** - GPS receivers - FM radio - AM radio ## 76 2/2 points "A feature continuously monitors a device's operating range for any radar signals that are allowed to operate in portions of the 5GHz band" is what? - QAM - Spread Spectrum - QPSK - Transmit Power Control - **Dynamic Frequency Selection** ## 77 0/2 points **What is an example of a point to multi-point antenna?** - log periodic - discone - yagi -*dish* *(Correct Answer: discone)* ## 78 2/2 points The following image is most likely an example of what kind of antenna? (Image ommitted) - Discone - Circular - Dish - **Yagi** ## 79 2/2 points Infrastructure mode provided by an access point is also known as what? - regression-modulated service mode - **basic service set** - modified amplitude mode - variable rate mode ## 80 0/2 points **"A networking protocol that offers several security benefits, including authorization, centralized access, and accounting supervision", is which of the following according to the text?** - LDAP - Kerberos -*RADIUS* *(Correct Answer: RADIUS)* - RADIUS - OAuth ## 81 2/2 points My cell phone uses Android Auto to provide GPS, audio, etc., to my car display. What communications type is it using? - IR - **Bluetooth** - Near-field communications - IEEE 802.11ac ## 82 2/2 points Which additional configuration step is necessary in order to connect to an access point that has SSID broadcasting disabled? - Configure MAC address filtering to permit the client to connect to the AP. - Configure open authentication on the AP and the client. - Set the SSID value in the client software to public. - **Set the SSID value on the client to the SSID configured on the AP.** ## 83 2/2 points "You have more than one access point, and they are in the same SSID connected by a distribution system" identifies what? - SSID - **Extended Service Set** - PSK - WEP - WPA ## 84 1/1 point CAPWAP is a mitigation technique for rogue access points. (T/F) - **False** - True ## 85 (Image ommitted) | Item | Description | |---|---| | NIC | installed in your computer to connect, or interface, your computer to the network | | Bridge | *connect multiple segments of a network together--recognizes frames and pays attention to the source and destination MAC address of the incoming frame as well as the port on which it was received* *(Correct Answer: device that connects all the segments of the network together in a star topology Ethernet network.)* | | HUB | **device that connects all the segments of the network together in a star topology Ethernet network** | | Switch | *a combined device for modulation and demodulation, for example, between the digital data of a computer and the analog signal of a phone line* *(Correct Answer: connect multiple segments of a network together--recognizes frames and pays attention to the source and destination MAC address of the incoming frame as well as the port on which it was received)* | ## 86 2/2 points Using the example in the text, what command is likely to result in the following output? (I.E., what command would be where the question marks are)? Switch(config-if)#????????? 10 Force 10 Mbps operation 100 Force 100 Mbps operation 1000 Force 1000 Mbps operation auto Enable AUTO speed configuration - config - running-config - type - rate - **speed** ## 87 0/1 point Firewalls operate at only layer 4 of the OSI model. (T/F) - True - **False** *Correct Answer: True* ## 88 2/2 points What is the most likely security device in the following diagram (labeled by the small blue box)? (Image ommitted) - switch - hub - bridge - **firewall** ## 89 3/3 points In a typical firewall design, what are the three separate networks, or zones that can be defined? - **external** - upper - combined - **internal** - lower - **dmz** ## 90 1/1 point A host-based IDS (HIDS) can monitor your network for signs of an intrusion. (T/F) - True - **False** ## 91 2/2 points What lets you configure the complete network on a single device and push the configurations out to the Wi-Fi access points? - HIPS - HIDS - Bi-directional modem - Wireless access point - **Wireless LAN controller** ## 92 2/2 points Often a single server does not have the capabilities to serve all requested traffic--a very busy website on the Internet could have hundreds of thousands of incoming requests every second, for example. What might you implement to handle this heavy traffic? - Network extender - Server multiplier - **Load balancer** - HIDS/HIPS ## 93 2/2 points When a wired device sending a frame is transmitting onto a network, what contention method is used? - MIMO - Carrier Sense Multiple Access with Collision Avoidance - MU-MIMO - **Carrier Sense Multiple Access with Collision Detection** - FIFO ## 94 2/2 points A server that assigns IP addresses to hosts is what kind of server? - DNS - Proxy - NTP - **DHCP** ## 95 2/2 points When the administrator configures a dynamic host control protocol server, they can also set some addresses in the pool as "off limits." What are those called? - **IP exclusions or exclusion ranges** - Hidden blocks - Invalid blocks - Out blocks ## 96 2/2 points If a DHCP server is no longer handing out IP addresses to hosts, what is one (logical) thing a system administrator might check? - IP range - runtime - uptime - **lease time** ## 97 2/2 points A computer networking device that switches on Open Systems Interconnection (OSI) layer 2 like an ordinary network switch but provides routing, is called what? - **A multilayer switch** - A IDS - A routing HUB - A combination switch ## 98 2/2 points In DNS records, what gives you the IP address of a domain or host? - The CNAME record - The SPF record - **The A record** - The MX record ## 99 2/2 points What protocol/service provides clock synchronization of network devices and computers? - ARP - DARP - DNS - **NTP** ## 100 2/2 points A type of server that handles its client-machine requests by forwarding them on to other servers while allowing granular control over the traffic between the local LAN and the Internet, is known as what? - A DNS server - An ARP server - **A proxy server** - AN NTP server ## 101 2/2 points The technology that uses sensors for monitoring and control of everything from power grids to machines on the factory floor is termed what? - Collision avoidance system - **industrial control systems (ICS)** - Wireless synchronization system - Waste management systems ## 102 2/2 points What is the time measured from when a frame enters a port to when it exits called? - quantum - delay - **latency** - congestion

Use Quizgecko on...
Browser
Browser