Each organization that provides host services
The 1024 - 65535 range
of ports is also known as the "well-known" range.
A. True b. False
·
b. False
An IPv6 address
consists of 128 bits that are written as 10 blocks of hexadecimal numbers
separated by colons.
A. True b. False
·
b. False
Each organization that
provides host services on the public Internet is responsible for providing and
maintaining DNS authoritative servers for public access.
A. True b. False
·
True
DNS follows a
centralized database model, allowing for easier management of DNS records.
A. True b. False
·
b. False
ICANN is responsible
for restrictions on use of the .com, .org, and .net TLDs
A. True b. False
·
b. False
At the root level of
the DNS hierarchical structure, 13 clusters of root servers hold information
used to locate TLD servers.
A. True b. False
·
True
UDP port 123 is
utilized by the Network Time Protocol service
A. True b. False
·
True
When using IPv6, two
or more nodes on the same link are said to be neighbors.
A. True b. False
·
True
A hexadecimal number
is a number written in the base 16 number system.
A. True b. False
·
True
The FTP protocol
utilizes UDP, while TFTP uses TCP for data transmission.
A. True b. False
·
b. False
You are
troubleshooting a network issue on a client computer and discover that the
network card has an IP address of 169.254.196.200. What does this mean?
a. The computer has been assigned a routed public IP address.
b. The network card has been erroneously assigned a loopback address.
c. The computer is configured to use DHCP, but was unable to lease an address.
d. The network card is set up for multicast communication.
·
c. The computer is
configured to use DHCP, but was unable to lease an address.
On a Linux-based
system, what command can be used to display TCP/IP information associated with
every interface on the system?
a. ipconfig /all
b. ifconfig -a
c. ip show
d. if status
·
b. ifconfig -a
If a host's IPv6
address contains the network adapter's MAC address within the last 64 bits of
the IPv6 address, what standard is being used?
a. EU1-64
b. IEEE 802.36
c. UUID-128
d. MACin6
·
b. IEEE 802.36
Encrypted control of
remote computers using the RDP protocol is accomplished using what port number?
a. TCP 22
b. UDP 161
C. TCP 3389
d. UDP 10000
·
C. TCP 3389
Your supervisor has
asked you to configure a new prototype network with a dual stack configuration.
What does this mean?
a. Two different IPv4 address spaces will exist on the same network segment.
b. Both IPv4 and IPv6 protocols will be used on the network.
c. The router serving the network will have a redundant spare.
d. The network will exist on two separate segments, separated by a proxy.
·
b. Both IPv4 and IPv6
protocols will be used on the network.
When using DHCP for
IPv6 (i.e. DHCPv6), what port do clients receive responses on?
a. port 67
b. port 68
c. port 546
d. port 547
·
d. port 547
What statement
regarding the Server Message Block protocol is accurate?
a. It is a simple protocol used to synchronize block messages written to iSCSI
drives on a network.
b. It is used by Windows and UNIX-based operating systems to share files.
c. It is a signaling protocol used to make a connection between hosts prior to
data transfer.
d. It is a protocol used for accessing network-based LDAP directories.
·
B. It is used by
Windows and UNIX-based operating systems to share files.
What utility is used
to verify that TCP/IP installed, bound to the NIC, configured correctly, and
communicating with the network?
a. traceroute
b. ifconfig
C. ping
d. Route
·
C. ping
What command can be
used to check a domain computer's time source from a Command Prompt window?
a. date /source
b.w32tm/query /source
c. ntpd show source
d. time –source
·
b.w32tm/query /source
What is by far the
most popular DNS server software available?
a.Microsoft DNS
b. Dnsmasq
c. Oracle Resolver
d. BIND
·
d. BIND