IS5203 Week-2 Quizzes

  1. What is the purpose of implementing a DHCP server on a network? [Choose all that apply

Automatically assign a DNS server address to a host

Dynamically allocate IP addresses to hosts on the network

2. After installation of the DHCP server role, why is it necessary to restart the DHCP service?

To ensure the credentials that were stipulated is applied

3. What is the functionality of a lease for a DHCP server?

It stipulates how long an IP address will be allocated to a host

4. When creating a scope on a DHCP server, what is the purpose of specifying an exclusion?

An exclusion is specified to ensure specific IP addresses are not automatically allocated to hosts

5. On which server will the DHCP server role normally be installed?

Domain Member Server

6. Which of the following is a Class C Private IP address?

192.168.0.10

7. What is the Subnet Mask for a Classful Class A IP range?

255.255.255.0

8. What would the subnet mask be of the following network range?

255.255.255.240

9. Which of the following is the Loopback address for IPv4?

127.0.0.1

10.What is the functionality of a Multicast IP address?

Sends network communication to a specific set of hosts

11. Which of the following Stratum Levels is the least Trusted?

Level 15

12. Which of the following command-line commands would display time sync information for an NTP client?

w32tm /query /peers

13. What is the maximum number of NTP Servers that an NTP client can be synchronized with?

1

14. Which of the following port is used by NTP Servers to provide time synchronization?

123

15. Which Transport Layer protocol is used by NTP Servers to provide time synchronization?

UDP

16. Which part of a MAC address is unique to each manufacturer?

a. The device identifier
b. The OUI
c. The physical address
d. The network identifier

17. What type of device does a computer turn to when attempting to connect with a host with a known IP address on another network?

a. DHCP server
b. Default gateway
c. DNS server
d. Root server

18. What decimal number corresponds to the binary number 11111111?

a. 255
b. 127
c. 11,111,111
d. 256

20. Suppose you send data to the 11111111 11111111 11111111 11111111 IP address on an IPv4 network. To which device(s) are you transmitting?

a. The one device that is configured with this IP address
b. All devices on your local network
c. No devices
d. All devices on the Internet

21. When your computer first joins an IPv6 LAN, what is the prefix of the IPv6 address the computer first configures for itself?

a. 2000::/3
b. FF00::/8
c. FE80::/64
d. ::1/128

22. If you are connected to a network that uses DHCP, and you need to terminate your Windows workstation’s DHCP lease, which command would you use?

a. ifconfig /release
b. ipconfig /release
c. ifconfig /renew
d. ipconfig /renew

23. You have just brought online a new secondary DNS server and notice your network-monitoring software reports a significant increase in network traffic. Which two hosts on your network are likely to be causing the increased traffic and why?

a. The root and primary DNS servers because the primary server is requesting zone transfers from the root server
b. The web server and primary DNS server because the web server is requesting zone transfers from the primary DNS server
c. The caching and primary DNS servers because the caching server is requesting zone transfers from the primary server
d. The secondary and primary DNS servers because the secondary server is requesting zone transfers from the primary server

24. Which type of DNS record identifies an email server?

a. AAAA record
b. PTR record
c. MX record
d. CNAME record

25. Which of these commands has no parameters in Windows?

a. ping
b. nslookup
c. hostname
d. ipconfig

26. which DNS server offers the most current resolution to a DNS query?

a. Primary DNS server
b. Root DNS server
c. Caching DNS server
d. TLD DNS server

27. After manually changing your IP address your computer identified the duplicate IP address problem. How can you tell?

It displays a duplicate address warning

28. Your computer has autoconfigured another IP address. What type of address. What type of address did your computer resort to?

APIPA

29. How can you tell this is APIPA address?

169.254.0.1-169.254.255.254 range

30. What is the new IP address?

169.254.183.21

31. Telnet, SSH, and VNC are which type of software?

Terminal Emulation

32. Which protocol can be used to connect to and control Microsoft computers?

Both choices will work

33. When implementing secure remote file access which choices will be incompatible with each other?

SFTP / FTPS

34. Telnet, SSH, RDP and VNC all rely on which type of management?

In-Band

35. When examining tunneling protocols, which choice is a component of the IPsec protocol suite?

IKEv2

36. What transport protocol/ports do DNS and DHCP use?

UDP 53 / UDP 67 and 68

37. You work as a network administrator and are responsible for configuring network firewalls, routers and switches. You have configured rules between the user and server VLANs. You received a request from your development team to create a new rule that allows port TCP 1433 to the database server. Based on the port number, which database is installed on the server.

SQL

38. You work as a network administrator in a domain environment. You have a new firewall and need to configure it. You are asked to create web filtering and firewall rules based on domain groups. Which of the following protocol will you use to integrate your firewall directly with Active Directory?

LDAP

39. To be able to remotely manage a Windows device securely, which of the following protocols can be used?

RDP

40. Which of the following connection methods can be used to connect a company’s offices which are located in different geographical areas?

Site-to-Site VPN

41. While configuring a new VPN client, which Role service needs to be installed for the Remote Access role on a Windows server?

Direct Access and VPN (RAS)

42. Which permission needs to be assigned to a user to be able to connect to a VPN connection?

Network Access permissions

43. Which permission allows a user access to a resource?

Authentication

44.Which protocol’s header would a layer 4 device read and process?

a. IP
b. TCP
c. ARP
d. HTTP

45. What field in a TCP segment is used to determine if an arriving data unit exactly matches the data unit sent by the source?

a. Acknowledgment number
b. DiffServ
c. Checksum
d. Source port

46. At which OSI layer does IP operate?

a. Transport layer
b. Network layer
c. Application layer
d. Data link layer

47. What is the Internet standard MTU?

a. 65,535 bytes
b. 1,500 bytes
c. 1,522 bytes
d. 9,198 bytes

48. Which two protocols manage neighbor discovery processes on IPv4 networks?

a. NDP and Ethernet
b. IPv4 and IPv6
c. ICMP and ARP
d. TCP and UDP

49. What is one advantage offered by VDI over RDS and VNC?

a. Offers access to multiple OSs in VMs
b. Supports remote access to mobile devices
c. Allows multiple users to sign in at once
d. Provides open source flexibility

50. Which encryption protocol does GRE use to increase the security of its transmissions?

a. SFTP
b. SSH
c. SSL
d. IPsec

51.Which encryption benchmark ensures data is not modified after it’s transmitted and before it’s received?

a. Integrity
b. Availability
c. Symmetric
d. Confidentiality

52. Which remote file access protocol is an extension of SSH?

a. TFTP
b. FTPS
c. SFTP
d. HTTPS

53. You’re getting a duplicate IP address error on your computer and need to figure out what other device on your network is using the IP address 192.168.1.56. What command will show you which MAC address is mapped to that IP address?

a. netstat -n
b. telnet 192.168.1.56
c. arp -a
d. tracert 192.168.1.56

Other Links:

Statistics Quiz

Networking Quiz

See other websites for quiz:

Check on QUIZLETCheck on CHEGG

Leave a Reply

Your email address will not be published. Required fields are marked *