1. A Cyclical Redundancy Check (CRC)
is an example of what type of built-in protocol mechanism?
Answers
·
Error detection
·
Error
recovery
·
Misconfiguration
error
·
Time
To Live (TTL) expiration
Explanation: Cyclical Redundancy
Checks, often known as CRCs, are a specific kind of error-checking technique
that are frequently used in communication systems to identify erroneous
modifications made to raw data. It is a technique for error detection that is
integrated into the protocol.
2. What does ICMP stand for?
Answers
·
Internet
Control Mail Protocol
·
Internet Control Message Protocol
·
Internet
Client Message Protocol
·
Interactive
Control Message Protocol
Explanation: The abbreviation for
"Internet Control Message Protocol" is "ICMP." It is a
network layer protocol that is part of the Internet Protocol (IP) suite, and it
is used for the transmission of error messages as well as operational information
on the status of the network.
3. The Linux and macOS program
traceroute is known by a slightly different name on Windows. It's referred to
as ______.
Answers
·
Ping
·
ipconfig
·
tracert
·
Tracepath
Explanation: On Windows, the tool that
is functionally comparable to traceroute is referred to as "tracert."
It accomplishes the same goal of tracking the path that data packets travel on
a network in order to get to their final destination.
4. You run the Test-NetConnection
command on a Windows PC while only providing a host name. As a result, what
default action does the command use?
Answers
·
IMCP eEcho request
·
Network
address translation
·
Name
server lookup
·
Private
tunnel
Explanation: When you use the
Test-NetConnection command on Windows and specify merely a host name, the
operating system will automatically carry out a fundamental TCP connection test
to the provided host on port 80. This is the default behavior. This is the same
as determining whether or not it is possible to create a connection to a web
server using the standard HTTP port.
5. You need to find the Internet
Protocol (IP) address for a website. Which command do you use on a Windows
system?
Answers
·
Netcat
·
Ping
·
Pathping
·
Nslookup
Explanation: Simply change
"example.com" to the actual domain name of the website whose IP
address you are trying to locate. The IP address of the selected domain will be
shown to you when you execute this command and give the domain's name.
6. One of Google's public DNS
servers is 8.8.8.8. The other one is ______.
Answers
·
1.2.1.1
·
255.255.255.255
·
8.8.4.4
·
0.0.0.0
Answers
·
Domain
Name System (DNS) service model
·
Cloud computing
·
Network
Address Translation (NAT)
·
Subnetting
Explanation: The delivery of services centered on a certain
piece of hardware Many people also refer to virtualization as "cloud
services" or simply "virtualization services." Through the use
of virtualization, many virtual machines are able to operate on a single
physical computer. This enables a more effective use of the machine's hardware
resources and provides flexibility in the management and deployment of
services.
8. What is The IPv6 loopback address?
Answers
·
127.0.0.1
·
0000:0000:0000:0000:0000:0000:0000:0000
·
1000:0000:0000:0000:0000:0000:0000:0000
·
0000:0000:0000:0000:0000:0000:0000:0001
9. Compress the following IP
address: 9930:cafa:0000:0052:04cc:7b7a:0037:27e6.
Answers
·
9930:cafa:0:52:4cc:7b7a:37:27e6
·
No
changes, the address is already compressed.
·
9930:cafa:0:052:4cc:7b7a:037:27e6
· 930:cafa:00:052:04cc:7b7a:037:27e6
Answers
·
Traffic
class
·
Flow
label
·
Hop
Limit
·
Next
header
Explanation: Hop Limit" is the
field in IPv6 that serves the same function as the Time-to-Live (TTL) field in
an IPv4 header; however, IPv6 refers to this field by a different name. The Hop
Limit field allows the maximum number of routers that a packet is permitted to
go through before it is considered to have failed its journey and been
rejected. It performs a function similar to that of the TTL field in IPv4,
namely assisting to stop packets from being sent back and forth across the
network indefinitely.
Shuffle Q/A 1
11. The first field of an Internet
Control Message Protocol (ICMP) packet specifies the message type. Which
choices represent message type examples? (Choose all that apply)
Answers
·
Destination unreachable
·
Time exceeded
·
Destination
port unreachable
·
Destination
network unreachable
Answers
·
Nslookup
·
netcat
·
Mtr
·
Pathping
13. A tech uses the netcat
tool on a Linux system. Of the choices, which has proper syntax?
Answers
·
nc
-v 80
·
nc google.com 80
·
nc
google.com -z
·
nc
google.com
14. Most public Domain Name Servers
(DNS) are available globally through which technology?
Answers
·
Anycast
·
Echo
request
·
Time
To Live (TTL) field
·
Host
file
15. With virtualization, a single
physical machine, called a host, can run many individual virtual instances,
called ______.
Answers
·
Clients
·
Servers
·
Clouds
·
Guests
Explanation: With the help of virtualization, a single physical
system, which is referred to as a host, can operate a great number of
separate virtual instances, which are referred to as "virtual
machines" or VMs. Each virtual machine functions the same way as if it
were a standalone physical computer, complete with its own set of apps and
operating systems, although sharing the same underlying hardware. This makes it
possible to employ resources more effectively and provides additional
flexibility in the management and deployment of computer systems.
16. An Internet Protocol (IP) v6
address is how many bits in size?
Answers
·
64
·
32
·
128
·
256
17. What is one of the most commonly
used name resolution tools?
Answers
·
Nslookup
·
DNS
·
Netcat
18. Internet Protocol (IP) v6
addresses are written out in which format?
Answers
·
8 groups of 16 bits
·
8
groups of 12 bits
·
6
groups of 32 bits
·
4
groups of 16 bits
Answers
·
16-bit
·
8-bit
·
32-bit
·
20-bit
20. What is one type of built-in
protocol mechanism?
Answers
·
Error detection
·
Time
to Live (TTL) expiration
·
IPv6
·
Misconfiguration
error
21. Traceroute uses UDP packets by
default on which of the following operating systems? (Choose all that apply)
Answers
· Linux
·
Mac OS
·
Windows
10
·
Windows
7
22. When troubleshooting Domain Name
System (DNS) problems, which helpful feature do public servers usually support?
Answers
·
Port
connectivity
·
Paths
between nodes
·
ICMP echo requests
·
Virtualization
services
Shuffle Q/A 2
23. When shortening an Internet
Protocol (IP) v6 address, which two rules are used? Select two that apply.
Answers
·
Removing all leading zeros.
·
Replace
groups of ones with semicolons.
·
Removing
all leading ones.
·
Replace groups of zeros with colons.
Answers
·
Flow label
·
Payload
length
·
Next
header
·
Version
25. A support technician
uses the ping utility on a system that is online, yet no response is received.
What should be allowed through a firewall for ping to operate correctly?
Answers
·
ICMP
·
Echo request
·
Echo reply
·
TTL
Explanation: It is necessary to set up a firewall to let
ICMP (Internet Control Message Protocol) Echo Request and Echo Reply messages
for the ping program to function effectively when it is used behind a
firewall. Ping uses ICMP Echo Request messages to determine whether or not a
host is reachable, and it uses ICMP Echo Reply messages to determine whether or
not the host has responded.
Check to verify that the firewall allows ICMP Echo Request
messages to come in and ICMP Echo Reply messages to go out. This may need establishing special rules or permitting ICMP traffic in general,
but this will depend on the firewall. Keep in mind that enabling ICMP traffic
might be a security issue. Because of this, it is essential to install the
required limits by the security regulations that apply to your
network.
26. While in an
interactive nslookup session, you'd use the ______ keyword to change the DNS
server you're using.
Answers
·
Client
·
FQDN
·
DNS
·
Server
Explanation: The
DNS server would then be set to Google's public DNS server (8.8.8.8) if you did
this. Following the successful modification of the server, any further queries
made inside that particular nslookup session will be sent to the newly defined
DNS server.
27. The ability for a
protocol or program to determine that something went wrong is known as
________.
Answers
·
error detection
·
data resilience
·
redundancy
·
data verification
Explanation: The capability of a protocol or software to identify that
something went wrong is referred to as "error detection." Error
detection systems are intended to discover faults or inconsistencies in the
transmission or processing of data. This enables the system to notice and react
to problems affecting the data's integrity or accuracy. Error
detection methods include checksums, parity bits, and cyclic
redundancy checks (CRC), to name a few. These methods may be found in a variety
of different protocols and systems.
28. When using the
netcat command to test a network port, which option will provide output that is
not useful for scripting but is useful for the human eye?
Answers
·
-z
·
-v
·
-Port
·
No option is required
Explanation: When testing a network port with the netcat command, the -v
(verbose) option may generate output helpful for the human eye but not
for scripting. This output is good for the human eye but not for scripting.
This option raises the verbosity of the output, which provides more data about
the connection process. As a result, it is much simpler for a person to
comprehend what is going on during the interaction with the network port.
29. A company runs
sensitive technologies locally while entrusting less-sensitive technologies to
a broader user base. Which cloud delivery model is being used?
Answers
·
Private
·
Community
·
Hybrid
·
Public
Explanation: A hybrid cloud delivery strategy is appropriate for the
situation that has been described, in which a corporation operates technologies
that are more sensitive on-premises while entrusting technologies that are less
sensitive to a larger user base. An enterprise uses a hybrid cloud when it
combines on-premises technology (also known as a private cloud) with services
provided by a public cloud. Because of this, they can store sensitive
data and essential apps in a private cloud, where they have more control and
security, while still using the scalability and cost-effectiveness of
public cloud services for less sensitive forms of technology.
30. What is one of the
most commonly used name resolution tools?
Answers
·
Tracert
·
DNS
·
Nslookup
·
Netcat
Explanation: "nslookup" is one of the name resolution tools that is used by users the majority of the time. Nslookup is a command-line utility that may be found in the majority of operating systems, including macOS, Linux, and Windows. It is used to make queries to servers that are part of the Domain Name System (DNS) in order to receive information about domain names, IP addresses, and other data associated with DNS. Nslookup is often used in the process of diagnosing problems related to network connection and validating DNS setups.