1. The protocol used to communicate network errors is known as __________.
Answers
·
TCP
·
Traceroute
·
ICMP
· UDP
Explanation: ICMP, which stands for Internet Control Message Protocol,
is the name of the protocol that is used to transmit network faults. The
Internet Control Message Protocol (ICMP) is an essential component of the
Internet Protocol (IP) suite. Its primary function is to transmit error
messages as well as operational information on the state of a network. It is
often used for diagnostic and troubleshooting reasons, giving feedback on
difficulties such as inaccessible hosts, network congestion, or other mistakes
in the process of communication.
2. The ping utility
sends what message type?
Answers
·
Destination Network Unknown
·
Echo Request
·
Echo Reply
· Destination Network Unreachable
Explanation: Ping is a tool that sends messages known as ICMP Echo
Request. When you use the ping command to verify the reachability of a host or
to measure the round-trip time for packets to go from the source to the
destination and back, it sends ICMP Echo Request messages to the host that you
want to check. This allows you to determine how long it takes for packets to
make the journey. The ICMP Echo Reply messages are sent back by the destination
host, assuming that it is both accessible and functioning. The time it takes
for the Echo Request to get to the destination and the time it takes for the
Echo Reply to make its way back to the source are both included into the
calculation of the round-trip time.
3. What is one of the
tools you can use to verify connectivity to a specific port on Windows OS?
Answers
·
Test-NetConnection
·
Tracert
·
nc (netcat)
· Ping
Explanation: The "Telnet" command is one of the tools that you
may use to test whether or not your Windows operating system is connected to a
certain port. In order to verify the connectivity of a network, you may use
Telnet, which lets you connect to a distant host on a certain port and create a
connection with that host.
4. Traceroute uses UDP
packets on which of the following operating systems? Select all that apply.
Answers
·
Windows 7
·
Windows 10
·
Mac Os
·
Linux
Explanation: On operating systems that are similar to Unix, the packet
format used by Traceroute is commonly UDP, which stands for User Datagram
Protocol. On Windows, it most often use ICMP Echo Request packets instead,
which stands for Internet Control Message Protocol. Traceroute is a diagnostic
tool for networks that may be used to track the path that data packets travel
from their origin to their final destination. This reveals information about
the network path as well as the delays that are experienced at each hop along
the way.
5. During a traceroute,
which action does a router perform to the value in the Time To Live (TTL)
field?
Answers
·
Addition
·
Multiplication
·
Division
· Subtraction
Explanation: The value stored in the Time-To-Live (TTL) field of an IP header is decreased by routers while a traceroute is being performed. In each packet, the sender (the person who initiated the traceroute) is responsible for setting a counter known as the TTL. Each router the packet passes through on its path to its destination reduces the TTL value by one. This process continues until the packet reaches its destination.
The Time-to-Live (TTL) field's job is to set a maximum for the amount of time a packet may spend in transit via a network as well as the number of hops it can make. When the TTL value hits zero, the router that decrements it to zero will reject the packet and send an ICMP Time Exceeded message back to the source where it originated. This procedure assists in establishing the path that will be used to reach the destination as well as the number of hops that will be required.
In the case of traceroute, the TTL is initially set to a certain number, and as the packet travels along its path, the value is reduced by each router along the route. Identifying each hop and calculating the round-trip time to each router is done with the help of the ICMP Time Exceeded signals that are received by the source.
6. One of Level 3's
public DNS servers is ____________.
Answers
·
8.8.8.8
·
192.168.1.1
·
127.0.0.1
· 4.2.2.3
Explanation: Please note that IP
addresses for DNS servers can change over time, and it's a good idea to check
Level 3's official documentation or website for the most up-to-date information
on their DNS server addresses. Additionally, you can use alternative DNS services
such as Google's (8.8.8.8) or Cloudflare's (1.1.1.1) if Level 3's servers are
not suitable for your needs.
7. A DNS resolver tool
available on all major desktop operating systems is __________.
Answers
·
Nslookup
·
Host
·
Ping
· Tracert
Explanation: The "nslookup" command is a DNS resolver utility
that is accessible on all major desktop operating systems. The
"nslookup" program is a command-line application that may be used to
query the Domain Name System (DNS) in order to retrieve information on a domain
name or an IP address. Users are given the ability to interactively query DNS
servers and solve problems that are associated with DNS.
This command will offer information about the domain or IP
address that you provide, including the domain name or IP address that
corresponds to the supplied domain or IP address, depending on the kind of
query that you use. The application is downloadable for use on computers
running macOS, Linux, and Windows.
8. Which top-level
organization manages the global DNS (Domain Name System)?
Answers
·
ICANN
·
Google
·
IANA
· RFC
Explanation: The Internet Corporation for Assigned Names and Numbers
(ICANN) is in charge of managing the Domain Name System (DNS), which is used
worldwide. The management of the Domain Name System (DNS) and the distribution
of IP addresses are both coordinated and overseen by ICANN, which is a
nonprofit organization. It is an extremely important factor in ensuring the
continuity of the Internet's interoperability, security, and stability,
respectively.
9. Which of the
following commands displays the current network configuration information?
Answers
·
Net user
·
Ipconfig
·
Winver
· Pathping
10. An organization
responsible for assigning individual domain names to other organizations or
individuals is known as a(n) ______.
Answers
·
Government
·
Internet authority
·
DNS registrar
· Autonomous system
Explanation: A domain name registrar is an institution that is responsible for allocating individual domain names to other companies and people. The Internet Corporation for Assigned Names and Numbers (ICANN) and other domain authorities authorize some organizations as Domain Name Registrars to administer the reservation and registration of domain names inside certain top-level domains (TLDs). These domain name registrars are also known as registrars.
A domain name (like example.com), also known as an Internet address, may be registered by a person or a business via a service known as a domain registrar. The registrar is responsible for facilitating the registration procedure, collecting the required information, and maintaining communication with the domain registry on behalf of the registrant in order to formally reserve the domain. Domain registrars are also responsible for providing administration services for domains, which may include DNS settings and choices for renewal.
11. A piece of software
that runs and manages virtual machines is known as a __________.
Answers
·
cloud computing device
·
Hypervisor
·
virtual instance
· cloud storage device
Explanation: "Hypervisor" or "Virtual Machine Monitor
(VMM)" refers to a piece of software that is responsible for the operation
and management of virtual machines. Hypervisors make it possible for numerous
virtual machines (VMs) to operate on a single physical host by allowing them to
share the resources that are provided by the host's hardware. They provide an
abstraction layer that makes it possible to create, manage, and run virtual
machines (VMs) in complete independence from the underlying physical hardware.
12. What is Office 365
Outlook an example of?
Answers
·
SaaS
·
PaaS
·
IaaS
· FttH
13. A hybrid cloud is
________________.
Answers
·
a combination of a private cloud and a
mesh network
·
a combination of a public cloud and
hardware virtualization
·
a combination of a public
cloud and a private cloud
· a combination of virtual hosts and virtual guests
Explanation: A computing environment is referred to as having a hybrid
cloud when it combines on-premises infrastructure, private cloud services, and
public cloud services into a single offering. They will be able to share data
and applications with one another as a result of this capability. Businesses
that use a hybrid cloud solution have the option to shift workloads between
private and public environments based on the amount of security necessary, the
costs associated, and the computing needs of the organization.
14. Which of the
following are additional cloud services? Select all that apply.
Answers
·
Data as a Service (DaaS)
·
VPN as a Service (VPNaaS)
·
Blockchain as a Service
(BaaS)
· Python as a Service (PaaS)
15. Which cloud service
provides access to things like virtual machines, containers, networks, and
storage?
Answers
·
SaaS
·
FaaS
·
PaaS
· IaaS
Explanation: IaaS is the abbreviation for "infrastructure as a service," which describes the kind of cloud computing service that gives users access to virtual machines, containers, networks, and storage. IaaS, or infrastructure as a service, is a type of cloud computing that provides access to virtualized computer resources over the internet. Users are able to provide and manage virtual computers, storage, and networking infrastructure without having to invest in or maintain actual hardware. This is made possible via the use of cloud computing.
16. An IPv6 address is
how many bits long?
Answers
·
16
·
128
·
32
· 64
Explanation: The length of an IPv6 address is 128 bits. When compared to the earlier IPv4, which has a length of just 32 bits, this represents a huge expansion of the available address space. The restriction of IPv4 is addressed and the ever-increasing number of devices that are connected to the internet is accommodated by IPv6, which has an extended address space that allows for a much higher number of distinct IP addresses. The IPv6 address is commonly shown in hexadecimal format and is broken up into eight groups of 16 bits each, with colons serving as the delimiters between each group.
17. What is the very
first field in an IPv6 header?
Answers
·
data payload field
·
version field
·
traffic class field
· source address field
Explanation: The "Version" field is the very first field that
you'll see in an IPv6 header. The number 6 is assigned to the Version field,
which identifies the protocol version that is currently in use (in the case of
IPv6). Routers and other network devices may determine whether or not a packet
is utilizing the IPv6 protocol with the assistance of this field.
The Version field is a 4-bit field that may be found at the
very beginning of the IPv6 header. This field is positioned at the beginning of
the header. The IPv6 header has a variety of elements as part of its
comprehensive structure. Some of these fields include Payload Length, Next
Header, Hop Limit, Source Address, and Destination Address. Other fields
include Traffic Class and Flow Label.
18. Which IPv6 header
field indicates how many routers can forward a packet before it's discarded?
Answers
·
hop limit field
·
next header field
·
router forward field
· TTL
Explanation: "Hop Limit" is the field in the IPv6 header that
specifies the maximum number of routers through which a data packet may be sent
before it is rejected. The Hop Limit field is an 8-bit field that takes up one
byte and specifies the maximum number of intermediate routers that a packet may
pass through on its way to its final destination. It does something similar to
what the "Time to Live" (TTL) field in IPv4 does.
Each router that forwards the packet will decrease the Hop
Limit field before moving on to the next router. When the Hop Limit field hits
0, the packet is dropped, and an ICMP Time Exceeded message may be sent back to
the source to alert it of the discarded packet. This is done in order to inform
the source of the discarded packet.
19. The IPv4 mapped
address space within IPv6 always starts with _______ zeroes.
Answers
·
32
·
80
·
“128”
· 64
Explanation: When using IPv6, the address space that corresponds to IPv4
will always begin with 80 zeroes. Within the IPv6 address space, IPv4 addresses
may be represented using IPv6 addresses that have been translated from IPv4 to
IPv6. Following the prefix "0:0:0:0:FFFF:" is the IPv4 address
written in hexadecimal notation. These addresses begin with the
"0:0:0:0:FFFF:" prefix.
20. For IPv6 traffic to
travel on an IPv4 network, which two technologies are used? Select all that
apply.
Answers
·
Datagrams
·
IPv4 Tunnels
·
Packets
· IPv6 tunnels
Explanation: These technologies make it possible for IPv4 and IPv6 to cohabit and move inside networks. This makes it possible for a network to gradually transition to IPv6 while still keeping compatibility with the IPv4 infrastructure that is already in place. Dual Stack offers native support for both protocols, while tunneling enables the encapsulation of IPv6 traffic inside IPv4 packets so that it may be sent over an IPv4 network. Dual Stack provides native support for both protocols.
21. A Cyclical Redundancy Check
(CRC) is an example of what type of built-in protocol mechanism?
Answers
·
Error detection
·
Error
recovery
·
Misconfiguration
error
·
Time
To Live (TTL) expiration
Explanation: An example of an error-checking method that is
used in network communication is called a Cyclical Redundancy Check (or CRC for
short). It is a built-in system for detecting faults in data that is being
communicated, and it takes the form of a sort of protocol.
In particular, the CRC is a kind of checksum that entails the
calculation of a remainder (checksum) based on the polynomial division of the
data. This particular checksum is then used to validate the data. Before
sending the data, the sender adds the CRC, which they have calculated
themselves, to the file. The receiver carries out the identical computation and
then checks to see whether the CRC that was produced matches the CRC that was
received. When there is a discrepancy between the two, this suggests that there
were mistakes made during the transmission.
CRC
is used often in a variety of network protocols, such as Ethernet and Wi-Fi, as
well as in some serial communication protocols. During the process of data
transmission via a network, it is able to identify defects such as noise or
corruption, which helps to guarantee that the data's integrity is maintained.
22.
What does ICMP stand for?
Answers
·
Internet
Control Mail Protocol
·
Internet Control Message Protocol
·
Internet
Client Message Protocol
·
Interactive
Control Message Protocol
Explanation:
The
abbreviation ICMP refers to the "Internet Control Message Protocol."
In the context of network communication, diagnostic and error reporting are the
primary functions served by the Internet Control Message Protocol (ICMP), which
is part of the Internet Protocol (IP) family of protocols. It offers a channel
over which network devices may transmit error messages as well as operational
information on the state of the network.
23.
The Linux and macOS program traceroute is known by a slightly different name on
Windows. It's referred to as ______.
Answers
·
Ping
·
ipconfig
·
tracert
·
Tracepath
Explanation:
On
Windows, the software that is identical to the traceroute tool that is
available on Linux and macOS is named "tracert," which is an
abbreviation for "traceroute." It is possible to track the path that
data packets follow from their point of origin to their final destination by
using the "tracert" command. This command displays information about
each hop along the path, including round-trip timings and the IP addresses of
intermediary routers.
On
Windows, the same command is referred to as "tracert," but on Linux
and macOS, it is more often referred to as "traceroute." The
functionality is similar, in that it offers a tool for diagnosing problems with
network connection and determining the route that data packets take as they
travel over the network.
24.
You run the Test-NetConnection command on a Windows PC while only providing a
host name. As a result, what default action does the command use?
Answers
·
IMCP eEcho request
·
Network
address translation
·
Name
server lookup
· Private tunnel
Explanation: When
you execute the Test-NetConnection command on a Windows computer and supply
simply the host name, without also providing a particular test or action, the
program will automatically conduct a TCP port ping test to the host you select
as the target. The default behavior is analogous to a fundamental connectivity
test, and it examines whether or not the supplied host can be reached on a
certain port.
25. You need to find the Internet
Protocol (IP) address for a website. Which command do you use on a Windows
system?
Answers
·
Netcat
·
Ping
·
Pathping
· Nslookup
Explanation: To
determine the Internet Protocol (IP) address that is connected to a certain
website, you may use the nslookup command on a computer running Windows. The
nslookup command is a utility for querying the DNS (Domain Name System) in
order to retrieve information on a domain name or an IP address. It is run from
the command line.
26. One of Google's public DNS
servers is 8.8.8.8. The other one is ______.
Answers
·
1.2.1.1
·
255.255.255.255
·
8.8.4.4
·
0.0.0.0
27. What is the name of the
provision of services based around hardware virtualization?
Answers
·
Domain
Name System (DNS) service model
·
Cloud computing
·
Network
Address Translation (NAT)
·
Subnetting
Explanation:
The
delivery of services centered on a certain piece of hardware In common
parlance, virtualization is referred to as "Virtualization." In the
context of computer hardware, virtualization is the process of producing
virtual instances of computer hardware, such as servers, storage devices, or
network resources. Virtualization is the process of making a virtual (rather
than real) version of anything, and in this context, it includes constructing a
virtual version of something.
Answers
·
127.0.0.1
·
0000:0000:0000:0000:0000:0000:0000:0000
·
1000:0000:0000:0000:0000:0000:0000:0000
· 0000:0000:0000:0000:0000:0000:0000:0001
Explanation: The address of the IPv6 loopback device is :1. In the same way that the loopback address 127.0.0.1 in IPv4 is used to establish communication with the same device, the loopback address in IPv6 is used to do the same thing. In IPv6, this address is often referred to as the "localhost" address.
The IPv6 loopback address is notated in its complete form as 0000:0000:0000:0000:0000:0000:0000:0000:0001, however it is most usually stated in its shortened form as::1. A device is able to communicate with and test itself internally using the loopback address that has been designated for that purpose. This address also enables the device to send network packets to itself.
You may
use the loopback address::1 as the destination address, for instance, if you
wish to test a service or application that is running on your local system
while using IPv6.
Answers
·
9930:cafa:0:52:4cc:7b7a:37:27e6
·
No
changes, the address is already compressed.
·
9930:cafa:0:052:4cc:7b7a:037:27e6
·
930:cafa:00:052:04cc:7b7a:037:27e6
Answers
·
Traffic
class
·
Flow
label
·
Hop
Limit
·
Next
header
Explanation: The "Hop Limit" field in IPv6 is the
equivalent in function to the "Time to Live" (TTL) field in an IPv4
header. Both fields are located in the header. The Hop Limit field performs the
same core function as the TTL field in IPv4; that is, it determines the maximum
number of hops (routers) that a packet is permitted to travel before it is
dropped from the network.
The Hop Limit field undergoes the same process of decrementing
that the TTL field does in IPv4; it is performed by each router that sends the
packet. In the event that the Hop Limit becomes zero, the packet is thrown
away, and an ICMP Time Exceeded message may be issued to the source as a
warning.
The Hop Limit field is an 8-bit field that is included in the
IPv6 header. Its existence guarantees that packets do not cycle endlessly in
the network, which helps eliminate routing loops and ensures that packets are
delivered correctly.
Shuffle Q/A 1
Answers
·
Destination unreachable
·
Time exceeded
·
Destination
port unreachable
·
Destination
network unreachable
32. Which two tools function similar
to traceroute? (Choose all that apply)
Answers
·
Nslookup
·
netcat
·
Mtr
·
pathping
33. A tech uses the netcat tool on a
Linux system. Of the choices, which has proper syntax?
Answers
·
nc
-v 80
·
nc google.com 80
·
nc
google.com -z
·
nc
google.com
34. Most public Domain Name Servers
(DNS) are available globally through which technology?
Answers
·
Anycast
·
Echo
request
·
Time
To Live (TTL) field
· Host file
The Domain Name System (DNS) infrastructure may be found all over the globe, and it plays an essential role in the operation of the global Internet. Public DNS servers, such as those offered by corporations like Google (8.8.8.8, 8.8.4.4), or Cloudflare (1.1.1.1), are available to users all over the world over the internet. DNS queries may be sent to these servers by users in a variety of locations and networks. The purpose of these queries is to resolve domain names into IP addresses.
The Domain
Name System (DNS) is designed to be decentralized and distributed. This design
assures that the translation of domain names to IP addresses is accurate,
dependable, and scalable on a worldwide scale.
Answers
·
Clients
·
Servers
·
Clouds
·
Guests
By installing a number of virtual machines
(VMs) on a single physical host, virtualization makes it possible to make
effective use of the resources offered by hardware. This technology finds
widespread use in data centers and other locations for cloud computing, as well
as for a variety of testing and development reasons. Because each virtual
machine is capable of running its own operating system, this configuration is
very flexible and may be used to execute a wide variety of applications and
services on the same physical hardware.
Answers
·
64
·
32
·
128
· 256
Explanation: There are 128 individual
bits that make up an Internet Protocol version 6 (IPv6) address. When compared
to IPv4, which uses 32-bit addresses, this is a considerable increase in the
length of an IP address. IPv6's increased address space makes it possible to
assign a much greater number of distinct IP addresses. This helps overcome the
constraints imposed by IPv4 and makes room for the increasing number of devices
that are connected to the internet.
37. What is one of the most commonly
used name resolution tools?
Answers
·
Nslookup
·
DNS
· Netcat
Explanation: The "nslookup" command is a command-line tool that is used for querying the Domain Name System (DNS) to get information such as a domain name or an IP address. Its name, which stands for "name server lookup," is one of the name resolution tools that is used the most often.
You may execute a variety of queries that are connected to DNS by using nslookup. Some examples of these searches include seeking up the IP address that is associated with a domain name or finding the domain name that is associated with an IP address. It offers a quick and easy method for troubleshooting and diagnosing problems that are associated with DNS.
Answers
·
8 groups of 16 bits
·
8
groups of 12 bits
·
6
groups of 32 bits
·
4
groups of 16 bits
39. What size is an Internet
Protocol (IP) v6 payload length field?
Answers
·
16-bit
·
8-bit
·
32-bit
· 20-bit
Explanation: The amount of data included in the payload length field of Internet Protocol version 6 (IPv6) is represented by 16 bits. The length of the IPv6 payload is indicated by the payload length field. The IPv6 payload is the material that comes after the IPv6 header and contains things like upper-layer protocol data.
Octets, which are 8-bit bytes, are used as the unit of measurement for the payload length field, which can be found in the IPv6 header. There is a limit of 65,535 octets to the maximum length of the payload that may be represented by the 16-bit field. It is important to keep in mind that this incorporates not just the data for the upper-layer protocol but also any extension headers that could be included.
By using
the IPv6 payload length field, routers and other devices are able to process
and forward IPv6 packets in an appropriate manner. This is accomplished by
identifying the size of the payload that follows the IPv6 header.
Answers
·
Error detection
·
Time
to Live (TTL) expiration
·
IPv6
· Misconfiguration error
Explanation: The "Checksum" is a
built-in protocol mechanism that may be found in several protocols. A checksum
is a mathematical number that is computed from the contents of a message, most
often a data packet, and it is used for the purpose of identifying mistakes
that may occur during the transmission of data.
Answers
· Linux
·
Mac OS
·
Windows
10
· Windows 7
Explanation: On Unix-like operating systems, such as Linux and macOS, the packet format known as User Datagram Protocol (UDP) is the one that Traceroute utilizes by default. The number 33434 is often the UDP port number that is used by traceroute.
When doing a standard traceroute, the tool will send a sequence of UDP packets to the target host, each of which will have a time-to-live (TTL) value that increases by one. Each router that the packet passes through reduces the TTL value, and when the TTL value approaches zero, the router sends an ICMP Time Exceeded message back to the original sender of the packet. These messages are used by traceroute in order to identify the routers that are located along the path to the destination.
Noteworthy
is the fact that the tracert program on Windows use ICMP Echo Request messages
rather than UDP packets as its default mode of operation. The underlying
processes all operate toward the same objective, which is to identify the
network route that leads to a target.
Answers
·
Port
connectivity
·
Paths
between nodes
·
ICMP echo requests
· Virtualization services
Explanation: "Recursive
Querying" is a beneficial function that is often supported by public DNS
servers. It is used for diagnosing difficulties related to the Domain Name
System (DNS). Recursive querying is the ability of a DNS server to execute
complete DNS resolution on behalf of a client, beginning with the root DNS
servers and recursively traveling through the DNS hierarchy to resolve the
requested domain. This capacity is referred to as "full DNS
resolution."
Answers
·
Removing all leading zeros.
·
Replace
groups of ones with semicolons.
·
Removing
all leading ones.
·
Replace groups of zeros with colons.
Answers
·
Flow label
·
Payload
length
·
Next
header
· Version
Explanation: The "Traffic Class" field is the part of an Internet Protocol version 6 (IPv6) header that is responsible for determining the quality of service level associated with a datagram. The Traffic Class field, which is often referred to as the "Class" or "Priority" field, is an integral component of the IPv6 header, and its size is 8 bits.
Along with the "Flow Label" field, the Traffic Class field is designed to provide the Quality of Service (QoS) capability that is included in IPv6. It gives the sender the ability to choose a priority or differentiated services level for a packet, which indicates how the sender would want the packet to be handled by routers and other network devices along its path.
It is possible to give different priority to individual packets via the use of the Traffic Class field, which assists in the management and prioritization of network traffic according to the needs of various applications or services.
45. A support
technician uses the ping utility on a system that is online, yet no response is
received. What should be allowed through a firewall, for ping to operate
correctly?
Answers
·
ICMP
·
Echo request
·
Echo reply
· TTL
Explanation: It is necessary to enable ICMP (Internet Control Message Protocol) Echo Request and Echo Reply messages for a firewall to support proper operation of the ping tool when it is placed behind a firewall. Ping is dependent on both the source and the destination sending ICMP Echo Request messages and the destination sending ICMP Echo Reply messages back to the source.
As a result, the firewall rules should make it possible for incoming ICMP Echo Request messages to communicate with the target system, and it should also make it possible for outbound ICMP Echo Reply messages to communicate with the source system. To be more specific, the firewall has to be configured to allow traffic on ICMP Type 8 (Echo Request) and ICMP Type 0 (Echo Reply).
It is important to be aware that for reasons related to network security, some firewalls and security setups may block ICMP traffic. In such circumstances, you may need to review and maybe alter the firewall rules in order to expressly allow ICMP traffic in order to make use of the ping feature.
46. While in an
interactive nslookup session, you'd use the ______ keyword to change the DNS
server you're using.
Answers
·
Client
·
FQDN
·
DNS
· Server
Explanation: Simply replace "DNS_server" with the Internet Protocol address (IP address) or hostname of the DNS server you want to switch to. This gives you the ability to query several DNS servers in an interactive manner without requiring you to terminate the nslookup session.
47. The ability for a
protocol or program to determine that something went wrong is known as
________.
Answers
·
error detection
·
data resilience
·
redundancy
· data verification
Explanation: The ability for a protocol or program to determine that something went wrong is known as "Error Detection" or "Error Handling." Error detection techniques in protocols and programs are intended to spot irregularities, inconsistencies, or unanticipated situations while the data is being sent or processed.
These techniques may take many different forms, including as checksums, error-checking codes, acknowledgment messages, and other ways that allow for the identification of mistakes or failures in a system. After an error has been found, the proper actions or reactions may be made, such as retransmitting data, requesting retransmission, recording an error, or informing the user or the system administrator. These actions and responses can be taken after an error has been found.
48. When using the
netcat command to test a network port, which option will provide output that is
not useful for scripting, but is useful for the human eye?
Answers
·
-z
·
-v
·
-Port
· No option is required
Explanation: When testing a network port with the netcat command, the -v (verbose) option may offer output that is more easily readable by humans, but this output may not be appropriate for scripting. Using the -v option causes netcat to show more information on the connection. This information includes the connection attempt, whether or whether the connection was successful, and the data that was sent.
49. A company runs
sensitive technologies locally, while entrusting less-sensitive technologies to
a broader user base. Which cloud delivery model is being used?
Answers
·
Private
·
Community
·
Hybrid
· Public
Explanation: It is extremely probable that a "Hybrid Cloud" model is being used as the method of cloud service delivery in this instance. In order to fulfill its unique business and information technology needs, a company may implement a hybrid cloud environment by combining on-premises, private cloud, and public cloud services.
50. What is one of the
most commonly used name resolution tools?
Answers
·
Tracert
·
DNS
·
Nslookup
· Netcat
Explanation: The "nslookup" command is one
of the name resolution tools that is used by users the majority of the time.
nslookup is a command-line utility that may be used on many different operating
systems, including macOS, Linux, and Windows. It is used for the purpose of
querying Domain Name System (DNS) servers in order to get information on IP
addresses, domain names, and other DNS data.