0% found this document useful (0 votes)
158 views

Modules 5 Exam

This document contains a 20 question multiple choice exam on network fundamentals. The questions cover topics such as the OSI model, encapsulation, DHCP, TCP, UDP, IP addressing, networking commands, and port protocols.

Uploaded by

Jayz Joe
Copyright
© © All Rights Reserved
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
158 views

Modules 5 Exam

This document contains a 20 question multiple choice exam on network fundamentals. The questions cover topics such as the OSI model, encapsulation, DHCP, TCP, UDP, IP addressing, networking commands, and port protocols.

Uploaded by

Jayz Joe
Copyright
© © All Rights Reserved
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 8

Modules 5 - 10: Network Fundamentals Group Exam

1At which OSI layer is a source MAC address added to a PDU during the
encapsulation process?

 transport layer

 presentation layer

 application layer

 data link layer

2
 
Match each description to its corresponding term. (Not all options are used.)

message encoding
message sizing
message encapsulation
the process of determining when to begin sending messages on a network
the process of converting information from one format into another acceptable
for transmission
the process of placing one message format inside another message format
the process of unpacking one message format from another message format
the process of breaking up a long message into individual pieces before being
sent over the network
Navigation Bar

3What is done to an IP packet before it is transmitted over the physical medium?

 It is encapsulated into a TCP segment.

 It is encapsulated in a Layer 2 frame.

 It is segmented into smaller individual pieces.

 It is tagged with information guaranteeing reliable delivery.

4Which statement describes the ping and tracert commands?

 Tracert uses IP addresses; ping does not.

 Ping shows whether the transmission is successful; tracert does not.


 Tracert shows each hop, while ping shows a destination reply only.

 Both ping and tracert can show results in a graphical display.


 Navigation Bar

5A host PC is attempting to lease an address through DHCP. What message is sent by


the server to let the client know it is able to use the provided IP information?

 DHCPDISCOVER

 DHCPOFFER

 DHCPREQUEST

 DHCPACK

 DHCPNACK
 Navigation Bar

6What action does a DHCPv4 client take if it receives more than one DHCPOFFER
from multiple DHCP servers?

 It sends a DHCPNAK and begins the DHCP process over again.

 It discards both offers and sends a new DHCPDISCOVER.

 It accepts both DHCPOFFER messages and sends a DHCPACK.

 It sends a DHCPREQUEST that identifies which lease offer the client is accepting.

7Which protocol is a client/server file sharing protocol and also a request/response


protocol?

 SMB

 TCP

 UDP

 FTP

8What network service uses the WHOIS protocol?

 HTTPS

 DNS

 SMTP

 FTP
 Navigation Bar
 9
  
 Match each statement about FTP communications to the connection it describes. (Not all options
are used.)

 from client to server via TCP port 20


 from server to client via TCP port 21
 from server to client via TCP port 20
 used for actual file transfer
 from client to server via TCP port 21
 used for commands and replies
 first connection established
 Target
 Target
 second connection established
 Target
 Target
 Navigation Bar
10What is the result of an ARP poisoning attack?

 Client memory buffers are overwhelmed.

 Network clients are infected with a virus.

 Network clients experience a denial of service.

 Client information is stolen.

11A cybersecurity analyst believes an attacker is spoofing the MAC address of the
default gateway to perform a man-in-the-middle attack. Which command should the
analyst use to view the MAC address a host is using to reach the default gateway?

 ipconfig /all

 netstat -r

 route print

 arp -a
12What addresses are mapped by ARP?

 destination IPv4 address to the destination host name

 IPv4 address to a destination MAC address

 destination MAC address to the source IPv4 address

 destination IPv4 address to the source MAC address


13A user sends an HTTP request to a web server on a remote network. During
encapsulation for this request, what information is added to the address field of a
frame to indicate the destination?

 the MAC address of the default gateway

 the MAC address of the destination host

 the network domain of the destination host

 the IP address of the default gateway


 Navigation Bar

14An employee complains that a Windows PC cannot connect to the Internet. A


network technician issues the ipconfig command on the PC and is shown an IP
address of 169.254.10.3. Which two conclusions can be drawn? (Choose two.)

 The PC cannot contact a DHCP server.

 The DNS server address is misconfigured.

 The PC is configured to obtain an IP address automatically.

 The default gateway address is not configured.

 The enterprise network is misconfigured for dynamic routing.


 Navigation Bar

15Which value, that is contained in an IPv4 header field, is decremented by each


router that receives a packet?

 Header Length

 Differentiated Services

 Time-to-Live

 Fragment Offset
 Match each IPv4 address to the appropriate address category. (Not all options are used.)

 192.168.100.161/25
 192.168.1.191/26
 10.10.10.128/25
 224.10.0.254/24
 203.0.113.100/24
 172.110.12.64/28
 10.0.0.159/27
 host address
 10.10.10.128/25
 10.0.0.159/27
 network address
 192.168.100.161/25
 192.168.1.191/26
 broadcast address
 224.10.0.254/24
 203.0.113.100/24
 Navigation Bar
17Which field in an IPv4 packet header will typically stay the same during its
transmission?

 Destination Address

 Flag

 Packet Length

 Time-to-Live
17Which field in an IPv4 packet header will typically stay the same during its
transmission?

 Destination Address

 Flag

 Packet Length

 Time-to-Live
 18
 Option 1: DHCP. Press spacebar to enter matching mode.
 Match the application protocols to the correct transport protocols.

 DHCP
 FTP
 HTTP
 SMTP
 TFTP
 TCP
 Target
 Target
 Target
 UDP
 Target
 Target
 Navigation Bar
19How does network scanning help assess operations security?
 It can detect weak or blank passwords.

 It can detect open TCP ports on network systems.

 It can log abnormal activity.

 It can simulate attacks from malicious sources.


 20
  
 Match the characteristic to the protocol category. (Not all options are used.)

 window size
 checksum
 including IP addresses in the header
 best for VoIP
 port number
 connectionless
 3-way handshake
 TCP
 Target
 Target
 UDP
 Target
 Target
 Both UDP and TCP
 Target
 Target
 Navigation Bar
21Which two operations are provided by TCP but not by UDP? (Choose two.)

 retransmitting any unacknowledged data

 identifying the applications

 acknowledging received data

 reconstructing data in the order received

 identifying individual conversations


22A network administrator is testing network connectivity by issuing
the ping command on a router. Which symbol will be displayed to indicate that a time
expired during the wait for an ICMP echo reply message?

 .

 U

 !
 $
 Navigation Bar

23What mechanism is used by a router to prevent a received IPv4 packet from


traveling endlessly on a network?

 It checks the value of the TTL field and if it is 100, it discards the packet and sends a Destination
Unreachable message to the source host.

 It increments the value of the TTL field by 1 and if the result is 100, it discards the packet and sends a
Parameter Problem message to the source host.

 It checks the value of the TTL field and if it is 0, it discards the packet and sends a Destination
Unreachable message to the source host.

 It decrements the value of the TTL field by 1 and if the result is 0, it discards the packet and sends a
Time Exceeded message to the source host.
 Navigation Bar

24 Refer to the
exhibit. This PC is unable to communicate with the host at 172.16.0.100. What
information can be gathered from the displayed output?

 The communication fails after the default gateway.

 The target host is turned off.

 172.16.0.100 is only a single hop away.

 This PC has the wrong subnet configured on its NIC.


25What is the purpose of ICMP messages?

 to inform routers about network topology changes

 to ensure the delivery of an IP packet

 to provide feedback of IP packet transmissions

 to monitor the process of a domain name to IP address resolution

You might also like