Academic Integrity: tutoring, explanations, and feedback — we don’t complete graded work or submit on a student’s behalf.

2.) Your workstation is having a TCP conversation with another node across TCP p

ID: 3780010 • Letter: 2

Question

2.) Your workstation is having a TCP conversation with another node across TCP port 80. Your machine receives a TCP segment with the header checksum 0x5149. Your machine calculates the checksum for that segment as 0x6372. What will your workstation do to the TCP segment?

Nothing.

The workstation will reset the TCP connection.

The segment will be discarded.

Your machine will drop the connection to the opposite server and not reestablish communication with it.

Which protocol is used by ping and tracert?

ICMP

IGMP

IMAP

HTTP

DNS

A device which forwards frames based on MAC addresses is called:

Router

Framer

Firewall

Application gateway

Switch

5.) Convert the CIDR notation /26 to dotted decimal notation?

255.255.255.0

255.255.255.128

255.255.255.192

255.255.254.0

255.255.255.224

6.) What type of DNS record is used to specify mail servers?

CNAME

Mail slots

AAAA

A

MX

mail exchange record

7.) What routing protocol would be used by an organization to connect to an ISP?

BGP

OSPF

IGMP

RIP

EIGRP

8.) What is the maximum number of hosts on the 192.168.50.0 255.255.255.252 network?

2

4

254

12

9.) RIP uses what as its metric?

MTU

Delay

Load

Cost

Bandwidth

Hops

10.) In order to communicate with other nodes, workstations need IP addresses. An automated method of assigning IP addresses to workstations is called:

POST

ARP

RARP

DHCP

DNS

11.) You have been tasked with finding a subnet mask large enough to accommodate an address space of 1000 addresses as efficiently as possible. What subnet mask do you use?

255.255.248.0

255.255.255.0

255.0.0.0

255.255.252.0

255.255.0.0

12.) A customer has called in complaining about not being able to connect to network resources on their workstation. You ask for their workstation’s hostname and try to ping it. Your pings are unsuccessful. You instruct the customer on how to find their IP address and they report it as 169.254.36.237. What issue is affecting the customer at this time?

They are not connected to the network.

They are connected to the network, but their workstation hasn’t picked up an IP address from the network’s DHCP server.

Their firewall is misconfigured to block DNS messages.

The NIC driver needs to be updated.

13.) What is the address range for a private Class A network?

8.0.0.0-8.255.255.255

192.168.0.0-192.168.255.255

172.15.0.0-172.32.255.255

10.0.0.0-10.255.255.255

Question 15 of 40
TCP is noted for which of the following: (Select all that apply)

Flow control

Connectionless communication

Connection-oriented communication

Error notification

Reliable delivery

Question 16 of 40
Why do nodes need to use ARP to communicate effectively?

ARP enables a workstation to receive IP address, subnet mask, and default gateway information automatically from a central server

ARP resolves host names to IP addresses

ARP resolves host names to MAC addresses

ARP resolves IP addresses to MAC addresses

Question 17 of 40
Which network services listed use UDP? (Select all that apply)

SMTP

SNMP

HTTPS

Network Time Protocol

DNS

Question 18 of 40
Why do nodes need to use DNS to communicate effectively?

DNS resolves host names, or fully qualified domain names, to IP addresses

DNS resolves NetBIOS names to MAC addresses

DNS resolves host names to MAC addresses

DNS enables a workstation to receive IP address, subnet mask, and default gateway information automatically from a central server

Question 19 of 40
Convert hexadecimal number FF to decimal:

128

127

255

256

512

Question 21 of 40
What is the default subnet mask for a Class A network?

255.0.0.0

255.255.0.0

255.255.255.0

255.240.0.0

Question 22 of 40
What is the protocol data unit called for layer 3 in the OSI model?

Frame

Packet

Bit

Segment

Question 23 of 40
You are assisting an application developer with filling out a load balancing request. The developer wants all http requests to be forwarded to the default https port. How would you advise the developer to fill out the request?

The load balancer should listen on tcp port 443 and forward to tcp port 80

The load balancer should listen on tcp port 80 and forward to tcp port 445

The load balancer should listen on tcp port 80 and forward to tcp port 443

The load balancer should listen on tcp port 80 and forward to tcp port 80

The load balancer should listen on udp port 80 and forward to a dynamic udp port

Question 24 of 40
Which of the following are legitimate subnet masks? (Select all that apply)

225.0.0.0

255.255.242.0

255.255.255.252

255.240.0.255

255.128.0.0

Question 25 of 40
What type of record is used for DNS reverse lookup?

A

AAAA

MX

SOA

PTR

SRV

What command(s) would be used to send a continuous stream of packets to a target IP address? (Select all that apply)

ping -t

ping -l

ping -6 -t

netstat -a

ping localhost

netstat –ano

Question 27 of 40
A customer has returned from a business trip and cannot connect to your company’s network. What command(s) would you most likely run to correct this lack of connectivity? (Select all that apply)

ping 127.0.0.1

ipconfig/release

ipconfig/flushdns

nbstat -RR

ipconfig/renew

netstat -apo

Question 28 of 40
In order to communicate on a switched network, a workstation must resolve IP addresses to MAC addresses. The protocol that is used for this is:

ARP

ICMP

DHCP

DNS

HTTP

Question 29 of 40
Convert the binary number 01101101 to decimal

111

127

108

109

Question 30 of 40
Your organization is migrating to a new email server and you are assisting an engineer with the firewall rules needed for the new infrastructure. What port needs to be open for the new email server to communicate with the outside world?

UDP 110

TCP 443

UDP 143

TCP 25

Question 31 of 40                                                                                                                                                          What is the purpose of a subnet mask?

The subnet mask allows a workstation to know which part of the MAC address is the network portion and which part is the host portion

The subnet mask filters incoming packets according to a configured policy

The subnet mask divides the IP address into a network portion and a host portion

The subnet mask allows the workstation to know which part of the MAC address is the OUI and the Device ID

Question 33 of 40
RIP is an example of what kind of routing protocol?

Path vector

Static routing

Link-state

Distance vector

Strict source

Question 34 of 40
Convert 210 to binary notation

01111111

10000000

11010010

11100010

Question 35 of 40
Your colleague is having trouble converting CIDR notation to regular decimal format. He has been tasked to find the decimal format subnet mask for a /23 network. What do you tell him?

255.255.255.0

255.255.255.128

255.255.0.0

255.255.254.0

255.255.128.0

Question 37 of 40
What is the last assignable address on the 192.168.50.0 255.255.255.248 network?

192.168.50.7

192.168.50.6

192.168.50.254

192.168.50.8

192.168.50.9

Question 38 of 40
What type of DNS record is used to specify an alias?

CNAME

A

AAAA

Alias

PTR

Question 39 of 40
OSPF is an example of what kind of routing protocol?

Distance vector

Static routing

Link-state

Path vector

Loose source

Question 40 of 40
OSPF uses what as its metric?

Hops

MTU

Delay

Cost

Clicks

Explanation / Answer

Answer

(3)Which protocol is used by ping and tracert?

HTTP

(4) A device which forwards frames based on MAC addresses is called:

Firewall

(5) 255.255.255.0

(6) Mail slots

(7) IGMP

(8) 2

(9) Hops

(10) DHCP

(11) 255.255.0.0

(12) Their firewall is misconfigured to block DNS messages.

(13) Flow control

(14) ARP resolves host names to IP addresses

(17) SMTP

(19) 255

(21) 255.0.0.0

(22) Packet

(24) 225.0.0.0

(25) PTR

(29) 109

(34) 11010010

(39) Link-state

(40) Cost