Deck 3: Addressing on Networks

Full screen (f)
exit full mode
Question
 What is by far the most popular DNS server software available?

A) Microsoft DNS
B) Dnsmasq
C) Oracle Resolver
D) BIND
Use Space or
up arrow
down arrow
to flip the card.
Question
 A hexadecimal number is a number written in the base 16 number system.
Question
 When using IPv6, two or more nodes on the same link are said to be neighbors.
Question
 On a Linux-based system, what command can be used to display TCP/IP information associated with every interface on the system?

A) ipconfig /all
B) ifconfig -a
C) ip show
D) if status
Question
 Which of the following protocols is used as a signaling protocol for the initial connection between hosts, but does not participate in data transfer during the session?

A) NTP
B) LDAP
C) TFTP
D) SIP
Question
 UDP port 123 is utilized by the Network Time Protocol service.
Question
 An IPv6 address consists of 128 bits that are written as 10 blocks of hexadecimal numbers separated by colons.
Question
 What text editor can be used on Linux to view and edit the contents of a configuration file?

A) Notepad
B) Microsoft Word
C) vim
D) edit
Question
 Each organization that provides host services on the public Internet is responsible for providing and maintaining DNS authoritative servers for public access.
Question
 At the Transport layer of the OSI, what is used to find and communicate with a particular application running on a host?

A) IP addresses
B) port numbers
C) domain names
D) MAC addresses
Question
 Which of the following IP addresses would be a loopback IP address?

A) 169.254.0.1
B) 192.168.1.1
C) 224.0.0.1
D) 127.0.0.1
Question
 At the root level of the DNS hierarchical structure, 13 clusters of root servers hold information used to locate TLD servers.
Question
 How can you determine the manufacturer of a NIC card based on the MAC address?

A) The first 24 bits, known as the Organizationally Unique Identifier, identify the manufacturer.
B) The last 24 bits, known as the Organizationally Unique Identifier, identify the manufacturer.
C) The middle 24 bits, known as the Organization Universal Identifier, identify the manufacturer.
D) The first 12 bits and last 12 bits combined are known as the Organizationally Unique Identifier.
Question
 Which of the following IPv6 addresses represents a global unicast address?

A) FE80::10
B) 2000::/3
C) FC00::/7
D) FD00::/8
Question
 ICANN is responsible for restrictions on use of the .com, .org, and .net TLDs.
Question
 The FTP protocol utilizes UDP, while TFTP uses TCP for data transmission.
Question
 With a FQDN of ftp1.dallas.mycompany.com, what part is the domain name?

A) ftp1
B) ftp1.dallas
C) ftp1.dallas.mycompany.
D) mycompany.com
Question
 What command can you utilize to display TCP/IP configuration information for each network adapter installed?

A) ipconfig /show
B) ipconfig /list
C) ipconfig /all
D) ipconfig /full
Question
 The 1024 - 65535 range of ports is also known as the "well-known" range.
Question
 DNS follows a centralized database model, allowing for easier management of DNS records.
Question
 In a DNS zone, what type of record holds the name-to-address mapping for IPv6 addresses?

A) A record
B) AAAA record
C) PTR record
D) TXT record
Question
 You are setting up a DNS zone and have been asked to create SPF and DKIM records. What type of DNS record will hold this information?

A) SRV record
B) CNAME record
C) TXT record
D) PTR record
Question
 What command can be used to check a domain computer's time source from a Command Prompt window?

A) date /source
B) w32tm /query /source
C) ntpd show source
D) time --source
Question
 You are troubleshooting a network issue on a client computer and discover that the network card has an IP address of 169.254.196.200. What does this mean?

A) The computer has been assigned a routed public IP address.
B) The network card has been erroneously assigned a loopback address.
C) The computer is configured to use DHCP, but was unable to lease an address.
D) The network card is set up for multicast communication.
Question
 What does the MX record do in a forward DNS zone?

A) It identifies the hostname and port of a computer that hosts a specific network service, such as FTP or SIP.
B) It identifies the authoritative name server for a domain.
C) It identifies the e-mail server to be used for e-mail traffic for the domain.
D) It holds the alternative names for a host.
Question
 Which of the following is NOT a range of IP addresses recommended for use in private networks?

A) 10.0.0.0 through 10.255.255.255
B) 172.16.0.0 through 172.31.255.255
C) 192.168.0.0 through 192.168.255.255
D) 127.0.0.0 through 127.255.255.255
Question
 How do routers create a broadcast domain boundary?

A) They forward broadcasts only to necessary segments.
B) They listen to and direct broadcast traffic.
C) They only forward broadcasts that are intended for multiple subnets.
D) They do not forward broadcast traffic.
Question
 What is the ARPA domain suffix utilized for?

A) It is a specialized government restricted TLD.
B) It is used to announce records for other TLDs such as .com and .net.
C) It is a private TLD used for synchronization of zones between servers.
D) It is used for reverse DNS queries, and holds PTR records.
Question
 What statement regarding the Server Message Block protocol is accurate?

A) It is a simple protocol used to synchronize block messages written to iSCSI drives on a network.
B) It is used by Windows and UNIX-based operating systems to share files.
C) It is a signaling protocol used to make a connection between hosts prior to data transfer.
D) It is a protocol used for accessing network-based LDAP directories.
Question
 If a host's IPv6 address contains the network adapter's MAC address within the last 64 bits of the IPv6 address, what standard is being used?

A) EUI-64
B) IEEE 802.36
C) UUID-128
D) MACin6
Question
 Your supervisor has asked you to configure a new prototype network with a dual stack configuration. What does this mean?

A) Two different IPv4 address spaces will exist on the same network segment.
B) Both IPv4 and IPv6 protocols will be used on the network.
C) The router serving the network will have a redundant spare.
D) The network will exist on two separate segments, separated by a proxy.
Question
 You are troubleshooting a DNS issue on a Linux system, and need to test the resolution of your domain mycompany.com MX record using Google's DNS server with the IP address of 8.8.8.8. What dig command will accomplish this?

A) dig --server 8.8.8.8 --type=mx mycompany.com
B) dig -s 8.8.8.8 -t mx mycompany.com
C) dig query 8.8.8.8 domain mycompany.com type mx
D) dig @8.8.8.8 mycompany.com MX
Question
 In the classful addressing scheme, what range of network addresses is considered a Class B?

A) 1.x.y.z to 126.x.y.z
B) 128.0.x.y to 191.255.x.y
C) 192.0.0.x to 223.255.255.x
D) 224.x.y.z to 255.x.y.z
Question
 In the DNS hierarchy, where is information about how to find the top-level domain servers held?

A) In the hosts file on the local machine.
B) On the DNS root servers.
C) On DNS caching-only servers.
D) In the organization's forward lookup zone.
Question
 When using DHCP for IPv6 (i.e. DHCPv6), what port do clients receive responses on?

A) port 67
B) port 68
C) port 546
D) port 547
Question
 Encrypted control of remote computers using the RDP protocol is accomplished using what port number?

A) TCP 22
B) UDP 161
C) TCP 3389
D) UDP 10000
Question
 What part of a MAC address serves as the extension identifier, or device ID?

A) The first 24 bits of the MAC address.
B) The last 24 bits of the MAC address.
C) The first 12 bits of the MAC address.
D) The last 12 bits of the MAC address.
Question
 What type of IPv6 address is fe80::8cf1:2c42:ffde:da1c?

A) global address
B) link local address
C) multicast address
D) anycast address
Question
 What utility is used to verify that TCP/IP installed, bound to the NIC, configured correctly, and communicating with the network?

A) traceroute
B) ifconfig
C) ping
D) route
Question
 A Windows computer on your network is having issues resolving queries for a specific domain, but not other domains. Other computers on the same network resolve the name just fine. What command can you issue that might fix the problem?

A) ipconfig /renew
B) ipconfig /release
C) ipconfig /flushdns
D) ipconfig /refresh
Question
 How might an organization configure a DNS server for use on their network?
Question
 What are the two different types of DNS requests?
Question
 Why are the Class D and Class E IPv4 address ranges not available for general use?
Question
 What is a subnet mask, and how is it used?
Question
 What is the difference between a port and a socket?
Question
 IPv6 has two different types of unicast addresses. How do these two types differ from each other?
Question
 What are the three different types of port number ranges as defined by IANA?
Question
 What are the two different variations of network address translation (NAT)?
Question
 How is an IPv6 address written and displayed?
Question
 What is the difference between unicast, multicast, and anycast addresses?
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/50
auto play flashcards
Play
simple tutorial
Full screen (f)
exit full mode
Deck 3: Addressing on Networks
1
 What is by far the most popular DNS server software available?

A) Microsoft DNS
B) Dnsmasq
C) Oracle Resolver
D) BIND
D
2
 A hexadecimal number is a number written in the base 16 number system.
True
3
 When using IPv6, two or more nodes on the same link are said to be neighbors.
True
4
 On a Linux-based system, what command can be used to display TCP/IP information associated with every interface on the system?

A) ipconfig /all
B) ifconfig -a
C) ip show
D) if status
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
5
 Which of the following protocols is used as a signaling protocol for the initial connection between hosts, but does not participate in data transfer during the session?

A) NTP
B) LDAP
C) TFTP
D) SIP
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
6
 UDP port 123 is utilized by the Network Time Protocol service.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
7
 An IPv6 address consists of 128 bits that are written as 10 blocks of hexadecimal numbers separated by colons.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
8
 What text editor can be used on Linux to view and edit the contents of a configuration file?

A) Notepad
B) Microsoft Word
C) vim
D) edit
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
9
 Each organization that provides host services on the public Internet is responsible for providing and maintaining DNS authoritative servers for public access.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
10
 At the Transport layer of the OSI, what is used to find and communicate with a particular application running on a host?

A) IP addresses
B) port numbers
C) domain names
D) MAC addresses
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
11
 Which of the following IP addresses would be a loopback IP address?

A) 169.254.0.1
B) 192.168.1.1
C) 224.0.0.1
D) 127.0.0.1
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
12
 At the root level of the DNS hierarchical structure, 13 clusters of root servers hold information used to locate TLD servers.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
13
 How can you determine the manufacturer of a NIC card based on the MAC address?

A) The first 24 bits, known as the Organizationally Unique Identifier, identify the manufacturer.
B) The last 24 bits, known as the Organizationally Unique Identifier, identify the manufacturer.
C) The middle 24 bits, known as the Organization Universal Identifier, identify the manufacturer.
D) The first 12 bits and last 12 bits combined are known as the Organizationally Unique Identifier.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
14
 Which of the following IPv6 addresses represents a global unicast address?

A) FE80::10
B) 2000::/3
C) FC00::/7
D) FD00::/8
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
15
 ICANN is responsible for restrictions on use of the .com, .org, and .net TLDs.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
16
 The FTP protocol utilizes UDP, while TFTP uses TCP for data transmission.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
17
 With a FQDN of ftp1.dallas.mycompany.com, what part is the domain name?

A) ftp1
B) ftp1.dallas
C) ftp1.dallas.mycompany.
D) mycompany.com
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
18
 What command can you utilize to display TCP/IP configuration information for each network adapter installed?

A) ipconfig /show
B) ipconfig /list
C) ipconfig /all
D) ipconfig /full
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
19
 The 1024 - 65535 range of ports is also known as the "well-known" range.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
20
 DNS follows a centralized database model, allowing for easier management of DNS records.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
21
 In a DNS zone, what type of record holds the name-to-address mapping for IPv6 addresses?

A) A record
B) AAAA record
C) PTR record
D) TXT record
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
22
 You are setting up a DNS zone and have been asked to create SPF and DKIM records. What type of DNS record will hold this information?

A) SRV record
B) CNAME record
C) TXT record
D) PTR record
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
23
 What command can be used to check a domain computer's time source from a Command Prompt window?

A) date /source
B) w32tm /query /source
C) ntpd show source
D) time --source
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
24
 You are troubleshooting a network issue on a client computer and discover that the network card has an IP address of 169.254.196.200. What does this mean?

A) The computer has been assigned a routed public IP address.
B) The network card has been erroneously assigned a loopback address.
C) The computer is configured to use DHCP, but was unable to lease an address.
D) The network card is set up for multicast communication.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
25
 What does the MX record do in a forward DNS zone?

A) It identifies the hostname and port of a computer that hosts a specific network service, such as FTP or SIP.
B) It identifies the authoritative name server for a domain.
C) It identifies the e-mail server to be used for e-mail traffic for the domain.
D) It holds the alternative names for a host.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
26
 Which of the following is NOT a range of IP addresses recommended for use in private networks?

A) 10.0.0.0 through 10.255.255.255
B) 172.16.0.0 through 172.31.255.255
C) 192.168.0.0 through 192.168.255.255
D) 127.0.0.0 through 127.255.255.255
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
27
 How do routers create a broadcast domain boundary?

A) They forward broadcasts only to necessary segments.
B) They listen to and direct broadcast traffic.
C) They only forward broadcasts that are intended for multiple subnets.
D) They do not forward broadcast traffic.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
28
 What is the ARPA domain suffix utilized for?

A) It is a specialized government restricted TLD.
B) It is used to announce records for other TLDs such as .com and .net.
C) It is a private TLD used for synchronization of zones between servers.
D) It is used for reverse DNS queries, and holds PTR records.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
29
 What statement regarding the Server Message Block protocol is accurate?

A) It is a simple protocol used to synchronize block messages written to iSCSI drives on a network.
B) It is used by Windows and UNIX-based operating systems to share files.
C) It is a signaling protocol used to make a connection between hosts prior to data transfer.
D) It is a protocol used for accessing network-based LDAP directories.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
30
 If a host's IPv6 address contains the network adapter's MAC address within the last 64 bits of the IPv6 address, what standard is being used?

A) EUI-64
B) IEEE 802.36
C) UUID-128
D) MACin6
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
31
 Your supervisor has asked you to configure a new prototype network with a dual stack configuration. What does this mean?

A) Two different IPv4 address spaces will exist on the same network segment.
B) Both IPv4 and IPv6 protocols will be used on the network.
C) The router serving the network will have a redundant spare.
D) The network will exist on two separate segments, separated by a proxy.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
32
 You are troubleshooting a DNS issue on a Linux system, and need to test the resolution of your domain mycompany.com MX record using Google's DNS server with the IP address of 8.8.8.8. What dig command will accomplish this?

A) dig --server 8.8.8.8 --type=mx mycompany.com
B) dig -s 8.8.8.8 -t mx mycompany.com
C) dig query 8.8.8.8 domain mycompany.com type mx
D) dig @8.8.8.8 mycompany.com MX
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
33
 In the classful addressing scheme, what range of network addresses is considered a Class B?

A) 1.x.y.z to 126.x.y.z
B) 128.0.x.y to 191.255.x.y
C) 192.0.0.x to 223.255.255.x
D) 224.x.y.z to 255.x.y.z
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
34
 In the DNS hierarchy, where is information about how to find the top-level domain servers held?

A) In the hosts file on the local machine.
B) On the DNS root servers.
C) On DNS caching-only servers.
D) In the organization's forward lookup zone.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
35
 When using DHCP for IPv6 (i.e. DHCPv6), what port do clients receive responses on?

A) port 67
B) port 68
C) port 546
D) port 547
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
36
 Encrypted control of remote computers using the RDP protocol is accomplished using what port number?

A) TCP 22
B) UDP 161
C) TCP 3389
D) UDP 10000
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
37
 What part of a MAC address serves as the extension identifier, or device ID?

A) The first 24 bits of the MAC address.
B) The last 24 bits of the MAC address.
C) The first 12 bits of the MAC address.
D) The last 12 bits of the MAC address.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
38
 What type of IPv6 address is fe80::8cf1:2c42:ffde:da1c?

A) global address
B) link local address
C) multicast address
D) anycast address
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
39
 What utility is used to verify that TCP/IP installed, bound to the NIC, configured correctly, and communicating with the network?

A) traceroute
B) ifconfig
C) ping
D) route
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
40
 A Windows computer on your network is having issues resolving queries for a specific domain, but not other domains. Other computers on the same network resolve the name just fine. What command can you issue that might fix the problem?

A) ipconfig /renew
B) ipconfig /release
C) ipconfig /flushdns
D) ipconfig /refresh
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
41
 How might an organization configure a DNS server for use on their network?
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
42
 What are the two different types of DNS requests?
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
43
 Why are the Class D and Class E IPv4 address ranges not available for general use?
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
44
 What is a subnet mask, and how is it used?
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
45
 What is the difference between a port and a socket?
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
46
 IPv6 has two different types of unicast addresses. How do these two types differ from each other?
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
47
 What are the three different types of port number ranges as defined by IANA?
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
48
 What are the two different variations of network address translation (NAT)?
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
49
 How is an IPv6 address written and displayed?
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
50
 What is the difference between unicast, multicast, and anycast addresses?
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
locked card icon
Unlock Deck
Unlock for access to all 50 flashcards in this deck.