Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

Chapter 10 Network Naming 1. How does NetBIOS identify a computer system on the network? A. By using the Web address B. By using a

Chapter 10

Network Naming

1. How does NetBIOS identify a computer system on the network?

A. By using the Web address

B. By using a NetBIOS name

C. By using the IP address

D. By using a port number

2. Within the DNS hierarchy, which term refers to the DNS servers just below the DNS root?

A. Domain controllers

B. Top-level domain servers

C. Second-level domain server

D. WINS server

3. Which statement is true about DNS roots?

A. They handle all the name resolution tasks of the Internet.

B. They are directly below the top-level domain server.

C. They have the complete definitive name resolution table.

D. They do not know any IP addresses.

4. What term best describes the way the DNS name space is organized?

A. Hierarchical

B. Tree-like

C. Flat

D. Domain

5. Including the separating periods, what is the maximum number of characters allowed by the DNS naming convention?

A. 128

B. 80

C. 15

D. 255

6. Which term is an original top-level domain name?

A. .prt

B. .mil

C. .html

D. .biz

7. Which organization has the authority to create new top-level domain names?

A. ICANN

B. IANA

C. IEEE

D. IETF

8. What UDP port do DNS servers primarily use?

A. 53

B. 80

C. 90

D. 110

9. Which of the following is true of the names in a flat name space?

A. Names must be the same length.

B. Names must include the domain name.

C. Names must have a common part.

D. Names must be unique.

10. How many powerful DNS server clusters, scattered all over the world, does the DNS root contain?

A. 1

B. 3

C. 13

D. 23

11. Which characters are not permitted in a DNS domain or host name?

A. Spaces

B. Upper and lower case letters

C. Numbers

D. Hyphens

12. In the DNS naming convention, what character(s) separate(s) a domain name from its subdomains?

A. Forward slash (/)

B. Backward slash (\)

C. Forward double slash (//)

D. Period (.)

13. In the DNS naming convention, what is the correct sequence for writing a fully qualified domain name (FQDN)?

A. Root.domain.host

B. Host.domain.root

C. Domain.host.root

D. Domain.root.host

14. Which item is part of a fully qualified domain name (FQDN)?

A. The host name

B. The MAC address

C. The IP address

D. The segment ID

15. In comparing the DNS name space to a computers file system, a domain is like __________.

A. a single computer

B. the hard drive

C. the root directory

D. a folder

16. How is the address 127.0.0.1 listed in the hosts file?

A. loopback

B. root

C. localhost

D. gateway

17. What entry is made at the command prompt in UNIX/Linux to display DNS server information?

A. ipconfig /all

B. ipconfig /displaydns

C. ping /dns

D. cat /etc/resolv.conf

18. What company handles security for a lot of the e-commerce on the Internet and also maintains two root name server clusters?

A. Microsoft

B. VeriSign

C. ICANN

D. Ubuntu

19. What information is kept in the cached lookups folder for a DNS server?

A. The favorite list of IP addresses

B. The IP addresses and FQDNs for the computers in a domain

C. The IP addresses already resolved

D. A list of pointer records that can determine an FQDN from an IP address

20. On an authoritative DNS server, which storage areas hold the IP addresses and FQDNs for the computers in a domain?

A. Forward lookup zones

B. Cached lookups

C. DNS cache

D. SOA record

21. Which DNS server is used to talk to other DNS servers to resolve IP addresses for DNS clients?

A. Cache-only DNS server

B. DHCP server

C. WINS server

D. Authoritative server

22. Which zone files are the most important part of any DNS server?

A. Forward lookup zones

B. Replicated zones

C. Loopback zones

D. Cached zones

23. Which record type points to the authoritative name server?

A. BIND

B. SOA

C. FQDN

D. A

24. Which zone is created on other DNS servers to act as backups to the primary zone?

A. Active

B. Backup

C. Secondary

D. Reverse

25. What enables a system to determine an FQDN by knowing the IP address?

A. Reverse lookup zones

B. WINS

C. Cached lookups

D. Forward lookup zones

26. Microsoft used DNS names with the __________ protocol to provide folder and printer sharing in small TCP/IP networks.

A. SMB

B. Samba

C. NetBIOS

D. NetBT

27. DNS domains that are not on the Internet should use the top-level name __________.

A. .foreign

B. .root

C. .remote

D. .local

28. Which type of domain allows all of the domain controllers to be equal partners, such that any domain controller can take over if one domain controller fails?

A. Active Directory

B. WINS

C. NetBIOS

D. NetBEUI

29. Which protocol enables DNS servers to get automatic updates of IP addresses of computers in their forward lookup zones, mainly by talking to the local DHCP server?

A. NetBIOS over TCP/IP

B. Dynamic DNS

C. ARP

D. WINS

30. Which term refers to an authentication and authorization protocol designed to prevent bad guys from impersonating legitimate DNS servers?

A. DNSSEC

B. WINS

C. IPSec

D. Active Directory

31. Which command is used to force a DNS server to update its records?

A. ifconfig /renew

B. ipconfig /renew

C. ifconfig eth0 up

D. ipconfig /registerdns

32. Which tool is the best choice for testing DNS?

A. ping

B. ipconfig

C. tracert

D. nslookup

33. Which of the following would confirm that you have a DNS problem?

A. Ping returns a request timed out message.

B. Ping does not work with either an IP address or a Web site address.

C. Ping works with the IP address but not with the Web site name.

D. The DNS resolver cache is empty.

34. Which program, available on all operating systems, provides all types of information from a DNS server and allows you to query all types of information from a DNS server and change how your system uses DNS?

A. ipconfig

B. tracert

C. winipcfg

D. nslookup

35. If you are using NetBIOS, which command allows you to see if other local systems are visible?

A. netstat

B. net view

C. nbtstat

D. net send

--- END CHAPTER 10 ---

Chapter 11

Securing TCP/IP

1. Which term means to scramble, to mix up, and to change data in such a way so that the wrong people cannot read it, but the right people can unscramble it?

A. Authentication

B. Encryption

C. Authorization

D. Nonrepudiation

2. Which term defines what an authenticated person can do with data?

A. Auditing

B. Authentication

C. Accounting

D. Authorization

3. Which term refers to a ciphers underlying mathematical formula?

A. Algorithm

B. Encryption

C. Authentication

D. Hash

4. Which term refers to the result of running cleartext through a cipher algorithm using a key?

A. Key pair

B. Digital signature

C. Plaintext

D. Ciphertext

5. Which block cipher is used by most TCP/IP applications?

A. Rivest Cipher 4 (RC4)

B. Data Encryption Standard (DES)

C. Advanced Encryption Standard (AES)

D. Rivest Shamir Aleman (RSA)

6. Which algorithm is the oldest of the TCP/IP symmetric-key algorithms?

A. Data Encryption Standard (DES)

B. Rivest Cipher 4(RC4)

C. Advanced Encryption Standard (AES)

D. Public-key cryptography

7. Which type of encryption is the most popular form of e-mail encryption?

A. Data Encryption Standard (DES)

B. Asymmetric-key algorithm

C. Block encryption

D. Public-key cryptography

8. Which type of algorithm is used when two different keys are used in encryption?

A. Symmetric-key

B. Keyless

C. PKI

D. Asymmetric-key

9. Which layer of the OSI model is a common place for encryption using proprietary encryption devices?

A. Layer 1

B. Layer 2

C. Layer 4

D. Layer 7

10. Which term describes a mathematical function that you run on a string of binary digits of any length that results in a value of some fixed length?

A. Authentication

B. Encryption

C. Hash

D. Nonrepudiation

11. Which cryptographic hash comes in several versions?

A. MD5

B. PKI

C. SNMP

D. Secure Hash Algorithm (SHA)

12. Which term refers to a standardized type of digital signature that includes the digital signature of a third party?

A. Hash

B. Certificate

C. Encryption

D. Password

13. Which organization is the biggest player in the certificate authority market?

A. Microsoft

B. eBay

C. VeriSign

D. ICAN

14. Which authentication method is the most common authentication method for dial-up connections?

A. PPP

B. AAA

C. MS-CHAPv2

D. RADIUS

15. Which standard offers authentication, authorization, and accounting?

A. DES

B. RADIUS

C. MS-CHAP

D. Network Access Servers (NASs)

16. Which standard offers authentication, authorization, and accounting?

A. Terminal Access Control Access Control System Plus (TACACS+)

B. Data Encryption Standard (DES)

C. MS-CHAP

D. Network Access Servers (NASs)

17. Which authentication protocol is used in a TCP/IP network where many clients all connect to a single authenticating server with no point-to-point involved?

A. MS-CHAP

B. PPP

C. TACACS+

D. Kerberos

18. Which port does the Kerberos authentication protocol use?

A. 22

B. 23

C. 53

D. 88

19. What is another name for a timestamped service ticket?

A. Passcode

B. Token

C. Password

D. Smart card

20. Which technology is not a true protocol in the classic sense?

A. EAP

B. PPP

C. 802.1X

D. IPsec

21. Which authentication method is the most popular form of authentication used in wireless networks today?

A. PPP

B. EAP-PSK (Personal Shared Key)

C. EAP-TLS

D. LEAP

22. EAP is not a protocol in the classic sense, but rather, it is a PPP __________ that EAP-compliant applications can use to accept one of many types of authentication.

A. authentication rule

B. token

C. wrapper

D. ticket

23. Which port-authentication network access control standard forces devices to go through a full Authentication, Authorization, and Accounting (AAA) process to get anywhere past the interface on a gateway system?

A. EAP

B. 802.1X

C. KDC

D. RADIUS

24. Which proprietary EAP authentication is used almost exclusively by Cisco on their wireless products?

A. LEAP

B. EAP-TLS

C. EAP-MS-CHAPv2

D. EAP-PSK

25. 802.1X combines the RADIUS-style Authentication, Authorization, and Accounting (AAA) with __________ versions to make a complete authentication solution.

A. PPP

B. EAP

C. MS-CHAP

D. TLS

26. Which of the following was developed as a secure replacement for Telnet?

A. Telnet II

B. Secure Shell (SSH)

C. AES

D. IPSec

27. Which term refers an encrypted link between two programs on two separate computers?

A. PKI

B. Tunnel

C. 802.1X

D. Kerberos

28. Which of the following is an authentication and encryption protocol suite that works at the Network layer of the OSI seven-layer model?

A. IPSec

B. MS-CHAP

C. Secure Sockets Layer (SSL)

D. Transport Layer Security (TLS)

29. Which statement is true of the Transport mode of IPSec?

A. Only the actual payload of an IP packet is encrypted.

B. The entire packet, including the header, is encrypted.

C. MS-CHAP authentication occurs.

D. The EAP-TLS protocol is used.

30. What causes the most common problems with HTTPS connection?

A. PKI

B. Revoked certificates

C. Bad certificates

D. Bad URLs

31. What potential problem does a browser look for after it receives a certificate from a secure HTTP site?

A. Duplicated certificate

B. Revoked certificate

C. Deleted certificate

D. Disconnected certificate

32. Which term describes an SSH-enabled program?

A. Secure Copy Protocol (SCP)

B. Telnet

C. HTTPS

D. Kerberos

33. Which protocol offers a method for querying the state of certain network devices?

A. SFTP

B. NTP

C. SNMP

D. SCP

34. SNMP uses __________ (special client programs) to collect network information from a Management Information Base (MIB), SNMPs version of a server.

A. subroutines

B. blocks

C. bots

D. agents

35. Which protocol is the tool programs use to query and change a database used by the network?

A. LDAP

B. EAP

C. Kerberos

D. NTP

--- END CHAPTER 11 ---

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image_2

Step: 3

blur-text-image_3

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

Upgrading Oracle Databases Oracle Database New Features

Authors: Charles Kim, Gary Gordhamer, Sean Scott

1st Edition

B0BL12WFP6, 979-8359657501

More Books

Students also viewed these Databases questions