Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

MULTIPLE CHOICE. Choose the one alternative that best completes the statement or answers the question. 1) Which of the following is a secure protocol? A)

MULTIPLE CHOICE. Choose the one alternative that best completes the statement or answers the question.

1) Which of the following is a secure protocol?

A) SIP

B) HTTPS

C) H.323

D) RTP

Answer:

2) What service allows a computer to obtain name resolution?

A) RTP

B) FTP

C) DDNS

D) DHCP

Answer:

3) Which of the following hardware devices links multiple networks and directs traffic between networks??

A) Bridge

B) Hub

C) Repeater

D) Router

Answer:

4) An attacker sends many packets to a host opening up many TCP sessions that keep the users from accessing services. What type of an attack is this?

A) Smurf attack

B) SYN attack

C) Spoof

D) Directed broadcast

Answer:

5) What is the order of the four switch states of STP?

A) Block, learn, listen, and forward

B) Listen, block, learn, and forward

C) Block, listen, learn, and forward

D) Block, listen, forward, and learn

Answer:

6) Which of the following are ports reserved by ICANN?

A) Well-known ports

B) Dynamic ports

C) Ephemeral ports

D) Internet sockets

Answer:

7) Which port is used by secure HTTP?

A) 443

B) 53

C) 143

D) 80

E) 161

Answer:

8) Which port is used by Simple Network Management Protocol?

A) 69

B) 161

C) 143

D) 53

E) 22

Answer:

9) Which port is used by Secure Shell?

A) 161

B) 20, 21

C) 110

D) 69

E) 22

Answer:

10) From the Windows Command Prompt, which netstat option is for displaying all connections including listening ports?

A) -a

B) sp tcp

C) -n

D) None of the above

Answer:

11) A TCP three-way handshake is a unique sequence of three data packets exchanged at the beginning of a TCP connection between two hosts. True or False?

A) True

B) False

Answer:

12) What is the purpose of ARP?

A) Test for connectivity

B) Request MAC address for known IP address

C) Request IP address for known MAC address

D) None of the above

Answer:

13) How does an 8 port switch learn the address of an unknown device?

A) Send the frame out ports 2-8

B) Send the frame only out of the destination port

C) Send the frame out of all 8 ports

D) Drop the frame

Answer:

14) Which routing protocols used for Internet routing?

A) EIGRP

B) OSPF

C) BGP

D) Static routes

Answer:

15) What is causing a computer to be assigned an IP address in the 169.254.0.0 network?

A) The computer uses a multihomed router as the default gateway

B) The computer has been configured to use DNS

C) The computer has been configured to use static routes

D) The computer is unable to reach the DHCP server

Answer:

16) Which of the following devices does not provide any network segmentation?

A) Switch

B) Hub

C) Router

D) Firewall

Answer:

17) What is the broadcast address for the following IP address and subnet mask combination? 192.168.10.93/25

A) 192.168.10.0

B) 192.168.10.127

C) 192.168.10.1

D) 192.168.10.126

Answer:

18) How many IP addresses can be assigned to hosts in a subnet of 255.255.255.224?

A) 30

B) 29

C) 14

D) 254

Answer:

19) Which of the following is a path vector routing protocol?

A) OSPF

B) BGP

C) RIP

D) AS

Answer:

20) Which of the following devices will narrow the broadcast domain to a single port?

A) Hub

B) Switch

C) Trunking

D) QoS

Answer:

21) You have configured switch ports using PortFast. You connect another two ports of another switch which also have all ports configured with PortFast. What is the result?

A) Duplexing Mismatch

B) Static Routing Loop

C) Broadcast Loop

D) LAN Isolation

Answer:

22) Which of the following operates at OSI layer 3?

A) 802.3

B) IPSec

C) UDP

D) MAC

Answer:

23) Which of the following is a data link address?

A) IP

B) TCP

C) UDP

D) MAC

Answer:

24) What will allow a router to translate internal (inside local) private addresses to one or more outside (inside global, usually registered) IP addresses.?

A) NAT Pool

B) NAT Overloading

C) ALG

D) MIB

Answer:

25) What helps makes TCP a reliable protocol?

A) MTU

B) Congestion Control

C) Encryption

D) Checksum

Answer:

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image_2

Step: 3

blur-text-image_3

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

Advances In Knowledge Discovery In Databases

Authors: Animesh Adhikari, Jhimli Adhikari

1st Edition

3319132121, 9783319132129

More Books

Students also viewed these Databases questions