Home
Subjects
Textbook solutions
Create
Study sets, textbooks, questions
Log in
Sign up
Upgrade to remove ads
Only $35.99/year
Network+ quiz 4
STUDY
Flashcards
Learn
Write
Spell
Test
PLAY
Match
Gravity
Terms in this set (19)
the university of Oklahoma has hired you as a network engineer, and you are required to remote into a LINUX server of the legal department building, which is located on the same block. which of the following protocols will you apply in this case?
a. VPN
b. RDP
c. SSH
d. SFTP
SSH
you are running the netstat command to list all active TCP/IP connections of the local machine. However, you now want to have access to the routes used by the network hosts to reach the particular network destinations. which of the following commands will you apply in such a situation?
a. netstat -f
b. netstat -b
c. netstat -n
d. netstat -r
netstat -r
computer a started a communication sequence with computer B that has a sequencing number of 300070. computer b accepted the request and sent an acknowledgement number of 300071. until this point, no payload has been exchanged. SO far, the sequence numbers have increased by exactly 1 in each acknowledgment. Now, Computer A sends a payload data that is 800 bits long. According to you, what will be the acknowledgement number for the return message in this case?
a. 300871
b. 300870
c. 300072
d. 300800
300871
Mr. Yen has been working as a network technician for Goldyear Tyres. recently, a couple of routers were reported for hardware failure. as the organization is large, it will take a lot of time to track down and identify the malfunctioning routers. what would be the most feasible options for Mr. Yen in this situation to solve the issue?
a. use ping to test for network connectivity
b. use traceroute or tracert to track down the malfunctioning routers
c. use mac spoofing
d. use tracert to target a node instead of the router
use tracert to target a node instead of the router
you are a network engineer who is keen to develop a secure TCP/IP transmission so that you can not only add security information to the headers of the IP packets but also encrypt the entire IP package for added security. which of the following IPsec encryptions will you apply to your program in such a scenario?
a. ISAKMP
b. AH
c. ESP
d. IKE
ESP
Meredith and Co. provides ISP services to a bulk of the corporates in the silicon valley. however, due to the recent covid outbreak, a lot of the firms have started to allow their employees to work from home. Ceratrix is one such company that wants to allow its employees to work from home; however, certain features are only available to the employees when they have access to their workstations in the organization. this basically means that they would have to command the host. what remote access method should be provided to Ceratrix to fulfill this requirement?
a. VPN
b. Terminal emulation
c. FTPS
d. Remote file access
terminal emulation
you, as a network administrator, want to setup a file transfer of ssh so that you can use a single channel to control both inbound and outbound communications. which of the following ports will you use to carry out this operation?
a. port 69
b. port 989
c. port 22
d. port 20
port 22
Barney is the owner of Venture Capitals Internet Solutions. Venture's client Riverdale Union High has many remote users, who are school students., and they regular need access to desktops. the school wants to offer a consistent desktop experience with installed applications that the students commonly need. however, they don't want to purchase dozens of physical computers for these students to connect to. what should Barney do in such a scenario?
a. Barney should use VDI ( virtual desktop infrastructure)
b. Barney should use RDP (Remote Desktop Protocol)
c. Barney should use SSH (secure shell)
d. Barney should use Telnet
should use VDI
While analyzing an intermittent error, James, an independent contractor for HKV infrastructures, finds that the destination host is constantly asking the source to retransmit the data. he finds that the bug might be related to the transport layer of the OSI. since the tcp provides reliable delivery protocols, analyze which of the following characteristics of the tcp protocol james should check to fix this error
a. source port
b. sequencing
c. checkum
d. flow control
checksum
Robert is the network administrator for JP Morgan. He made a hardware upgrade, which involved him bringing in new hard disks and NICs for the entire facility. Despite all this, he notices that the webserver is taking twice as long to respond to HTTP requests. He has an impression that the reason for this might be the traffic going into and out of each NIC. Analyze which of the following utilities should Robert use to determine the traffic going in and out of each NIC.
a. tcpdump
b. arp
c. netstat
d. traceroute
netstat
Which of the following remote access methods requires a virtual connection to remotely access resources between a client and a network?
a. remote file access
b. terminal emulator
c. remote desktop protocol
d. VPN
VPN
Which of the following protocols creates a frame around the payload by adding both a header and a trailer to the payload?
a. NDP
b. TCP
c. ethernet
d. ICMP
ethernet
You have just managed to send a fragmented IP packet across a network as the IP packets are larger than what the network allows. Which of the following bits in the flags section of IPv4 field will you apply so that you can send a clear message across to the receiving host that there are more fragments on the way?
a. the second bit
b. the third bit
c. the first bit
d. the fourth bit
the third bit
Joffrey plans on installing a terminal emulator for a small organization so that he can control the office computers for troubleshooting issues. Joffrey is working as an intern for IVP internet solutions, which is an ISP. Analyze which of the following terminal emulators will be more suitable for James as he is new to his job and not well=equipped to handle complex layers of programming
a. remote desktop gateway
b. telnet
c. rdp
d. ssh
RDP
Hiliary has been working on a pilot project for a start-up on which she has been testing the maximum bytes for the length of an IP packet. As her intended IP packets are larger than what the network allows, she has to break them up into smaller packets for transmission. Analyze and suggest which of the following fields Hilary should use in an IPv4 so that the receiving host is able to identify and reassemble the fragmented messages.
a. flags
b. version
c. fragment offset
d. identification
identification
Sets with similar terms
CompTIA Security+ Domain 1 Practice
98 terms
CompTIA Security+ Domain 1 Practice
168 terms
Chapter 6
75 terms
Other sets by this creator
jason dion section 16 networking tools and the com…
12 terms
jason dion section 15 troubleshooting
38 terms
Jason dion section 14 network management
41 terms
Jason dion section 13 networking availability
49 terms