Ch4 Flashcards
Barney is the owner of Venture Capitals Internet Solutions. Venture’s client Riverdale Union High has many remote users, who are school students, and they regularly need access to desktops. The school wants to offer a consistent desktop experience with installed applications that the students commonly need. However, they don’t want to purchase dozens of physical computers for these students to connect to.
What should Barney do in such a scenario?
A. Barney should use VDI (Virtual Desktop Infrastructure).
B. Barney should use SSH (Secure Shell).
C. Barney should use Telnet.
D. Barney should use RDP (Remote Desktop Protocol).
A
Which of the following protocols creates a frame around the payload by adding both a header and a trailer to the payload?
ICMP
NDP
TCP
Ethernet
Ethernet
As a network engineer for Orior Telecommunications, you are programming an IPv4 header. You decide to put additional routing and timing information to the header as a result of which the header is no longer a multiple of 32 bits. Which of the following IPv4 fields will you use in such a situation?
Data
Padding
Option
Protocol
Padding
Which of the following protocols is not a terminal emulation protocol?
Remote Desktop
Telnet
TFTP
SSH
TFTP
Joffrey plans on installing a terminal emulator for a small organization so that he can control the office computers for troubleshooting issues. Joffrey is working as an intern for IVP Internet Solutions, which is an ISP. Analyze which of the following terminal emulators will be more suitable for James as he is new to his job and not well-equipped to handle complex layers of programming.
RDP
Telnet
Remote desktop gateway
SSH
RDP
Which of the following utilities would you use to display TCP/IP components and connections on a host?
tcpdump
netstat
arp
tracert
netstat
Which of the following is a collection of protocols that performs both authentication and encryption?
RDP
Telnet
VNC
SSH
SSH
Glenn Infosys has successfully managed to set up VPN tunnels between branch locations for Syndicate Bank across India, ensuring that it protects the company’s data, network, and liability. However, the top management wants Rahul, a network engineer for Glenn Infosys, to examine the network connection so that there are no bugs within the system. On inspection, he found that even though there are multiple points for connecting branch offices to the main office, certain branches have been left out. Analyze which of the following VPN protocols Rahul should use in such a situation.
L2TP
OpenVPN
mGRE
GRE
mGRE
Raqeeb is an employee working for Deloitte Corporation. He has been allowed to work from home because of the COVID-19 outbreak. You have been asked to establish a VPN so that Raqeeb can access a file server from the office while he operates from his workstation at home. It also has to be kept in mind that Raqeeb wants to stream music alongside when he does this. Which of the following VPN types will you apply so that the necessary requirements are met?
Host-to-host VPN
Site-to-site VPN
Split tunnel VPN
Full tunnel
Split tunnel VPN
You are a network engineer who is keen to develop a secure TCP/IP transmission so that you can not only add security information to the headers of the IP packets but also encrypt the entire IP package for added security. Which of the following IPsec encryptions will you apply to your program in such a scenario?
ISAKMP
ESP
AH
IKE
ESP
As a network administrator in Wright Elementary School, it is your job to monitor all the devices used by the staff and students. Which of the following commands would you employ to be able to detect, identify, and monitor devices on a network?
tcpdump
ping
netstat
nmap
nmap
You, as a network administrator, want to set up a file transfer version of SSH so that you can use a single channel to control both inbound and outbound communications. Which of the following ports will you use to carry out this operation?
Port 69
Port 20
Port 22
Port 989
Port 22
You, as a network administrator, want to set up an FTP for remote file access. You also want to add an added layer of protection so that you can encrypt both the data and control channels. Which of the following technologies will you apply in such a case?
TFTP
FTPS
RDP
SFTP
FTPS
What is a small file containing verified users’ identification information and public key known as?
Asymmetric encryption
Public-key infrastructure
Digital certificate
Key pair
Digital certificate
Which of the following utilities is also known as a packet sniffer?
traceroute
netstat
ping
tcpdump
tcpdump
Mr. Yen has been working as a network technician for Goldyear Tyres. Recently, a couple of routers were reported for hardware failure. As the organization is large, it will take a lot of time to track down and identify the malfunctioning routers. What would be the most feasible option for Mr. Yen in this situation to solve the issue?
Use Mac spoofing
Use ping to test for network connectivity
Use tracert to target a node instead of the router
Use traceroute or tracert to track down the malfunctioning routers
Use tracert to target a node instead of the router
JV Enterprises is currently using terminal emulation software to remotely control the devices for its employees. The administration however wants to build a dedicated network connection that will allow network administrators to remotely troubleshoot boot problems. Analyze which of the following options should JV consider for its needs.
In-band management
Telnet
Out-of-band management
SSH
Out-of-band management
Which of the following protocols are used to transmit IP and other kinds of messages through a tunnel?
OpenVPN
GRE
IKEv2
L2TP
GRE
Your client has hired you to extract details about the port on which the TCP/IP connections are running. You, as a network engineer, have decided to use the netstat utility for this purpose. Which of the following commands will you apply to list all current TCP connections and an all listening TCP and UDP ports?
netstat -n
netstat -f
netstat -r
netstat -a
netstat -a
Which of the following layers in an Open System Interconnection (OSI) model adds a header in front of the payload?
Layer 3
Layer 4
Layer 2
Layer 1
Layer 4
You, as a network engineer, are working on setting up a data delivery service. While creating the TCP segment for this purpose, you wish to set up a command requesting a synchronization of the sequence numbers between two nodes. Which of the following flags will you apply with a 1-bit field so that you can set this up?
SYN
URG
FIN
PSH
SYN
Computer A started a communication sequence with Computer B that has a sequencing number of 300070. Computer B accepted the request and sent an acknowledgment number of 300071. Until this point, no payload has been exchanged. So far, the sequence numbers have increased by exactly 1 in each acknowledgment. Now, Computer A sends a payload data that is 800 bits long. According to you, what will be the acknowledgment number for the return message in this case?
300870
300072
300871
300800
300871
While programming an IP packet, Kiara, a network programmer, gets to know that the packet has not reached the destination and has been sent back because the allotted TTL has expired. Now, as the device was running on an IPv6 packet, analyze which of the following protocols should Kiara opt for so that such errors do not arise in the future?
ICMP
NDP
Ethernet
ARP
NDP
You have just managed to send a fragmented IP packet across a network as the IP packets are larger than what the network allows. Which of the following bits in the flags section of an IPV4 field will you apply so that you can send a clear message across to the receiving host that there are more fragments on the way?
The first bit
The fourth bit
The second bit
The third bit
The third bit