The bits and bytes of computer networking week 6 quiz answers
Verifying Connectivity
1.The protocol used to communicate network errors is known as __________.
- TCP
- Traceroute
- ICMP
- UDP
2. The ping utility sends what message type?
- Destination Network Unknown
- Echo Request
- Echo Reply
- Destination Network Unreachable
3. What is one of the tools you can use to verify connectivity to a specific port on Windows OS?
- Test-NetConnection
- Tracert
- nc (netcat)
- Ping
4. Traceroute uses UDP packets on which of the following operating systems? Select all that apply.
- Windows 7
- Windows 10
- Mac Os
- Linux
5. During a traceroute, which action does a router perform to the value in the Time To Live (TTL) field?
- Addition
- Multiplication
- Division
- Subtraction
6. One of Level 3's public DNS servers is ____________.
- 8.8.8.8
- 192.168.1.1
- 127.0.0.1
- 4.2.2.3
7. A DNS resolver tool available on all major desktop operating systems is __________.
- Nslookup
- Host
- Ping
- Tracert
8. Which top-level organization manages the global DNS (Domain Name System)?
- ICANN
- IANA
- RFC
9. Which of the following commands displays the current network configuration information?
- Net user
- Ipconfig
- Winver
- Pathping
10. An organization responsible for assigning individual domain names to other organizations or individuals is known as a(n) ______.
- Government
- Internet authority
- DNS registrar
- Autonomous system
11. A piece of software that runs and manages virtual machines is known as a __________.
- cloud computing device
- Hypervisor
- virtual instance
- cloud storage device
12. What is Office 365 Outlook an example of?
- SaaS
- PaaS
- IaaS
- FttH
13. A hybrid cloud is ________________.
- a combination of a private cloud and a mesh network
- a combination of a public cloud and hardware virtualization
- a combination of a public cloud and a private cloud
- a combination of virtual hosts and virtual guests
14. Which of the following are additional cloud services? Select all that apply.
- Data as a Service (DaaS)
- VPN as a Service (VPNaaS)
- Blockchain as a Service (BaaS)
- Python as a Service (PaaS)
15. Which cloud service provides access to things like virtual machines, containers, networks, and storage?
- SaaS
- FaaS
- PaaS
- IaaS
16. An IPv6 address is how many bits long?
- 16
- 128
- 32
- 64
17. What is the very first field in an IPv6 header?
- data payload field
- version field
- traffic class field
- source address field
18. Which IPv6 header field indicates how many routers can forward a packet before it's discarded?
- hop limit field
- next header field
- router forward field
- TTL
19. The IPv4 mapped address space within IPv6 always starts with _______ zeroes.
- 32
- 80
- “128”
- 64
20. For IPv6 traffic to travel on an IPv4 network, which two technologies are used? Select all that apply.
- Datagrams
- IPv4 Tunnels
- Packets
- IPv6 tunnels
21. A Cyclical Redundancy Check (CRC) is an example of what type of built-in protocol mechanism?
- Error detection
- Error recovery
- Misconfiguration error
- Time To Live (TTL) expiration
22. What does ICMP stand for?
- Internet Control Mail Protocol
- Internet Control Message Protocol
- Internet Client Message Protocol
- Interactive Control Message Protocol
23. The Linux and macOS program traceroute is known by a slightly different name on Windows. It's referred to as ______.
- Ping
- ipconfig
- tracert
- Tracepath
24. You run the Test-NetConnection command on a Windows PC while only providing a host name. As a result, what default action does the command use?
- IMCP eEcho request
- Network address translation
- Name server lookup
- Private tunnel
25. You need to find the Internet Protocol (IP) address for a website. Which command do you use on a Windows system?
- Netcat
- Ping
- Pathping
- Nslookup
26. One of Google's public DNS servers is 8.8.8.8. The other one is ______.
- 1.2.1.1
- 255.255.255.255
- 8.8.4.4
- 0.0.0.0
27. What is the name of the provision of services based around hardware virtualization?
- Domain Name System (DNS) service model
- Cloud computing
- Network Address Translation (NAT)
- Subnetting
28. What is The IPv6 loopback address?
- 127.0.0.1
- 0000:0000:0000:0000:0000:0000:0000:0000
- 1000:0000:0000:0000:0000:0000:0000:0000
- 0000:0000:0000:0000:0000:0000:0000:0001
29. Compress the following IP address: 9930:cafa:0000:0052:04cc:7b7a:0037:27e6.
- 9930:cafa:0:52:4cc:7b7a:37:27e6
- No changes, the address is already compressed.
- 9930:cafa:0:052:4cc:7b7a:037:27e6
- 930:cafa:00:052:04cc:7b7a:037:27e6
30. Which Internet Protocol (IP) v6 field is identical in purpose to the TTL field in an IPv4 header?
- Traffic class
- Flow label
- Hop Limit
- Next header
31. The first field of an Internet Control Message Protocol (ICMP) packet specifies the message type. Which choices represent message type examples? (Choose all that apply)
- Destination unreachable
- Time exceeded
- Destination port unreachable
- Destination network unreachable
32. Which two tools function similar to traceroute? (Choose all that apply)
- Nslookup
- netcat
- Mtr
- pathping
33. A tech uses the netcat tool on a Linux system. Of the choices, which has proper syntax?
- nc -v 80
- nc google.com 80
- nc google.com -z
- nc google.com
34. Most public Domain Name Servers (DNS) are available globally through which technology?
- Anycast
- Echo request
- Time To Live (TTL) field
- Host file
35. With virtualization, a single physical machine, called a host, can run many individual virtual instances, called ______.
- Clients
- Servers
- Clouds
Guests
36. An Internet Protocol (IP) v6 address is how many bits in size?
- 64
- 32
- 128
- 256
37. What is one of the most commonly used name resolution tools?
- Nslookup
- DNS
- Netcat
38. Internet Protocol (IP) v6 addresses are written out in which format?
- 8 groups of 16 bits
- 8 groups of 12 bits
- 6 groups of 32 bits
- 4 groups of 16 bits
39. What size is an Internet Protocol (IP) v6 payload length field?
- 16-bit
- 8-bit
- 32-bit
- 20-bit
40. What is one type of built-in protocol mechanism?
- Error detection
- Time to Live (TTL) expiration
- IPv6
- Misconfiguration error
41. Traceroute uses UDP packets by default on which of the following operating systems? (Choose all that apply)
- Linux
- Mac OS
- Windows 10
- Windows 7
42. When troubleshooting Domain Name System (DNS) problems, which helpful feature do public servers usually support?
- Port connectivity
- Paths between nodes
- ICMP echo requests
- Virtualization services
43. When shortening an Internet Protocol (IP) v6 address, which two rules are used? Select two that apply.
- Removing all leading zeros.
- Replace groups of ones with semicolons.
- Removing all leading ones.
- Replace groups of zeros with colons.
44. Which Internet Protocol (IP) v6 header field is used to determine the quality of service level for a datagram?
- Flow label
- Payload length
- Next header
- Version
45. A support technician uses the ping utility on a system that is online, yet no response is received. What should be allowed through a firewall, for ping to operate correctly?
- ICMP
- Echo request
- Echo reply
- TTL
46. While in an interactive nslookup session, you'd use the ______ keyword to change the DNS server you're using.
- Client
- FQDN
- DNS
- Server
47. The ability for a protocol or program to determine that something went wrong is known as ________.
- error detection
- data resilience
- redundancy
- data verification
48. When using the netcat command to test a network port, which option will provide output that is not useful for scripting, but is useful for the human eye?
- -z
- -v
- -Port
- No option is required
49. A company runs sensitive technologies locally, while entrusting less-sensitive technologies to a broader user base. Which cloud delivery model is being used?
- Private
- Community
- Hybrid
- Public
50. What is one of the most commonly used name resolution tools?
- Tracert
- DNS
- Nslookup
- Netcat