The bits and bytes of computer networking week 6 quiz answers

Verifying Connectivity

1.The protocol used to communicate network errors is known as __________.

  • TCP
  • Traceroute
  • ICMP
  • UDP

 

2. The ping utility sends what message type?

  • Destination Network Unknown
  • Echo Request
  • Echo Reply
  • Destination Network Unreachable

 

3. What is one of the tools you can use to verify connectivity to a specific port on Windows OS?

  • Test-NetConnection
  • Tracert
  • nc (netcat)
  • Ping

 

4. Traceroute uses UDP packets on which of the following operating systems? Select all that apply.

  • Windows 7
  • Windows 10
  • Mac Os
  • Linux

 

5. During a traceroute, which action does a router perform to the value in the Time To Live (TTL) field?

  • Addition
  • Multiplication
  • Division
  • Subtraction

 

6. One of Level 3's public DNS servers is ____________.

  • 8.8.8.8
  • 192.168.1.1
  • 127.0.0.1
  • 4.2.2.3

 

7. A DNS resolver tool available on all major desktop operating systems is __________.

  • Nslookup
  • Host
  • Ping
  • Tracert

 

8. Which top-level organization manages the global DNS (Domain Name System)?

  • ICANN
  • Google
  • IANA
  • RFC

 

9. Which of the following commands displays the current network configuration information?

  • Net user
  • Ipconfig
  • Winver
  • Pathping

 

10. An organization responsible for assigning individual domain names to other organizations or individuals is known as a(n) ______.

  • Government
  • Internet authority
  • DNS registrar
  • Autonomous system

 

11. A piece of software that runs and manages virtual machines is known as a __________.

  • cloud computing device
  • Hypervisor
  • virtual instance
  • cloud storage device

 

12. What is Office 365 Outlook an example of?

  • SaaS
  • PaaS
  • IaaS
  • FttH

 

13. A hybrid cloud is ________________.

  • a combination of a private cloud and a mesh network
  • a combination of a public cloud and hardware virtualization
  • a combination of a public cloud and a private cloud
  • a combination of virtual hosts and virtual guests

14. Which of the following are additional cloud services? Select all that apply.

  • Data as a Service (DaaS)
  • VPN as a Service (VPNaaS)
  • Blockchain as a Service (BaaS)
  • Python as a Service (PaaS)

15. Which cloud service provides access to things like virtual machines, containers, networks, and storage?

  • SaaS
  • FaaS
  • PaaS
  • IaaS

 

16. An IPv6 address is how many bits long?

  • 16
  • 128
  • 32
  • 64

17. What is the very first field in an IPv6 header?

  • data payload field
  • version field
  • traffic class field
  • source address field

18. Which IPv6 header field indicates how many routers can forward a packet before it's discarded?

  • hop limit field
  • next header field
  • router forward field
  • TTL

 

19. The IPv4 mapped address space within IPv6 always starts with _______ zeroes.

  • 32
  • 80
  • “128”
  • 64

 

20. For IPv6 traffic to travel on an IPv4 network, which two technologies are used? Select all that apply.

  • Datagrams
  • IPv4 Tunnels
  • Packets
  • IPv6 tunnels

 

21. A Cyclical Redundancy Check (CRC) is an example of what type of built-in protocol mechanism?

  • Error detection
  • Error recovery
  • Misconfiguration error
  • Time To Live (TTL) expiration

 

22. What does ICMP stand for?

  • Internet Control Mail Protocol
  • Internet Control Message Protocol
  • Internet Client Message Protocol
  • Interactive Control Message Protocol

 

23. The Linux and macOS program traceroute is known by a slightly different name on Windows. It's referred to as ______.

  • Ping
  • ipconfig
  • tracert
  • Tracepath

 

24. You run the Test-NetConnection command on a Windows PC while only providing a host name. As a result, what default action does the command use?

  • IMCP eEcho request
  • Network address translation
  • Name server lookup
  • Private tunnel

 

25. You need to find the Internet Protocol (IP) address for a website. Which command do you use on a Windows system?

  • Netcat
  • Ping
  • Pathping
  • Nslookup

 

26. One of Google's public DNS servers is 8.8.8.8. The other one is ______.

  • 1.2.1.1
  • 255.255.255.255
  • 8.8.4.4
  • 0.0.0.0

27. What is the name of the provision of services based around hardware virtualization?

  • Domain Name System (DNS) service model
  • Cloud computing
  • Network Address Translation (NAT)
  • Subnetting

 

28. What is The IPv6 loopback address?

  • 127.0.0.1
  • 0000:0000:0000:0000:0000:0000:0000:0000
  • 1000:0000:0000:0000:0000:0000:0000:0000
  • 0000:0000:0000:0000:0000:0000:0000:0001

29. Compress the following IP address: 9930:cafa:0000:0052:04cc:7b7a:0037:27e6.

  • 9930:cafa:0:52:4cc:7b7a:37:27e6
  • No changes, the address is already compressed.
  • 9930:cafa:0:052:4cc:7b7a:037:27e6
  • 930:cafa:00:052:04cc:7b7a:037:27e6

 

30. Which Internet Protocol (IP) v6 field is identical in purpose to the TTL field in an IPv4 header?

  • Traffic class
  • Flow label
  • Hop Limit
  • Next header

 

31. The first field of an Internet Control Message Protocol (ICMP) packet specifies the message type. Which choices represent message type examples? (Choose all that apply)

  • Destination unreachable
  • Time exceeded
  • Destination port unreachable
  • Destination network unreachable

32. Which two tools function similar to traceroute? (Choose all that apply)

  • Nslookup
  • netcat
  • Mtr
  • pathping

33. A tech uses the netcat tool on a Linux system. Of the choices, which has proper syntax?

  • nc -v 80
  • nc google.com 80
  • nc google.com -z
  • nc google.com

34. Most public Domain Name Servers (DNS) are available globally through which technology?

  • Anycast
  • Echo request
  • Time To Live (TTL) field
  • Host file

35. With virtualization, a single physical machine, called a host, can run many individual virtual instances, called ______.

  • Clients
  • Servers
  • Clouds
  • Guests

36. An Internet Protocol (IP) v6 address is how many bits in size?

  • 64
  • 32
  • 128
  • 256

37. What is one of the most commonly used name resolution tools?

  • Nslookup
  • DNS
  • Netcat

38. Internet Protocol (IP) v6 addresses are written out in which format?

  • 8 groups of 16 bits
  • 8 groups of 12 bits
  • 6 groups of 32 bits
  • 4 groups of 16 bits

39. What size is an Internet Protocol (IP) v6 payload length field?

  • 16-bit
  • 8-bit
  • 32-bit
  • 20-bit

40. What is one type of built-in protocol mechanism?

  • Error detection
  • Time to Live (TTL) expiration
  • IPv6
  • Misconfiguration error

41. Traceroute uses UDP packets by default on which of the following operating systems? (Choose all that apply)

  • Linux
  • Mac OS
  • Windows 10
  • Windows 7

42. When troubleshooting Domain Name System (DNS) problems, which helpful feature do public servers usually support?

  • Port connectivity
  • Paths between nodes
  • ICMP echo requests
  • Virtualization services

43. When shortening an Internet Protocol (IP) v6 address, which two rules are used? Select two that apply.

  • Removing all leading zeros.
  • Replace groups of ones with semicolons.
  • Removing all leading ones.
  • Replace groups of zeros with colons.

44. Which Internet Protocol (IP) v6 header field is used to determine the quality of service level for a datagram?

  • Flow label
  • Payload length
  • Next header
  • Version

45. A support technician uses the ping utility on a system that is online, yet no response is received. What should be allowed through a firewall, for ping to operate correctly?

  • ICMP
  • Echo request
  • Echo reply
  • TTL

46. While in an interactive nslookup session, you'd use the ______ keyword to change the DNS server you're using.

  • Client
  • FQDN
  • DNS
  • Server

47. The ability for a protocol or program to determine that something went wrong is known as ________.

  • error detection
  • data resilience
  • redundancy
  • data verification

48. When using the netcat command to test a network port, which option will provide output that is not useful for scripting, but is useful for the human eye?

  • -z
  • -v
  • -Port
  • No option is required

49. A company runs sensitive technologies locally, while entrusting less-sensitive technologies to a broader user base. Which cloud delivery model is being used?

  • Private
  • Community
  • Hybrid
  • Public

50. What is one of the most commonly used name resolution tools?

  • Tracert
  • DNS
  • Nslookup
  • Netcat

Leave a Reply