Check answers here:
Modules 5 – 10: Network Fundamentals Group Exam (Answers)
Quiz-summary
0 of 70 questions completed
Questions:
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- 16
- 17
- 18
- 19
- 20
- 21
- 22
- 23
- 24
- 25
- 26
- 27
- 28
- 29
- 30
- 31
- 32
- 33
- 34
- 35
- 36
- 37
- 38
- 39
- 40
- 41
- 42
- 43
- 44
- 45
- 46
- 47
- 48
- 49
- 50
- 51
- 52
- 53
- 54
- 55
- 56
- 57
- 58
- 59
- 60
- 61
- 62
- 63
- 64
- 65
- 66
- 67
- 68
- 69
- 70
Information
Modules 5 - 10: Network Fundamentals Group Exam - Test online
You have already completed the quiz before. Hence you can not start it again.
Quiz is loading...
You must sign in or sign up to start the quiz.
You have to finish following quiz, to start this quiz:
Results
0 of 70 questions answered correctly
Your time:
Time has elapsed
You have reached 0 of 0 points, (0)
Average score |
|
Your score |
|
Categories
- Not categorized 0%
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- 16
- 17
- 18
- 19
- 20
- 21
- 22
- 23
- 24
- 25
- 26
- 27
- 28
- 29
- 30
- 31
- 32
- 33
- 34
- 35
- 36
- 37
- 38
- 39
- 40
- 41
- 42
- 43
- 44
- 45
- 46
- 47
- 48
- 49
- 50
- 51
- 52
- 53
- 54
- 55
- 56
- 57
- 58
- 59
- 60
- 61
- 62
- 63
- 64
- 65
- 66
- 67
- 68
- 69
- 70
- Answered
- Review
-
Question 1 of 70
1. Question
1 pointsWhen a wireless network in a small office is being set up, which type of IP addressing is typically used on the networked devices?Correct
Incorrect
-
Question 2 of 70
2. Question
1 pointsWhich two parts are components of an IPv4 address? (Choose two.)Correct
Incorrect
-
Question 3 of 70
3. Question
1 pointsMatch each IPv4 address to the appropriate address category. (Not all options are used.)Correct
Incorrect
-
Question 4 of 70
4. Question
1 pointsWhat is the full decompressed form of the IPv6 address 2001:420:59:0:1::a/64?Correct
Incorrect
-
Question 5 of 70
5. Question
1 pointsA cybersecurity analyst believes an attacker is spoofing the MAC address of the default gateway to perform a man-in-the-middle attack. Which command should the analyst use to view the MAC address a host is using to reach the default gateway?Correct
Incorrect
-
Question 6 of 70
6. Question
1 pointsA user sends an HTTP request to a web server on a remote network. During encapsulation for this request, what information is added to the address field of a frame to indicate the destination?Correct
Incorrect
-
Question 7 of 70
7. Question
1 pointsWhat addresses are mapped by ARP?Correct
Incorrect
-
Question 8 of 70
8. Question
1 pointsWhat type of information is contained in an ARP table?Correct
Incorrect
-
Question 9 of 70
9. Question
1 pointsMatch the characteristic to the protocol category. (Not all options are used.)Correct
Incorrect
-
Question 10 of 70
10. Question
1 pointsWhat type of information is contained in a DNS MX record?Correct
Incorrect
-
Question 11 of 70
11. Question
1 pointsMatch the application protocols to the correct transport protocols.Correct
Incorrect
-
Question 12 of 70
12. Question
1 pointsA PC is downloading a large file from a server. The TCP window is 1000 bytes. The server is sending the file using 100-byte segments. How many segments will the server send before it requires an acknowledgment from the PC?Correct
Incorrect
-
Question 13 of 70
13. Question
1 pointsA user issues a ping 192.168.250.103 command and receives a response that includes a code of 1 . What does this code represent?Correct
Incorrect
-
Question 14 of 70
14. Question
1 pointsWhich two commands can be used on a Windows host to display the routing table? (Choose two.)Correct
Incorrect
-
Question 15 of 70
15. Question
1 pointsA user issues a ping 2001:db8:FACE:39::10 command and receives a response that includes a code of 2 . What does this code represent?Correct
Incorrect
-
Question 16 of 70
16. Question
1 pointsWhat message informs IPv6 enabled interfaces to use stateful DHCPv6 for obtaining an IPv6 address?Correct
Incorrect
-
Question 17 of 70
17. Question
1 pointsWhat is the purpose of ICMP messages?Correct
Incorrect
-
Question 18 of 70
18. Question
1 pointsMatch the HTTP status code group to the type of message generated by the HTTP server.Correct
Incorrect
-
Question 19 of 70
19. Question
1 pointsWhat network service uses the WHOIS protocol?Correct
Incorrect
-
Question 20 of 70
20. Question
1 pointsWhat action does a DHCPv4 client take if it receives more than one DHCPOFFER from multiple DHCP servers?Correct
Incorrect
-
Question 21 of 70
21. Question
1 pointsRefer to the exhibit. From the perspective of users behind the NAT router, what type of NAT address is 209.165.201.1?Correct
Incorrect
-
Question 22 of 70
22. Question
1 pointsMatch each characteristic to the appropriate email protocol. (Not all options are used.)Correct
Incorrect
-
Question 23 of 70
23. Question
1 pointsWhat is done to an IP packet before it is transmitted over the physical medium?Correct
Incorrect
-
Question 24 of 70
24. Question
1 pointsWhich PDU is processed when a host computer is de-encapsulating a message at the transport layer of the TCP/IP model?Correct
Incorrect
-
Question 25 of 70
25. Question
1 pointsWhich networking model is being used when an author uploads one chapter document to a file server of a book publisher?Correct
Incorrect
-
Question 26 of 70
26. Question
1 pointsWhich type of transmission is used to transmit a single video stream such as a web-based video conference to a select number of users?Correct
Incorrect
-
Question 27 of 70
27. Question
1 pointsRefer to the exhibit. PC1 attempts to connect to File_server1 and sends an ARP request to obtain a destination MAC address. Which MAC address will PC1 receive in the ARP reply?Correct
Incorrect
-
Question 28 of 70
28. Question
1 pointsWhat is the result of an ARP poisoning attack?Correct
Incorrect
-
Question 29 of 70
29. Question
1 pointsWhat is the function of the HTTP GET message?Correct
Incorrect
-
Question 30 of 70
30. Question
1 pointsWhich protocol is a client/server file sharing protocol and also a request/response protocol?Correct
Incorrect
-
Question 31 of 70
31. Question
1 pointsHow is a DHCPDISCOVER transmitted on a network to reach a DHCP server?Correct
Incorrect
-
Question 32 of 70
32. Question
1 pointsWhat is a description of a DNS zone transfer?Correct
Incorrect
-
Question 33 of 70
33. Question
1 pointsWhat are the two sizes (minimum and maximum) of an Ethernet frame? (Choose two.)Correct
Incorrect
-
Question 34 of 70
34. Question
1 pointsWhich process failed if a computer cannot access the internet and received an IP address of 169.254.142.5?Correct
Incorrect
-
Question 35 of 70
35. Question
1 pointsWhich statement describes a feature of the IP protocol?Correct
Incorrect
-
Question 36 of 70
36. Question
1 pointsWhat is a basic characteristic of the IP protocol?Correct
Incorrect
-
Question 37 of 70
37. Question
1 pointsWhich statement describes the ping and tracert commands?Correct
Incorrect
-
Question 38 of 70
38. Question
1 pointsA large corporation has modified its network to allow users to access network resources from their personal laptops and smart phones. Which networking trend does this describe?Correct
Incorrect
-
Question 39 of 70
39. Question
1 pointsMatch each description to its corresponding term. (Not all options are used.)Correct
Incorrect
-
Question 40 of 70
40. Question
1 pointsWhich method would an IPv6-enabled host using SLAAC employ to learn the address of the default gateway?Correct
Incorrect
-
Question 41 of 70
41. Question
1 pointsRefer to the exhibit. This PC is unable to communicate with the host at 172.16.0.100. What information can be gathered from the displayed output?Correct
Incorrect
-
Question 42 of 70
42. Question
1 pointsA user issues a ping 192.168.250.103 command and receives a response that includes a code of 1. What does this code represent?Correct
Incorrect
-
Question 43 of 70
43. Question
1 pointsWhat are three responsibilities of the transport layer? (Choose three.)Correct
Incorrect
-
Question 44 of 70
44. Question
1 pointsHow does network scanning help assess operations security?Correct
Incorrect
-
Question 45 of 70
45. Question
1 pointsRefer to the exhibit. A network security analyst is examining captured data using Wireshark. The captured frames indicate that a host is downloading malware from a server. Which source port is used by the host to request the download?Correct
Incorrect
-
Question 46 of 70
46. Question
1 pointsWhich two operations are provided by TCP but not by UDP? (Choose two.)Correct
Incorrect
-
Question 47 of 70
47. Question
1 pointsA user is executing a tracert to a remote device. At what point would a router, which is in the path to the destination device, stop forwarding the packet?Correct
Incorrect
-
Question 48 of 70
48. Question
1 pointsA network administrator is testing network connectivity by issuing the ping command on a router. Which symbol will be displayed to indicate that a time expired during the wait for an ICMP echo reply message?Correct
Incorrect
-
Question 49 of 70
49. Question
1 pointsA technician is configuring email on a mobile device. The user wants to be able to keep the original email on the server, organize it into folders, and synchronize the folders between the mobile device and the server. Which email protocol should the technician use?Correct
Incorrect
-
Question 50 of 70
50. Question
1 pointsAt which OSI layer is a source MAC address added to a PDU during the encapsulation process?Correct
Incorrect
-
Question 51 of 70
51. Question
1 pointsWhich value, that is contained in an IPv4 header field, is decremented by each router that receives a packet?Correct
Incorrect
-
Question 52 of 70
52. Question
1 pointsWhat are three responsibilities of the transport layer? (Choose three.)Correct
Incorrect
-
Question 53 of 70
53. Question
1 pointsWhich two ICMP messages are used by both IPv4 and IPv6 protocols? (Choose two.)Correct
Incorrect
-
Question 54 of 70
54. Question
1 pointsWhat mechanism is used by a router to prevent a received IPv4 packet from traveling endlessly on a network?Correct
Incorrect
-
Question 55 of 70
55. Question
1 pointsA device has been assigned the IPv6 address of 2001:0db8:cafe:4500:1000:00d8:0058:00ab/64. Which is the host identifier of the device?Correct
Incorrect
-
Question 56 of 70
56. Question
1 pointsWhat three application layer protocols are part of the TCP/IP protocol suite? (Choose three.)Correct
Incorrect
-
Question 57 of 70
57. Question
1 pointsA computer can access devices on the same network but cannot access devices on other networks. What is the probable cause of this problem?Correct
Incorrect
-
Question 58 of 70
58. Question
1 pointsRefer to the exhibit. PC1 issues an ARP request because it needs to send a packet to PC3. In this scenario, what will happen next?Correct
Incorrect
-
Question 59 of 70
59. Question
1 pointsA user who is unable to connect to the file server contacts the help desk. The helpdesk technician asks the user to ping the IP address of the default gateway that is configured on the workstation. What is the purpose for this ping command?Correct
Incorrect
-
Question 60 of 70
60. Question
1 pointsA user gets an IP address of 192.168.0.1 from the company network administrator. A friend of the user at a different company gets the same IP address on another PC. How can two PCs use the same IP address and still reach the Internet, send and receive email, and search the web?Correct
Incorrect
-
Question 61 of 70
61. Question
1 pointsHow many host addresses are available on the 192.168.10.128/26 network?Correct
Incorrect
-
Question 62 of 70
62. Question
1 pointsWhat are the three ranges of IP addresses that are reserved for internal private use? (Choose three.)Correct
Incorrect
-
Question 63 of 70
63. Question
1 pointsRefer to the exhibit. A cybersecurity analyst is viewing captured packets forwarded on switch S1. Which device has the MAC address 50:6a:03:96:71:22?Correct
Incorrect
-
Question 64 of 70
64. Question
1 pointsA host PC is attempting to lease an address through DHCP. What message is sent by the server to let the client know it is able to use the provided IP information?Correct
Incorrect
-
Question 65 of 70
65. Question
1 pointsAn employee complains that a Windows PC cannot connect to the Internet. A network technician issues the ipconfig command on the PC and is shown an IP address of 169.254.10.3. Which two conclusions can be drawn? (Choose two.)Correct
Incorrect
-
Question 66 of 70
66. Question
1 pointsWhat is a function of the tracert command that differs from the ping command when they are used on a workstation?Correct
Incorrect
-
Question 67 of 70
67. Question
1 pointsWhich two functions or operations are performed by the MAC sublayer? (Choose two.)Correct
Incorrect
-
Question 68 of 70
68. Question
1 pointsWhich field in an IPv4 packet header will typically stay the same during its transmission?Correct
Incorrect
-
Question 69 of 70
69. Question
1 pointsMatch each statement about FTP communications to the connection it describes. (Not all options are used.)Correct
Incorrect
-
Question 70 of 70
70. Question
1 pointsWhat are the two sizes (minimum and expected maximum) of an Ethernet frame? (Choose two.)Correct
Incorrect