NEWEST VERSION COMPLETE
QUESTIONS AND CORRECT
ANSWERS|ALREADY GRADED A+
How a connection is uniquely identified in a TCP/IP network? - Answers -✔✔ by the
combination of server port and IP address and client port and IP address
Which statement BEST describes the use of port numbers in TCP/IP networking? -
Answers -✔✔ Port numbers are used in conjunction with IP addresses to direct packets
to specific services or applications.
What is the purpose of a socket in the context of network communications? - Answers -
✔✔ to serve as a unique identifier for a network connection
What does TCP use to divide data from the Application layer? - Answers -✔✔
Segments
What layer of the OSI model does the Transmission Control Protocol (TCP) operate at?
- Answers -✔✔ Transport Layer
What might cause a host to send a reset (RST) segment during a TCP session? -
Answers -✔✔ the host decides to abruptly end the session.
Which TCP flag is used by both the client and server to indicate that they want to close
the connection? - Answers -✔✔ FIN
Which TCP flag is set by the client to initiate the three-way handshake? - Answers -✔✔
SYN
UDP is particularly suitable for which type of applications? - Answers -✔✔ Applications
that send small amounts of data and do not require acknowledgment
Which netstat switch is used to filter sockets by IPv4 or IPv6 addresses on Linux? -
Answers -✔✔ -4 or -6
Which command would you use to show listening and established Internet connections
(TCP and UDP) only? - Answers -✔✔ netstat -tua
Your computer is sharing information with a remote computer using the TCP/IP
protocol. Suddenly, the connection stops working and appears to hang.
, Which command can you use to check the state of ports on your computer? - Answers -
✔✔ netstat
You've recently installed a new Windows server. To ensure system time accuracy,
you've loaded an application that synchronizes the hardware clock on the server with an
external time source on the Internet. Now you must configure your network firewall to
allow time synchronization traffic through.
Which of the following ports are you MOST likely to open on the firewall? - Answers -
✔✔ 123
A network administrator is looking at packet captures from the network and trying to
isolate email traffic.
Which of the following should the network administrator include? (Select two.) -
Answers -✔✔ TCP 25
TCP 143
Which protocols and port numbers are used by DHCP? (Select two. - Answers -✔✔
TCP 67
UDP 67
What does the client do to ensure the offered IP address is not already in use? -
Answers -✔✔ Broadcasts an ARP message
You have a network with 50 workstations. You want to automatically configure the
workstations with the IP address, subnet mask, and default gateway values.
Which device should you use? - Answers -✔✔ DHCP server
What is the first step in the DHCP lease process? - Answers -✔✔ DHCPDISCOVER
Why must a DHCP server be placed in the same subnet as its clients? - Answers -✔✔
To ensure it can assign IP addresses to them
What is a scope in the context of DHCP server configuration? - Answers -✔✔ A range
of IP addresses and options configured for a single subnet
What is the significance of configuring a DHCP server with a range of IP addresses and
subnet masks? - Answers -✔✔ It enables the server to assign appropriate IP
configurations to clients within a specific subnet.
Which DHCP option specifies the IP address of the router? - Answers -✔✔ Default
gateway
What is the consequence of a long DHCP lease time? - Answers -✔✔ The DHCP
server's available pool of IP addresses is not replenished frequently