Скачать книгу

install 100 Windows workstations, and she is working on automating the process by configuring the workstations to use PXE boots. Each workstation therefore must obtain an IP address from a DHCP server and download a boot image file from a TFTP server. Which of the following well-known ports must Alice open on the firewall separating the workstations from the servers? (Choose all that apply.)6566676869

      206 Which of the following explanations best describes the function of a Transmission Control Protocol (TCP) or User Datagram Protocol (UDP) port number?The port number indicates to the receiver that the sender can activate a specific port only.The port number is used by both the sender and the receiver to identify the application that generated the information in the datagram.The port number is used only by the receiver, to indicate the application process running on the sender.The port number is used by both the sender and the receiver to negotiate a well-known server port for the communicating processes.

      207 What is the valid range of numbers for the ephemeral client ports used by the Transmission Control Protocol (TCP) and User Datagram Protocol (UDP)?1023 through 655341 through 102449152 through 655351024 to 49151

      208 Which of the following statements about the User Datagram Protocol (UDP) are true? (Choose all that apply.)UDP does not use packet sequencing and acknowledgments.UDP uses packet sequencing and acknowledgments.UDP is a connection-oriented protocol.UDP is a connectionless protocol.UDP has an 8-byte header.UDP has a 20-byte header.

      209 Which of the following port values are used by the File Transfer Protocol (FTP)? (Choose all that apply.)2123205369

      210 Which of the following protocols provides connectionless delivery service at the transport layer of the Open Systems Interconnection (OSI) model?TCPHTTPUDPARP

      211 What is the valid range of numbers for the well-known Transmission Control Protocol (TCP) and User Datagram Protocol (UDP) ports used by servers?1024 through 491511 through 4915149152 through 655341 through 1023

      212 Ralph is a network administrator who has just installed a new open-source email server for the users at his company. The server is configured to send and receive Internet email and create a mailbox for each user that will permanently store the user's mail on the server. Ralph next uses a protocol analyzer to examine the network traffic resulting from the new server installation. Which of the following new protocols should Ralph expect to see in his network traffic analysis? (Choose all that apply.)SNMPSMTPPOP3IMAPRIP

      213 Which of the following values could a web client use as an ephemeral port number when communicating with a web server?123801024199950134

      214 Which of the following protocols provides connection-oriented service with guaranteed delivery at the transport layer of the OSI model?TCPHTTPUDPIP

      215 Which of the following protocols is limited to use on the local subnet only?Address Resolution Protocol (ARP)Dynamic Host Configuration Protocol (DHCP)Domain Name System (DNS)Simple Mail Transfer Protocol (SMTP)

      216 Which of the following prefixes must you use in the URL you type into a web browser when the website you want to access has been secured with Transport Layer Security (TLS)?TLS://HTTPS://HTTP://HTLS://

      217 What is the difference when you specify the HTTPS:// prefix in a Uniform Resource Locator (URL) instead of HTTP://? (Choose all that apply.)The connection between the web browser and the server is encrypted.The browser uses a different port number to connect to the server.The connection uses SSL or TLS instead of HTTP.The browser uses a different IP address to connect to the server.

      218 You are a consultant installing a web server application for a client called Adatum. The domain name Adatum.com has been registered in the DNS, and the server has one public IP address, so the new website will be accessible to users on the Internet. You want to be able to access the web server application's administrative site from your remote office, so you configure that site to be encrypted and to use the port number 12354 instead of the default. Which of the following URLs will you have to use to access the administrative website?http://www.adatum.comhttp://www.adatum.com:12354https://www.adatum.com:80https://www.adatum.com:12354

      219 Which of the following protocols does IPsec use to digitally encrypt packets before transmitting them over the network?ESPSSLAHMSCHAP

      220 Which of the following are the protocols that IPsec uses to secure network traffic? (Choose all that apply.)SSHAHESPSSL

      221 What is the primary shortcoming of the File Transfer Protocol (FTP) that is addressed by FTPS and SFTP?Lack of securitySlow file transfersFile size limitationsLack of authentication

      222 Which of the following File Transfer Protocol (FTP) variants transmit authentication passwords over the network in clear text?FTPFTPSSFTPTFTP

      223 Which of the following File Transfer Protocol (FTP) variants is typically used to download boot image files during Preboot Execution Environment (PXE) startup sequences?FTPFTPSSFTPTFTP

      224 Which of the following protocols does IPsec use to digitally sign packets before transmitting them over the network?ESPSSLAHMSCHAP

      225 Which of the following security protocols used to protect traffic exchanged by web browsers and servers was created first?SSLTLSSSHDTLS

      226 Which of the following security protocols for web servers or browsers was deprecated in 2015 in favor of Transport Layer Security (TLS) and Datagram Transport Layer Security (DTLS)?SSHSSLRDPIPsec

      227 In which of the following DNS transactions does the querying system generate a recursive query? (Choose all that apply.)A DNS client sends the server name www.adatum.com from a URL to its designated DNS server for resolution.A client's DNS server sends a request to a root domain server to find the authoritative server for the com top-level domain.A client's DNS server sends a request to the com top-level domain server to find the authoritative server for the adatum.com domain.A client's DNS server, which has been configured to function as a forwarder, sends the server name www.adatum.com from a URL to its ISP's DNS server for resolution.A client's DNS server sends a request to the adatum.com domain server to find the IP address associated with the server name www.

      228 Which of the following devices would you most likely configure to function as a Dynamic Host Configuration Protocol (DHCP) server?A wireless routerAn unmanaged switchA hubA bridge

      229 Which of the following protocols are responsible for assigning IP addresses to hosts? (Choose all that apply.)Dynamic Host Configuration Protocol (DHCP)Address Resolution Protocol (ARP)Domain Name System (DNS)File Transfer Protocol (FTP)Bootstrap Protocol (BOOTP)

      230 Which of the following Domain Name System (DNS) resource records is used only for reverse name resolution?MXAAAACNAMEPTR

      231 Which of the following features is supported by DHCP, but not by BOOTP and RARP?Dynamic address allocationRelay agentsManual address allocationAutomatic address allocation

      232 Which of the following message types are exchanged by Dynamic Host Configuration Protocol (DHCP) clients and servers during a successful IP address allocation transaction? (Choose all that apply.)DHCPDISCOVERDHCPOFFERDHCPINFORMDHCPACKDHCPREQUESTDHCPNAKDHCPRENEWDHCPRELEASE

      233 Which of the following message types are exchanged by Dynamic Host Configuration Protocol (DHCP) clients and servers during a successful IP address lease renewal transaction? (Choose all that apply.)DHCPDISCOVERDHCPOFFERDHCPINFORMDHCPACKDHCPREQUESTDHCPNAKDHCPRENEWDHCPRELEASE

      234 Which of the following is not a protocol used to allocate IP address assignments to clients on a network?ARPRARPBOOTPDHCP

      235 Which of the following best describes what happens when a DNS server receives an iterative name resolution query?The DNS server responds immediately to the query with the best information it has in its resource records or in its cache, or failing

Скачать книгу