1. What transport layer protocol does DNS normally use?
Answers
· UDP
· ICMP
· IP
· TCP
Explanation: The User Datagram Protocol, sometimes known as UDP, is the protocol that the Domain Name System (DNS) commonly employs for its transport layer. DNS queries and replies are typically sent via the User Datagram Protocol (UDP), but the protocol may convert to utilizing the Transmission Control Protocol (TCP) if the data from the response is too vast to fit in a single packet.
2. A DNS TTL determines what?
Answers
· How many DNS resolutions can take place before the IP has to change.
· How long a DNS entry is allowed to be cached.
· How many steps there are in the resolution process.
· How far away a DNS can be from you.
Explanation: The length of time that a DNS record is regarded to be valid by caching DNS resolvers and other devices is determined by the DNS TTL, which stands for "Time to Live." The duration is measured in seconds. When a DNS resolver sends a query to a domain and gets a response that includes a TTL, the resolver will keep the information for the amount of time that was given. Once the TTL has run its course, the resolver will toss out the information and, if necessary, re-query the DNS server to get the most recent version of the data. TTL is used to make caching more efficient and to guarantee that DNS records are not cached for an unlimited period of time. This frees up the DNS system to enable for changes and updates to propagate across the system.
3. How many root servers are there?
Answers
· 16
· 13
· 17
· 8
Explanation: There are thirteen root DNS servers spread around the globe, as per my most recent information update in January of 2022. These servers are fragmented over a wide range of geographic areas and are administered by a variety of organizations. They are very important to the operation of the Domain Name System (DNS) since they provide the entry points that are used to initiate the resolution of DNS queries. It is important to keep in mind that the number of root servers may shift over time as a result of the influence of a variety of circumstances; hence, it is recommended that you consult more current sources in order to get the most up-to-date information.
4. Which of the following are benefits of using Domain Name Resolution (DNS)?
Answers
· Allows administrative changes to happen seamlessly.
· Easy for the node to find the network ID.
· Small routing tables.
· Easier for humans to remember website names.
5. The process of using DNS to turn a domain name into an IP address is known as_________.
Answers
· ARP table lookup
· IP addresses
· DNS server
· name resolution
Explanation: The act of converting a domain name into an IP address by utilizing the Domain Name System (DNS) is referred to as "domain name resolution" or "DNS resolution." It requires converting a domain name that is readable by humans, such as "www.example.com," into the associated numerical IP address that is used by the computer network to identify and find the website or resource in question. Resolution of DNS queries is one of the most important features of the Domain Name System (DNS), and it is absolutely necessary for the efficient operation of the internet.
6. An A Record contains what?
Answers
· An SOA
· An IPv4 address
· An IPv6 address
· A CNAME
Explanation: An A Record, also known as an Address Record, is part of the DNS (Domain Name System) and stores information that maps a domain or subdomain to the IPv4 address that corresponds to it. In particular, it is responsible for associating a domain name with a 32-bit IPv4 address. This allows the Domain Name System (DNS) to translate easily readable domain names into the numerical addresses that computers use to locate and identify one another on a network.
7. MX stands for ________.
Answers
· Meta exchange
· Micro exchange
· Micro extreme
· Mail exchange
Explanation: The abbreviation MX stands for "Mail Exchange." An MX record is a kind of resource that is utilized inside the framework of DNS (Domain Name System) to declare the mail servers that are accountable for receiving emails on behalf of a domain. MX records assist in directing electronic mail messages to the appropriate mail servers that are linked with the domain of the receiver. When someone sends an email to an address that is part of a certain domain, the mail server that is doing the sending will query the DNS for the MX records of that domain in order to figure out where the email should be sent.
8. A fully qualified domain name can contain how many characters?
Answers
· 63
· 127
· 255
· 64
Explanation: The maximum number of characters that may be used in a fully qualified domain name (FQDN) is 253. This restriction encompasses both the length of the individual labels (which are broken up by dots) as well as the length of the dots themselves. Each label may have a maximum length of 63 characters, and the dots do not count against the total number of characters on the label.
9. What technique is used to balance traffic across multiple IPs for the same domain?
Answers
· Round robin
· Quad A record
· Cycling records
· CNAME
Explanation: The process of distributing traffic among many IP addresses for a single domain is referred to as "Load Balancing." Load balancing is the process of dividing incoming network traffic over numerous servers or network pathways, with the goal of preventing any one server or path from being overloaded with an excessive amount of traffic. A website or program may see improvements in its availability, reliability, and performance as a result of this change.
There are a variety of approaches to load balancing, one of which is the employment of a load balancer, which splits the traffic across many servers depending on criteria such as the health of the server, the amount of work being done on the server, or a predetermined algorithm. The DNS (Domain Name System) may be set up to do load balancing in addition to its other uses by linking numerous IP addresses with a single domain name. This enables DNS to achieve load distribution and balance across numerous servers by distributing incoming requests across the IP addresses that have been provided.
10. Which of the following are part of a Zone File? (select all that apply)
Answers
· NS record
· SOA
· FQDN
· A Record
11. Which of the following need to be configured for a computer to operate on a modern network? Check all that apply.
Answers
· A TCP port
· An IP address
· A name server
· A MAC address
12. When using Fixed Allocation DHCP, what is used to determine a computer's IP?
Answers
· An A Record
· A subnet mask
· A MAC address
· Location
Explanation: The MAC address of a particular computer or device is used in a configuration called Fixed Allocation DHCP (Dynamic Host Configuration Protocol), which is also known as DHCP reservation. This setup assigns a specified IP address to the computer or device in question. The Media Access Control address, more often referred to as a MAC address, is a one-of-a-kind identification that is connected to a network interface card (NIC) or network device.
When a DHCP reservation is created for a computer, the DHCP server is configured to always assign the same IP address to that machine based on its MAC address. This ensures that the computer always has the same IP address. This guarantees that the IP address that is assigned to the specified device will be consistent and predictable. The DHCP server makes use of the MAC address as a key identifier in order to link the reserved IP address with the appropriate device on the local area network (LAN).
13. The process by which a client, configured to use DHCP, attempts to get network configuration information is known as _________________.
Answers
· DHCP Discovery
· DHCP Request
· DHCP Acknowledgement
· DHCP Offer
Explanation: DHCP Discover" refers to the procedure whereby a client that has been set up to utilize DHCP makes an effort to get information on the configuration of a network.
During the process of DHCP Discover, the client will search for a DHCP server on the local network by broadcasting a DHCP Discover message. The client is looking for a DHCP server that will supply it with an IP address, subnet mask, default gateway, DNS server, and other configuration settings. This is the first phase in the interaction that takes place between a client and a DHCP server during the DHCP (Dynamic Host Configuration Protocol) process.
14. Which of the following are ways a DHCP can operate? Select all that applies.
Answers
· Dynamic allocation
· ARP
· CIDR
· Fixed allocation
15. DHCP is a protocol of which layer?
Answers
· Application layer
· Network Layer
· Transport layer
· Physical layer
Explanation: The Dynamic Host Configuration Protocol, often known as DHCP, runs at the application layer of the Open Systems Interconnection architecture (Layer 7). To be more specific, it operates on port 67 for server communication and port 68 for client communication. The transport protocol that it employs is known as UDP, which stands for User Datagram Protocol. Devices on a network are given IP addresses and other network setup settings in a dynamic fashion thanks to DHCP, which is responsible for this task.
16. What technique allows for specific destination ports to be configured to always deliver to specific nodes?
Answers
· IP masquerading
· IP translation
· Ephemeral ports
· Port forwarding
Explanation: Port forwarding is a method that enables specified target ports to be programmed to always deliver to specific nodes. This approach is referred to as "port forwarding." The process of port forwarding includes rerouting network traffic away from a particular port and towards a device or node on the network that has been specified.
When a connection is established to a certain port on a router or gateway, port forwarding kicks in. This causes the router to forward the traffic to a previously determined internal IP address and port. This makes it possible for the data to reach the target device on the local network.
This method is often used for programs or services that call for access from the outside world, such as web servers, online gaming, or remote desktop connections. Through the process of routing incoming traffic to the appropriate location within the local network, port forwarding makes it possible for these services to function in an efficient manner.
17. The total number of IPv4 addresses is approximately:
Answers
· 100 billion
· 4.2 million
· *B: 4.2 billion
· 4.2 trillion
Explanation: It is estimated that there are around 4.3 billion IPv4 addresses in total. IPv4 makes use of a 32-bit address system, which makes it possible to have a total of 232 addresses. This equates to around 4.3 billion IP addresses that are completely unique. On the other hand, as a result of the expansion of the internet and the rising number of devices that are linked to it, IPv4 numbers are running out. This has resulted in the implementation of IPv6, which makes use of a 128-bit address system, enabling a much greater number of addresses that may be used.
18. Which Regional Internet Registry(RIR) serves the USA and Canada? multiple choice, shuffle
Answers
· ARIN
· APNIC
· LACNIC
· RIPE
19. What is another solution to IP exhaustion that will create more public IP addresses as it is implemented? multiple choice, shuffle
Answers
· IP masquerading
· IPv6
· Port preservation
· RFC1918
20. What allows a gateway to rewrite the source IP of an outgoing datagram? multiple choice, shuffle
Answers
· IPv4
· NAT
· IPv6
· IANA
21. What is two-factor authentication? Select all that apply.
Answers
· a method that requires two usernames
· a method where you need two passwords
· a method where users are required to verify their credentials through a combination of hardware and/or software. Usually a username, password, and a short-lived token.
· a method where you authenticate twice
22. VPNs are known as a _____ protocol.
Answers
· network layer
· data link layer
· Connectionless
· Tunneling
Explanation: Virtual Private Networks, sometimes known as VPNs, are what's referred to as a "tunneling" protocol. Virtual private networks (VPNs) are used to protect the secrecy and integrity of the data that is being communicated by establishing a secure connection that is encrypted across a less secure network, such as the internet. It is the job of tunneling protocols to encapsulate and encrypt the data before sending it between the VPN client and the VPN server to ensure its safety during transmission. The Point-to-Point Tunneling Protocol (PPTP), the Layer 2 Tunneling Protocol (L2TP), Internet Protocol Security (IPSec), and a few additional tunneling protocols are some examples of those used in virtual private networks (VPNs).
23. A proxy is something that _______________________.
Answers
· communicates on behalf of something else
· allows for many devices to speak to one other device
· encrypts traffic sent across the Internet
· sends data across a single network segment
Explanation: A proxy is anything that functions on behalf of another system or organization as an intermediary or a representative in some other capacity. A proxy server is a server or software application that acts as an intermediary between client devices (such web browsers) and other servers in the context of computer networks. A proxy server may either be a server or a software application.
24. What are some use cases for reverse proxies? Select all that apply.
Answers
· IP address translation
· Improved computer graphics
· Encryption and Decryption
· Load balancing
25. What was one of the first technologies that commonly utilized 2FA (Two-Factor Authentication)?
Answers
· TCP
· DNS
· VPN
· UDP
Networking Services Simulation
26. A company moves a popular website to a new web host. Which of the following will change as a result?
Answers
· Root name server
· Internet Protocol (IP)
· Network service
· Domain name
Answers
· 100
· 13
· 24
· 5
Answers
· 5
· 13
· 24
· 100
Answers
· To route traffic to different destinations, depending on factors like location, congestion, or link health
· To balance traffic
· To resolve an IP to a domain name
· To redirect traffic from one domain name to another
Explanation: Incoming requests are dispersed among all of the available IP addresses in a cyclical sequence when the DNS round robin protocol is used. This helps to divide the demand among different servers, which provides a fundamental kind of load balancing and improves the system's overall performance as well as its dependability. Because it does not take into consideration the server's current load or health, DNS round robin is a way of load balancing that is both straightforward and easy to put into practice. It is vital to keep this fact in mind.
30. A complete Fully Qualified Domain Name (FQDN) is limited to how many characters?
Answers
· 127
· 255
· 53
· 63
Explanation: The number of characters that may be used in a Fully Qualified Domain Name (FQDN) is capped at 253. This accounts for the total length of all the labels, which are broken up into individual segments by dots, as well as the dots themselves. The length of each label is limited to 63 characters at most. The fully qualified domain name (FQDN) is formed by combining the hostname and the domain name to create the entire address that is used to specifically identify a place on the internet. The restriction contributes to the compatibility and consistency of DNS implementations by helping to keep them intact.
31. Along with an IP address, a subnet mask, and a name server, which of the following is the other thing required for a computer to operate on a network?
Answers
· A gateway
· A proxy
· A NTP server
· A FQDN
Explanation: In order for a computer to function properly on a network, in addition to having an IP address, a subnet mask, and a name server, it is necessary for the machine to have something called a "Default Gateway." The IP address of the router or gateway device that links the local network to other networks or the internet is known as the default gateway. In other words, the default gateway is the IP address. It acts as the point of departure for traffic that is going to be sent to a separate network or the internet. For devices on the local network to be able to communicate with devices on other networks, the default gateway is an absolutely necessary component.
32. Fill in the blank: When NAT hides the source IP of an originating device, this is known as _____.
Answers
· Port Forwarding
· Routing
· Masquerading
· Switching
Explanation: IP masquerading, also known as IP address masquerading, is the process by which Network Address Translation (NAT) conceals the source IP of an originating device. During this stage of the process, the NAT device modifies the outgoing packets by substituting its own IP address for the source IP address. This gives the impression that the traffic is coming from the NAT device itself. This helps obscure the internal network structure as well as the individual IP addresses of devices from external networks, which improves both privacy and security.
33. What NAT technique allows for complete IP masquerading, while still having services that can respond to incoming traffic?
Answers
· Preservation
· Rewriting
· Port forwarding
· One-to-many
Explanation: NAT Overload" or "Port Address Translation (PAT)" is the name of the NAT approach that enables full IP masquerading while still allowing services to react to incoming traffic. This method may also be referred to simply as "NAT."
With NAT Overload, several private IP addresses from the internal network are mapped to a single public IP address, and each private IP address is linked with a different port number. This allows for many private IP addresses to share a single public IP address. Because of this, several devices on the internal network are able to share a single public IP address, and the NAT device uses port numbers to keep track of the translations that are taking place.
When a device on the private network establishes a connection to the outside world, the NAT device does two things: it gives the connection a special port number and it combines that port number with the public IP address. After that, the replies that come in are directed to the appropriate internal device by using the port number as a guide. This method permits IP masquerading for the internal devices, while at the same time ensuring that those devices may continue to get replies to the requests they send out.
34. VPNs often use an authentication procedure that requires a user to generate a short lived numerical token through a specialized piece of hardware or software, in addition to providing a username and password. What is this authentication procedure called?
Answers
· Biometric authentication
· Two-factor authentication
· Certificate-based authentication
· Password-based authentication
Explanation: The authentication technique known as "Time-based One-Time Password (TOTP)" or "Two-Factor Authentication (2FA)" requires a user to produce a short-lived numerical token using a specific piece of hardware or software in addition to supplying a username and password. This is referred to as "Two-Factor Authentication" (two-factor-authentication). TOTP is an extra layer of protection that is added on top of the standard login and password, and it is accomplished by the development of a one-of-a-kind numeric code that swaps out at predetermined time intervals (often once every 30 seconds). This code is often produced by a specialized piece of hardware (referred to as a hardware token) or a mobile application (referred to as a software token) that is connected to the user's account.
35. Fill in the blank: A service that appears to external clients as a single server, but actually represents many servers behind it, is known as a _____.
Answers
· port preservation
· reverse proxy
· VPN
· multiplexer
Explanation: A "Load Balancer" or "Load Balancing Service" is a service that gives the appearance to clients on the outside that it is a single server while in reality it is representing a number of servers in the background. Load balancers are devices that split incoming network traffic amongst many servers in order to optimize resource usage, boost dependability, and boost the overall performance of a service. This helps to balance the demand and prevents any one server from becoming a bottleneck, which ensures that users that use the service will have a more pleasant experience overall.
Shuffle Q/A 1
36. Which type of Domain Name System (DNS) server performs a full name resolution request?
Answers
· Caching name server
· Authoritative name server
· Recursive name server
· Root name server
When a client (such a web browser) makes a DNS query to a recursive DNS server, the recursive DNS server is responsible for recursively contacting additional DNS servers on behalf of the client until it gets the final authoritative response. This process continues until the client receives the final authoritative answer. It is responsible for carrying out the whole of the process of resolving the domain name to the IP address that corresponds to it by communicating with authoritative DNS servers at various points along the road.
Answers
· Hypertext Transfer Protocol (HTTP)
· IP (Internet Protocol)
· Dynamic Host Configuration Protocol (DHCP)
· User Datagram Protocol (UDP)
Answers
· CNAME
· SQA
· QUAD A
· NS
Answers
· The Dynamic Host Configuration Protocol (DHCP)
· The subdomain
· The DNS Resolver
· The Top Level Domain (TLD) name
Answers
· Subnet mask
· Automatic allocation
· FQDN
· Fixed allocation
41. Network Address Translation (NAT) technology provides benefits for which of these network problems?
Answers
· Port Preservation
· Routable addresses
· Address exhaustion
· Assigning IPs to devices on the same network
Answers
· Forwarding
· Preservation
· Translation
· Masquerading
In PAT, numerous private IP addresses from an internal network are mapped to a single public IP address, and each private IP address is linked with a different port number. This is done so that traffic may be routed more efficiently. When a client begins the process of establishing an outbound connection, the NAT device will combine the public IP address with a specific port number before assigning it to the connection. Because of this, numerous devices on the internal network are able to share a single public IP address. The NAT device is responsible for distinguishing the traffic of each device depending on the specific port numbers it assigns. PAT allows for the preservation of public IP addresses and offers a fundamental kind of load balancing at the same time.
Answers
· Domain Name System (DNS)
· Dynamic Host Configuration Protocol (DHCP)
· User Datagram Protocol (UDP)
· Virtual Private Network (VPN)
Answers
· Dynamic Host Configuration Protocol (DHCP)
· A Virtual Private Network (VPN)
· A proxy server
· Domain Name Systems (DNS)
Proxy servers are useful for many things, including filtering material, balancing traffic, providing security, and optimizing network speed, among other things. They mediate communication between the client and the service they are attempting to access, acting as a gateway between the two parties while also having the capacity to introduce new features or bolster existing ones.
Answers
· It helps automate network configuration.
· It provides Network Address Translation (NAT).
· It assigns Internet Protocol (IP) addresses.
· It provides addresses that are easier for people to remember.
Answers
· Host (A)
· Canonical name (CNAME)
· Text (TXT)
· Service record (SRV)
The SRV record might be used in the context of a video conferencing application to indicate the hostname and port number of the server that manages video conferencing services. In the event that there is a problem with the DNS port setting, modifying the SRV record so that it has the appropriate port information could be able to assist in fixing the issue.
In order to identify the appropriate SRV record configuration for the specified port settings, it is essential to examine the documentation or support resources provided by the particular video conferencing program.
Answers
· DHCP
· CNAME
· FQDN
· ICANN
48. Which of the following allows hundreds of computers all to have their outbound traffic translated to a single IP?
Answers
· Rewriting
· Preservation
· One-to-many NAT
· Port forwarding
Explanation: "Network Address Translation (NAT) Overload" or "Port Address Translation (PAT)" is the name of the option that translates the outward traffic of hundreds of machines to a single IP address. This is possible with "Network Address Translation (NAT) Overload."
The term "NAT Overload" refers to a method in which numerous private IP addresses from a local network are mapped to a single public IP address, and each private IP address is linked with a different port number. NAT Overload is an example of a kind of network address translation. Because of this, a single public IP address may serve several devices on the internal network. Differentiating between connections and directing traffic to the appropriate internal device is made easier by using the public IP address in conjunction with a specific port number for each one. A typical method that is used for preserving public IP addresses and delivering a fundamental kind of load balancing is called NAT Overload.
Answers
· transport
· application
· network
· presentation
50. At the very lowest level, what data does a computer understand?
Answers
· Media Access Control (MAC) addresses
· IP (Internet Protocol) addresses
· Binary numbers
· Hexadecimal digits
Explanation: A computer is capable of understanding binary data at its most fundamental level. Information that is represented and processed by computers is done so using a basic language that is comprised of binary data, which is a series of 0s and 1s in a sequence. Each individual 0 or 1 is referred to as a "bit" (binary digit), and groupings of bits are used to represent many kinds of information, such as characters, numbers, and instructions. Bits may also stand alone as binary digits. The binary system provides the basis for the representation of information in machine language and serves as the foundation for all of the digital data that is stored in computers.
51. Network Address Translation (NAT) is typically implemented with which of these hardware devices?
Answers
· Hubs
· Routers
· Servers
· Switches
Explanation: The Network Address Translation (NAT) protocol is normally set up using a router or a device specifically designed for use with NAT. The NAT capability is often included as an in-built feature on routers, particularly those that are used in home or small business networks. When gaining access to resources on the internet, this enables several devices on the internal network to collaborate and share a single public IP address.
There is also the option of using dedicated NAT devices or appliances, which are often found in more extensive network configurations. These devices are specifically designed to handle the translation of private IP addresses to public IP addresses. This not only helps to save the space available for public IP addresses but also adds an extra degree of security by concealing the specifics of the internal network.
In either scenario, the NAT device plays a critical part in translating IP addresses and controlling the flow of data between the internal network and external networks like the internet. NAT stands for network address translation.
52. During the name resolution process, which server does a local recursive server contact first?
Answers
· Root name server
· Top level domain (TLD) server
· Caching name server
· Authoritative name server
Explanation: When attempting to resolve a hostname, a regional recursive DNS server would normally initiate communication with the root DNS servers first. The Domain Name System (DNS) is organized in a hierarchical fashion, and the root DNS servers are an essential component of this system. There are thirteen different sets of root DNS servers, all of which are carefully dispersed throughout the globe.
When a local recursive server gets a DNS query for a domain, it will first ask the root DNS servers in order to gather information about the top-level domain (TLD) servers that are responsible for the particular domain extension (such as.com,.org, etc.). This will allow the local server to resolve the query. This procedure will continue in a recursive manner until it reaches the authoritative DNS server for the domain that is being searched, at which point the last IP address that is connected with the domain will be received.
53. What port on a name server is used for User Datagram Protocol (UDP) name request packets?
Answers
· 53
· 80
· 25
· 22
Explanation: On a name server, port 53 is the User Datagram Protocol (UDP) port that is used for packets containing name request data. Queries sent to the Domain Name System (DNS) and their answers are normally sent via the UDP protocol on port 53. However, if the answer data is too extensive to fit in a single UDP packet, DNS may convert to utilizing Transmission Control Protocol (TCP) on port 53 for that specific transaction. This occurs when the port number is 53.
54. Which address does the field in DHPOFFER specify?
Answers
· The Gateway address
· The Internet Protocol (IP) address
· The Media Access Control (MAC) address
· The Data Link Layer
Explanation: The IP address that the DHCP server is willing to make available to the client is indicated by the value contained in the field of a DHCP (Dynamic Host Configuration Protocol) DHCPOFFER packet. This IP address is a component of the pool of accessible addresses that is managed by the DHCP server, and it is being made available to the client in order for them to lease it. The DHCP lease procedure may then be finished off by the client by having them submit a DHCPREQUEST to the server. This will allow them to accept the IP address that was provided to them.
55. What kind of proxy is used to prevent someone from accessing sites by inspecting what data is being requested, and then allowing or denying this request, depending on what site is being accessed?
Answers
· A gateway proxy
· A reverse proxy
· An authentication proxy
· A web proxy
Explanation: A "Content Filtering Proxy" or "Web Filtering Proxy" is a kind of proxy that may be used to block users from accessing certain websites. This type of proxy works by evaluating the data that is being requested and then either permitting or rejecting the request depending on the website that is being viewed. The content of online traffic may be analyzed by this kind of proxy server, and then filtering rules can be used to limit access to certain websites or content categories. In order to limit users' access to certain websites or forms of material, corporations often use content filtering proxies for the purposes of ensuring security, complying with regulations, or enforcing company policies.