1.
Which one of the following commands should you use on a Windows system to examine all the IP to MAC address mappings of the neighboring devices that are on the same network?
Correct Answer
D. Arp -a
Explanation
The correct answer is "arp -a." The arp command is used to view and manipulate the ARP (Address Resolution Protocol) cache, which contains the IP to MAC address mappings of neighboring devices on the same network. The "-a" option displays all the entries in the ARP cache, providing a comprehensive list of the IP to MAC address mappings. This command is specific to Windows systems.
2.
If a host on a network wants to ping another host on the same network, which three of the following options are required? (Choose three.)
Correct Answer(s)
A. ICMP echo request and echo reply
B. Source and destination IP addresses
C. Source and destination MAC addresses
Explanation
To ping another host on the same network, three options are required. Firstly, ICMP echo request and echo reply are necessary as they are the protocols used for sending and receiving ping messages. Secondly, the source and destination IP addresses are required to identify the sender and receiver of the ping messages. Lastly, the source and destination MAC addresses are needed to locate the specific devices within the network. The default gateway MAC address and IP address are not necessary for pinging another host on the same network.
3.
When data is sent from one host to another host, the sending host must package up the data. What is this packaging-up process called?
Correct Answer
B. Encapsulation
Explanation
The process of packaging up data when it is sent from one host to another host is called encapsulation. This involves placing the data into a specific format or structure, which includes adding headers and trailers to the data to ensure it is properly transmitted and received by the receiving host. Encapsulation helps to organize and protect the data during transmission, allowing it to be successfully delivered to its intended destination.
4.
What is the maximum number of hosts that a network with a subnet mask of /26 can have?
Correct Answer
C. 62
Explanation
A subnet mask of /26 means that there are 26 bits in the network portion of the IP address and 6 bits in the host portion. The formula to calculate the number of hosts is 2^(number of host bits) - 2. In this case, it would be 2^6 - 2, which equals 64 - 2, resulting in 62 hosts.
5.
If a host fails to get an IP address from a DHCP server, which of the following may be true?
Correct Answer
D. All available IP addresses on the DHCP server are already leased out.
Explanation
If a host fails to get an IP address from a DHCP server, it may be true that all available IP addresses on the DHCP server are already leased out. This means that there are no more IP addresses available for the host to be assigned. As a result, the host is unable to obtain an IP address from the DHCP server.
6.
A lack of validation of the ARP replies can allow an attacker to successfully execute what type of attack?
Correct Answer
A. Man in the middle
Explanation
A lack of validation of the ARP replies can allow an attacker to successfully execute a man-in-the-middle attack. In this type of attack, the attacker intercepts communication between two parties and can potentially eavesdrop on or manipulate the data being transmitted. By not validating the ARP replies, the attacker can send spoofed ARP replies, tricking the victims into sending their data through the attacker's machine, giving them unauthorized access to the data.
7.
Which one of the following protocols is susceptible to a SYN flood attack?
Correct Answer
C. TCP
Explanation
TCP (Transmission Control Protocol) is susceptible to a SYN flood attack. In a SYN flood attack, an attacker sends a large number of SYN requests to a target server, but never completes the handshake by sending an ACK. This causes the server to allocate resources for each incomplete connection, eventually exhausting its resources and becoming unresponsive. TCP's three-way handshake makes it vulnerable to this type of attack, as it requires the server to allocate resources for each incoming connection request.
8.
Which one of the following flags does a host set in the TCP segment to gracefully terminate a TCP connection?
Correct Answer
D. FIN
Explanation
The correct answer is FIN. In TCP, the FIN flag is set by a host to indicate its intention to terminate the TCP connection gracefully. When a host sends a TCP segment with the FIN flag set, it is indicating that it has no more data to send and wants to close the connection. The other flags mentioned in the options (END, STOP, TERM) are not used in TCP for this purpose.
9.
Which one of the following protocols is used to automatically assign IP addresses and set TCP/IP stack configuration parameters?
Correct Answer
C. DHCP
Explanation
DHCP (Dynamic Host Configuration Protocol) is the correct answer. DHCP is used to automatically assign IP addresses and set TCP/IP stack configuration parameters. It allows devices to obtain an IP address, subnet mask, default gateway, and other network configuration information dynamically from a DHCP server. This eliminates the need for manual configuration and makes it easier to manage IP addresses in a network. DNS (Domain Name System) is used for translating domain names into IP addresses. TFTP (Trivial File Transfer Protocol) is used for simple file transfers. RARP (Reverse Address Resolution Protocol) is used to obtain an IP address from a MAC address.
10.
Which one of the following tools should you use for packet capture and analysis?
Correct Answer
E. Tcpdump
Explanation
Tcpdump is the correct answer because it is a widely used command-line tool for packet capture and analysis. It allows users to capture network traffic in real-time and save it to a file for later analysis. Tcpdump provides detailed information about each packet, including source and destination addresses, protocol, and payload. It is commonly used by network administrators and security professionals to troubleshoot network issues, monitor network activity, and analyze network traffic for potential security threats.