CISSP - Communications and Network Security Mock Questions

Which of these remote access protocol has the option to send our data encrypted?

Options are :

  • Secure Shell. (Correct)
  • PowerShell.
  • Command prompt.
  • Telnet.

Answer : Secure Shell.

Explanation SSH (Secure Shell) is used for remote access over a network. Data is encrypted, but some recent leaks have shown the CIA may have tools that can break SSH.

To establish a TCP session, we are using the TCP 3-way handshake. What is the correct order of the handshake?

Options are :

  • SYN/ACK > ACK > SYN.
  • SYN > ACK > ACK.
  • SYN > SYN/ACK > ACK. (Correct)
  • SYN > SYN/ACK > SYN.

Answer : SYN > SYN/ACK > ACK.

Explanation The 3-way handshake is client SYN > Server SYN/ACK > Client ACK.

Which of these is a TRUE statement about the TCP protocol?

Options are :

  • It is always encrypted.
  • It is proprietary.
  • It is connection oriented. (Correct)
  • It is connectionless.

Answer : It is connection oriented.

Explanation TCP (Transmission Control Protocol): Reliable, Connection oriented, Guaranteed delivery, 3 way handshake, slower/more overhead, data reassembled.

An IPv4 address consists of how many bits?

Options are :

  • 4 bit.
  • 32 bit (Correct)
  • 128 bit.
  • 8 bit.

Answer : 32 bit

Explanation IPv4 (Internet Protocol version 4) addresses: IPv4 addresses are made up of 4 octets (dotted-decimal notation) and broken further down in a 32 bit integer binary.

Which type of IPv4 address is the range 172.31.0.0/24?

Options are :

  • Private. (Correct)
  • Public.
  • Link-local.
  • Loopback.

Answer : Private.

Explanation 172.16.0.0 – 172.31.255.255 are private IP's, we can use them on our internal network, they are not routable on the internet.

Which layer of the Open Systems Interconnect (OSI) model isolates traffic into broadcast domains?

Options are :

  • 4
  • 5
  • 1
  • 3 (Correct)

Answer : 3

Explanation Layer 3: Network Layer: Expands to many different nodes (IP) – The Internet is IP based. Isolates traffic into broadcast domains.

We are using a distance vector routing protocol. Which path would our traffic take from router A to router B?


Options are :

  • The 1Mbps path.
  • The 10Mbps path. (Correct)
  • The 1Gbps path.

Answer : The 10Mbps path.

Explanation Distance vector routing protocols: Only focuses on how far the destination is in Hops (how many routers in between here and there). Does not care about bandwidth, it just uses the shortest path.

The IPv4 address 169.254.0.0/16 is which type of an addresses?

Options are :

  • Link-local. (Correct)
  • Private.
  • Public.
  • Loopback.

Answer : Link-local.

Explanation 169.254.0.1 to 169.254.255.254 may be used for link-local addressing in IPv4. Link-local addresses are assigned to interfaces by host-internal, i.e. stateless, address autoconfiguration when other means of address assignment are not available. Most commonly seen when our system for one reason or another is not getting a correct IP.

Which of these protocols is NOT found on layer 7 of the Open Systems Interconnection (OSI) model?

Options are :

  • Telnet
  • PAP. (Correct)
  • HTTP.
  • FTP.

Answer : PAP.

Explanation PAP is a layer 5 protocol (used for setting up sessions). FTP, LDAP and HTTP are all layer 7 protocols.

Which of these would be an IP socket-pair?

Options are :

  • 10.0.10.1:80 and 21.12.12.1
  • 10.0.10.1:http and 21.12.12.1:51515 (Correct)
  • 10.0.10.1 and 21.12.12.1
  • 10.0.10.1 and 21.12.12.1:https

Answer : 10.0.10.1:http and 21.12.12.1:51515

Explanation Socket Pairs (TCP): 2 sets of IP and Port (Source and Destination). This could be Source pair:192.168.0.6:49691 Destination pair: 195.122.177.218:https. Well-known ports are often translated, port 443 is https.

We have acquired another company in our line of business. We notice they are using WEP for their wireless access point. WEP is considered which of these?

Options are :

  • Secure.
  • Unsecure. (Correct)
  • The preferred encryption type of wireless.
  • Preconfigured as standard for most wireless access points shipped today.

Answer : Unsecure.

Explanation WEP (Wired Equivalent Privacy) protocol, early 802.11 wireless security (1997). No longer secure, should not be used. Attackers can break any WEP key in a few minutes.

With the Open Systems Interconnection model (OSI model) in mind, which of these are COMMON layer 4 threats?

Options are :

  • ARP spoofing.
  • SYN floods. (Correct)
  • Eavesdropping.
  • Ping of death.

Answer : SYN floods.

Explanation SYN floods – half open TCP sessions, client sends 1,000’s of SYN requests, but replies with the 3rd ACK. The Transmission Control Protocol is an OSI level 4 protocol.

On which layer of the Open Systems Interconnection model (OSI model) would we find the broadcast address FF:FF:FF:FF:FF:FF?


Options are :

  • E: Layer 1.
  • D: Layer 2. (Correct)
  • B: Layer 4.
  • C: Layer 3.
  • A: Layer 5.

Answer : D: Layer 2.

Explanation FF:FF:FF:FF:FF:FF is the layer 2 broadcast address. Layer 2 uses mac addresses.

What makes COAX cables protected better against Electromagnetic Interference (EMI) than normal copper Twisted Pair (TP) cables?

Options are :

  • They have a copper mesh on the outside of the cable that protects it.
  • They have a copper braid/shield outside the data cable. (Correct)
  • They are thicker.
  • They have a glass core.

Answer : They have a copper braid/shield outside the data cable.

Explanation Coax (Coaxial) Cables are built in layers. Copper core in the middle. A plastic insulator around the middle core. A copper braid/shield around the insulator. A plastic outer layer. The braid/shield, makes it less susceptible to EMI.

We have implemented static Network address translation (NAT). How many public IP addresses do we need if we are using 5 private IP addresses and they all need internet access at the same time?

Options are :

  • 10
  • 1
  • 6
  • 5 (Correct)

Answer : 5

Explanation Static NAT Translates 1-1, we need 1 Public IP per Private IP we use, not practical and not sustainable.

In a MAC/EUI-64 mac addresses, how many bits is the manufacturer identifier?

Options are :

  • 12
  • 40
  • 24 (Correct)
  • 48

Answer : 24

Explanation EUI/MAC-64 Mac addresses are 64 bits. The first 24 are the manufacturer identifier. The last 40 are unique and identifies the host.

Which organization is responsible for delegating IP address ranges to ISPs in North America?

Options are :

  • APNIC.
  • RIPE NNC.
  • ARIN. (Correct)
  • LACNIC.

Answer : ARIN.

Explanation The world is divided into RIR (Regional Internet Registry) regions and organizations in those areas delegate the address space they have control over. ARIN (American Registry for Internet Numbers): United States, Canada, several parts of the Caribbean region, and Antarctica.

We are blocking unused ports on our servers as part of our server hardening. If we block TCP port 110, what would we be blocking?

Options are :

  • SMTP.
  • HTTP.
  • HTTPS.
  • POP3. (Correct)

Answer : POP3.

Explanation Post Office Protocol, version 3 (POP3) uses TCP port 110.

When we are using VoIP for our phone calls, which protocol does it use to transmit data?

Options are :

  • UDP. (Correct)
  • DHCP.
  • RDP.
  • TCP.

Answer : UDP.

Explanation VoIP (Voice over Internet Protocol): The digital information is packetized, and transmitted using UDP IP packets over a packet-switched network.

We have just upgraded our wireless access points throughout our organization. What would you answer if you were asked, "Which frequency does 802.11-g use?"

Options are :

  • 3.7GHz.
  • 2.4GHz. (Correct)
  • 20MHz.
  • 5GHz.

Answer : 2.4GHz.

Explanation 802.11g has 54 Mbit/s throughput using the 2.4 GHz band.

After our latest implementation of IPv6 128-bit addresses, our MAC addresses have also changed. Which format are they in now?

Options are :

  • EUI/MAC-48
  • EUI/MAC-256
  • EUI/MAC-128
  • EUI/MAC-64 (Correct)

Answer : EUI/MAC-64

Explanation IPv6 uses EUI/MAC-64 addresses. If the card is EUI/MAC-48 it adds fffe to get a 64-bit address.

We are slowly moving to IPv6 in our organization. In the transition period, we are using dual stack. What is the link-local prefix for IPv6?

Options are :

  • eeef:
  • fe80: (Correct)
  • fffe:
  • fefe:

Answer : fe80:

Explanation IPv6 Link Local address, only for local traffic uses the fe80: prefix, for instance fe80::b8:20fa:22ff:fe52:888a.

We have implemented NAT overload. How many public IP addresses do we need, if we are using 5 private IP addresses and they all need internet access at the same time?

Options are :

  • 5
  • 1 (Correct)
  • 10
  • 6

Answer : 1

Explanation PAT was introduced to solve the 1-1 NAT issues, it uses IP AND Port number. Also called One-to-Many or NAT Overload since it translates One public IP to Many private IP’s.

As part of our server hardening we have chosen to block TCP port 25. What are we blocking on the servers?

Options are :

  • SMTP. (Correct)
  • HTTP.
  • HTTPS.
  • POP3.

Answer : SMTP.

Explanation Simple Mail Transfer Protocol (SMTP), uses TCP port 25, but can also use port 2525.

Which of these protocols is NOT found on layer 3 of the OSI model?

Options are :

  • IP.
  • IKE.
  • ICMP.
  • IMAP. (Correct)

Answer : IMAP.

Explanation IMAP is a layer 7 protocol. IP, IPSEC, IKE, ICMP, … are all layer 3 protocols.

Which of these is a layer 3 broadcast address?

Options are :

  • 0.0.0.0
  • 255.255.255.255 (Correct)
  • FF:FF:FF:FF:FF:FF
  • 127.0.0.1

Answer : 255.255.255.255

Explanation Layer 3 uses IP addresses, for broadcast it uses the 255.255.255.255 broadcast IP address, routers do not pass it, they drop it.

All but one of these are networking topologies we could use in our design. Which is NOT a network topology?

Options are :

  • Star.
  • Mesh
  • Matrix. (Correct)
  • Ring.

Answer : Matrix.

Explanation Matrix is not a network topology. Ring, Mesh and Star are network topologies.

As part of our server hardening, are blocking all ports on our servers, unless specified as something we needed open in the technical design documentation. When we block TCP/UDP port 3389, what are we blocking?

Options are :

  • NetBIOS datagram service.
  • Microsoft Terminal Server (RDP). (Correct)
  • IMAP.
  • NetBIOS name service.

Answer : Microsoft Terminal Server (RDP).

Explanation Microsoft Terminal Server (RDP) uses TCP/UDP port 3389.

We are blocking unused ports on our servers as part of our server hardening. We have chosen to block UDP port 137. What are we blocking?

Options are :

  • Microsoft Terminal Server (RDP).
  • NetBIOS name service. (Correct)
  • IMAP.
  • NetBIOS datagram service.

Answer : NetBIOS name service.

Explanation NetBIOS Name Service uses UDP port 137 and is used for name registration and resolution.

On our network cards, we have MAC/EUI-48 MAC addresses. How many bits is the organization identifier on those?

Options are :

  • 12
  • 24 (Correct)
  • 48
  • 40

Answer : 24

Explanation EUI/MAC-48 are 48 bits. The first 24 are the manufacturer identifier. The last 24 are unique and identifies the host.

Which organization is responsible for delegating IP addresses to ISPs in Europe, Russia, and the Middle East?

Options are :

  • APNIC.
  • ARIN.
  • RIPE NNC. (Correct)
  • LACNIC.

Answer : RIPE NNC.

Explanation The world is divided into RIR (Regional Internet Registry) regions and organizations in those areas delegate the address space they have control over. RIPE NCC (Réseaux IP Européens Network Coordination Centre) Europe, Russia, Middle East, and Central Asia.

When we talk about transporting data over networks, we often use Transmission Control Protocol (TCP) or User Datagram Protocol (UDP). Which of these is unique to UDP?

Options are :

  • Proprietary
  • Connectionless. (Correct)
  • Encrypted.
  • Connection oriented.

Answer : Connectionless.

Explanation UDP (User Datagram Protocol): connectionless protocol, unreliable, VOIP, Live video, gaming, "real time". Timing is more important than delivery confirmation. Sends message, doesn't care if it arrives or in which order.

Which of these protocols is the one Voice over IP (VoIP) PRIMARILY uses?

Options are :

  • UDP (Correct)
  • TCP
  • VIP
  • BGP

Answer : UDP

Explanation VoIP uses UDP. It is connectionless; it is better to lose a packet or two than have it retransmitted half a second later.

Our networking department is recommending we use a full duplex solution for an implementation. What is a KEY FEATURE of those?

Options are :

  • One way communication, one system transmits the other receives, direction can't be reversed.
  • Both systems can send and receive at the same time. (Correct)
  • Only one system on the network can send one signal at a time.
  • One way communication, one system transmits the other receives, direction can be reversed.

Answer : Both systems can send and receive at the same time.

Explanation Full-duplex communication send and receive simultaneously. (Both systems can transmit/receive simultaneously).

172.32.0.0/24 is which type of IPv4 addresses?

Options are :

  • Public. (Correct)
  • Loopback.
  • Link-local.
  • Private.

Answer : Public.

Explanation This is a public address and it is internet routable, not to be confused by the private IPv4 range of 172.16.0.0 – 172.31.255.255, we can use them on our internal network, they are not routable on the internet.

We have had issues with employees adding wireless access points in areas of our organization where the wireless coverage is bad. What could be something we could implement, as part of a larger strategy, to stop that from happening again?

Options are :

  • Changing the SSIDs on our wireless access points every week.
  • Port security. (Correct)
  • Opening all ports on our switches.
  • Hiding our SSID.

Answer : Port security.

Explanation Good switch security can help with rogue access points, we would shut down unused ports, add mac-sticky and hardcode if ports are access or trunk ports.

In a new data center implementation, we are wanting to use IPv6 addresses. Which of these statements are TRUE about IPv6 addresses? (Select all that apply).

Options are :

  • They can use EUI/MAC48 addresses, by adding fffe in the middle of the mac address. (Correct)
  • They use the fe80: prefix for link local addresses. (Correct)
  • They are 128 bit binary. (Correct)
  • They use broadcast addresses.
  • They are 32-bit binary.

Answer : They can use EUI/MAC48 addresses, by adding fffe in the middle of the mac address. They use the fe80: prefix for link local addresses. They are 128 bit binary.

Explanation IPv6 is 128-bit binary, often expressed in hexadecimal numbers (using 0-9 and a-f); for Link Local addresses we add the fe80: prefix to an address, and for EUI/MAC48 addresses we add “fffe? to make it an EUI/MAC64 address.

At an all-hands IT meeting in our organization, one of the directors is talking about the intranet. What is he referring to?

Options are :

  • Connected private intranets often between business partners or parent/child companies.
  • The global collection of peered WAN networks, often between ISPs or long haul providers.
  • An organization's privately owned and operated internal network. (Correct)
  • The local area network we have in our home.

Answer : An organization's privately owned and operated internal network.

Explanation An Intranet is an organization's privately owned network, most larger organizations have them.

We are designing new networking infrastructure in our organization. The new infrastructure will be using CSMA/CA. What are we implementing?

Options are :

  • Extranet.
  • Ethernet.
  • Wireless. (Correct)
  • Internet.

Answer : Wireless.

Explanation CSMA CA (Carrier Sense Multiple Access Collision Avoidance): Used for systems that can either send or receive like wireless. They check if the line is idle, if idle they send, if in use they wait a random amount of time (milliseconds). If a lot of congestion the client can send a RTS (Request To Send), and if the host (the wireless access point) replies with a CTS (Clear To Send), similar to a token, the client will transmit. This goes some way to alleviating the problem of hidden nodes, in a wireless network, the Access Point only issues a Clear to Send to one node at a time.

What would a distance vector routing protocol use to determine the BEST route to a certain destination?

Options are :

  • The best bandwidth to the destination.
  • The path it used last time it sent data to that destination.
  • The aggregated payload and the bandwidth.
  • Least hops to the destination. (Correct)

Answer : Least hops to the destination.

Explanation Distance vector routing protocols: Only focuses on how far the destination is in Hops (how many routers in between here and there). Does not care about bandwidth, it just uses the shortest path.

When we implement VLANs, what would that do?

Options are :

  • Prevent users from accessing the internet.
  • Segments a switch into multiple separate logical networks. (Correct)
  • Divides a switch into equally large portions for each VLAN.
  • Shows a network administrator the traffic on his network.

Answer : Segments a switch into multiple separate logical networks.

Explanation VLAN (Virtual LAN) is a broadcast domain that is partitioned and isolated at layer 2. Specific ports on a switch is assigned to a certain VLAN. It allows networks and devices that must be kept separate to share the same physical devices without interacting, for simplicity, security, traffic management, and/or cost reduction.

Trying to convert a very old frame relay connection we have to a remote office, you are asked to include a list of the abbreviations you have used and what they stand for. Which of these would you add to that list? (Select all that apply).

Options are :

  • DLCI (Data Link Connection Identifiers). (Correct)
  • SVC (Switched Virtual Circuit). (Correct)
  • SON (Synchronous Optical Networking).
  • PVC (Permanent Virtual Circuit). (Correct)
  • PSC (Permanent Switched Circuit).

Answer : DLCI (Data Link Connection Identifiers). SVC (Switched Virtual Circuit). PVC (Permanent Virtual Circuit).

Explanation Frame Relay is a Packet-Switching L2 protocol, it has no error recovery and only focus on speed. Higher level protocols can provide that if needed. PVC (Permanent Virtual Circuit): Always up, ready to transmit data. Form logical end-to-end links mapped over a physical network. SVC (Switched Virtual Circuit): Calls up when it needs to transmit data and closes the call when it is done. Uses DLCI (Data Link Connection Identifiers) to identify the virtual connection, this way the receiving end knows which connection an information frame belongs to.

Looking at the Open Systems Interconnection model (OSI model), which of these protocols would we find on layer 3? (Select all that apply).

Options are :

  • IKE. (Correct)
  • IPSEC. (Correct)
  • IMAP.
  • ICMP. (Correct)
  • IP. (Correct)

Answer : IKE. IPSEC. ICMP. IP.

Explanation Layer 3: Network Layer: Expands to many different nodes (IP) – The Internet is IP based. Isolates traffic into broadcast domains. Protocols: IP, ICMP, IPSEC, IGMP, IGRP, IKE, ISAKMP, IPX. If the exam asks which layer a protocol with “I? is, remember IP, IGMP, IGRP, IPSEC, IKE, ISAKMP, … are all layer 3, all except IMAP which is layer 7.

As part of a security audit, we have found some security flaws. The IT Security team has been asked to suggest mitigation strategies using the OSI model. Which of these would address layer 7 issues?

Options are :

  • Access Lists.
  • Start using application firewalls. (Correct)
  • Installing UPSes in the data center.
  • Shut down open unused ports.

Answer : Start using application firewalls.

Explanation Application layer firewalls are on the 7th OSI Layer. The key benefit of application layer firewalls is that they can understand certain applications and protocols. They see the entire packet; the packet isn't decrypted until layer 6; any other firewall can only inspect the packet, but not the payload. They can detect if an unwanted application or service is attempting to bypass the firewall using a protocol on an allowed port, or detect if a protocol is being used any malicious way.

We use many different names for different types of networks. When our engineers are talking about the extranet, what are they referring to?

Options are :

  • The global collection of peered WAN networks, often between ISPs or long haul providers.
  • The local area network we have in our home.
  • An organization's privately owned and operated internal network.
  • Connected private intranets often between business partners or parent/child companies. (Correct)

Answer : Connected private intranets often between business partners or parent/child companies.

Explanation An Extranet is a connection between private Intranets, often connecting business partners' Intranets.

You get stopped on the way to your office by the CEO. She wants to talk to you because you are one of those IT people. The CEO is wanting us to implement VoIP and has heard it uses the User Datagram Protocol (UDP). On which layer of the Open Systems Interconnection model (OSI model) would we find the UDP protocol?


Options are :

  • B: Layer 4. (Correct)
  • A: Layer 5.
  • E: Layer 1.
  • D: Layer 2.
  • C: Layer 3.

Answer : B: Layer 4.

Explanation OSI layer 4 (Transport Layer) UDP (User Datagram Protocol): Connectionless protocol, unreliable, VOIP, Live video, gaming, “real time’’. Timing is more important than delivery confirmation.

On which layer of the Open Systems Interconnect (OSI) model do we establish the connection between 2 applications?

Options are :

  • 5 (Correct)
  • 4
  • 6
  • 3

Answer : 5

Explanation Layer 5: Session Layer: Establishes connection between 2 applications: Setup > Maintenance > Tear Down.

If you see any IPv4 address in the 127.0.0.0/8 range, what type of IPv4 address is that?

Options are :

  • Private.
  • Link-local.
  • Public.
  • Loopback. (Correct)

Answer : Loopback.

Explanation IPv4 network standards reserve the entire 127.0.0.0/8 address block for loopback purposes. That means any packet sent to one of those 16,777,214 addresses (127.0.0.1 through 127.255.255.254) is looped back. IPv6 has just a single address, ::1.

Which type of networking circuits would we use to ensure the traffic ALWAYS uses the same path?

Options are :

  • Full traffic switching.
  • Packet switching.
  • Circuit switching. (Correct)
  • Weighted routing tables.

Answer : Circuit switching.

Explanation Circuit switching - Expensive, but always available; used less often. A dedicated communications channel through the network. The circuit guarantees the full bandwidth. The circuit functions as if the nodes were physically connected by a cable.

We are using the OSI model to categorize attacks and threats. Which of these are COMMON layer 2 threats?

Options are :

  • Eavesdropping.
  • SYN floods.
  • ARP spoofing. (Correct)
  • Ping of death.

Answer : ARP spoofing.

Explanation ARP spoofing is an attack where an attacker sends a fake ARP (Address Resolution Protocol) messages over a local area network. This results in associating the attacker's MAC address with the IP address of an authorized computer or server on our network.

Which organization is responsible for delegating IP addresses to ISPs in the Caribbean and Latin America?

Options are :

  • APNIC.
  • ARIN.
  • RIPE NNC.
  • LACNIC. (Correct)

Answer : LACNIC.

Explanation The world is divided into RIR (Regional Internet Registry) regions and organizations in those areas delegate the address space they have control over. LACNIC (Latin America and Caribbean Network Information Centre): Latin America and parts of the Caribbean region.

We are blocking unused ports on our servers as part of our server hardening, when we block TCP/UDP port 138. Which protocol are we blocking?

Options are :

  • IMAP.
  • Microsoft Terminal Server (RDP).
  • NetBIOS datagram service. (Correct)
  • NetBIOS name service.

Answer : NetBIOS datagram service.

Explanation NetBIOS Datagram Service uses TCP/UCP port 138.

Jane is implementing Quality of Service (QoS) on our network. Which of these is one of the KEY benefit of QOS?

Options are :

  • Priority traffic (often VoIP) gets higher priority. (Correct)
  • All traffic gets equal preference on the network.
  • We have less traffic congestion, because we spread the traffic over multiple paths.
  • Larger data gets priority. This could be file uploads or downloads.

Answer : Priority traffic (often VoIP) gets higher priority.

Explanation QoS (Quality of Service) gives specific traffic priority over other traffic; this is most commonly VoIP (Voice over IP), or other UDP traffic needing close to real time communication. Other non real time traffic is down prioritized; the 0.25 second delay won’t be noticed.

Which of these protocols are used to transport operating systems to diskless workstations?

Options are :

  • SFTP.
  • FTPS
  • FTP.
  • TFTP. (Correct)

Answer : TFTP.

Explanation TFTP (Trivial FTP): Uses UDP Port 69. No authentication or directory structure, files are written and read from one directory /tftpboot. Used for "Bootstrapping" - Downloading an OS over the network for diskless workstations.

We are slowly migrating from IPv4 to IPv6. In the process we are using dual stack routers. One of your colleagues has asked how large IPv6 addresses are. What do you answer?

Options are :

  • 128 bit. (Correct)
  • 32 bit
  • 64 bit.
  • 256 bit.

Answer : 128 bit.

Explanation IPv6 is 128 bit in hexadecimal numbers (uses 0-9 and a-f). 8 groups of 4 hexadecimals, making addresses look like this: fd01:fe91:aa32:342d:74bb:234c:ce19:123b

Our networking department is recommending we use a simplex solution for an implementation. What is one of the KEY FEATURES of simplex solutions?

Options are :

  • Only one system on the network can send one signal at a time.
  • One way communication: One system transmits, the other receives. Direction can't be reversed. (Correct)
  • Both systems can send and receive at the same time.
  • One way communication: one system transmits, the other receives. Direction can be reversed.

Answer : One way communication: One system transmits, the other receives. Direction can't be reversed.

Explanation Simplex is a one-way communication (one system transmits, the other listens).

We have had a lot of employee complaints since we started blocking TCP/UDP port 80. What are we blocking?

Options are :

  • SMTP.
  • POP3.
  • HTTPS.
  • HTTP. (Correct)

Answer : HTTP.

Explanation Hypertext Transfer Protocol (HTTP) uses TCP/UDP port 80, can also use port 8008 and 8080 .

We have been tasked with implementing secure cables throughout all the buildings in our organization. What would be our CHEAPEST option to use?

Options are :

  • Copper Ethernet.
  • Wireless.
  • Coax copper.
  • Fiber Ethernet. (Correct)

Answer : Fiber Ethernet.

Explanation The most secure cable is fiber cables, it is slightly more expensive than copper, since we need both we would use fiber cables. Wireless is .. well not a cable.

We are moving to IPv6, and a friend of yours is at our helpdesk is asking, "In MAC/EUI-64 MAC addresses, how many bits is the unique device identifier?" What should you answer?

Options are :

  • 48
  • 12
  • 24
  • 40 (Correct)

Answer : 40

Explanation EUI/MAC-64 Mac addresses are 64 bits. The first 24 are the manufacturer identifier. The last 40 are unique and identifies the host.

A system is requesting an IP address using DHCP. How would the traffic flow look?

Options are :

  • Request > Discovery > Offer > Acknowledge.
  • Discovery > Offer > Request > Acknowledge. (Correct)
  • Request > Offer >Discovery > Acknowledge.
  • Request > Offer > Acceptance > Acknowledge.

Answer : Discovery > Offer > Request > Acknowledge.

Explanation DHCP (Dynamic Host Configuration Protocol) uses the Discovery > Offer > Request > Acknowledge flow. It is the protocol we use to assign IP’s. Controlled by a DHCP Server for your environment.

Comment / Suggestion Section
Point our Mistakes and Post Your Suggestions