Anda di halaman 1dari 105

ITE2 Mod01

1 From which Windows configuration tool can a user perform hardware and network configurations? Window Manager My Computer Control Panel Task Manager 2 Network operating systems were designed to provide which of the following tasks? (Select three.) file security multitasking user privileges resource access for a single user resource sharing among multiple users 3 Which acronyms describe the two general categories of OS user interfaces? DOS and UNIX DOS and GUI UNIX and GUI CLI and GUI 4 Which components are required by all operating systems? (Select three.) DOS support a kernel a user interface a file system 5 What is a major disadvantage of a GUI? It requires an understanding of commands. It requires more memory and storage space. It is more difficult to use. It is difficult to install. 6 What is a major advantage of a CLI? It is easier for inexperienced individuals to use. A mouse or other point-and-click device may be used to input data. It takes less processing power to run. It can be added later if disk space is limited. 7 Which part of the OS, loaded into memory at boot time, controls memory allocation? user interface application software kernel file system

ITE2 Mod01
8 What is a beneficial feature of preemptive multitasking? Applications share the use of the processor by time slicing. The processor dynamically adjusts the amount of memory needed by the application programs. Application programs share memory addresses and exchange information. The operating system controls the allocation of processor time. 9 Which device is used to input data from a CLI? mouse keyboard microphone monitor 10 What is the basic unit of logical storage on a FAT formatted disk? disk file allocation tables disk directories disk clusters disk folders 11 Although all of the following are possible, what is the primary focus of most home computers? database development Internet and email access typing practice programming language instruction 12 Which of the following is a characteristic of cooperative multitasking? The operating system controls the allocation of processor time. Programs run in their own separate address spaces. One crashed program will not affect other running programs. Applications share the processor using time-slicing. 13 What is meant by the statement, "We have to support our legacy system"? Support must be provided for the newest Linux system. Support must be provided for the system called legacy. Support must be provided for the newest Microsoft system. Support must be provided for outdated software. 14 Caldera, Slackware, SCO, and Debian are all distributions of which NOS? UNIX Solaris Linux OS X

ITE2 Mod01
15 Which component is supported in Windows XP Professional but is unavailable in the XP Home Edition? remote administration remote access multiple user accounts file security and resource sharing 16 Which software is used to display the GUI in both UNIX and Linux systems? Window Manager X-Window System Desktop Manager KDE Tools 17 Which command is entered in the Run dialog box of a Windows XP system to open a DOS command prompt window? run start cmd command 18 A user needs to know which version of the Windows operating system is installed. Which tab from the System Properties window should they click on to obtain that information? General Environment My Computer Settings 19 Why was the FAT32 file system developed? to allow for the use of file names of 32 characters to allow for the creation and storage of 32-bit file sizes to allow for the use of smaller cluster sizes on large disks to allow for a longer format for specifying the path of a file 20 What is a popular Linux desktop environment? GNU GNOME SuSE BASH 21 Which operating systems are collectively known as Windows 9x? (Select three.) Windows 95 Windows 98 Windows NT Windows ME Windows XP Windows for Workgroups

ITE2 Mod01
22 On most systems, which command is used to determine which version of UNIX or Linux is running? ver uname man vinfo 23 Why is it important for a NOS to have a robust kernel? to provide networking support to handle file sharing and security to prevent crashes and downtime to manage the file system 24 Which of the following is considered unimportant when selecting hardware for a Linux server? CPU speed hard disk type sound card and speakers amount of RAM

ITE2 Mod02
1 What is the physical topology when all the computers in a network connect to a central point? point-to-point star ring bus

Which features are LANs generally designed to accommodate? many users, high speed, limited geographical area many users, high speed, broad geographical area few users, low speed, limited geographical area few users, low speed, broad geographical area

Which statement is true of peer-to-peer networks? They scale easily as the size of the network grows. Security is easily maintained. Computers may change roles from client to server as needed. At least one computer functions as a dedicated server.

What is the purpose of protocols? to provide a controlled sequence of messages between systems to define which users have access to the network to allow the network administrator to decentralize control to limit access to network resources

Which IPX/SPX protocol forwards packets from one network to another? IPX SPX SAP RIP

6Which layer of the OSI reference model is concerned with data format and syntax? session presentation network transport

ITE2 Mod02

Which statement is true of a WAN? It normally operates at higher speeds than a LAN. It uses only permanent connections. It must use a ring topology. It makes use of facilities provided by common carriers.

8Why are open source technologies appealing to many people? A more organized source of funding and development is available. Proprietary technologies involve cooperation between many companies. De facto standards allow for more choice. Users are not bound by copyright laws.

Which layer of the OSI model is concerned with end-to-end connections and flow control? transport data link network session

10What is a characteristic of half-duplex transmission? Data travels in one direction only. Data travels in one direction at a time. Data travels in both directions simultaneously. Data travels in both directions at half the speed.

11

What is one advantage of directory and name services? All directories are kept in a single location. User names have a standardized format. Text names are easier to remember than numeric addresses. Network resources are bound to a physical location.

12Peer-to-peer and client/server networks share many characteristics. What is unique to the client/server environment? Passwords may be required to access shared resources. Local data files and devices can be shared by several users. Computers typically communicate using request/response protocols. Security and resource management scales easily as the network grows.

ITE2 Mod02

13

Match the order of ITU WAN standards to the technology they support. Standards: v.90, x.25, x.500, x.400, ISDN packet switching, dialup devices, directory services, electronic messaging, modems dialup devices, modems, packet switching, directory services, electronic messaging modems, packet switching, directory services, electronic messaging, dialup devices electronic messaging, directory services, modems, dialup devices, packet switching

14What is the order of the data units created as data is encapsulated from the transport layer through the network layer to the da layer? packet, segment, frame segment, packet, frame frame, packet, segment segment, frame, packet

15 What is the function of a CSU/DSU? It converts user data into an acceptable form to be sent over a WAN link. It protects user data from unauthorized access when transmitted over a WAN. It limits the geographic area in which a WAN operates. It converts between temporary and permanent WAN connections. 16 What is one disadvantage of a client/server network? It can have a single point of failure. It does not scale well to large networks. It requires each user to be trained to perform administrative tasks. It is less secure than a peer-to-peer network.

17Which transport layer protocol includes facilities for end-to-end connections, error detection, and metering data flow? DNS UDP TCP RIP

18

What is the most common media used in Ethernet 10BaseT implementations? STP UTP

ITE2 Mod02
coaxial ThinNet

19Which type of communication lines are used for WAN connections? point-to-point, parallel multipoint, serial multipoint, parallel point-to-point, serial

20

Which OSI reference model layer describes how packets of data are forwarded from one network to another? session presentation network transport

21Which IEEE standard specifies the requirements for Ethernet implementations? 802.2 802.3 802.5 802.11

22

Which of the following statements describes the OSI reference model? It details a set of rules describing the design process of a network. It provides a standard for measuring network performance. It divides the process of network communications into seven layers. It describes the set of procedures for troubleshooting network problems.

23Which of the following statements is true of print sharing? It requires a company to purchase more printers. It makes it more difficult for an administrator to control printers. It allows for more efficient use of printers. It limits the user to a single network printer.

24

Which TCP/IP protocol enables terminal access to local or remote systems? HTTP

ITE2 Mod02
FTP SMTP Telnet

25What does the term media access control describe? the rules for coordinating the use of the medium a list of users allowed to use the network the system administrator's role in controlling access to the network how to determine which media type is best for a network

ITE2 Mod03

Which list contains items that are entered into the TCP/IP Properties dialog box in a Windows OS environment? IP address, default gateway address, DHCP server address default gateway address, subnet mask, IP address subnet mask, DHCP server address, IP address default gateway address, subnet mask, DHCP server address

What is the primary function of a modem? provides the timing mechanism for sending data over synchronous serial lines provides optimal path determination for data packets converts digital signals to analog signals and back again encrypts and de-encrypts data streams

What are the two most common wireless technologies? IR and laser satellite and RF microwave and laser IR and RF

Which list indicates advantages associated with fiber-optic cable? capable of running long distances, inexpensive to install, not susceptible to electromagnetic interference not susceptible to electromagnetic interference, expensive to install, lower data rates not susceptible to electromagnetic interference, higher data rates, capable of running long distances lower data rates, inexpensive to install, capable of running long distances

Which statement is true of cable modem service? Bandwidth is dedicated to each user on the cable. Cable modems are strictly regulated by the IEEE standard. Cable modem service is an always-on technology. Cable modems connect to the Internet using existing phone lines.

6What is the most commonly used architecture in Ethernet LANs? bus star mesh ring

ITE2 Mod03

What is the function of a DHCP server? It stores websites that are used frequently. It dynamically assigns IP addresses to hosts. It determines the subnet mask of a network. It serves as a "first line of defense" firewall.

8What is the purpose of the twists in Category 5/5e UTP cable? to prevent the cable from breaking to make the cable easier to install and terminate properly to make the cable cheaper to produce to limit signal degradation caused by cross talk

How many bits are in an IP address? 16 64 32 48

10Which network layer device can separate a network into different broadcast domains? hub bridge switch router

11

Which data link layer device can segment a network into different collision domains? a router a switch a gateway a transceiver

12Which always-on network technology is offered by phone companies? PPP DSL NAP

ITE2 Mod03
CATV

13

What is the main function of the DNS? to scan the network for viruses to translate computer names to their corresponding IP addresses to assign IP addresses to nodes on the network to provide names to all the nodes on a network

14Which type of serial transmission uses a start bit to indicate the beginning of a new data stream? synchronous timed start-bit asynchronous

15 Which network topology has excellent redundancy and fault tolerance, but is expensive and difficult to implement on large netw bus star ring mesh

16

Which system resources do NICs require when installed in a computer? (Select three.) an IRQ buffer space memory space an I/O address a TCP address a PCI address

17What is meant by the term logical topology? the structured order of steps used by a host in connecting to the network the physical layout of the network the connections between software at different layers of the OSI model the paths that signals travel from one point on the network to another

18

What is one major advantage of a star topology?

ITE2 Mod03
It requires very little cabling. Problems are more easily identified and are typically isolated to one cable segment. Cabling can extend over great distances without loss of signal strength. It does not require any special devices such as hubs, switches, or routers.

19Which WAN protocol is used in dial-up networking? HDLC PPP Frame Relay IP

20

What is a major disadvantage of the bus topology? It is expensive. It requires a lot of cabling. A break in any one part of the cable brings down the entire network. All computers must be placed in a straight line.

21Which of the following are characteristics of routers? (Select three.) They contain tables with network addresses. They determine optimal destination routes to other networks. They are faster than switches and bridges. They can be computers with special network software installed. They can be active or passive.

22

Which factors are important considerations when selecting a NIC to use on a network? (Select three.) system processor speed type of system RAM type of media type of network type of system bus

23Which of the following is a company that connects computers to the Internet? ISP ARP IEEE

ITE2 Mod03
PDU

24

Which grade of cabling can be run above false ceilings and must be fire-retardant? plenum PVC polyvinyl protective

25A subnet mask is used by the system administrator to perform which of the following functions? filter out erroneous packets pick out desirable routes to subnets segment the network address convert the IP address to dotted decimal format

ITE2 Mod05

Where do print jobs wait to be printed? print list print queue wait list print job roster

Which version of Directory Service does Linux use? NDS NIS NFS NDAP

What is a domain? an autonomous system a group of computers that are physically near each other an administrator's realm of control a logical grouping of networked computers and servers

Outlook, Eudora, and Pine are all examples of which mail component? MTA MUA MDA MIA

What is one way to include the outside world into the internal network of a company? intranet extranet worldnet www

6Which syntax is incorrect for opening an FTP connection? ftp connect hostname ftp <hostname | IP_address> ftp 192.127.34.219 ftp computer.company.com

ITE2 Mod05

What are some uses for terminal emulation? automating scripts and installing network operating systems remote administration and delivering applications and services to clients downloading files from another computer and changing logon names peer to peer file sharing and Internet name lookup

8Match the descriptions/functions to the protocols they represent: - file transfer - web services - sending e-mail - hostname to IP translation - network management - dynamic allocation of IP addresses HTTP, SNMP, SMTP, DHCP, DNS, POP3 FTP, HTTP, POP3, DHCP, SMTP, DNS SMTP, HTTP, IMAP, DNS, SNMP, DHCP FTP, HTTP, SMTP, DNS, SNMP, DHCP

Which of the following are popular scripting languages? X Window script, vi script, Gnome script XML script, Sequel, Gnomepad Unix shell script, pico script, EmacsScript VBScript, Linux shell script, Java script

10What is the function of DNS? to provide a dynamic IP address to determine the MAC address given the IP address to translate an Internet name into an IP address to choose the "best path"

11

When using a modem, which protocol is used to establish a TCP/IP link between two computers? RIP PPP PAP ISDN

12Which protocol is a TCP/IP-based service?

ITE2 Mod05
IPX NetBEIU RIP HTTP

13

Which of the following is a web-based tool used to administer a Linux Samba server? SNMP IMAP Telnet SWAT

14Which protocol is designed to be secure and prevent a password from being used even if it is intercepted? FTP HTTP SSH SNMP

15 Which TCP/IP protocol is responsible for file sharing? DNS NFS UDP IPX

16

By default, incoming print jobs are serviced in which order? smallest to largest most important users first jobs from the same subnet first first in, first out

17Which protocol is used to send mail to a server? SNMP POP3 SMTP IMAP

ITE2 Mod05

18

What is the purpose of a directory service? It increases the need for redundant logins. It provides administrators with centralized control of users and resources across the network. It impairs network security and must therefore be used with a firewall. It keeps track of the home addresses and phone numbers of all users.

19What provides a barrier to block unwanted traffic between networks? a firewall a VPN concentrator a repeater a hub

20

Which protocol controls web page transmission? FTP HTTP SMTP DNS

21Which protocol was designed for file sharing on the Internet? HTTP FTP SMTP TCP

22

What is Telnet? a web service a terminal emulation application a file server an e-mail application

23Which type of network allows access to its servers only from within the network itself? internet intranet extranet WAN

ITE2 Mod05

24

What do Virtual Private Networks (VPNs) rely on to insure privacy? firewalls, Access Control Lists(ACLs), public keys username authentication, passwords, encryption passwords, firewalls, kerberos encryption, Access Control Lists (ACLs), username authentication

25All of the following rely on DNS except: WINS broadcasts file transfer programs web browsers e-mail

ITE2 Mod04

What is a function of the Internet Protocol (IP)? notifying the source of failure to deliver guaranteeing end-to-end connectivity providing a best effort delivery system providing a reliable delivery service

Which protocol is used for file transfer? FTP DNS UDP TCP

In which layer of the TCP/IP model does ICMP operate? Application Transport Internet Network Access

Which of the following rely on ICMP? sending an Echo Request logging in to a remote host mapping an IP address to a MAC address resolving a host name

Which service does ARP provide? It resolves a physical address to a TCP port number. It resolves a broadcast address to an IP address. It resolves an IP address to a physical address. It resolves a Domain Name address to a MAC address.

6What is the range of numbers in the first octet of a Class C address? 1-127 192-223 128-191 224-255

ITE2 Mod04

Which protocol is used to transfer a web page from a server to a browser? HTML TCP HTTP FTP

8How many octets are contained in an IP address? 1 2 4 8

Why is DNS called a distributed service? It is provided as shareware and can be freely distributed. Each DNS server knows the addresses for a set of names and how to contact other DNS servers. Each user configures the service individually and distributes changes to local peers. The domain names are assigned by an agency to ensure that no two hosts have the same name.

10What is one drawback of using host tables? Host tables must be configured on each computer in the network. Network bandwidth is negatively affected. The central database must be manually updated daily. The tables are limited in size to 256 hosts.

11

Which classes of IP addresses are used by commercial organizations for host addressing? A,C,D B,C,D C,D,E A,B,C

12What must a computer have when connected to a network? one unique name per function one unique address per service one unique address per connection point

ITE2 Mod04
one unique network

13

At which layer of the TCP/IP model does TFTP and FTP operate? Application Transport Internet Network Access

14Why is the TCP/IP protocol suite called an open system? It allows all users to access the network. Its protocols are viewable as text files. No organization owns or controls the specifications. Passwords are sent in clear text.

15 Which protocol is used to translate a domain name into an IP address? ARP DNS UDP NetBIOS

16

Which protocol suite is the standard implemented by almost all NOS manufacturers? IPX/SPX VINES TCP/IP NetBIOS

17Which types of applications are best suited to use UDP? those that can tolerate a loss of some data and still function those that need guaranteed delivery those that require reliable service those that are connection-oriented

18

What is a unique characteristic of the IP addressing scheme? flat addressing hierarchical addressing

ITE2 Mod04
inter-network addressing single-octet addressing

19What is the range of numbers that can be used in the first octet of a Class A network? 1-126 128-191 192-223 1-255

20

Which utility is used in Windows and UNIX to view network connections and protocol statistics? ARP Netstat Nbtstat Ipconfig

21Which service is used to enable individual computers to automatically obtain an IP address? WINS DNS ARP DHCP

22

Which service does TCP provide? guaranteeing delivery of packets tracing the path to a host transmitting web pages resolving a host name

23Which IP address range, as indicated by the first octet, is reserved for testing, and includes the loopback address? 127.x.x.x 168.x.x.x 255.x.x.x 192.x.x.x

24

Which address class contains the IP address 168.12.0.0? A

ITE2 Mod04
B C D

25What is subnetting? dividing large networks into smaller ones using the same network number allowing several small networks to communicate over the common carrier infrastructure combining several networks into a single larger network allowing separate companies to share an IP address by taking turns using it

ITE2 Mod06

What is the name of a mail server software package that is popular in Linux distributions? POP SMTP Postoffice Sendmail

What are two important features provided by security on a NOS? authentication and encryption reliable performance and account management virus protection and prevention from spamming processor balance and sustained work load

Windows .NET Server is tailored to provide what types of services? reliable application and database services reliable web and FTP services remote access and application services IPSec and remote access services

How many simultaneous connections does Windows 2000 Professional support? 3 10 40 25

Which Linux distribution was built solely for nonprofit uses? Debian GNU/Linux Caldera eDesktop and eServer SuSE Linux LinuxPPC

6What are two benefits of having more than one processor in a system? support for remote locations and automatic job queuing faster speeds and increased work capacity reduced need for IP addresses and decreased boot time reduced need for IP addresses and increased manageability

ITE2 Mod06

What are Network Operating Systems designed to do? share resources across a network with multiple users remotely control other computers on the network access and control the local hard disk run stand-alone computers that are not LAN capable

8A user account on a server enables the server to do which of the following? automatically download appropriate applications and print queues to that user authenticate that user and allocate those resources the user is allowed to access assign a specific IP and MAC address to the user's workstation assign the user to a specific domain and user group

Which of the following is open source? all versions of UNIX Windows 2000 all versions of NetWare Linux

10Which of the following is a better choice than Telnet for Remote Login Servers on a Linux system? SSL SSH Kerberos Remote Access

11

In Windows 2000 Server, what is the function of symmetric multiprocessing? It allows multiple processors to work together to share the workload in a computer. It provides for redundancy of data over multiple processors to prevent data loss. It assures that each processor in the server works on the same projects simultaneously. It monitors the processors for errors, performance levels, and queued jobs to ensure quality.

12Which client/server file system is used by most varieties of Linux file servers? FAT32 NFS NT SMB

ITE2 Mod06

13

Which of the following are Network Operating Systems? Linux, Windows 2000, Windows 98 Windows 2000, Windows 98, Novell NetWare Novell NetWare, Linux, Windows 2000 Novell NetWare, Linux, Windows 98

14How is redundancy built into a server system? by including additional hardware

16

Which of the following are Linux CLI text editors? vi, jed, pico, and Emacs gEdit, kEdit, pico, and Apache XEmacs, viGUI, Samba, and kEdit Squid, gEdit, vi, and Apache

17Windows 2000 Professional supports plug-and-play technology. What is one of the major advantages of this technology? An administrator can add devices from any manufacturer to the system and they will work. Devices no longer need software drivers to interact with the system. Components will interact with the system if plugged in prior to system boot. An administrator or user can easily add components to the system without manual configuration.

18

How many Primary Domain Controllers (PDCs) are allowed in a Windows NT environment? 1 2 4 9

19In Windows 2000, administrative tasks are accomplished using the Microsoft Management Console. Which type of module do tool require for specific administrative functions? plug-in add-on snap-in clip-on

ITE2 Mod06
20 What are two popular Desktop Environments that run on Linux? GNOME and KDE Apache and Samba Xfree86 and GNOME Apache and KDE

21In a Windows NT environment, what is the meaning of the term domain? a dedicated server containing the database of all IP and MAC addresses on the network a group of computers located in a specific physical or geographic region the OU that contains all user accounts groups of computers, users, and resources that form an administrative boundary

22

Which program, running on a Linux server, allows Windows-based clients to see the Linux file system without installing client NFS Apache Samba KDE

23Which type of authentication security does Windows 2000 Professional support? Secure Socket Layer Kerberos Samba Apache

24 Which of the following criteria must software meet in order to display the Open Source Initiative trademark? It must be easily altered and adapted to all major operating systems and source code must be limited. It must be compatible with third party add-ons and use standard source code. It must be provided in multiple languages and cost must be minimal. It must be freely distributed without restriction and the source code must be available.

ITE2 Mod07

What is the maximum number of extended partitions supported in any partitioning scheme? one two four eight

The ping command is used to test network connectivity. What is the best IP address to ping for this test? the DNS address the loopback address the local NIC address the default gateway address

In Windows 2000, which file is only used when the computer is set up to dual-boot? BOOTSECT.DOS NTDETECT.COM NTLDR BOOT.INI

When preparing for a CD-ROM based NOS installation, which BIOS setting is important to the system administrator? Boot Up Floppy Seek: Enabled Swap Floppy Drive: Disabled Boot Sequence: CD-ROM, C Quick Power On Self Test: Enabled

Which task should be performed before installing a NOS? Change the system hardware and peripherals before beginning. Verify that the NOS supports all application software that will run on the server. Run the evaluator software prior to loading to establish hardware settings. Be familiar with the NOS so configuration questions can be ignored.

6When setting up a hard disk, what are the three possible types of partitions? primary, secondary, and logical primary, logical, and extended C, D, and E boot, program, and data

ITE2 Mod07

All of the following are functions of an installation program except: ensure interoperability of components request user input for configuration information provide a default set of configuration options simplify the installation process

8How is the root partition identified in Linux? ? Root /root /

Which of the following is an advantage of getting a device with a pre-installed NOS or OS? It is optimized for the particular hardware installed. It compounds the need for a complex installation process. It does not support custom and legacy applications. It completes configuration of server-specific features.

10UNIX systems typically dedicate an entire partition to virtual memory. What is this partition called? the RAM partition the swap partition the page partition the memory partition

11

What is the maximum number of primary partitions allowed in a Sun-type partition table? one two four eight

12In Windows 9x and Linux, why is it important to keep a startup floppy containing the MBR? The startup floppy disk with the MBR must be used to boot from multiple partitions. The floppy disk can be used to boot the system if the MBR on the first sector of the hard disk is corrupt. The MBR on the floppy keeps an error log for troubleshooting purposes. The startup floppy disk with MBR defines the size of partitions on startup.

ITE2 Mod07

13

A DOS-type partition table can describe how many primary partitions? one two four eight

14Which Windows file performs the same function as the Linux LILO files? HAL NTLDR NTDETECT NTOSKRNL

15 Most NOSs will only run on certain hardware configurations. There are typically 4 key elements of the system's hardware that m the minimum requirements of the NOS. Choose the list that contains these elements. 1. CPU speed, RAM, NIC, hard disk space. 2. CPU type, CPU speed, RAM, hard disk space. 3. CPU type, RAM, NIC, CD ROM drive. 4. CPU type, RAM, CPU speed, CD ROM drive. 1 2 3 4

16

What is virtual memory? logical RAM that is created during installation memory that is installed on the logic board memory that can only be used by high-end programs hard disk space that is used to supplement RAM

17What is the best source of information for the latest hardware compatibility list? the World Wide Web a hardware manual a software manual the CD-ROM Read Me document

ITE2 Mod07

18

What are valid file systems for a UNIX or Linux partition? EXT1 and EXT2 EXT3 and UFS UFS and EXT1 LFS and EXT2

19What are logical divisions on a hard disk called? partitions sectors divisions cylinders

20

Which Windows utility can be used to perform a hardware inventory? Administrative Tools ScanDisk Windows Explorer Device Manager

21A user is loading the Linux NOS and the system hangs. What should be done? Immediately power down the machine and wait five minutes before rebooting and reinstalling. Wait five minutes, if there is no activity, power down the machine and restart. Start the installation again. Remove the installation media and attempt an install from a CD-ROM. Reformat the hard disk and reinstall the NOS.

22

When a computer is turned on, what is the first step every computer will do regardless of the operating system? Boot RAM POST SCSI

23What are the default names of the administrative accounts on a Windows and UNIX NOS, respectively? root, Administrator Admin, root Administrator, root root, Admin

ITE2 Mod07

24 What is the first sector of a hard drive called on systems that use DOS-type partitioning? partition table drive C swap space MBR

ITE2 Mod08

Which account, created during installation, allows someone to manage the Windows 2000 NOS? Manager Supervisor Administrator SuperUser

When installing Windows 2000 Professional on a new machine, what must you do to boot from the CD? Nothing, it will automatically boot from the CD. Select the correct install device option from the menu. Enter the CMOS setup and set the boot sequence to boot from the CD-ROM drive first. Insert the Windows 2000 CD in the CD-ROM drive and press Enter.

In a Windows 2000 environment, which key combination is used to enable the Windows logon window? Alt+Shift+Enter Ctrl+Shift+Delete Ctrl+Alt+Delete Ctrl+Alt+Enter

When entered in the Run box, which command will launch the Windows 2000 CLI? doskey cli cmd msdos

Which key combination, when executed in the Windows 2000 CLI, will display the command interpreter window in full screen m Shift+Enter Ctrl+Enter Alt+Enter Delete+Enter

6Which Windows tool provides administrators with an easy way to view or navigate a file system? Internet Explorer Windows Explorer WinNT Explorer File Explorer

ITE2 Mod08

What is the purpose of the user's full name in the New User account box? It is informational only. It authenticates the username. It allows the user to logon. It matches the user to permissions.

8In Windows 2000, which of the following is a required field when creating a new user account? the full name the password the user name the description

Which Windows 2000 Administrative Tools submenu provides configuration options for storage, shared resources, hardware d and other key components? Component Services Configure Your Server Computer Management Server Extensions Administrator

10In Windows 2000, what is the best way to restore a deleted user account? Select undelete from the popup menu. Create a new account with the same user name. Select undo from the Edit menu. Delete cannot be undone.

11

What is the proper way to shut down Windows? Push the power off button. Open a DOS window and enter the shut down command. Choose Shut Down from the Start menu. Log off, then push the power off button.

12The network administrator needs to setup a new user account. After clicking on Start --> Programs --> Administrative Tools, w menu option from Administrative Tools should be selected to complete the task? Event Viewer Performance Local Security Policy

ITE2 Mod08
Computer Management

13

All of the following groups can be created in Windows 2000 except: local groups global groups domain local groups domain global groups

14

In the graphic, which type of permissions are being set? share domain NTFS FAT32

15 What are the most basic user-related security tools available to an administrator? logons, permissions

ITE2 Mod08
permissions, groups permissions, passwords passwords, logons

16

Where does the address http://127.0.0.1 point? to the closest web server to the local host to the nearest DNS server to the local intranet

17In Windows 2000, what is the name of the HTTP web service located in the Administrative tools menu? Default FTP site Default Web site Default Web service Default Internet Information Service

18

In the Windows 2000 NOS, which tools must be loaded to run FTP services? FTP Services Network Services Internet Information Services Site Services

19What must occur for a user to telnet to a Windows 2000 machine? The Telnet client must be configured on the Windows 2000 machine. The user must have a valid user account on the Windows 2000 machine. The Telnet service must be stopped on the Windows 2000 machine. The user must physically be at the Windows 2000 machine.

20

Which Start Menu item would the administrator choose to configure Telnet services in Windows 2000? Programs > Administrative Tools > Telnet Client Programs> System tools > Administration > Telnet Programs > Administrative Tools > Telnet Server Administration Programs > Accessories > System Administration > Telnet Server

21In Windows 2000, which command terminates a Telnet session?

ITE2 Mod08
end exit bye logout

22

What is the default authentication method for Windows 2000 Telnet sessions? NTFS NTLM clear text security access method

23What is meant by the "store-and-forward" nature of e-mail? All messages are automatically stored on the server until the recipient forwards them to another user's account. The recipients do not need to be present when an e-mail is delivered to their account. The recipients receive e-mail messages on the server and then must forward them to their personal e-mail accounts. The recipients must be present to receive and store their messages.

24

What should a Windows 2000 administrator do to restrict Telnet access to specific users? Start the Telnet service. Change user permissions to include Telnet. List user names in the file telnet.ini. Create a Telnet Client group.

25Which component of Windows 2000 accommodates many types of scripting languages? VBScript JScript WSH ShellScript

26 Which scripting language is widely used in the Windows OS? VBScript Shell Script REXX Perl Script

ITE2 Mod08

ITE2 Mod09

When is the root account typically created in Linux? at first login during NOS installation when configuring NOS user accounts after user accounts are created

You have installed X Windows version 4.0.x and it will not work. Which of the following could be used to reconfigure it? (Select Xf86cfg Xf86setup Xf86config Xconfigurator XFree86

You have decided to install your new Linux distribution by using the bootable CD that came with it. What must be configured be can boot from the CD? CMOS NVRAM BIOS Hard drive

You have successfully installed your Linux workstation complete with working X Windows. However, your supervisor tells you t should check for a new video driver. Why might you want to do this? RedHat writes their own video drivers but factory ones are better. The manufacturer may have improved the performance with new drivers. Specific video drivers are not included on the distribution disks. All of the video drivers on the distribution disks are limited to 800 x 600 resolution.

Focus-follows-mouse and click-to-focus are two types of focus models. Which software would be responsible for configuring an Windows installation to use one of these models? desktop environment environment variables windows manager mouse driver

6You are at the command prompt and type in the command env. You notice that one of the environment variables shown is DIS What is the purpose of this variable? to identify the monitor type

ITE2 Mod09
to set the screen resolution to set the vertical refresh rate to identify the display used by X Windows

Which of the following would be standard file system types that Linux would use during an installation? (Select two.) NTFS FAT16 FAT32 ext2 ext3 VFAT

8Which statement correctly describes shadow passwords? They allow users to have two different passwords. They are stored in encrypted form in /etc/passwd. They are stored in encrypted form in a file all users can read. They are stored in a file which is not accessible by all users.

Which of the following are valid boot loader options for most Linux installations? (Select two.) Boot.ini Autoexec.bat LILO GRUB Loadlite RPM Loader

10Which term describes the Linux superuser account? sys root power user wheel daemon

11

Where would the driver files for Xfree86 be stored? /etc/X11R6/lib/modules/drivers

ITE2 Mod09
/usr/X11R6/lib/modules/drivers /var/X11R6/lib/modules/drivers /dev/X11R6/lib/modules/drivers

12Where, on a Linux server, would you find the main password file that is readable by any logged-in user? /etc/password /etc/shadow /etc/passwd /var/password /var/passwd

13

You are setting up a Linux workstation and you would like it to automatically get all of the correct IP settings as soon as it boo protocol should you set the workstation to use to accomplish this? DNS ARP DHCP NetBEUI Default Gateway

14You are installing X Windows on your RedHat server. Which command would be similar to what you would need to type at the command prompt in order to install X Windows? dpkg -i xserver-xfree86_4.0.2-7_i386.deb install -UvH X-Windows_4.0.2-7_i386 rpm -Uvh XFree86-server-4.0.2-11.i386.rpm tarrpm -Uvh XFree86-server-4.0.2-11.i386.tar

15 You would like to perform a high-level format on a hard disk. Which of the following Linux commands will accomplish this? format fdformat hformat mkfs mkhfs

16

You are examining lilo.conf and see a line that says "prompt". What will this command prompt a user for? a password an operating system

ITE2 Mod09
a username boot parameters

17You would like to install the samba program on your Linux machine. You have located the file samba-2.0.7.tar.gz. Which com should you use to completely unpack the files in this package? gunzip samba-2.0.7.tar.gz tar -xvf samba-2.0.7.tar.gz tar -xvzf samba-2.0.7.tar.gz gunzip -xvf samba-2.0.7.tar.gz

18

Which of the following can be set within the LILO configuration file? an option to ask for a DNS server an option to clear the /tmp directory at boot an option to boot to runlevel 5 an option to use DHCP

19You have tried to install a particular RedHat package but it keeps telling you that it has a "failed dependency". What would cau error? The package depends on certain user input. The package depends on operating system input. The package depends on another package being installed. The package depends on hardware that is not present in the computer.

20

You have edited lilo.conf and rebooted your Linux server. The changes that you made do not seem to have taken effect. Whic did you omit? copy lilo.conf to /var/lilo run the lilo command copy lilo.conf to /etc/lilo copy lilo.conf to the MBR

21What is the name of the X Windows package that is supplied with most distributions of Linux? X Windows Xfree86 Xfree386 Xlib86 Xlib386

ITE2 Mod09

22

You have successfully installed your Linux server but notice that it only seems to be using 64 megabytes of RAM. You know t are actually 128 megabytes of RAM in the server. How can you force Linux to use the full 128 megabytes of RAM? adjust the RAM setting in the BIOS create a file called SYSRAM in /etc put the actual amount of RAM in the LILO configuration file manually enter the amount of RAM in the /dev directory

23You have formatted a drive while doing a Linux installation for a production server. The formatting revealed that there were se blocks. You see that the bad blocks make up about four percent of the total disk. Which of the following would be the best cou action? reformat the drive with a high level format reformat the drive with a low level format replace the drive mark the blocks as "bad" and continue the installation

24

You are installing RedHat 7.2 and have decided to use the installation class called "Workstation". Which of the following pack not be installed? (Select two.) X Windows Telnet daemon HTTP daemon Vi editor Sendmail daemon Browser

25Which command will terminate an X Windows session and present the user with a text mode login prompt? Xend init 5 telinit 3 xstop 3 telinit 5 stopx

ITE2 Mod10

The administrator is logged in as the root user. What will happen when the command displayed in the graphic is executed? The home directory of user1 will be deleted along with all the subdirectories and files. An error message will display. All files and directories from the root level down will be deleted. Only files, not directories, will be deleted from the home directory of user1.

What are Pico and vi? versions of Linux Linux CLI commands text editors user desktop environments

Which command is used to create a group on a Linux system? newgrp addgroup groupadd newgroup

4In Linux, which command is used to create a new directory? md mdir dir mkdir

ITE2 Mod10

You are working in the vi editor and see the screen in the graphic. What will happen when you press Enter? Vi will request a file name. Vi will enable indexing. Vi will be set to edit mode. Vi will be set to interactive mode.

6Which command does the root user issue to create new user accounts? usernew newuser addnew useradd

In Linux, what information does the df command display about a hard disk or partition? (Select two.) the total, used, and available hard disk space all previous changes made to the partitions on the disk specific file information on the disk all the mounted partitions on the drive information about a specific file

8In Linux, which command is used to switch from the X Windows GUI to the CLI? Ctrl+Alt+F1 Shift+Ctrl+F1 Shift+Alt+F1 Ctrl+Delete+F1

What is X Windows?

ITE2 Mod10
It is server software to setup web services in Linux. It is software that allows users to set the number of open Telnet windows in Linux. It is a GUI interface used by Linux. It is mail client software for Linux.

10In Linux, what is the function of the cd .. command? changes to the user' home directory s changes to a specified directory changes to the previous directory changes to the directory above the current directory

11

Which file must be edited by the Linux administrator to manually disable a user' password? s /etc/passwd /user/shadow /etc/shadow /root/shadow

12Which command character allows users to enter the vi edit mode? # i e >

13

A user wants to disable the Telnet and FTP services in Linux. In the configuration file, which character would the user place a beginning of the Telnet or FTP line? x ? # !

14On a Linux system, which configuration files contain user account information?(Select two.) \etc\shadow /etc/passwd /etc/user/passwd \etc\passwd /etc/shadow

ITE2 Mod10
/etc/user/passwd

15 In Linux, what must the administrator do to configure web services? uninstall Apache install IIS modify the setup files in the /conf directory of the Apache installation modify the inetd.conf file in the /sbin directory

16

In Linux, which permissions can be set using the chmod command? change, read, and full control read, full control, and execute change, execute, and read read, write, and execute

17In Linux, which command is used to rename a directory? mv cd dir mkdir

18

What does the # symbol indicate at the Linux prompt? user' home directory s root access an error occurred password required

19Which term defines a process that runs on a Linux server? bin sys daemon root

20

Which service can be deployed as a more secure alternative to Telnet? FTP NFS

ITE2 Mod10
SSH TFTP

21Which Linux process will automatically run scheduled tasks at a specified time? run crond sched auto

22

Which Linux shell uses the % symbol as the default prompt? Bourne Shell Korn Shell C Shell BASH shell

23In Linux, which command allows users to learn more about any command? cal man help doskey

24

In which file does the activation of the Linux FTP service take place? /etc/conf/init.d /etc/conf.d /etc/rc.d/init.d/xinetd /etc/activate/inetd

25Which option is used with the init command to force a rescan of the /etc/inittab file to implement runlevel changes? f q r t

26

Which scripting language is basic to the Linux OS? VBScript

ITE2 Mod10
shell script JavaScript Perl Script

27In Linux, when is the root account typically created? at first login during NOS installation when configuring NOS user accounts after user accounts are created

ITE2 Mod11

There are several advantages of using SNMP over CMIP as a network management tool for small to medium sized businesses of the following is an advantage? Overhead for SNMP is considerably less than what is required for CMIP. SNMP is considerably faster than CMIP.

SNMP is based on the OSI protocol suite and is therefore more compatible with most network operating systems than CM SNMP gives a clearer analysis of network problems than CMIP.

What are the two backup utilities used in Linux? archive and backup tar and cpio xbackup and tape archive and cpio

What is the function of a protocol analyzer? analyzing unsuccessful ping packets for redelivery capturing packets transmitted between two or more network devices retransmitting packets that are dropped during transmission holding undeliverable packets in a queue for further analysis

What is the correct syntax for the Linux mount command? mount servername:/directory/subdirectory /localdirectory mount servername:/localdirectory/directory /subdirectory mount servername:/directory/localdirectory /subdirectory mount servername:/subdirectory/directory /localdirectory

Which item boosts system performance by allocating space on the hard drive and treating it as an extension of memory? CPU virtual memory RAM performance manager

6Linux administrators have several CLI commands available to display information on system resources. What is the output ass with using the du command? a display of disk usage for a file system a display of disk usage for a directory a display of disk usage for file information

ITE2 Mod11
a display of the user' remaining disk space s

Which Linux command can be used to terminate a process? terminate end kill abort

Based on the output in the graphic, which Linux utility is running? ps aux | more top performance monitor process viewer

The command in the graphic has been entered. What will be the result?

ITE2 Mod11
The system creates a j: drive for the mystuff share on the cdlist server. The system connects to the mystuff share on the cdlist server. The system connects to the cdlist share on the mystuff server. The system connects to the cdlist directory under the mystuff share.

10What is the centralized location for managing SNMP? agent station community management station central node

11

In Windows 2000, where would a user look to find information about system resources? My Computer Device Manager Performance tool Storage tool

12Which Linux command is used to create partitions on a hard disk? mkdev fdisk mkfs fsck

13

What is the function of the /etc/crontab file in Linux? to schedule system jobs to schedule user jobs to validate created processes to remove cron jobs

14 When should a baseline reading of network performance be made? at the busiest time of day when the network is running normally at the least busy time of day when the network is not in use

ITE2 Mod11

15Which considerations are most important when choosing a backup storage device? reliability and size speed and manageability ease of accessibility and size manufacturer and speed

16

Which output does the df command produce when executed from the Linux CLI? detailed information about the file system detailed information about the top-level directory detailed information about CPU and RAM usage detailed information about the data stored on the disk

17Which type of backup will select only those files that have changed since the last backup and clear the file markers indicating have been backed up? partial differential incremental full

18

A group of tape drives can be made fault-tolerant by using RAIT (the tape version of RAID). What is this technology called? tape group tape library tape autochanger tape array

19You would like to map the N drive to the TEAM1 subdirectory in the GROUPS directory. The directories reside in the volume D on the server CMF1. Which command sets up this mapping on a NetWare network? map N = CMF1:DATA1\GROUPS\TEAM1 map N = DATA1:CMF1:\GROUPS\TEAM1 map N:CMF1 = DATA1\GROUPS\TEAM1 map N:= CMF1\DATA1:GROUPS\TEAM1 map CMF1:DATA1\GROUPS\TEAM1 = N

20

Which procedure assigns a local drive letter to a remote shared directory? directory linking

ITE2 Mod11
drive linking drive mapping directory mapping

21Which Linux command is used to create filesystems on a partition? mkdev fdisk mkfs fsck

22

Which of the following is the result of poor memory management and lack of available RAM? loss of user permissions hard drive failures deletion of important files program crashes

23What is the function of the MIB? query hosts for their status automatically send information about important events respond to queries organize the information gathered about a network

24

Which disk management tool acts as a storage ceiling to limit the amount of data each user can store on the network? disk limit disk defragmentation disk quotas disk level

25 What is a Core Dump? a record of events occurring on the system a file containing data from a program crash a copy of important files compressed into RAM a text listing of kernel statements

ITE2 Mod11
26What are three key concepts when analyzing and optimizing network performance? bottlenecks, baselines, and best practices baselines, base logs, and best practices best practices, base logs, and bottlenecks baseline, bottlenecks, and backups

27 Why would you see a download speed of around 6.25-KBps when downloading a file from the Internet using a 50-Kbps connec The connection slows down once the download begins. Software compression slows the speed of the download. The download speed is being displayed incorrectly. One unit of measure refers to bits, the other refers to bytes.

ITE2 Mod12

Which unit is used to measure the speed of today' CPUs? s MHz GHz byte MB

Which type of cable is used to connect two computers without going through a hub? console straight-through crossover rollover

Where are video card drivers located in a Linux system? kernel X Window X Server gnome

Which insmod option will automatically unload the module when it is no longer being used? -s -p -f -k

Which Linux file needs to be edited to specify an IRQ for an Ethernet card? /lilo.conf /irq.conf /etc/lilo.conf etc/loli.conf /etc/irq.conf

Which version of the Linux kernel includes ISA PnP support that does not require the isapnp program? 2.1.x 2.2.x 2.3.x 2.4.x

ITE2 Mod12

Which device is used to measure electronic pulses through a cable and to determine shorts or breaks in the cable? digital volt-ohm meter LAN meter oscilloscope fox and hound

Which of the following factors should be considered when installing a SCSI drive? (Select three.) variant ID termination drive size

Which computer resource signals the CPU when a hardware event occurs? DMA IRQ I/O USB

10

Which component plays a big role in hardware configuration? USB ports BIOS SCSI CPU

11

Which option of the insmod program will send output to a log file instead of the console? -s -p -f -k

12

Which of the following files can you check on a Linux system for interrupt request number allocation? /dev/interrupt /proc/interrupt /interrupt /var/interrupt

ITE2 Mod12
13 Which device is used in electronic calibration and to measure signal voltage over time within a cable? LAN meter TDR oscilloscope cable tester

14

Which network troubleshooting device transmits a sonar type pulse through a cable? TDR Digital volt-ohm meter fox and hound LAN meter

15 Which device is used to check for cable breaks and shorts? LAN meter cable tester com port loopback fox and hound

16

Which hardware devices are not considered PnP because they usually involve setting jumpers? (Select three.) hard drives CD-ROMs CPUs modems sound cards

17

Which of the following ports do external peripherals use to connect to a computer? (Select four.) SCSI parallel USB serial RJ-45 BNC

18

What is the main concept to be aware of when installing hardware on a Linux system? price type of device compatibility

ITE2 Mod12
number of slots available

19

Which insmod option will instruct the program to load the module even if the module was compiled for a different kernel? -s -p -f -k

20

Which device is used to check for broadcasts, collisions, usage levels, and errors on an Ethernet network? oscilloscope LAN meter TDR cable tester

21

How is PnP handled in a Linux system? (Select two.) isapnp program iopnp program ISA configuration option in control panel ISA configuration option in the Linux kernel

22

A module needs to be loaded. However, confirmation that the Linux kernel can load the module is important. Which of the follo options of the insmod program will accomplish this task? -s -p -f -k

23

Which program is used to insert a single module into the Linux kernel? imsmod smod ismod insmod

24

When selecting a video card for a server, which of the following would be one important feature to consider for performance? card type amount of on-board RAM manufacturer

ITE2 Mod12
price

25

Which of the following Linux files can be viewed to see resource allocations? (Select three.) /proc/interrupt /proc/dma /proc/imports proc/ioports /proc/alloc

ITE2 Mod13

The graphic displays output from the dmesg command. Where are the messages coming from? the boot loader the kernel the TCP/IP protocol stack the security log

While troubleshooting a Linux server, sometimes it is necessary to terminate a process when it has become unresponsive. This accomplished by using which command? kill quit exit bye

What is the term for a commercial facility whose system backup services include server hardware and other equipment? cold site hot site warm site prep site

4Which Redundant Array of Inexpensive Disks (RAID) level is also known as disk striping? RAID 0

ITE2 Mod13
RAID 1 RAID 5 RAID 0+1

What is the loopback address that a technician would ping to verify that TCP/IP is correctly installed? 192.0.0.1 127.0.0.1 168.0.0.1 223.0.0.1

6What is the maximum amount of down time a mission-critical application can have during the course of the year if the applicatio 99.999% availability requirement? 1 hour 8 hours 5 minutes 90 minutes

On a Linux server, which file is usually the best place to locate error messages that have been generated but not displayed on user log group log security log system log

8What is the term given to a group of independent computers working together as a single system? cluster workgroup domain DNS group

What is the simplest and most recommended method of creating a custom emergency boot disk for Linux? Run the btdisk command. Modify one of the existing boot disks. Copy individual boot files to a floppy. Download a custom configuration from a Web site.

ITE2 Mod13
10In Linux, what is the first program that takes control of the boot process from the BIOS? kernel LILO config.sys linux.sys

11

Which statement is true about the use of passwords in the Linux operating system? Passwords provide little or no security. Passwords cannot expire. There are no passwords. Passwords are case sensitive.

12Which Redundant Array of Inexpensive Disks (RAID) level is also known as disk mirroring? RAID 0 RAID 1 RAID 5 RAID 0+1

13

Which Linux utility will display the system' current IP address, subnet mask, default gateway, DNS server, DHCP server, and s address of the network card? ipconfig ifconfig route tar

14Which type of files can be helpful in identifying several types of problems in a Linux server? security files user data files log files text files

15 Which Redundant Array of Inexpensive Disks (RAID) level is also known as disk striping with parity? RAID 0 RAID 1 RAID 5

ITE2 Mod13
RAID 0+1

16

While booting a Linux server, the booting process stopped and the ' LIL-' error code was displayed. What does this indicate? No part of LILO loaded. The second stage of LILO did not load. The first and second stages both loaded, but the second stage will not run. The disk descriptor table (/boot/map) is corrupt.

17Which Linux file is used to map partitions to the file system? map fstab boot.b syslog

18

Which command in Linux is useful to help resolve printing problems? lprint capture lpq printconfig

19What is the name of the signal that a network administrator sends to remotely power up a computer that has a NIC with WOL technology capabilities? startx powerx magic packet nicpower

20

Which Red Hat Linux utility allows an administrator to either select DHCP IP configuration, or to specify a static IP address alo the associated netmask, gateway, and primary nameserver? netconfig ifconfig pathping lsof

21Which TCP/IP utility prints information about network connections, routing tables, and interfaces? arp

ITE2 Mod13
netstat host dig

22

While booting a Linux server, the booting process has stopped. Upon troubleshooting, an ' error code is discovered. What d L' indicate? No part of LILO loaded. The second stage of LILO did not load. The first and second stages both loaded, but the second stage will not run. The disk descriptor table (/boot/map) is corrupt.

23In a Linux system, the set of recent kernel messages is known as the kernel ring buffer. Which command displays these mess dmesg imesg kmsg rmesg

24 Which Linux packages have the ability to notify the user of dependency issues? (Select two.) Debian RPM tarball nodeps

ITE2 Mod14

Which layer of the OSI reference model is involved when an access list denies traffic to a specific port? Layer 3 Layer 4 Layer 5 Layer 7

What is the first step in creating a security policy for a company network? Lock down the network until holes can be closed. Define an Acceptable Use policy. Implement firewalls at all connections to untrusted networks. Scan open ports on all company servers.

Which of the following are characteristics of a good password policy? (Select two.) It should encourage passwords from a language other than English. It should teach users to use easy-to-remember passwords like a pet' name. s It should expire passwords after a specified time. It should force passwords to be all uppercase. It should require passwords that are a mixture of letters and numbers.

When does it make sense to use a NOS as a firewall solution? if server overhead is a problem if there is a low-traffic environment if there is a need to decrease latency if a NAT solution is recommended

What can be used to repair security ' holes' software? in a security updater a' band-aid' a security patch a router

6Which of the following are examples of biometric security devices? (Select two.) magnetic card reader fingerprint reader retinal scanner proximity token

ITE2 Mod14
key fob token

Which layers of the OSI model are examined in the most comprehensive form of stateful packet filtering? 1, 2, and 7 1, 2, and 3 5, 6, and 7 3, 4, and 7

8Which information can IP filtering technologies use to make packet-forwarding decisions?(Select three.) source IP address destination IP address source MAC address destination MAC address port address

What is one security advantage that magnetic access cards have over physical keys? They are cheaper to purchase and deploy. They allow the authorization to be revoked from a central server. They can be easily hidden. They ensure the identity of the card carrier.

10Which list contains only specific types of DoS attacks? buffer overflow, TCP SYN, Teardrop, and Smith buffer overflow, Data Hang, TCP SYN, and Smurf Ping of Death, TCP SYN, Teardrop, and Smurf Ping of Death, TCP SYN, Data Hang, and Smurf

11

Which agency discovers and studies Internet-related security vulnerabilities? IEEE DARPA CERT/CC DoD

12What is one method of implementing a firewall? router filtering

ITE2 Mod14
ACLs packet switching cut-through filtering

13

Which type of DoS attack uses three-way handshaking to leave multiple ' half-open' connections? Ping of Death TCP SYN Teardrop Data Hang

14What should an administrator do before installing a major software upgrade on a production server? shut down the network obtain written permission from the manufacturer reboot the server test the results on a test server

15 What is the purpose of a firewall? completely isolating a network from the Internet preventing unwanted or malicious IP packets from reaching a network blocking sensitive data packets from exiting a network allowing for control of communication within an intranet

16

What can be done with a packet when using packet filtering? It can be processed, returned, or dropped. It can be forwarded, dropped, or processed. It can be processed, forwarded, or returned. It can be returned, dropped, or processed.

17What is the only 100 percent effective measure to protect the network from outside attacks? Install a firewall. Use a virus scanner. Disallow TCP/IP services. Disconnect from the outside network.

ITE2 Mod14
18 NAT is a process used to protect local networks from hackers. Which list of items applies to NAT? It rewrites the addressing information in IP packets. Hosts with NAT addresses can directly reach Internet hosts. Outside hackers cannot directly reach private IP addresses. It rewrites the addressing information in IP packets. It protects private IP addresses from the Internet. Hosts with NAT addresses can directly reach Internet hosts. Outside hackers can directly reach private IP addresses. It protects private IP addresses from the Internet. It rewrites the addressing information in IP packets. It rewrites the addressing information in IP packets. It protects private IP addresses from the Internet. Outside hackers cannot directly reach private IP addresses. 19When do software manufacturers release security updates? when requested by customers on a bi-monthly basis during field testing a product when vulnerabilities are discovered and fixed on a monthly basis

20

The Internet poses many security issues. What is characteristic of Internet security for corporate networks? Internet protocols are very secure but unauthorized software and e-mail attachments can introduce viruses to a corporat network. Internet protocols have an inherent lack of security and Internet rules have loopholes that can be exploited.

Internet connections are safe because security breaches are uni-directional and therefore do not reach the corporate net

Most Internet security threats to corporations originate from outside attacks because inside users must authenticate to th network. 21/sbin/ipfw/add allow tcp from any to 10.90.0.3 80 What does the 80 signify in the ipfw configuration statement? well-known port for ftp well-known port for RIP well-known port for web servers well-known port for telnet

22

Which option in the Microsoft NOS periodically checks for software patches and upgrades via the Internet? Microsoft Security Fix Windows Update Patch Manager Microsoft Update Manager

23Which term describes an insecure host that has a permanent Internet connection and is used in a DDoS attack?

ITE2 Mod14
a hacker a fleet a zombie a cracker

ITE2 Final

How can the Windows 2000 CLI be accessed? by typing cli in the Run window by typing command prompt in the Run window by typing cmd in the Run window by typing doskey in the Run window

What should an administrator do before installing a major software upgrade on a production server? shut down the network obtain written permission from the manufacturer reboot the server test the results on a test server

What is a legacy application? software that has been inherited from another company a suite of applications intended for integrated use outdated software that remains in use a downloadable upgrade to an application

What is the physical topology when all the computers in a network connect to a central point? point-to-point star ring bus

Which UNIX command allows viewing and changing items in the configuration of a network interface such as IP address, hardw address, broadcast address, and subnet mask? netconfig ifconfig pathping lsof

Which list specifies the items needed to set up email for Linux? mail user agent, mailbox, mailbox protocol transport protocol, mail user agent, mail transfer agent mailbox protocol, mail user agent, transport protocol mail transfer agent, mail protocol, mail user agent

ITE2 Final

In the graphic, which type of permissions are being set? share domain NTFS FAT32

Which of the following are valid boot loader options for most Linux installations? (Select two.) Boot.ini Autoexec.bat LILO GRUB Loadlite RPM Loader

When setting up a hard disk, what are the three possible types of partitions? primary, secondary, and logical primary, logical, and extended

ITE2 Final
C, D, and E boot, program, and data

10

In Linux, which symbol represents the root directory? * / # \

11

You have decided to install your new Linux distribution by using the bootable CD that came with it. What must be configured b you can boot from the CD? CMOS NVRAM BIOS Hard drive

12

Which list of IP addressing information can the DHCP server supply? IP address, NetBIOS, subnet mask subnet mask, web server IP address, DNS IP address DNS IP address, IP address, subnet mask IP address, DNS IP address, web server IP address

13

Which Redundant Array of Inexpensive Disks (RAID) level is also known as disk mirroring? RAID 0 RAID 1 RAID 5 RAID 0+1

14

Which device is used to check for broadcasts, collisions, usage levels, and errors on an Ethernet network? oscilloscope LAN meter TDR cable tester

15 What is the main Internet protocol used for creating a connection with a remote computer? FTP SNMP

ITE2 Final
IMAP Telnet

16

Which TCP/IP utility prints information about network connections, routing tables, and interfaces? arp netstat host dig

17

Which list best describes the main features to consider when selecting a NOS? manufacturer, NIC, security, scalability, performance performance, management/monitoring tools, security, scalability, and robustness scalability, management tools, size, NIC, BUS type size, performance, security, bus architecture, scalability

18

What is one method of implementing a firewall? router filtering ACLs packet switching cut-through filtering

19

Which of the following correctly identifies the network and host portions of a traditional Class B network? network.network.host.host network.network.network.network network.network.network.host network.host.host.host

20

Which characteristic typifies robustness in a server system? the ability to support extra video adapters and monitors the ability to provide multiple remote access connections the ability to survive the failure of one or more components and continue functioning the ability to support redundant backup systems

21

What is a beneficial feature of preemptive multitasking? Applications share the use of the processor by time slicing. The processor dynamically adjusts the amount of memory needed by the application programs. Application programs share memory addresses and exchange information.

ITE2 Final
The operating system controls the allocation of processor time.

22

Which of the following are characteristics of UDP? (Select three.) unreliable fast often used in diskless workstations will retransmit on error

23

In a NOS, what is meant by multitasking? the ability to queue multiple tasks for each user the ability to respond to many user' requests in a hierarchal manner s the ability to appear to execute multiple tasks or processes simultaneously the ability to utilize multiple computers to perform a task

24

Which phrase best describes scalability in a system? ability to sustain its services if components or processes fail ability to deliver NOS services consistently under heavy load ability to respond to client requests for access to server databases ability to grow without degradation in performance

25

The ping command is used to test network connectivity. What is the best IP address to ping for this test? the DNS address the loopback address the local NIC address the default gateway address

26

A module needs to be loaded. However, confirmation that the Linux kernel can load the module is important. Which of the follo options of the insmod program will accomplish this task? -s -p -f -k

27

What does a brute force attack involve? physically damaging a computer or piece of network equipment removing the NOS from the computer sending corrupted attachments via e-mail

ITE2 Final
using a program that guesses at a password using a dictionary

28

Where does the address http://127.0.0.1 point? to the closest web server to the local host to the nearest DNS server to the local intranet

29

193.8.8.8 is an example of which class of IP address? A B C D

30 Which type of backup will select only those files that have changed since the last backup and clear the file markers indicating th been backed up? partial differential incremental full

31

Which Linux command is used to create partitions on a hard disk? mkdev fdisk mkfs fsck

32

Which type of cable is used to connect two computers without going through a hub? console straight-through crossover rollover

33

Which part of the OS, loaded into memory at boot time, manages hardware devices? file system user interface

ITE2 Final
application software kernel

34

What do Virtual Private Networks (VPNs) rely on to insure privacy? firewalls, Access Control Lists(ACLs), public keys username authentication, passwords, encryption passwords, firewalls, kerberos encryption, Access Control Lists (ACLs), username authentication

35

What is the most popular Web server software for Linux? Apache Roxen Opera thttp

36

Which item boosts system performance by allocating space on the hard drive and treating it as an extension of memory? CPU virtual memory RAM performance manager

37

Which of the following are characteristics of routers? (Select three.) They contain tables with network addresses. They determine optimal destination routes to other networks. They are faster than switches and bridges. They can be computers with special network software installed. They can be active or passive.

38

What is characteristic of a TCP SYN attack? a large number of half-open connections large numbers of illegal pings multiple servers that are sending large amounts of data numerous port scans looking for open ports on the server

39

What is the function of DNS? to provide a dynamic IP address to determine the MAC address given the IP address

ITE2 Final
to translate an Internet name into an IP address to choose the "best path"

40

What are the default names of the administrative accounts on a Windows and UNIX NOS, respectively? root, Administrator Admin, root Administrator, root root, Admin

41

Which of the following statements describes the OSI reference model? It details a set of rules describing the design process of a network. It provides a standard for measuring network performance. It divides the process of network communications into seven layers. It describes the set of procedures for troubleshooting network problems.

42

You are working in the vi editor and see the screen in the graphic. What will happen when you press Enter? Vi will request a file name. Vi will enable indexing. Vi will be set to edit mode. Vi will be set to interactive mode.

43

Which of the following would be standard file system types that Linux would use during an installation? (Select two.) NTFS FAT16 FAT32 ext2 ext3

ITE2 Final
VFAT

44

What are three key concepts when analyzing and optimizing network performance? bottlenecks, baselines, and best practices baselines, base logs, and best practices best practices, base logs, and bottlenecks baseline, bottlenecks, and backups

45 Which unit is used to measure the speed of today' CPUs? s MHz GHz byte MB

46

What is the most desirable method of documenting Linux system configurations and changes? an electronic logbook a handwritten logbook a tar file of the /etc directory a tar file of the init config

47

What is the most common media used in Ethernet 10BaseT implementations? STP UTP coaxial ThinNet

48

Which protocol was designed for file sharing on the Internet? HTTP FTP SMTP TCP

49

Why is it important to install X Windows on all Linux workstations? The CLI is unavailable for users on a client workstation. It is required for network access. Users are not familiar with the CLI.

ITE2 Final
Almost every workstation program requires X Window in order to run.

50

How is the FTP Service installed on Windows 2000? by installing with a separate program by starting Windows 2000 services by opening the Web Services site by installing the IIS component of Windows 2000

51

What is one major advantage of a star topology? It requires very little cabling. Problems are more easily identified and are typically isolated to one cable segment. Cabling can extend over great distances without loss of signal strength. It does not require any special devices such as hubs, switches, or routers.

52 In Windows 2000 Device Manager, what does a question mark in a yellow circle next to a device indicate? The device does not physically exist. The device drivers are not installed. The device is not compatible with Windows 2000. The device is not supported.

172.30.1.20

172.30.1.25

Ethernet Header (Layer 2)


Ethernet Destination Address (MAC)

Ethernet Source Address (MAC)

Frame Type

IP Header (Layer 3)

Source IP Add. Dest. IP Add. Protocol field

Type 0 or 8

ICMP Message (Layer 3)


Code 0

Checksum

ID

Seq. Num.

Data

Ether. Tr.
FCS

Ping Uses ICMP message within an IP Packet, Protocol field = 1 Both are layer 3 protocols. (ICMP is considered as a network layer protocol.) Does not use TCP or UDP, but may be acted upon by the receiver using TCP or UDP. Format ping ip address (or ping <cr> for extended ping) ping 172.30.1.25
3

Ethernet Destination Address (MAC)

Ethernet Header (Layer 2)

Ethernet Source Address (MAC)

Frame Type

Source IP Add. 172.30.1.20 Dest. IP Add. 172.30.1.25 Protocol field 1

IP Header (Layer 3)

Type 8

ICMP Message - Echo Request (Layer 3)


Code 0 Checksum ID

Seq. Num.

Data

FCS

Ether. Tr.

Echo Request The sender of the ping, transmits an ICMP message, Echo Request Echo Request - Within ICMP Message Type = 8 Code = 0
4

172.30.1.20

172.30.1.25

Ethernet Destination Address (MAC)

Ethernet Header (Layer 2)

Ethernet Source Address (MAC)

Frame Type

Source IP Add. 172.30.1.25 Dest. IP Add. 172.30.1.20 Protocol field 1

IP Header (Layer 3)

Type 0

ICMP Message - Echo Reply (Layer 3)


Code 0 Checksum ID

Seq. Num.

Data

FCS

Ether. Tr.

Echo Reply The IP address (destination) of the ping, receives the ICMP message, Echo Request The ip address (destination) of the ping, returns the ICMP message, Echo Reply Echo Reply - Within ICMP Message Type = 0 Code = 0
6

Q: Are pings forwarded by routers? A: Yes! This is why you can ping devices all over the Internet. Q: Do all devices forward or respond to pings? A: No, this is up to the network administrator of the device. Devices, including routers, can be configured not to reply to pings (ICMP echo requests). This is why you may not always be able to ping a device. Also, routers can be configured not to forward pings destined for other devices.

Traceroute

Trace ( Cisco = traceroute, tracert,) is used to trace the probable path a packet takes between source and destination. Probable, because IP is a connectionless protocol, and different packets may take different paths between the same source and destination networks, although this is not usually the case. Trace will show the path the packet takes to the destination, but the return path may be different.
This is more likely the case in the Internet, and less likely within your own autonomous system.

Uses ICMP message within an IP Packet Both are layer 3 protocols. Uses UDP as a the transport layer. We will see why this is important in a moment.

10.0.0.0/8 RTA .1 .2 RTB .1

172.16.0.0/16 RTC .2

192.168.10.0/24 RTD .1 .2

Format (trace, traceroute, tracert) RTA# traceroute ip address RTA# traceroute 192.168.10.2

10.0.0.0/8 RTA .1 .2 RTB .1

172.16.0.0/16 RTC .2

192.168.10.0/24 RTD .1 .2

DA = 192.168.10.2, TTL = 1

Data Link Header (Layer 2) Data Link Data Link Source Destination Address Address

IP Header (Layer 3) Source IP Add. 10.0.0.1 Dest. IP Add. 192.168.10.2 Protocol field 1 TTL 1

ICMP Message - Echo Request (trace) Type 8 Code 0 Chk sum ID Seq. Num Data

UDP (Layer 4) DestPort 35,000

DataLink Tr. FCS

How it works - Fooling the routers & host!


Traceroute uses ping (echo requests) Traceroute sets the TTL (Time To Live) field in the IP Header, initially to 1
10

10.0.0.0/8 RTA .1 .2 RTB .1

172.16.0.0/16 RTC .2

192.168.10.0/24 RTD .1 .2

DA = 192.168.10.2, TTL = 1 ICMP Time Exceeded, SA = 10.0.0.2

Data Link Header (Layer 2) Data Link Data Link Destination Source Address Address

IP Header (Layer 3) Source IP Add. 10.0.0.2 Dest. IP Add. 10.0.0.1 Protocol field 1

ICMP Message - Time Exceeded Type 11 Code 0 Chk sum ID Seq . Nu m. Data

DataLink Tr. FCS

RTB - TTL:
When a router receives an IP Packet, it decrements the TTL by 1. If the TTL is 0, it will not forward the IP Packet, and send back to the source an ICMP time exceeded message. ICMP Message: Type = 11, Code = 0
11

10.0.0.0/8 RTA .1 .2 RTB .1

172.16.0.0/16 RTC .2

192.168.10.0/24 RTD .1 .2

DA = 192.168.10.2, TTL = 1 ICMP Time Exceeded, SA = 10.0.0.2

Data Link Header (Layer 2) Data Link Data Link Destination Source Address Address

IP Header (Layer 3) Source IP Add. 10.0.0.2 Dest. IP Add. 10.0.0.1 Protocol field 1

ICMP Message - Time Exceeded Type 11 Code 0 Chk sum ID Seq . Nu m. Data

DataLink Tr. FCS

RTB
After the traceroute is received by the first router, it decrements the TTL by 1 to 0. Noticing the TTL is 0, it sends back a ICMP Time Exceeded message back to the source, using its IP address for the source IP address. Router Bs IP header includes its own IP address (source IP) and the sending hosts IP address (dest. IP).

12

10.0.0.0/8 RTA .1 .2 RTB .1

172.16.0.0/16 RTC .2

192.168.10.0/24 RTD .1 .2

DA = 192.168.10.2, TTL = 1 ICMP Time Exceeded, SA = 10.0.0.2

Data Link Header (Layer 2) Data Link Data Link Destination Source Address Address

IP Header (Layer 3) Source IP Add. 10.0.0.2 Dest. IP Add. 10.0.0.1 Protocol field 1

ICMP Message - Time Exceeded Type 11 Code 0 Chk sum ID Seq . Nu m. Data

DataLink Tr. FCS

RTA, Sending Host The traceroute program of the sending host (RTA) will use the source IP address of this ICMP Time Exceeded packet to display at the first hop.
RTA# traceroute 192.168.10.2 Type escape sequence to abort. Tracing the route to 192.168.10.2 1 10.0.0.2 4 msec 4 msec 4 msec
13

10.0.0.0/8 RTA .1 .2 RTB .1

172.16.0.0/16 RTC .2

192.168.10.0/24 RTD .1 .2

DA = 192.168.10.2, TTL = 1 ICMP Time Exceeded, SA = 10.0.0.2

DA = 192.168.10.2, TTL = 2

Data Link Header (Layer 2) Data Link Data Link Source Destination Address Address

IP Header (Layer 3) Source IP Add. 10.0.0.1 Dest. IP Add. 192.168.10.2 Protocol field 1 TTL 2

ICMP Message - Echo Request (trace) Type 8 Code 0 Chk sum ID Seq. Num Data

UDP (Layer 4) DestPort 35,000

DataLink Tr. FCS

RTA
The traceroute program increments the TTL by 1 (now 2 ) and resends the ICMP Echo Request packet.

14

10.0.0.0/8 RTA .1 .2 RTB .1

172.16.0.0/16 RTC .2

192.168.10.0/24 RTD .1 .2

DA = 192.168.10.2, TTL = 1 ICMP Time Exceeded, SA = 10.0.0.2

DA = 192.168.10.2, TTL = 2 ICMP Time Exceeded, SA = 172.16.0.2

RTB This time RTB decrements the TTL by 1 and it is NOT 0. (It is 1.) So it looks up the destination ip address in its routing table and forwards it on to the next router. RTC RTC however decrements the TTL by 1 and it is 0. RTC notices the TTL is 0 and sends back the ICMP Time Exceeded message back to the source. RTCs IP header includes its own IP address (source IP) and the sending hosts IP address (destination IP address of RTA). The sending host, RTA, will use the source IP address of this ICMP Time Exceeded message to display at the second hop.

15

10.0.0.0/8 RTA .1 .2 RTB .1

172.16.0.0/16 RTC .2

192.168.10.0/24 RTD .1 .2

DA = 192.168.10.2, TTL = 1 ICMP Time Exceeded, SA = 10.0.0.2

DA = 192.168.10.2, TTL = 2 ICMP Time Exceeded, SA = 172.16.0.2

RTA to RTB
Data Link Header (Layer 2) Data Link Data Link Source Destination Address Address IP Header (Layer 3) Source IP Add. 10.0.0.1 Dest. IP Add. 192.168.10.2 Protocol field 1 TTL 2 ICMP Message - Echo Request (trace) Type 8 Code 0 Chk sum ID Seq. Num Data UDP (Layer 4) DestPort 35,000 DataLink Tr. FCS

RTB to RTC
Data Link Header (Layer 2) Data Link Data Link Source Destination Address Address IP Header (Layer 3) Source IP Add. 10.0.0.1 Dest. IP Add. 192.168.10.2 Protocol field 1 TTL 1 IP Header (Layer 3) Source IP Add. 172.16.0.2 Dest. IP Add. 10.0.0.1 Protocol field 1 ICMP Message - Echo Request (trace) Type 8 Code 0 Chk sum ID Seq. Num Data UDP (Layer 4) DestPort 35,000 DataLink Tr. FCS

.
Data Link Header (Layer 2) Data Link Data Link Source Destination Address Address .

ICMP Message - Time Exceeded Type 11 Code 0 Chk sum ID Seq . Nu m. Data

DataLink Tr. FCS

16

10.0.0.0/8 RTA .1 .2 RTB .1

172.16.0.0/16 RTC .2

192.168.10.0/24 RTD .1 .2

DA = 192.168.10.2, TTL = 1 ICMP Time Exceeded, SA = 10.0.0.2

DA = 192.168.10.2, TTL = 2 ICMP Time Exceeded, SA = 172.16.0.2

Data Link Header (Layer 2) Data Link Data Link Destination Source Address Address

IP Header (Layer 3) Source IP Add. 172.16.0.2 Dest. IP Add. 10.0.0.1 Protocol field 1

ICMP Message - Time Exceeded Type 11 Code 0 Chk sum ID Seq . Nu m. Data

DataLink Tr. FCS

The sending host, RTA:


The traceroute program uses this information (Source IP Address) and displays the second hop.
RTA# traceroute 192.168.10.2 Type escape sequence to abort. Tracing the route to 192.168.10.2 1 10.0.0.2 4 msec 4 msec 4 msec 2 172.16.0.2 20 msec 16 msec 16 msec
17

10.0.0.0/8 RTA .1 .2 RTB .1

172.16.0.0/16 RTC .2

192.168.10.0/24 RTD .1 .2

DA = 192.168.10.2, TTL = 1 ICMP Time Exceeded, SA = 10.0.0.2

DA = 192.168.10.2, TTL = 2 ICMP Time Exceeded, SA = 172.16.0.2

DA = 192.168.10.2, TTL = 3

Data Link Header (Layer 2) Data Link Data Link Destination Source Address Address

IP Header (Layer 3) Source IP Add. 10.0.0.1 Dest. IP Add. 192.168.10.2 Protocol field 1 TTL 3

ICMP Message - Echo Request (trace) Type 8 Code 0 Chk sum ID Seq. Num Data

UDP (Layer 4) DestPort 35,000

DataLink Tr. FCS

The sending host, RTA:


The traceroute program increments the TTL by 1 (now 3 ) and resends the Packet.
18

10.0.0.0/8 RTA .1 .2 RTB .1

172.16.0.0/16 RTC .2

192.168.10.0/24 RTD .1 .2

DA = 192.168.10.2, TTL = 1 ICMP Time Exceeded, SA = 10.0.0.2

DA = 192.168.10.2, TTL = 2 ICMP Time Exceeded, SA = 172.16.0.2

DA = 192.168.10.2, TTL = 3

RTA to RTB
Data Link Header (Layer 2) Data Link Data Link Source Destination Address Address IP Header (Layer 3) Source IP Add. 10.0.0.1 Dest. IP Add. 192.168.10.2 Protocol field 1 TTL 3 ICMP Message - Echo Request (trace) Type 8 Code 0 Chk sum ID Seq. Num Data UDP (Layer 4) DestPort 35,000 DataLink Tr. FCS

Data Link Header (Layer 2) Data Link Data Link Source Destination Address Address

RTB to RTC

IP Header (Layer 3) Source IP Add. 10.0.0.1 Dest. IP Add. 192.168.10.2 Protocol field 1 TTL 2

ICMP Message - Echo Request (trace) Type 8 Code 0 Chk sum ID Seq. Num Data

UDP (Layer 4) DestPort 35,000

DataLink Tr. FCS

RTC to RTD
Data Link Header (Layer 2) Data Link Data Link Destination Source Address Address IP Header (Layer 3) Source IP Add. 10.0.0.1 Dest. IP Add. 192.168.10.2 Protocol field 1 TTL 1 ICMP Message - Echo Request (trace) Type 8 Code 0 Chk sum ID Seq. Num Data UDP (Layer 4) DestPort 35,000 DataLink Tr. FCS

19

10.0.0.0/8 RTA .1 .2 RTB .1

172.16.0.0/16 RTC .2

192.168.10.0/24 RTD .1 .2

DA = 192.168.10.2, TTL = 1 ICMP Time Exceeded, SA = 10.0.0.2

DA = 192.168.10.2, TTL = 2 ICMP Time Exceeded, SA = 172.16.0.2

DA = 192.168.10.2, TTL = 3

RTB This time RTB decrements the TTL by 1 and it is NOT 0. (It is 2.) So it looks up the destination ip address in its routing table and forwards it on to the next router. RTC This time RTC decrements the TTL by 1 and it is NOT 0. (It is 1.) So it looks up the destination ip address in its routing table and forwards it on to the next router. RTD RTD however decrements the TTL by 1 and it is 0. However, RTD notices that the Destination IP Address of 192.168.0.2 is its own interface. Since it does not need to forward the packet, the TTL of 0 has no affect. 20

Data Link Header (Layer 2) Data Link Data Link Destination Source Address Address

IP Header (Layer 3) Source IP Add. 10.0.0.1 Dest. IP Add. 192.168.10.2 Protocol field 1 TTL 1

ICMP Message - Echo Request (trace) Type 8 Code 0 Chk sum ID Seq. Num Data

UDP (Layer 4) DestPort 35,000

DataLink Tr. FCS

Data Link Header (Layer 2) Data Link Data Link Destination Source Address Address

IP Header (Layer 3) Source IP Add. 192.168.10.2 Dest. IP Add. 10.0.0.1 Protocol field 1

ICMP Message Port Unreachable Type 3 Code 3 Chk sum ID Seq . Nu m. Data

DataLink Tr. FCS

RTD RTD sends the packet to the UDP process. UDP examines the unrecognizable port number of 35,000 and sends back an ICMP Port Unreachable message to the sender, RTA, using Type 3 and Code 3.
21

10.0.0.0/8 RTA .1 .2 RTB .1

172.16.0.0/16 RTC .2

192.168.10.0/24 RTD .1 .2

DA = 192.168.10.2, TTL = 1 ICMP Time Exceeded, SA = 10.0.0.2

DA = 192.168.10.2, TTL = 2 ICMP Time Exceeded, SA = 172.16.0.2

DA = 192.168.10.2, TTL = 3 ICMP Port Unreachable, SA = 192.168.10.2

Data Link Header (Layer 2) Data Link Data Link Destination Source Address Address

IP Header (Layer 3) Source IP Add. 192.168.10.2 Dest. IP Add. 10.0.0.1 Protocol field 1

ICMP Message Port Unreachable Type 3 Code 3 Chk sum ID Seq . Nu m. Data

DataLink Tr. FCS

Sending host, RTA RTA receives the ICMP Port Unreachable message. The traceroute program uses this information (Source IP Address) and displays the third hop. The traceroute program also recognizes this Port Unreachable message as meaning this is the destination it was tracing. 22

10.0.0.0/8 RTA .1 .2 RTB .1

172.16.0.0/16 RTC .2

192.168.10.0/24 RTD .1 .2

DA = 192.168.10.2, TTL = 1 ICMP Time Exceeded, SA = 10.0.0.2

DA = 192.168.10.2, TTL = 2 ICMP Time Exceeded, SA = 172.16.0.2

DA = 192.168.10.2, TTL = 3 ICMP Port Unreachable, SA = 192.168.10.2

Sending host, RTA


RTA, the sending host, now displays the third hop. Getting the ICMP Port Unreachable message, it knows this is the final hop and does not send any more traces (echo requests). RTA# traceroute 192.168.10.2 Type escape sequence to abort. Tracing the route to 192.168.10.2 1 10.0.0.2 4 msec 4 msec 4 msec 2 172.16.0.2 20 msec 16 msec 16 msec 3 192.168.10.2 16 msec 16 msec 16 msec

23

24

Anda mungkin juga menyukai