1. What transport layer protocol does DNS normally use?
- UDP
- ICMP
- IP
- TCP
2. A DNS TTL determines what?
- How many DNS resolutions can take place before the IP has to change.
- How long a DNS entry is allowed to be cached.
- How many steps there are in the resolution process.
- How far away a DNS can be from you.
3. How many root servers are there?
- 16
- 13
- 17
- 8
4. Which of the following are benefits of using Domain Name Resolution (DNS)?
- Allows administrative changes to happen seamlessly.
- Easy for the node to find the network ID.
- Small routing tables.
- Easier for humans to remember website names.
5. The process of using DNS to turn a domain name into an IP address is known as_________.
- ARP table lookup
- IP addresses
- DNS server
- name resolution
6. An A Record contains what?
- An SOA
- An IPv4 address
- An IPv6 address
- A CNAME
7. MX stands for ________.
- Meta exchange
- Micro exchange
- Micro extreme
- Mail exchange
8. A fully qualified domain name can contain how many characters?
- 63
- 127
- 255
- 64
9. What technique is used to balance traffic across multiple IPs for the same domain?
- Round robin
- Quad A record
- Cycling records
- CNAME
10. Which of the following are part of a Zone File? (select all that apply)
- NS record
- SOA
- FQDN
- A Record
11. Which of the following need to be configured for a computer to operate on a modern network? Check all that apply.
- A TCP port
- An IP address
- A name server
- A MAC address
12. When using Fixed Allocation DHCP, what is used to determine a computer’s IP?
- An A Record
- A subnet mask
- A MAC address
- Location
13. The process by which a client, configured to use DHCP, attempts to get network configuration information is known as _________________.
- DHCP Discovery
- DHCP Request
- DHCP Acknowledgement
- DHCP Offer
14. Which of the following are ways a DHCP can operate? Select all that applies.
- Dynamic allocation
- ARP
- CIDR
- Fixed allocation
15. DHCP is a protocol of which layer?
- Application layer
- Network Layer
- Transport layer
- Physical layer
16. What technique allows for specific destination ports to be configured to always deliver to specific nodes?
- IP masquerading
- IP translation
- Ephemeral ports
- Port forwarding
17. The total number of IPv4 addresses is approximately:
- 100 billion
- 4.2 million
- *B: 4.2 billion
- 4.2 trillion
18. Which Regional Internet Registry(RIR) serves the USA and Canada? multiple choice, shuffle
- ARIN
- APNIC
- LACNIC
- RIPE
19. What is another solution to IP exhaustion that will create more public IP addresses as it is implemented? multiple choice, shuffle
- IP masquerading
- IPv6
- Port preservation
- RFC1918
20. What allows a gateway to rewrite the source IP of an outgoing datagram? multiple choice, shuffle
- IPv4
- NAT
- IPv6
- IANA
21. What is two-factor authentication? Select all that apply.
- a method that requires two usernames
- a method where you need two passwords
- a method where users are required to verify their credentials through a combination of hardware and/or software. Usually a username, password, and a short-lived token.
- a method where you authenticate twice
22. VPNs are known as a _____ protocol.
- network layer
- data link layer
- Connectionless
- Tunneling
23. A proxy is something that _______________________.
- communicates on behalf of something else
- allows for many devices to speak to one other device
- encrypts traffic sent across the Internet
- sends data across a single network segment
24. What are some use cases for reverse proxies? Select all that apply.
- IP address translation
- Improved computer graphics
- Encryption and Decryption
- Load balancing
25. What was one of the first technologies that commonly utilized 2FA (Two-Factor Authentication)?
- TCP
- DNS
- VPN
- UDP
26. Let’s test your knowledge of networking services! You’re an IT Support Specialist at a new company. As your company grows, your manager asks you to solve various networking problems. Your task is to select the correct network device or server to solve the manager’s request.
Step 1: Read the manager’s request in the top-left corner of the screen. The manager’s request will be in the blue speech bubble next to the graphic of a person.
Step 2: Drag and drop the correct network device or server icon (e.g. DHCP) into the “drop here” box on the screen. If you make a mistake, click the back arrow button and try again.
Step 3: After you have completed all requests, close the quiz window and click the “Submit Quiz” button.
Good luck!
IMPORTANT: At the end of the interactive you will need to select the next arrow button one more time before clicking SUBMIT to receive a grade.
27. A company moves a popular website to a new web host. Which of the following will change as a result?
- Root name server
- Internet Protocol (IP)
- Network service
- Domain name
28. How many root name servers are there?
- 100
- 13
- 24
- 5
29. How many root name servers are there?
- 5
- 13
- 24
- 100
30. What is the purpose of DNS round robin technique?
- To route traffic to different destinations, depending on factors like location, congestion, or link health
- To balance traffic
- To resolve an IP to a domain name
- To redirect traffic from one domain name to another
31. A complete Fully Qualified Domain Name (FQDN) is limited to how many characters?
- 127
- 255
- 53
- 63
32. Along with an IP address, a subnet mask, and a name server, which of the following is the other thing required for a computer to operate on a network?
- A gateway
- A proxy
- A NTP server
- A FQDN
33. Fill in the blank: When NAT hides the source IP of an originating device, this is known as _____.
- Port Forwarding
- Routing
- Masquerading
- Switching
34. What NAT technique allows for complete IP masquerading, while still having services that can respond to incoming traffic?
- Preservation
- Rewriting
- Port forwarding
- One-to-many
35. VPNs often use an authentication procedure that requires a user to generate a short lived numerical token through a specialized piece of hardware or software, in addition to providing a username and password. What is this authentication procedure called?
- Biometric authentication
- Two-factor authentication
- Certificate-based authentication
- Password-based authentication
36. Fill in the blank: A service that appears to external clients as a single server, but actually represents many servers behind it, is known as a _____.
- port preservation
- reverse proxy
- VPN
- multiplexer
37. Which type of Domain Name System (DNS) server performs a full name resolution request?
- Caching name server
- Authoritative name server
- Recursive name server
- Root name server
38. Which of these protocols is used by DNS?
- Hypertext Transfer Protocol (HTTP)
- IP (Internet Protocol)
- Dynamic Host Configuration Protocol (DHCP)
- User Datagram Protocol (UDP)
39. Fill in the blank: A DNS record that’s used to redirect traffic from one domain name to another is known as a _______ record.
- CNAME
- SQA
- QUAD A
- NS
40. Which portion of a domain is known as the ‘www” portion?
- The Dynamic Host Configuration Protocol (DHCP)
- The subdomain
- The DNS Resolver
- The Top Level Domain (TLD) name
41. Which of the following requires a manually specified list of MAC addresses and corresponding IPs?
- Subnet mask
- Automatic allocation
- FQDN
- Fixed allocation
42. Network Address Translation (NAT) technology provides benefits for which of these network problems?
- Port Preservation
- Routable addresses
- Address exhaustion
- Assigning IPs to devices on the same network
43. What technique is used with Network Address Translation (NAT) when a source port chosen by a client is the same port used by a router?
- Forwarding
- Preservation
- Translation
- Masquerading
44. Which of these technologies uses encrypted tunnels to allow for a remote computer or network to act as if it’s connected to a network that it’s not actually physically connected to?
- Domain Name System (DNS)
- Dynamic Host Configuration Protocol (DHCP)
- User Datagram Protocol (UDP)
- Virtual Private Network (VPN)
45. What service acts on behalf of a client in order to access another service?
- Dynamic Host Configuration Protocol (DHCP)
- A Virtual Private Network (VPN)
- A proxy server
- Domain Name Systems (DNS)
46. Which of the following are benefits of the Domain Name System (DNS)? Select all that apply.
- It helps automate network configuration.
- It provides Network Address Translation (NAT).
- It assigns Internet Protocol (IP) addresses.
- It provides addresses that are easier for people to remember
47. A video conferencing application isn’t working due to a Domain Name System (DNS) port error. Which resource record requires modification to fix the issue?
- Host (A)
- Canonical name (CNAME)
- Text (TXT)
- Service record (SRV)
48. What is the non-profit organization that handles administration and definition of TLDs?
- DHCP
- CNAME
- FQDN
- ICANN
49. Which of the following allows hundreds of computers all to have their outbound traffic translated to a single IP?
- Rewriting
- Preservation
- One-to-many NAT
- Port forwarding
50. Fill in the blank: Most VPNs work by using the payload section of the _____ layer to carry an encrypted payload that contains an entire second set of packets.
- transport
- application
- network
- presentation
51. At the very lowest level, what data does a computer understand?
- Media Access Control (MAC) addresses
- IP (Internet Protocol) addresses
- Binary numbers
- Hexadecimal digits
52. Network Address Translation (NAT) is typically implemented with which of these hardware devices?
- Hubs
- Routers
- Servers
- Switches
53. During the name resolution process, which server does a local recursive server contact first?
- Root name server
- Top level domain (TLD) server
- Caching name server
- Authoritative name server
54. What port on a name server is used for User Datagram Protocol (UDP) name request packets?
- 53
- 80
- 25
- 22
55. Which address does the field in DHPOFFER specify?
- The Gateway address
- The Internet Protocol (IP) address
- The Media Access Control (MAC) address
- The Data Link Layer
56. What kind of proxy is used to prevent someone from accessing sites by inspecting what data is being requested, and then allowing or denying this request, depending on what site is being accessed?
- A gateway proxy
- A reverse proxy
- An authentication proxy
- A web proxy
57. What is the biggest difference between TCP and UDP?
- TCP requires less overhead for DNS.
- More traffic can be transmitted using UDP.
- TCP is connectionless.
- UDP is connectionless