Free Cheat-test Samples and Demo Questions Download
Adobe exams Adobe
Apple exams Apple
Avaya exams Avaya
Check Point exams Check Point
Cisco exams Cisco
Citrix exams Citrix
CIW exams CIW
CompTIA exams CompTIA
CWNP exams CWNP
EC-Council exams EC-Council
EMC exams EMC
Exin exams Exin
Fortinet exams Fortinet
GIAC exams GIAC
Hitachi exams Hitachi
HP exams HP
IBM exams IBM
Isaca exams Isaca
ISC exams ISC
ISEB exams ISEB
Juniper exams Juniper
LPI exams LPI
McAfee exams McAfee
Microsoft exams Microsoft
Oracle exams Oracle
PMI exams PMI
Riverbed exams Riverbed
SNIA exams SAP
Sun exams SAS
Symantec exams Symantec
VMware exams VMware
All certification exams

Network General 1T6-530 Exam - Cheat-Test.com

Free 1T6-530 Sample Questions:

Q: 1 This protocol is connection-oriented and provides reliable end-to-end communication.
A. UDP
B. IP
C. TCP
D. ICMP
Answer: C

Q: 2 The relationship of ports, addresses and sockets is best represented by which of the following statements?
A. A socket is an alternative name for a port
B. A socket is a combination of port and IP address
C. A port is an application and IP address
D. A socket is a pair of IP addresses
Answer: B

Q: 3 The acronym RFC stands for _______.
A. Requested File Control
B. Requesting Further Clarification
C. Revised for Comments
D. Request for Comments
Answer: D

Q: 4 A message is associated with which layer of the OSI reference model?
A. Application
B. Transport
C. Network
D. Data Link
Answer: A

Q: 5 IP addresses consist of unique ______-bit address space.
A. 16
B. 32
C. 1514
D. 2048
Answer: B

Q: 6 The mask /26 will allow _______ hosts on a subnet.
A. 30
B. 32
C. 62
D. 64
Answer: C

Q: 7 What is the Network part of a host that has an address of 10.27.42.100, with a mask of 255.255.0.0?
A. 10
B. 27
C. 27.42
D. 100
Answer: A

Q: 8 Dynamic NAT is typically used for which type of host access?
A. Outside to inside
B. Inside to outside
C. Inside to firewall
D. Firewall to firewall
Answer: B

Q: 9 The Sniffer posts a Local Router condition when:
A. A host receives frames from a local router instead of a remote router
B. No routing is available on a subnet
C. A host sends its frames to a host instead of a router on a subnet
D. A host sends its frames to the router's DLC instead of the DLC of a host on the same subnet
Answer: D

Q: 10 The mask 255.255.255.240 is equivalent to a mask length of_______.
A. 24 bits
B. 28 bits
C. 32 bits
D. None of the above
Answer: B

Q: 11 A logical AND operation of the address 1.2.3.4 with the mask 255.255.255.0 would result in the value:
A. 1.0.0.0
B. 1.2.3.255
C. 1.2.3.0
D. 255.255.255.4
Answer: C

Q: 12 The definition of a supernet is:
A. A block of contiguous network addresses that creates a smaller address space for use on multiple network segments
B. A block of separate network addresses that creates a larger address space for use on multiple network segments
C. A block of separate network addresses that creates a smaller address space for use on multiple network segments
D. A block of contiguous network addresses that creates a larger address space for use on multiple network segments
Answer: D

Q: 13 Which of the following is an address reserved by the InterNIC?
A. 126.0.0.1
B. 127.0.0.1
C. 128.0.0.1
D. All of the above
Answer: B

Q: 14 IP addresses consist of two parts. These parts are:
A. The local portion and the host portion
B. The local portion and the remote portion
C. The network portion and the host portion
D. The network portion and the remote portion
Answer: C

Q: 15 The addresses described by 200.1.32.0 /23 is:
A. A CIDR block
B. A Class C subnet
C. A Class B subnet
D. An aggregator
Answer: A

Q: 16 The address mask 255.255.224.0 equates to _______ in binary.
A. 11111111. 11111111. 11100000. 00000000
B. 00000000. 00000000. 00000000. 00000111
C. 11111111. 11111111. 11111111. 11100000
D. 00000000. 00000111. 11111111. 11111111
Answer: A

Q: 17 When viewing the layout of an IP packet, the first field is the:
A. Version
B. Destination address
C. Source address
D. TTL
Answer: A

Q: 18 Proxy ARP is needed when:
A. A station that does not have a default gateway needs to communicate with a node across a router
B. A station that does not have a DNS server needs to communicate with a node across a router
C. A station that does not have a WINS server needs to communicate with a node across a router
D. A station that does not have a default gateway needs to communicate with a node on the same subnet
Answer: A

Q: 19 ARP lets a host learn the _______ address of another node.
A. DNS
B. MAC or DLC
C. IP
D. WINS
Answer: B

Q: 20 Which of the following ICMP messages is used to test for the existence of an address?
A. Redirect
B. Destination Unreachable
C. Echo Request/Reply
D. Source Quench
Answer: C

Q: 21 To aid a host that has sent an IP packet that has been directed in error to a router, ICMP will:
A. Tunnel IP inside ICMP to connect to the alternative router
B. Send an ICMP message to the sender containing the IP header of the original packet and a suggested alternative route
C. Use ICMP to alter the routing tables
D. Decrement the TTL to zero and return an error
Answer: B

Q: 22 ICMP is a protocol that is used by network devices to:
A. Locate hosts on a subnet
B. Deliver IP troubleshooting data delivered back to the original sender
C. Restrict the Time-to-Live of a packet
D. Determine the best path across an internet
Answer: B

Q: 23 User Datagram Protocol may be described as:
A. A user authentication service
B. A service that provides reliable and connectionless service using IP
C. A service that provides reliable and connection-oriented service using IP
D. A service that provides unreliable and connectionless service using IP
Answer: D

Q: 24 Choose all that apply. What does Transmission Control Protocol do?
A. Eliminates the need for a 3-way handshake
B. Multiplexes conversations and connections
C. Provides reliable segment delivery
D. It handles flow control
Answer: B, C, D

Q: 25 _______ occurs when a host delays the transmission of a full buffer of data until the rate of ACKs returned is evaluated.
A. Delayed Duplicates
B. TCP Slow Start
C. Session Hijacking
D. SYN Flooding
Answer: B

Q: 26 _______ occurs when an attacker sends numerous session requests to a host, but never acknowledges the reply.
A. Delayed Duplicates
B. TCP Slow Start
C. Session Hijacking
D. SYN Flooding
Answer: D

Q: 27 The _______ describes a station that has closed its window. This may or may not be a genuine problem.
A. Window Frozen symptom
B. Silly Window Syndrome symptom
C. Zero Window symptom
D. Duplex Connection symptom
Answer: C

Q: 28While TCP uses ports, UDP:
A. Also has ports, but is not reliable
B. Also has ports, but is reliable
C. Uses process IDs and SAPS
D. None of the above
Answer: A

Q: 29 Virtual circuits are linked together via:
A. Client scope
B. IP address only
C. Well-known ports on the server
D. Client and server ports
Answer: D


© 2014 Cheat-Test.com, All Rights Reserved