What tcpdump command can be used to filter out all traffic except ssh traffic?

QUESTION 45

  1. What is NOT one of the three characteristics of TCP in its role
    as a reliable delivery protocol?

    a. Sequencing and checksums
    b. Flow Control
    c. Framing
    d. Connection-oriented Protocol

1.25 points   

QUESTION 46

  1. What is by far the most popular DNS server software
    available?

    a. Dnsmasq
    b. Microsoft DNS
    c. BIND
    d. Oracle Resolver

1.25 points   

QUESTION 47

  1. What is routing protocol convergence time defined as?

    a. It is the time it takes for the protocol to recognize that a
    change has occurred.
    b. It is the amount of time it takes after initial configuration of
    the protocol for all routes to become known.
    c. It is the time it takes for the protocol to recognize the best
    path in the event of a network change.
    d. It is the amount of time involved in configuration of the
    routing protocol.

1.25 points   

QUESTION 48

  1. What is the ARPA domain suffix utilized for?

    a. It is used to announce records for other TLDs such as .com and
    .net.
    b. It is a specialized government restricted TLD.
    c. It is used for reverse DNS queries, and holds PTR records.
    d. It is a private TLD used for synchronization of zones between
    servers.

1.25 points   

QUESTION 49

  1. What is the purpose of the checksum TCP field?

    a. It specifies special options, such as the maximum segment size a
    network can handle.
    b. It identifies the data segment's position in the stream of data
    segments being sent.
    c. It allows the receiving node to determine whether the TCP
    segment became corrupted during transmission.
    d. It confirms receipt of data via a return message to the
    sender.

1.25 points   

QUESTION 50

  1. What occurs when a collision happens on a network?

    a. The collision will create an error in the network switch, but
    otherwise, no issues will occur as a result.
    b. The collision goes undetected, and data transmission
    continues.
    c. Each node on the network waits a random amount of time and then
    resends the transmission.
    d. Each node on the network stops transmitting, until manually told
    to reconnect and transmit.

1.25 points   

QUESTION 51

  1. What part of a MAC address serves as the extension identifier,
    or device ID?

    a. The last 12 bits of the MAC address.
    b. The first 12 bits of the MAC address.
    c. The first 24 bits of the MAC address.
    d. The last 24 bits of the MAC address.

1.25 points   

QUESTION 52

  1. What routing metric affects a path's potential performance due
    to delay?

    a. latency
    b. theoretical bandwidth
    c. MTU
    d. load

1.25 points   

QUESTION 53

  1. What statement regarding the Server Message Block protocol is
    accurate?

    a. It is a protocol used for accessing network-based LDAP
    directories.
    b. It is used by Windows and UNIX-based operating systems to share
    files.
    c. It is a simple protocol used to synchronize block messages
    written to iSCSI drives on a network.
    d. It is a signaling protocol used to make a connection between
    hosts prior to data transfer.

1.25 points   

QUESTION 54

  1. What statement regarding the differences between the Windows
    tracert utility and the Linux/UNIX/macOS traceroute utility is
    accurate?

    a. By default, the tracert utility uses ICMP echo requests, while
    traceroute uses UDP datagrams or TCP SYN messages.
    b. The Windows tracert utility does not place limits on the TTL of
    repeated trial messages.
    c. The tracert utility expects an ICMP port unreachable error
    message as the final reply to a trace.
    d. Only tracert can send UDP messages for tracing a path.

1.25 points   

QUESTION 55

  1. What tcpdump command can be used to filter out all traffic
    except SSH traffic?

    a. tcpdump port 22
    b. tcpdump -f +ssh
    c. tcpdump -p 22
    d. tcpdump only ssh

1.25 points   

QUESTION 56

  1. What text editor can be used on Linux to view and edit the
    contents of a configuration file?

    a. Microsoft Word
    b. vim
    c. edit
    d. Notepad

1.25 points   

QUESTION 57

  1. What type of IPv6 address is fe80::8cf1:2c42:ffde:da1c?

    a. anycast address
    b. global address
    c. multicast address
    d. link local address

1.25 points   

QUESTION 58

  1. What utility is the equivalent to the pathping command on a
    Linux system?

    a. mtr
    b. tracepath
    c. traceroute
    d. hping

1.25 points   

QUESTION 59

  1. What utility is used to verify that TCP/IP installed, bound to
    the NIC, configured correctly, and communicating with the
    network?

    a. ping
    b. ifconfig
    c. traceroute
    d. route

1.25 points   

QUESTION 60

  1. When using DHCP for IPv6 (i.e. DHCPv6), what port do clients
    receive responses on?

    a. port 68
    b. port 546
    c. port 67
    d. port 547

Answer

`Hey,

Note: Brother if you have any queries related the answer
please do comment. I would be very happy to resolve all your
queries.

45) OPTION C IS CORRECT

46) OPTION C IS CORRECT

47) OPTION A IS CORRECT

48) OPTION C IS CORRECT

49) OPTION C IS CORRECT

Note: Brother According to chegg's policy we are only
allowed to answer first 5 mcq if there are many. So, I request you
to post other part as separate posts.

Kindly revert for any queries

Thanks.

Leave a Reply

Your email address will not be published. Required fields are marked *

Related Posts