IP services are crucial in managing network configurations, addressing, and communication. In this section, we will focus on the key topics: DHCP, DNS, NTP, TFTP, FTP, Port Security, and NAT. These services are essential for network management, ensuring efficient communication, accurate time synchronization, and secure data transfers.
DHCP (Dynamic Host Configuration Protocol)
What is the main purpose of the DHCP protocol? a) Assign IP addresses dynamically to clients b) Provide DNS services c) Encrypt data packets d) Configure the router
Which of the following DHCP messages is used by the client to request an IP address? a) DHCPDISCOVER b) DHCPREQUEST c) DHCPOFFER d) DHCPACK
Which port does DHCP use for communication? a) 53 b) 67 c) 80 d) 123
What is the role of the DHCP server in the IP configuration process? a) Assign IP addresses to clients b) Assign DNS addresses c) Route packets d) Verify IP address conflicts
What happens if a DHCP client does not receive an IP address? a) The client stops working b) The client retries the DHCPDISCOVER message c) The client manually assigns an IP address d) The router assigns the IP
In DHCP, what is the purpose of a lease time? a) It determines how long the client can keep its IP address b) It determines how long the DHCP server will operate c) It determines the number of clients allowed d) It determines the time for DNS resolution
Which of the following is NOT a type of DHCP message? a) DHCPREQUEST b) DHCPACK c) DHCPACKNOWLEDGE d) DHCPDISCOVER
What is the role of the DHCP relay agent? a) It forwards DHCP messages between clients and servers b) It directly assigns IP addresses c) It encrypts DHCP packets d) It resolves IP conflicts
Which DHCP option is used to configure the DNS server address? a) Option 6 b) Option 15 c) Option 3 d) Option 66
In which scenario is DHCP most commonly used? a) For static IP address assignment b) For dynamic address assignment in large networks c) For DNS lookups d) For routing information propagation
DNS (Domain Name System)
What is the purpose of the DNS protocol? a) To assign IP addresses dynamically b) To resolve hostnames to IP addresses c) To encrypt data packets d) To check the availability of a device
Which DNS record type is used to map a domain name to an IPv4 address? a) A b) AAAA c) CNAME d) MX
What does the “MX” record in DNS specify? a) Mail server b) Name server c) IP address d) Alias
Which DNS record type is used for IPv6 addresses? a) A b) AAAA c) CNAME d) PTR
What is the default port number for DNS communication? a) 80 b) 53 c) 443 d) 21
Which of the following is a DNS query type? a) A b) B c) C d) D
What is the purpose of a CNAME DNS record? a) Maps a domain to an IPv6 address b) Specifies mail servers c) Creates an alias for a domain d) Defines the authoritative name server
What is the maximum size of a DNS packet over UDP? a) 512 bytes b) 1024 bytes c) 1500 bytes d) 2048 bytes
Which DNS server holds the most authoritative information about a domain? a) Root server b) Secondary server c) Authoritative server d) Cache server
What type of DNS record is used to map a domain to a specific mail server? a) A b) MX c) TXT d) PTR
NTP (Network Time Protocol)
What is the main function of the NTP protocol? a) To configure network devices b) To synchronize clocks of computer systems c) To resolve domain names to IP addresses d) To secure network traffic
Which of the following is true about NTP? a) NTP uses UDP for communication b) NTP uses TCP for communication c) NTP only works within LANs d) NTP is used for file transfers
What is the default port for NTP communication? a) 123 b) 443 c) 80 d) 21
In NTP, what is a “stratum”? a) The delay between client and server b) The level of time accuracy c) The type of synchronization d) The time zone configuration
Which of the following NTP servers would have the highest level of time accuracy? a) Stratum 1 b) Stratum 2 c) Stratum 3 d) Stratum 4
What is the purpose of a “leap second” in NTP? a) To adjust the time periodically b) To synchronize clocks with atomic time c) To adjust for Daylight Saving Time d) To synchronize with the local time zone
What type of information does the NTP client exchange with an NTP server? a) Time and date only b) Time, date, and time zone c) Time, date, and accuracy d) Time, date, and synchronization status
Which of the following is a typical use case for NTP? a) Synchronizing routers with time servers b) Transferring files between systems c) Encrypting data packets d) Configuring DHCP
How does NTP improve the accuracy of time synchronization? a) By using GPS signals b) By averaging time from multiple servers c) By using a single time reference d) By adjusting for network delays
What happens if a system’s NTP configuration is incorrect? a) The system may experience clock drift b) The system will stop operating c) The system will require a reboot d) The system will switch to manual time setting
TFTP and FTP
What does TFTP stand for? a) Trivial File Transfer Protocol b) Transfer File Time Protocol c) Transparent File Transfer Protocol d) Time File Transfer Protocol
Which of the following is true about TFTP? a) It is more secure than FTP b) It operates over TCP c) It is typically used for file transfers in a local network d) It provides error-checking during data transmission
Which protocol uses port 21 for communication? a) TFTP b) FTP c) SMTP d) SSH
What is a key feature of FTP? a) It is unencrypted b) It supports both file upload and download c) It uses port 443 d) It is used for network time synchronization
What is the default mode of FTP for file transfers? a) Active mode b) Passive mode c) Secure mode d) Binary mode
In FTP, which command is used to authenticate a user? a) USER b) PASS c) AUTH d) LOGIN
Which of the following protocols is used for transferring files with no encryption? a) FTP b) SFTP c) HTTPS d) FTPS
What is the primary difference between FTP and TFTP? a) FTP is more secure b) TFTP uses UDP, while FTP uses TCP c) FTP is faster d) TFTP supports file compression
What does the FTP command “STOR” do? a) Retrieves a file from the server b) Stores a file on the server c) Lists files on the server d) Deletes a file from the server
In which scenario is TFTP typically used? a) Uploading large files to a server b) Transferring system configurations to network devices c) Securely transferring personal files d) Sending email attachments
Port Security and NAT
What is the main function of Port Security? a) To prevent unauthorized devices from accessing a network b) To configure IP addresses for devices c) To create a VPN connection d) To monitor network traffic
Which of the following can be used to limit access to specific ports in a network switch? a) Port Security b) NAT c) DHCP d) DNS
What is the main purpose of NAT (Network Address Translation)? a) To encrypt data packets b) To translate private IP addresses to public IP addresses c) To assign IP addresses dynamically d) To verify domain names
Which of the following NAT types allows multiple devices on a local network to share a single public IP address? a) Static NAT b) Dynamic NAT c) PAT (Port Address Translation) d) Overloading NAT
What is the function of Port Address Translation (PAT)? a) It assigns multiple private IP addresses to one public IP b) It translates public IP addresses into private IPs c) It encrypts data packets d) It tracks network usage
Which of the following can Port Security limit on a switch port? a) IP addresses b) MAC addresses c) Subnet masks d) DNS queries
What happens if an unauthorized MAC address is detected in a port-secured environment? a) The port is disabled b) The port is reset c) The connection is established d) The switch reconfigures
Which of the following is a limitation of NAT? a) It increases security b) It reduces the number of public IP addresses needed c) It may cause issues with certain protocols d) It accelerates network performance
Which port security mode allows only specific MAC addresses to connect to the network? a) Dynamic b) Static c) Sticky d) Adaptive
How does NAT enhance security? a) By encrypting data packets b) By hiding internal network IP addresses from external networks c) By limiting access to ports d) By configuring firewall rules
Answers
Qno
Answer
1
a) Assign IP addresses dynamically to clients
2
b) DHCPREQUEST
3
b) 67
4
a) Assign IP addresses to clients
5
b) The client retries the DHCPDISCOVER message
6
a) It determines how long the client can keep its IP address
7
c) DHCPACKNOWLEDGE
8
a) It forwards DHCP messages between clients and servers
9
a) Option 6
10
b) For dynamic address assignment in large networks
11
b) To resolve hostnames to IP addresses
12
a) A
13
a) Mail server
14
b) AAAA
15
b) 53
16
a) A
17
c) Creates an alias for a domain
18
a) 512 bytes
19
c) Authoritative server
20
b) MX
21
b) To synchronize clocks of computer systems
22
a) NTP uses UDP for communication
23
a) 123
24
b) The level of time accuracy
25
a) Stratum 1
26
a) To adjust the time periodically
27
c) Time, date, and accuracy
28
a) Synchronizing routers with time servers
29
b) By averaging time from multiple servers
30
a) The system may experience clock drift
31
a) Trivial File Transfer Protocol
32
c) It is typically used for file transfers in a local network
33
b) FTP
34
b) It supports both file upload and download
35
a) Active mode
36
a) USER
37
a) FTP
38
b) TFTP uses UDP, while FTP uses TCP
39
b) Stores a file on the server
40
b) Transferring system configurations to network devices
41
a) To prevent unauthorized devices from accessing a network
42
a) Port Security
43
b) To translate private IP addresses to public IP addresses
44
c) PAT (Port Address Translation)
45
a) It assigns multiple private IP addresses to one public IP
46
b) MAC addresses
47
a) The port is disabled
48
c) It may cause issues with certain protocols
49
b) Static
50
b) By hiding internal network IP addresses from external networks