Docsity
Docsity

Prepare for your exams
Prepare for your exams

Study with the several resources on Docsity


Earn points to download
Earn points to download

Earn points by helping other students or get them with a premium plan


Guidelines and tips
Guidelines and tips

CNAB PRACTICE QUESTIONS WITH GUARANTEED ACCURATE ANSWERS |VERIFIED, Exams of Nursing

Match the following components with the layer of the OSI model in which it relates most closely with. A. 64-bit MAC address _________________ B. Encryption _________________ C. Hub _________________ D. SMTP _________________ - ACCURATE ANSWERS✔✔ A. 2 B. 5 C. 1 D. 7 Match the following components with the layer of the OSI model in which it relates most closely with. E. Bridge _________________ F. Internet Protocol _________________ G. Full Duplex Transmission _________________ - ACCURATE ANSWERS✔✔ E. 2

Typology: Exams

2024/2025

Available from 11/21/2024

tenetiii-salvy
tenetiii-salvy 🇺🇸

3

(1)

1.5K documents

1 / 15

Toggle sidebar

Related documents


Partial preview of the text

Download CNAB PRACTICE QUESTIONS WITH GUARANTEED ACCURATE ANSWERS |VERIFIED and more Exams Nursing in PDF only on Docsity!

CNAB PRACTICE QUESTIONS CNAB PRACTICE QUESTIONS WITH GUARANTEED ACCURATE ANSWERS |VERIFIED Match the following components with the layer of the OSI model in which it relates most closely with. A. 64-bit MAC address _________________ B. Encryption _________________ C. Hub _________________ D. SMTP _________________ - ACCURATE ANSWERS✔✔ A. 2 B. 5 C. 1 D. 7

Match the following components with the layer of the OSI model in which it relates most closely with. E. Bridge _________________ F. Internet Protocol _________________ G. Full Duplex Transmission _________________ - ACCURATE ANSWERS✔✔ E. 2 F. 3 G. 1 In which layer of the OSI model can you find TCP/UDP? Layer 3 Layer 4 Layer 5 Layer 6 None of the above - ACCURATE ANSWERS✔✔ Layer 4 What is the octal equivalent of 101010110? 516 726 526 716 - ACCURATE ANSWERS✔✔ 526 What is another term for metric when discussing OSPF?

a. Cost b. Hop count c. Bandwidth d. Delay - ACCURATE ANSWERS✔✔ A Which protocol is represented by 0x 00 19? a. POP b. DNS c. SNMP d. SMTP - ACCURATE ANSWERS✔✔ SMTP Which of the following is a public IP? a. 10.254.254. b. 192.168.24. c. 172.16.4. d. 172.36.8. e. 169.254.4.191 - ACCURATE ANSWERS✔✔ D Match the following PDU to the correct layer of the OSI model a. Layer 1 1.Frame b. Layer 2 2.Segment c. Layer 3 3. Bits d. Layer 4 4. Packet - ACCURATE ANSWERS✔✔ A. 3

B. 1

C. 4

D. 2

Identify the network, first usable, last usable, and broadcast of the following IP address/CIDR. 144.25.72.21/ a. Network________________________ b. First usable________________________ c. Last usable________________________ d. Broadcast________________________ - ACCURATE ANSWERS✔✔ A. 144.25.72. B. 144.25.72. C. 144.25.72. D. 255.255.255. Which of the following is not a valid IPv6 address? a. 2001:cdba:0000:0000:0000:0000:3257: b. 2001:cdba:0:0:0:0:3257: c. 2001:cdba::3257: d. :: e. 127:0:0: f. :: g. All are valid IPv6 IPs - ACCURATE ANSWERS✔✔ e. 127:0:0:

  1. Identify if the protocol is TCP or UDP(most commonly used), then match the corresponding port. Write "TCP" or "UDP" on your answer sheet in column "h-8" a. SNMP TCP or UDP ______________ 1. 110 b. TFTP TCP or UDP ______________ 2. 513 c. rlogin TCP or UDP ______________ 3. 389 d. POP3 TCP or UDP ______________ 4. 69 e. LDAP TCP or UDP ______________ 5. 161 - ACCURATE ANSWERS✔✔ A. UDP 5 B. UDP 4 C. TCP 1 D. TCP 2 E. TCP 3
  2. What does the following command do?

find / -perm /a=x

a. Find all files that are read only b. Find all files that are executable c. Find all files that are owned by root and executable

d. Find all files that are owned by user x - ACCURATE ANSWERS✔✔ c. Find all files that are owned by root and executable

  1. Which of the following is a virtual file system in Linux and contains runtime system information? a. /bin b. /etc c. /dev d. /proc - ACCURATE ANSWERS✔✔ A. /proc
  2. Which of the following is a hidden file on a Linux machine? a. .test.txt b. ~test.txt c. *test.txt d. %test.txt - ACCURATE ANSWERS✔✔ A .test.txt
  3. Which command identifies kernel information in linux? a. iname b. uname c. systeminfo d. ename - ACCURATE ANSWERS✔✔ b. uname
  1. When running an application from command line in linux, what happens when you put an & behind the executable? e.g. root@kali# wireshark & a. Delegate execution to someone else b. The application launches and you lose access to your current command prompt c. The application runs in the background d. Allows you to add another application to run in concert - ACCURATE ANSWERS✔✔ c. The application runs in the background
  2. Which command checks the status of sshd service in linux? a. status sshd b. sshd service status c. service sshd status d. check sshd service status - ACCURATE ANSWERS✔✔ a. status sshd
  3. Which command(s) creates and saves a file in the current directory the user is in; this is a linux environment? Choose all that apply. a. touch test.txt b. echo test > test.txt c. vi test.txt d. nano test.txt - ACCURATE ANSWERS✔✔ a. touch test.txt
  4. What are the most common file descriptors? a. STDIN, STDOUT, STDERR

b. STDIN, STDOUT, STDER c. STIN, STOUT, STERR d. STIN, STOUT, STER - ACCURATE ANSWERS✔✔ a. STDIN, STDOUT, STDERR

  1. Match following ttl values to the operating system (most likely). TTL values may be used more than once. Operating System TTL Value a. Windows XP_______ 1. 64 b. Linux_______ 2. 128 c. Windows Vista__________ 3. 192 d. Windows Server 2008 __________ 4. 255 e. iOS 12.4 __________ 5. 32 - ACCURATE ANSWERS✔✔ A. 2 B. 1 C. 2 D. 2 E. 4
  2. On your home internal network, if you were to ping an IP address (inside your network) that existed, but not assigned to a device, what kind of packet would be generated first? a. ARP b. SNMP c. ICMP

d. CDP e. NFS - ACCURATE ANSWERS✔✔ c. ICMP

  1. Identify the purpose and location of the host file on a current version of windows. a. map hostname to IP address and C:/windows/system32/etc/ b. map MAC address to IP and C:/windows/system32/drivers/etc c. map hostname to IP address and C:/windows/system32/drivers/etc d. map MAC address to IP and C:/windows/system32/etc/ e. Windows does not use a host file, that is only on linux. - ACCURATE ANSWERS✔✔ c. map hostname to IP address and C:/windows/system32/drivers/etc
  2. Which of the following windows feature is a security feature that helps prevents damage to your computer from viruses by closing programs that attempts to execute code from memory in an incorrect way? Choose the best answer. a. Windows Firewall b. Data Execution Prevention c. Kerberos d. LDAP e. WINS f. Windows defender - ACCURATE ANSWERS✔✔ b. Data Execution Prevention
  1. In windows, if you wanted to schedule a task, what command would you issue? (Choose all that apply) a. tasklist b. net task c. schedule d. at e. cron f. schtasks - ACCURATE ANSWERS✔✔ D F
  2. Which of the following hashes is the administrator hash in windows? a. :500:44efce164ab921caaad3b435b51404ee:32ed87bdb5fdc5e9cba 47376818d4::: b.:1:d5fe21d304a98621a361a6c342c88aea:f6f385f51564ede6f6a 226bb3c::: c. :501:aad3b435b51404eeaad3b435b51404ee:31d6cfe0d16ae931b73c 9d7e0c089c0::: d. :0:aad3b435b51404eeaad3b435b51404ee:31d6cfe0d16ae931b73c59d 7e0c089c0::: - ACCURATE ANSWERS✔✔ A
  3. Match the following assembly registers to their definition. a. EBP_____ 1. Next instruction b. ESP_____ 2. Current position of stack c. EIP_____ 3. Top of the stack - ACCURATE ANSWERS✔✔ A. 1 B. 3

C. 2

  1. What does the following command do? dig axfr @dns.lackland.af.mil lackland.af.mil a. zone transfer b. flush dns c. manage primary dns server d. dns query e. none of the above - ACCURATE ANSWERS✔✔ A
  2. The following command would look for which of the following software suite? (most likely)? Choose the BEST answer. netstat -an 1 | find "4444" | find "ESTABLISHED" a. NESSUS b. BACKTRACK c. Metasploit d. BURP Suite e. Cain and Abel f. Nmap - ACCURATE ANSWERS✔✔ B
  3. This following netstat output identifies which operating system (most likely)? Also identify why you made your selection in blocks "f-6" through "h-8".

TCP 0.0.0.0:21 0.0.0.0:0 LISTENING

TCP 0.0.0.0:25 0.0.0.0:0 LISTENING

TCP 0.0.0.0:80 0.0.0.0:0 LISTENING

TCP 0.0.0.0:135 0.0.0.0:0 LISTENING

TCP 0.0.0.0:111 0.0.0.0:0 LISTENING

TCP 0.0.0.0:445 0.0.0.0:0 LISTENING

TCP 0.0.0.0:1035 0.0.0.0:0 LISTENING

TCP 0.0.0.0:3351 0.0.0.0:0 LISTENING

a. Windows b. Linux c. Neither - ACCURATE ANSWERS✔✔ B

  1. Which UNIX command(s) display information on logged-in users? a. rusers -l 10.10.10. b. finger -l @10.10.10. c. showmount -u 10.10.10. d. showuser -l 10.10.10. e. both a and b - ACCURATE ANSWERS✔✔ E
  2. Remote logging capabilities for UNIX is controlled through which two key files?

a. /etc/syslog.txt b. /etc/host c. /etc/hosts d. /etc/syslog.conf e. /etc/hostlog.conf - ACCURATE ANSWERS✔✔ C D

  1. You've been asked to change the permissions for the DailyLog directory to grant users and groups read and execute privileges. How would you write that command? a. chmod g+rx DailyLog b. chgrp 770 DailyLog c. chgrp a-ux DailyLog d. chmod g+rx Dai1yLog e. chmod ug+rx DailyLog - ACCURATE ANSWERS✔✔ E
  2. Which of these is the proper command for finding files that end in .xml? a. find [a-zA-Z0-9+] '.xml' b. find. -name '.xml' c. echo -n .xml d. grep '[0-9] .xml'

e. finger. -name *.xml - ACCURATE ANSWERS✔✔ B

  1. Which address is likely not a legitimate IP address assigned by the Network Information Center (NIC) or service provider? a. Outside local address b. Inside global address c. Outside global address d. Inside local address - ACCURATE ANSWERS✔✔ D
  2. Which of the following are common routing protocols? a. NetBIOS, ARP, NTP b. EIGRP, OSPF c. SMTP, SNMP d. RIPS, BGTP - ACCURATE ANSWERS✔✔ B
  3. Which of the following is a UNC filepath? a. \dc01\sysvol\scripts\awesome.bat b. /dc01/sysvol/scripts/awesome.bat c. C:\sysvol\scripts\awesome.bat d. awesome.bat - ACCURATE ANSWERS✔✔ A
  1. What is the following? dGhlcXVpY2ticm93bmZveGp1bXBzb3ZlcnRoZWxhenlkb2c= a. Base b. Hex c. Binary d. Python - ACCURATE ANSWERS✔✔ A
  2. Using PGP, User1 wants to send an encrypted message to User2. What key will be used to encrypt the message? a. User1's Public Key b. User1's Private Key c. User2's Private Key d. User2's Public Key - ACCURATE ANSWERS✔✔ D
  3. What can you determine by looking at the IP header? Choose all that apply. a. Destination of the packet b. Next device the packet will route to c. Source IP d. TTL - ACCURATE ANSWERS✔✔ A C