• No results found

1 Data information is sent onto the network cable using which of the following? A Communication protocol B Data packet

N/A
N/A
Protected

Academic year: 2021

Share "1 Data information is sent onto the network cable using which of the following? A Communication protocol B Data packet"

Copied!
7
0
0

Loading.... (view fulltext now)

Full text

(1)

Review questions

1 Data information is sent onto the network cable using which of the following?

A Communication protocol B Data packet

C Media access method D Packages

2 To which TCP/IP architecture layer do the media access methods belong?

A Application B Internet

C Network Interface D Transport

3 To which TCP/IP architecture layer do TCP and UDP belong? A Application

B Internet

C Network Interface D Transport

4 To which TCP/IP architecture layer do routing protocols belong? A Application

B Internet

C Network Interface D Transport

5 To which TCP/IP architecture layer do e-mail and Web browser protocols belong?

A Application B Internet

(2)

6 Which IEEE standard defines the communication protocol for Ethernet? A 802.3

B 802.5 C 802.11 D 802.15

7 Which protocol is used to convert logical IP addresses to physical MAC addresses?

A ARP B DNS C IMAP4 D RIP

8 You can use the command-line utility _______________ to retrieve a computer’s IP configuration.

IPCONFIG

9 Which protocol is responsible for the logical addressing of each packet created by the transport layer?

A IP B RIP C TCP D UDP

10 The ping utility is the most common use of which protocol? A ARP

B ICMP/ICMPv6 C IGMP

D RIP

11 SSH was designed as a replacement for ________________ and other insecure remote shells, which sent data (including passwords) in plaintext.

(3)

12 Which TCP/IP architecture layer makes use of ports? A Application

B Internet

C Network Interface D Transport

13 True or false? TCP is a connection-oriented protocol that creates and verifies a connection with a remote host before sending information. True. UDP is connectionless.

14 Which is a simple software-based protocol analyzer? A The command-line utility ARP

B The command-line utility IPCONFIG C The Windows Network Monitor utility D The Windows Network Control Panel utility

15 Which protocol do Web browsers and Web servers use most often? A FTP

B HTTP C HTTP(S) D TFTP

16 Which e-mail protocol is used to send and receive e-mail messages between e-mail servers and used by e-mail client software to send messages to the server, but never used to retrieve e-mail from a server? A IMAP4

B POP3 C SMTP

17 The Internet Assigned Numbers Authority (IANA) implemented _____________ IPv4 addresses in order to differentiate between the portion of the IP address that identifies a particular network and the portion that identifies a specific host on that network.

(4)

18 What is the default subnet mask for a Class C IP address? A 255.0.0.0

B 255.255.0.0 C 255.255.255.0 D 0.255.255.255

19 Which is not a valid subnet mask? A 255.255.0.0

B 255.247.0.0 C 255.255.255.0 D 255.0.255.0

20 IP address 227.43.76.109 is an example of which of the following classes of IP addresses?

A Class A B Class B C Class C D Class D

21 How many octets are part of the network ID when using the subnet mask 255.255.255.0?

A 1 B 2 C 3 D 4

22 True or false? The IP address 169.254.226.4 can be routed on the Internet.

False

23 What was introduced to make IPv4 Internet routing more efficient? A Subnet masks

(5)

24 An IPv4 packet sent to all workstations on the network is called a __________. A Directed packet B Unicast C Multicast D Broadcast

25 True or false? A computer will use a default gateway if the destination IP address is on a different network.

True

26 Which of the following is another name for default gateway? A Host

B Hub C Router D Switch

27 How many octets are in an IPv4 address? A 2

B 4 C 8 D 16

28 How many bits are in an octet? A 2

B 4 C 8 D 16

29 How many bits is an IPv6 address? A 8

(6)

30 Which type of address is written in the standard 4-part dotted decimal address, followed by /N where N is a number from 0 to 32?

A APIPA B CIDR C IPv4 D IPv6

31 An IPv6 subnet ID is how many bits long? A 8

B 16 C 32 D 64

32 True or false? A WINS server is necessary for address translation between IP addresses and network nodes’ FQDNs.

False. WINS is used for NetBIOS names.

33 After installing the DHCP Server service on a domain member server, what must be done in Active Directory before it begins delivering leased IP addresses?

A Authorize it.

B Reinstall Active Directory. C Activate it.

D Modify the firewall rules.

34 What is the default lease length used by a wired scope created in the Windows Server 2008 DHCP Service?

(7)

35 Which of the following are client options that can be set at the scope level? (Choose all that apply.)

A DNS B WINS C ROUTER D MAC address

Independent practice activity

11 What’s reported by the ipconfig command for each connection? On LAN 2 – PCI Card, DHCP is not enabled. A manual IPv4 address, along with a subnet mask, default gateway, and DNS server address are reported. There is no IPv6 information, as you disabled IPv6 on this NIC.

On Local Area Connection, DHCP is enabled. You have an IPv6 link-local address (meaning the IPv6 address was self-configured, similar to an IPv4 APIPA address). The IPv4 address, subnet mask, default gateway, DHCP and DNS server

addresses are reported, along with details regarding your IP lease—when it was obtained and when it expires.

17 Which TCP/IP configuration parameters are configured for distribution to clients with an IPv4 address lease?

Router, DNS Server, and DNS Domain Name

19 If you had added a WINS server to your network, which value would you configure in the Server Options box?

References

Related documents

• SMTP protocol between mail servers to send email messages. • client: sending mail server • server: receiving

We apply the proposed methods to discover single nucleotide polymor- phisms (SNPs) associated with type 2 diabetes risk in the WHI Clinical Trial and Observational Study SNP

An Enterprise shall notify all enterprises to which it sends or plans to send encrypted e-mail if it feeds decrypted messages from the Outbound E-mail Gateway to the e-mail

The actual quality of the information is an important consideration in esnuring the effectiveness of a tourism Website. Poor quality information pertaining to tourist

In addition, a variety of offline techniques can be used to obtain approval to send e-mail newsletters and promotional campaign messages.. Salespeople frequently obtain e-mail

235 (2010) (explaining that the Court wasted opportunities in both Roper and Graham to clarify the methodology by which the majorities incorporated international

• Rizal left Barcelona in the fall of 1882 and established himself in Madrid, the capital of Spain LIFE IN MADRID.. • November 3, 1882- Rizal enrolled in the Universidad Central

• Send e-mail to this group using RIMS E-Mail Manager (attachments allowed) • Send HTML & plain text e-mail to this group using RIMS E-Mail Manager • Create a distribution