Chapter 2: How computers Find Each Other on Networks

¡Supera tus tareas y exámenes ahora con Quizwiz!

You have just brought online a new secondary DNS server and notice your monitoring software reports a significant increase in network traffic. Which two hosts on your network are likely to be causing the increased traffic and why?

The secondary and primary DNS servers, because the secondary server is requesting zone transfers from the primary server

What command below can be used to display ​a complete summary of all network interfaces in a Windows computer?

ipconfig /all

If you are connected to a network that uses DHCP, and you need to terminate your Windows workstation's DHCP lease, which command would you use?

ipconfig /release

​What range of ports is referred to as the "well-known" range of ports?

​0-1023

A loopback IP address begins with what ​number?

​127

An IPv6 address consists of how many bits?​

​128

Select the name of the free, open source software that is by far the most popular DNS server software:

​BIND

Select the IPv6 address below that indicates a global unicast address:

​FE80::10

Select the protocol below that is used to synchronize clocks on computers on a network:​

​NTP

What RFC outlines recommendations for private IP addresses?​

​RFC 1918

​Which protocol below is used to make an initial connection between hosts for transferring multimedia data, relying on other protocols once a connection is

​SIP

What protocol is commonly used to request configuration files from another computer?​

​TFTP

A port number, which identifies an application on a host, exists at what level of the OSI model?​

​Transport

​The Network Time Protocol service uses what port number?

​UDP 123

​In Linux systems, what file contains the settings for the DHCP service?

​dhcpd.conf

What command on Linux will display TCP/IP information associated with every interface on the device?​

​ifconfig -a

When two IPv6 nodes are on the same network, they are referred to as which of the following?

​neighbors

What utility is used to verify that TCP/IP installed, bound to the NIC, configured correctly, and communicating with the network?​

​ping

What top level domain is used for the air-transport industry?​

.aero

How many clusters of root servers exist?​

13

What decimal number corresponds to the binary number 11111111?

255

Suppose you send data to the 11111111 11111111 11111111 11111111 IP address on an IPv4 network. To which device(s) are you transmitting?

All devices on your local network

What version of SMB can be used across Windows, UNIX, and other operating systems?

CIFS (Common Internet File System)

What type of device does a computer turn to first when attempting to make contact with a host on another network?

Default gateway

When your computer first joins an IPv6 network, what is the prefix of the IP address the computer first configures for itself?

FE80::/10

What do the first 24 bits of a MAC address represent?​

Organizationally Unique Identifier

What computers are the highest authorities in the Domain Name System hierarchy?

Root servers

Which statement actually describes SMTP?

SMTP is a connection-based protocol that uses TCP

Which part of a MAC address is unique to each manufacturer?

The OUI

What are the last two parts of a host name known as?​

domain name


Conjuntos de estudio relacionados

hunanities: King Hezekiah of Judah

View Set

IU Intro To Criminal Justice Exam 4

View Set

Honors Biology Unit 1 Test Study Guide

View Set

Bus 140 Operations Supply Chain Ch 6 Processes and Technology

View Set

Restaurant management ch 5 and 6

View Set

This passage is excerpted from Charlotte Bronte, Villette. Originally published in 1853. In this chapter, the narrator and her host, Mrs. Bretton, are trying to occupy a young girl, Paulina, who is staying with them

View Set

Ceutics case study practice questions exam 2

View Set

Chapter 16 Cardiovascular Emergencies quiz

View Set