ITSP13 m06 chapter 7 review

¡Supera tus tareas y exámenes ahora con Quizwiz!

Cathy wants to connect to her wireless LAN at home but is not sure where to change the setting so that she can connect.Where in the Windows Control Panel will Cathy find her computer's network connection settings?

Network and Sharing Center Correct. Cathy will find the computer's network connection settings in the Network and Sharing Center. She will also see all the network connection types.

You are running a performance test using three different browsers on the same computer to simultaneously access the same web site. What numeric identifier or address is used to keep the three connections separate at the application (browser) level? IP address Incorrect. The IP address is used to identify a node and its network connection. It facilitates communication between devices and, unlike the MAC address, can be changed. FQDN Incorrect. The FQDN is the fully qualified domain name such as www.mydomainname.com. It includes the hostname (www) the domain (mydomainname) and the top-level domain name (com). The FQDN identifies a computer and the network to which it belongs.

Port number

You recently bought a new router, modem, and switch to create a wired network at home containing six computers. Beginning with the computers, how would you connect the devices to ensure the computers have internet access?

computers, switch, router, modem

You recently bought a new router, modem, and switch to create a wired network at home containing six computers. Beginning with the computers, how would you connect the devices to ensure the computers have internet access?

computers, switch, router, modem Correct. Computers are end devices that are utilized by end users. You connect end devices to a switch. Switches have multiple ports to connect many devices on the local network together. You then use another cable to connect the switch to the router, and another cable from the router to the modem.

Henry is using the command line to troubleshoot whether a Windows client is able to connect to the server on his network.What command should Henry use to check whether he has connectivity to the server?

ping Correct. The ping command allows Henry to test whether the system has connectivity with the computer he is pinging. The ping commands sends an echo request message. If there is connectivity, the receiving device will respond with an echo reply, along with the round trip time in milliseconds. If there is no connectivity, a destination unreachable or similar message will be displayed.

You are asked to add a resource record in the DNS namespace for a website your company wants to publish. Which of the following entries will you make? www.company.com 14440 209.165.200.5 A IN Incorrect. The proper format is resource name (www.company.com), record type (A), class code (IN), TTL (14400), Data (209.168.200.5). The record type of A is the address record and points a host name to its IP address. The class code IN means the record is allowed on the internet.  The TTL is the time-to-live and represents the time a server can hold the record in its cache. The data is the IP address mapped to the host.

www.company.com A IN 14440 209.165.200.5 The proper format is resource name (www.company.com), record type (A), class code (IN), TTL (14400), Data (209.168.200.5). The record type of A is the address record and points a host name to its IP address. The class code IN means the record is allowed on the internet.  The TTL is the time-to-live and represents the time a server can hold the record in its cache. The data is the IP address mapped to the host.

Makani is participating in an on-the-job training program at work. He is learning how to configure computers in a network. He is told to use private IP addresses because all organizations could use them without conflict since they are not routable. It is private network so they will not have internet access Incorrect. Assigning private IP addresses to computers in a network does not mean they will not have internet connectivity. If the computers are connected to a router through a switch, they will be able to access resources outside of the local network.

A proxy server will temporarily change the address on the host

A technician wants to configure a DHCP server to guarantee that certain printers always receive the same address. Which of the following should the technician configure? VPN tunnel Incorrect. A VPN (virtual private network) tunnel is a technique in which the data transferred between two points is protected by encryption. One typical application for a VPN tunnel is for a remote employee to connect to his private corporate network via the public untrusted Internet.

Address reservation Correct. An address reservation can be configured on a DHCP server to always assign the same IP address to a network host. When the host queries the DHCP server, the server checks the MAC address of the host and assigns the appropriate preconfigured IP address.

Vishalini rented a small office to offer bookkeeping services. She needs DHCP, wired, wireless, and file sharing capabilities, as well as a switch to connect three computers. However, her technology budget is limited. How can she obtain access to all these capabilities at a modest cost? Lease a simple modem from the ISP. Incorrect. A modem sits between the ISP and your router. It converts the signal from the ISP to Ethernet for use in a local network. While modem-router combos do exist, the word simple implies it is not a combo and thus would not supply the needed capabilities.   Integrate the services into a server. Incorrect. Integrating the services into a server is not a cost-effective, simple, or recommended solution. A multifunction SOHO router will offer all the benefits stated at a modest cost.

Buy a multifunction router. Correct. A multifunction SOHO router can offer all the features specified. For file sharing capabilities, the router needs to have a USB port to connect external storage which can be used to share files with network users.

Which of the following devices are most commonly used to connect a LAN to an ISP for broadband services? (Select TWO.)

Cable modem Correct. The cable modem is the hardware device used to connect the local area network (LAN) to a cable Internet service provider (ISP). Cable is a broadband technology transported over a coaxial cable that can provide high-speed Internet, TV, and voice via a single cable connection. DSL modem Correct. A DSL modem is the hardware device used to connect the local area network (LAN) to an Internet service provider (ISP). DSL is a broadband technology transported over copper POTS (plain old telephone service) cable that can provide high-speed Internet alone (SDSL) or Internet combined with voice (ADSL, VDSL).

You log in to a wireless router with administrative privileges and change the SSID. What exactly have you done? Changed the IP address Incorrect. Changing the SSID (Service Set Identifier) does not change the IP address. The IP address identifies a node and its network connection.

Changed the network name Correct. The network name for a wireless router is the SSID (Service Set Identifier). When you connect to a wireless network, you may see multiple networks names available for selection; these are the SSIDs. Most are secure so you will need a password to connect.

A small company has a few users that are spending too much time on specific social media web sites; this is affecting their productivity at work. The manager asks if it is possible to limit access to those sites.Which of the following will satisfy the request while not limiting access to other websites? Implement MAC filtering on the router for the PCs that are accessing the sites. Incorrect. MAC filtering will keep the PCs from connecting to the network entirely. MAC filtering is used to allow or deny network hosts access to the private LAN based on the MAC address of the host. Configure a firewall and add the web sites the users are visiting to the whitelist. Incorrect. The whitelist is configured on the network firewall; however, a whitelist assumes all sites are blocked with the exception of the sites added to the whitelist.

Configure a proxy server as an internet appliance to limit access to the web sites.

Quintavius loves to tinker with computers so he sets off to see how many networking services he can install in one physical server. He sets up the system to support DCHP, DNS, HTTP, HTTPS, Telnet, SSH, and an email server. On what port will these services listen?

DCHP 67, DNS 53, HTTP 80, HTTPS 443, Telnet 23, SSH 22, SMTP 25 Correct. DHCP listens on port 67; it is used to assign IP addresses to computers automatically. DNS listens on port 53; it resolves domain names into IP addresses. HTTP listens on port 80; it serves online resources, but it is not secure. HTTPS listens on port 443; it serves web pages securely. Telnet listens on port 23; it is used for remote access, but transmissions are not encrypted so it is not secure. SSH listens on port 22 and is used for remote access. SSH is secure because the transmissions are encrypted. SMTP listens on port 25 and is used to send and receive email messages between email servers.

A client contacted you to request your help in researching and supplying the hardware necessary to implement a SOHO solution at his new home-based business.Which of the following SOHO router features will simplify IP address configuration on the private network for both wired and wireless clients? Multi-port switch Incorrect. Most SOHO routers include multiple network device functionality in addition to routing and include several wired Ethernet ports. These ports simplify connecting wired hosts to the network but do not simplify assigning IP address information to host devices.

DHCP server Correct. An integral feature of a SOHO router is the DHCP (Dynamic Host Configuration Protocol) server, which automatically assigns IP address information to network clients with either wired or wireless connections. The host device is configured to obtain IP address information automatically.

You are a security professional tasked with preventing fraudulent emails. Which DNS records will you configure to help you realize this goal? Select three.

DKIM Correct. The DKIM (DomainKeys Identified Mail) record authenticate that an email message came from a trusted source. SPF Correct. (Sender Policy Framework) record helps protect against email spoofing by informing the receiving email server which servers can send emails from your domain. DMARC Correct. The DMARC (Domain-based Message Authentication, Reporting, and Conformance) records tell the receiving email server what to do when it receives fraudulent emails.

You are setting up your Windows computer to connect to the Internet. When you type www.microsoft.com, the issues an error message indicating the site cannot be reached.What network setting should you check to see the address of the server being used to resolve the domain name you entered in the browser?

DNS Correct. The DNS address is used to connect to a DNS (domain name system) server that is used to resolve the domain name. This allows you to use a name like www.microsoft.com instead of trying to remember the IP address of the Microsoft web server.

You buy a cable that has RJ-45 connectors. For what type of transmission will the cable be used? Cellular Incorrect. Cellular uses wireless communications and does not require a cable. An RJ-45 connector is a copper twisted pair cable connector used on Ethernet cables.

Ethernet

Ramah is preparing a presentation on networking terminology. She wants to ensure everyone understands the dif

Every host is a node, but not every node is a host. Correct. All hosts and nodes have an IP address and are accessible through the network. However, a host is a general-purpose computer and can be either a client or a server. Depending on the network, a node that is not a host typically provides a specialized function such as a router, switch, or a printer. A node is not used to run a variety of applications. Correct. Depending on the network, a node that is not a host typically provides a specialized function such as a router, switch, or a printer. It is not a general-purpose computing device that provides client/server functionality. A smart thermostat is an example of a node. Correct. Devices that connect to the network such as routers, switches, hubs and even smart thermostats are considered nodes. A node that is not a host does not typically provide client/server functionality as would a web, DHCP, or DNS server.

Akello uses his computer to download a document from the internet. What role does his computer play as opposed to the computer from which he is downloading the document? Select two.

His computer is a client Correct. In a client/server model, the device initiating the request is the client and the machine that responds to the request, and services that request, is the server. The client application is the browser Akello is using, and the system supplying the resource is the web server. The computer from which he downloads the document is a server Correct. In a client/server model, the device initiating the request is the client and the machine that responds to the request, and services that request, is the server. The client application is the browser Akello is using, and the system supplying the resource is the web server.

Gulliver is trying to determine why one of the computers at work cannot connect to the network. He thinks it might be DHCP related but wants to rule out the computer itself as being the problem. Gulliver manually configures the network settings that will allow the computer to connect to the network. What three values does he configure? Select three.

IP address Correct. The IP address is used to identify the node and its network connection. Subnet Mask Correct. The subnet mask is used by a computer to determine if the destination device to which it is sending a message resides in its own network (the local network) or another network. If the destination resides in the local network, it sends the message directly to that device. If the destination resides in a remote network (a different network), it sends the message to the default gateway. Default Gateway Correct. The default gateway is the address of the router connected to the local network. When sending a message to another network, a device will send the message to the router (default gateway), and the router will forward the message based on entries in its routing table. In larger networks, the default gateway could be a layer 3 switch instead of a router. A layer 3 switch has switching and routing capabilities

Which of the following is a scenario in which an IT support technician would most likely be required to implement the alternate IP configuration method on a network host? To ensure a workstation receives the same IP address from the DHCP server each time the workstation is booted. Incorrect. There are two methods of guaranteeing that a network host receives the same IP address each time it is booted. First, a technician could configure a statically assigned IP address to the host. Second, a DHCP reservation could be configured on the DHCP server. When the specific host requests an IP address from the DHCP server, the server verifies the MAC address of the host and assigns the reserved IP address. Neither of these methods would necessitate an alternate IP configuration.

In the event a DHCP server is unavailable, the workstation will have a valid IP address on the subnet.

The owner of a small loan brokerage firm does not know much about computers but has always been concerned with security, so he buys a used enterprise grade router. Mango, a loan officer with a little bit of IT knowledge, configures FE80::1 as the only address on the internal interface of the router. What effect will this have?

Internet access will now be suppressed. Correct. FE80::1 is a link-local IPv6 address; it is not routable. Configuring a global unicast address will allow devices to have internet access.

Cathy wants to connect to her wireless LAN at home but is not sure where to change the setting so that she can connect.Where in the Windows Control Panel will Cathy find her computer's network connection settings? Network Control Center Incorrect. Cathy will find the computer's network connection settings in the Network and Sharing Center. Windows does not have a Network Control Center.

Network and Sharing Center

You run the ipconfig /all command on your Windows computer and see a hexadecimal value that looks like this: E0-70-EA-4E-AB-A5What does it represent? Select two. IP address Incorrect. It is a MAC address. The MAC address contains 48 bits represented by 12 hexadecimal digits. The IP address is used to identify a node and its network connection; it can also be referred to as a logical address. It is represented using four decimal numbers called octets and separated by a period.

MAC address Correct. The MAC address is the same as the physical address burned-in to the NIC. It cannot be changed by conventional means and is globally unique. Physical address Correct. The Physical address is the same as the MAC address burned-in to the NIC. It cannot be changed by conventional means and is globally unique.

Kwan, a fifth-grade teacher, has been learning about computers but does not know much about networking. He found a hub in the supply closet and decided to create a small network in his classroom consisting of a file/application server, 10 relatively new computers, and a printer. The students often complain that the computers are slow, but one student blames it on the network. What can Kwan do to eliminate complaints? Upgrade to more powerful PCs Incorrect. Upgrading to more powerful computers will not improve network performance because the hub is the slowest device on the network. Hubs employs older technology, operate at 10/100 Mbps, and share the bandwidth with all the devices connected to it. The solution is to replace the hub with a switch.

Replace the hub with a switch

Venus is a member of the IT department at a company that has a moderately-sized network. One of her performance review objectives is to help her department be more proactive relative to being notified, and responding to, certain events that occur in the network. What type of server will help her meet the objective?

Syslog Server Correct. A syslog server gathers information about various network devices and stores the events into a database. Syslog messages have a numeric identifier to denote the severity of the event.

Jesenia read an article that said stored data, such as when you are downloading an app, is transmitted using TCP, but live-streaming events are transmitted using UDP. Why would this be true? Select two.

TCP is reliable and ensures the delivery of data using a connection-oriented mechanism. Correct. TCP (Transmission Control Protocol) is reliable and uses a connection-oriented mechanism to guarantee the delivery of data. It expects an acknowledgement from the destination. If it does not receive one, it resends the data. UDP is fast and does not retransmit lost data so as not to disrupt the live video feed. Correct. Live stream video feeds and real-time calls using Voice over IP are best delivered in a continuous stream so as not to disrupt the experience. If a live-stream video packet is lost, the video quality may be degraded for a second. If a voice packet is lost, the recipient could ask to repeat the statement.

A restricted computer lab at a college has been set up with local authentication. Students are able to log in but do not have internet access. You check the network settings on one of the computers and it has an IP address of 169.254.1.10. What is the problem? The AAA server is not reachable Incorrect. An AAA server is for authentication, authorization, and accounting. It is used to secure and control access to the network and its resources. The DNS server is not reachable Incorrect. A DNS (Domain Name System) server is used to resolve domain names to IP addresses. For example, when you access microsoft.com, the DNS server tells your system the corresponding IP address. This allows your computer to send traffic to the destination using the IP address.

The DHCP server is not reachable Correct. When a computer is configured to request an IP address from a DHCP server on power up, and the DHCP server is not available or reachable, the operating system will assign an address in the 169.254.x.y address space (APIPA, Automatic Private IP Addressing). This allows devices in the local network to have connectivity with each other but not with computers on another network, hence internet access is not possible. The host will transmit a DHCP discover message periodically in an attempt to obtain an address from a DHCP server.

Torino receives a call from a SOHO client who says her computer is not working. He goes to her office and checks the network settings. He notices that the default gateway entry is blank, yet he can ping the router. Once he enters the default gateway, the problem is solved. What did the client mean when she said her computer is not working?

The computer had no internet access Correct. If the default gateway is not set, the computer will not be able to send traffic outside of the local network. He can ping the default gateway because the router interface is part of the local network. The address on the router interface is the default gateway but the computer does not know this unless it is explicitly configured either manually or automatically using DHCP.

You want to setup a separate network at home that is accessible from the internet. You want it to be isolated from your personal network, so you lease an IPv6 address from the ISP. When you configure the interface IDs of the devices on the network, which bits in the IPv6 address will you be modifying? The first 48 bits of the IPv6 address Incorrect. The first 48 bits make up the global routing prefix. The last (rightmost) 64 bits make up the interface ID. A simplistic analogy is to say that the interface ID of an IPv6 address is equivalent to the host portion of an IPv4 address.

The last 64 bits of the IPv6 address

What characteristics do the 10.0.0.1/24, 172.16.0.2/24, and 192.168.0.3/24 IP addresses have in common? Select three.

They are private IP addresses. Correct. The range of private IP addresses is 10.0.0.0 - 10.255.255.255, 172,16.0.0 - 172.31.255.255, and 192.168.0.0 - 192.168.255.255. They can be used internally by any organization and will not create a conflict because they are not routable. They are not routable by the ISP. Correct. Private IP addresses are not routable and can be used internally by any organization. If an ISP router encounters a packet with any one of these addresses, it will drop the packet (not forward it). They all have the same subnet mask. Correct. The /24 is using the CIDR notation. This means that the first 24 bits of the address represent the network portion. It is an alternate way of representing the subnet mask which is used to help computers determine if the destination device is on the local network or on another network.


Conjuntos de estudio relacionados

Mill Ch. 2 (What Utilitarianism is)

View Set

Accounting 201 - Chapter 10 Quiz

View Set

Informatics and Professional Identity

View Set

Business Finance Chapter 7, Business Finance Chapter 8, Business Finance Chapter 9, Business Finance Final Exam review, Business Finance Exam 3 Final Exam, Finance Test 3, Business Finance Ch. 6, Business Finance Chapter 9, Business Finance 3, Busine...

View Set

Reflexes and Spontaneous Movements

View Set

Chapter 14 SB: Eating Disorders and Disordered Eating

View Set