Midterm chapter 4

¡Supera tus tareas y exámenes ahora con Quizwiz!

To convert host names to IP addresses on the Internet, ____________ is used.

DNS

For a Class C IPv4 address, what is the correct default subnet mask value, specified as either a dotted decimal address or a CIDR value? (Choose all that apply.) a. /24 b. 255.255.255.0 c. C::/24 d. 255.0.0.0 e. 255.255.256.0

a. /24 b. 255.255.255.0

Which of the following IPv4 addresses have the same network ID as 10.16.112.45 given the subnet mask 255.255.0.0? (Choose all that apply.) a. 10.16.160.45 b. 192.168.172.46 c. 10.16.122.2 d. 10.16.185.45 e. 10.18.114.3

a. 10.16.160.45 c. 10.16.122.2 d. 10.16.185.45

A computer has the IPv4 address 192.168.0.23 and a subnet mask of 255.255.255.0. Which of these addresses represents a possible default gateway address? (Choose all that apply.) a. 192.168.0.254 b. 192.168.0.1 c. 127.0.0.1 d. 0.0.0.1 e. 193.168.0.1

a. 192.168.0.254 b. 192.168.0.1

Which IPv4 configuration options must be configured properly to communicate with websites on the Internet? (Choose all that apply.) a. A default gateway b. WINS c. A subnet mask d. An IP address e. DNS

a. A default gateway c. A subnet mask d. An IP address e. DNS

Your company is looking at securing connectivity between an internal server and workstations on the local area network. The network infrastructure does not support VLAN technology to compartmentalize network traffic, so they ask you for an overall design plan using Windows Defender Firewall with Advanced Security. Computers are required to confirm their identity when they communicate with one another using IPSec. For which of the following should your plan reference specific rules? (Choose all that apply.) a. Connection security rules b. IPSec token rules c. Routing table rules d. Inbound rules e. Outbound rules

a. Connection security rules d. Inbound rules e. Outbound rules

Your computer is configured to obtain an IPv4 address and DNS server address automatically. Which utility will help you to find the IPv4 address of your computer? (Choose all that apply.) a. Get-NetIPConfiguration b. netsh c. Get-NetIPAddress d. ipconfig e. arp

a. Get-NetIPConfiguration b. netsh c. Get-NetIPAddress d. ipconfig

Which protocol is used by the Client for Microsoft Networks and File and Printer Sharing for Microsoft Networks to communicate with one another and share files? a. SMB b. IPv6 c. IPv4 d. FTP e. HTTP

a. SMB

Which method can be used to assign IPv4 configuration settings when a DHCP server is not available? (Choose all that apply.) a. Static configuration b. DNS c. WINS d. APIPA e. Alternate IP configuration

a. Static configuration d. APIPA e. Alternate IP configuration

Your computer is configured to obtain an IPv4 address and DNS server address automatically. Network traffic is not flowing as expected. You are asked by your manager to output the current IPv4 routing table. What commands can you use to display the IPv4 routing table? (Choose all that apply.) a. netstat b. Get-NetRoute c. Get-RouteIPv4Table d. route e. nslookup

a. netstat b. Get-NetRoute d. route

Which of the following IP addresses is a valid IPv4 address and can be used by a host on the global Internet? (Choose all that apply.) a. 192.168.0.55 b. 172.32.0.1 c. 169.254.99.208 d. 38.15.222.299 e. 99.99.99.99

b. 172.32.0.1 e. 99.99.99.99

Which Internet connection type is most likely to require the use of PPPoE? a. Dial-up b. DSL c. Wireless hotspot d. Cable

b. DSL

Your company requires computers to authenticate to one another and enforces this requirement with Windows Defender Firewall with advanced security rules. You are asked to customize exceptions based on specific IP ranges. This can be done with a(n) _____ connection security rule. a. inbound b. authentication exemption c. isolation d. outbound e. server-to-server

b. authentication exemption

Which utilities can be used to perform advanced firewall configuration? (Choose all that apply.) a. Device security b. netsh c. Group Policy d. Windows Defender Firewall with Advanced Security e. Windows PowerShell

b. netsh c. Group Policy d. Windows Defender Firewall with Advanced Security e. Windows PowerShell

Which of these addresses represents a valid loopback address? (Choose all that apply.) a. ::/0 b. FF::1 c. ::1 d. 127::1/32 e. 127.0.0.1

c. ::1 e. 127.0.0.1

Which of the following IPv4 addresses is a valid IPv4 address and has the same network ID as 192.168.112.45 given the subnet mask 255.255.255.0? a. 10.0.0.45 b. 192.168.113.46 c. 192.168.112.257 d. 192.168.112.5 e. 172.16.112.45

d. 192.168.112.5

_____________ provides you with a way to control how your computer views other computers on the network and advertises its presence on the network. a. Windows Defender Firewall b. SMB c. IPv6 d. Network discovery e. Network location

d. Network discovery

Which of these addresses represents a valid IPv6 global unicast address? a. 2001::1::FEA b. FF::1:2 c. 169.254.12.1/64 d. FE80::2cab:2a76:3f57:8499 e. 2001:0:4137:9e74:2cab:2a76:3f57:8499

e. 2001:0:4137:9e74:2cab:2a76:3f57:8499

Which of these addresses represents a valid IPv6 link-local address? a. ::1 b. 2001:0:4137:9e74:2cab:2a76:3f57:8499 c. FF::1:2 d. 169.254.12.1 e. FE80::2cab:2a76:3f57:8499

e. FE80::2cab:2a76:3f57:8499

A Wi-Fi access point with a non-broadcasting SSID is not discoverable through any means unless a Wi-Fi client is configured to connect to it in advance. True or False?

False


Conjuntos de estudio relacionados

Introduction to Normal Distributions Assignment and Quiz 80%

View Set

CSCS - Organization & Administration

View Set

Commissioner of Insurance - P&C License Section 1

View Set

PrepU Management of Patients with Chronic Pulmonary Disease

View Set

U1C1L1 The Making of a Better Citizen

View Set

Psych 2303 - Positive Psych Exam 1

View Set