Network+ 8th Edition Chapter 3

¡Supera tus tareas y exámenes ahora con Quizwiz!

7. If a host's IPv6 address contains the network adapter's MAC address within the last 64 bits of the IPv6 address, what standard is being used?

a. EUI-64

23. How can you determine the manufacturer of a NIC card based on the MAC address?

a. The first 24 bits, known as the Organizationally Unique Identifier, identify the manufacturer.

14. How do routers create a broadcast domain boundary?

a. They forward broadcasts only to necessary segments.

22. In the classful addressing scheme, what range of network addresses is considered a Class B?

b. 128.0.x.y to 191.255.x.y

11. Which of the following IPv6 addresses represents a global unicast address?

b. 2000::/3

13. In a DNS zone, what type of record holds the name-to-address mapping for IPv6 addresses?

b. AAAA record

12. Your supervisor has asked you to configure a new prototype network with a dual stack configuration. What does this mean?

b. Both IPv4 and IPv6 protocols will be used on the network.

16. What does the MX record do in a forward DNS zone?

c. It identifies the e-mail server to be used for e-mail traffic for the domain.

4. You are setting up a DNS zone and have been asked to create SPF and DKIM records. What type of DNS record will hold this information?

c. TXT record

2. What command can you utilize to display TCP/IP configuration information for each network adapter installed?

c. ipconfig /all

1. A Windows computer on your network is having issues resolving queries for a specific domain, but not other domains. Other computers on the same network resolve the name just fine. What command can you issue that might fix the problem?

c. ipconfig /flushdns

17. What utility is used to verify that TCP/IP installed, bound to the NIC, configured correctly, and communicating with the network?

c. ping

3. What text editor can be used on Linux to view and edit the contents of a configuration file?

c. vim

8. Which of the following is NOT a range of IP addresses recommended for use in private networks?

d. 127.0.0.0 through 127.255.255.255

24. Which of the following IP addresses would be a loopback IP address?

d. 127.0.0.1

5. Which of the following protocols is used as a signaling protocol for the initial connection between hosts, but does not participate in data transfer during the session?

d. SIP

15. You are troubleshooting a DNS issue on a Linux system, and need to test the resolution of your domain mycompany.com MX record using Google's DNS server with the IP address of 8.8.8.8. What dig command will accomplish this?

d. dig @8.8.8.8 mycompany.com MX

25. With a FQDN of ftp1.dallas.mycompany.com, what part is the domain name?

d. mycompany.com

6. When using DHCP for IPv6 (i.e. DHCPv6), what port do clients receive responses on?

d. port 547

9. You are troubleshooting a network issue on a client computer and discover that the network card has an IP address of 169.254.196.200. What does this mean?

c. The computer is configured to use DHCP, but was unable to lease an address.

21. What statement regarding the Server Message Block protocol is accurate?

b. It is used by Windows and UNIX-based operating systems to share files.

20. In the DNS hierarchy, where is information about how to find the top-level domain servers held?

b. On the DNS root servers.

18. What part of a MAC address serves as the extension identifier, or device ID?

b. The last 24 bits of the MAC address.

10. What type of IPv6 address is fe80::8cf1:2c42:ffde:da1c?

b. link local address

19. What command can be used to check a domain computer's time source from a Command Prompt window?

b. w32tm /query /source


Conjuntos de estudio relacionados

Human Bio- Chapter 11 hw questions

View Set

Consumer Behavior (Final Cumulative)

View Set

BUS251: Chapter 41 Reading & Assessment Questions

View Set