Section C Review
44. The loopback address for IPv4 is , and the loopback address for IPv6 is 0:0:0:0:0:0:0:1 or .
127.0.0.1, ::1
51. IPv6 addresses have a total address length of bits.
128
41. Port is the default port used by IMAP service.
143
25. NetBIOS names are characters long.
15
34. The fi rst two octets of an IP address issued using the APIPA service is .
169.254
38. FTP uses port and by default.
20, 21 (any order)
5. Each octet represents a decimal number in the range of 0 through .
255
37. A Web server uses port for Web services.
80
41. The acronym ARP represents .
Address Resolution Protocol
56. The acronym ARP represents .
Address Resolution Protocol
34. Macintosh computers originally used the protocol, which consisted of its own set of protocols such as EtherTalk,LocalTalk, and TokenTalk.
AppleTalk
35. The acronym AARP represents .
AppleTalk Address Resolution Protocol
33. The acronym APIPA represents .
Automatic Private IP Addressing
7. A Class network uses a subnet mask of 255.255.0.0.
B
7. Ethernet networks use the access method to control and ensure the delivery of data.
CSMA/CD
29. The purpose of a(n) server is to supply IP addresses automatically to network devices.
DHCP
32. The server sets a lease period for IP address assignments.
DHCP
42. Port 53 is used by default by the .
Domain Name Service
28. The acronym DHCP represents .
Dynamic host control protocol
26. The acronym NetBEUI represents NetBIOS .
Extended User Interface
45. The default prefi x is used to identify the link-local IPv6 address assigned to the network adapter.
FE80
12. The acronym FQDM represents .
Fully Qualified Domain Name
22. DNS, DHCP, and similar upper-level protocols are associated with the , , and layers of the OSI model.
IP
25. The IP protocol adds the address during the encapsulation process.
IP
32. Novell NetWare introduced the protocol suite.
IPX/SPX
33. A(n) address consists of a network address, node address, and a socket number.
IPX/SPX
1. The two types of IP addressing schemes are and .
IPv4, IPv6 (any order)
42. The purpose of ARP is to resolve a(n) address to a(n) address.,
IPv4, MAC
8. The acronym ICS represents .
Internet Connection Sharing
39. TCP/IP was originally developed for WAN communications, but today it is commonly used on communications.
LAN
44. The protocol is designed to serve the same purpose as a DNS server.
LLMNR
43. is the core protocol used for Network and Sharing Center mapping function.
LLTD
10. The address is programmed into the network interface card.
MAC
23. UDP and TCP are typically encapsulated by the protocol.
MAC
57. ARP is used to map the host address to the logical host IP address.
MAC
6. The sublayer of the data link layer is responsible for formatting the data into frames and then placing the frame on the media.
MAC
9. Each computer on the network has a unique hex address called the address.
MAC
24. NetBIOS can identify a computer by its address, its name, or by the to which it belongs.
MAC, logical, group
27. NetBEUI was designed as an enhanced version of .
NetBIOS
27. WINS is used to resolve names to IP addresses.
NetBIOS
9. The acronym NAT represents .
Network Address Translation
40. Port 110 is the default port used by the service.
POP
29. The acronym SMB represents .
Server Message Block
1. All network operating systems provide a means of communication over the Internet by using the protocol.,
TCP/IP
37. The protocol is native to the UNIX operating system.
TCP/IP
40. Today, all major operating systems can communicate across the Internet and adhere to the naming rules of .
TCP/IP
46. Windows , Windows , and Windows operating systems automatically confi gure IPv6 by default.
Vista, 7, 8, 10 Server 2008 (any order)
17. The acronym WINS represents .
Windows Internet Naming Service
17. A(n) is responsible for monitoring activity on the Token Ring network.
active monitor
21. Ethernet is directly associated with the and the layer of the OSI model.
application, presentation, session (any order
21. A recovery process after a hardware failure occurs on a Token Ring network is called .
beaconing
11. A(n) storm is when collisions flood the network.
broadcast
8. CSMA/CD is a(n) method of communication.
broadcast
43. IPv6 is also referred to as IP addressing.
classless
12. A section of the network where collisions occur is called a(n) domain.
collision
3. In a command-line environment, commands are entered at the .
command prompt
18. The active monitor is selected through a process called monitor or monitor .
contention, election (any order)
45. LLDP works at the layer of the OSI model.
data link
5. Ethernet and Token Ring are associated with the layer of the OSI model.
data link
22. The term means the software became standard because of widely accepted use.
de facto
13. The Domain Name System associates a host or name with an IP address.
domain
15. Examples of top-level are .edu, .com, and .gov.
domains
30. When a workstation's IP address is assigned automatically, it is referred to as a(n) IP assignment.
dynamic
31. When a workstation's IP address is assigned manually, it is referred to as a(n) IP assignment.
dynamic
3. Each octet in an IPv4 address is composed of binary numbers.
eight
31. Together, NetBEUI and SMB span the upper layers of the OSI model.
five
4. An IPv4 address consists of a total of octets.
four
49. A(n) unicast IPv6 address is the same as a IPv4 public address.
global
2. The two types of user interface are and -based.
graphical, text
16. The text fi le used to resolve host names to IP addresses is .
hosts
13. Two devices that do not limit network broadcasts are and .
hubs, repeaters (any order)
10. To view the IP confi guration settings at a Linux workstation, you would type at the shell prompt.
ifconfig
11. To view the IP confi guration settings at a Windows XP or later computer, you would type at the command prompt.
ipconfig
53. The command is used to display NetBIOS over TCP statistics.
nbtstat
encapsulated as at the data link layer.
network
6. IP addressing is used to identify every or host on the network.
node
58. The UNIX/Linux operating systems use the command to query domain servers for information about domain names.
nslookup
2. A(n) is an eight-bit or one-byte value.
octet
20. The IP protocol is directly associated with the layer of the OSI model.
physical, data link (any order)
54. The command uses the Internet Control Message Protocol to carry data.
ping
19. The active monitor conducts a ring to identify new computers on the Token Ring.
poll
26. A DHCP server has a(n) of IP addresses to draw from.
pool
24. The Ethernet protocol adds the address during the encapsulation process.
port
35. To identify network services, numbers are used.
port
20. The active monitor performs a ring , which removes and replaces the defective token.
purge
14. At the top of the Domain Name System structure is the .
root
28. A protocol that can be transmitted across a router is referred to as a(n) protocol.
routable
15. Dividing a network into smaller sections to avoid collisions is called .
segmenting
19. In the encapsulation process, raw data is fi rst divided into , and then encapsulated into , which are then
segments, packets, frames
23. When communication is limited between two particular computers, it is referred to as a(n) .
session
36. The combination of a port number and an IP address creates a(n) .
socket
38. TCP/IP is actually a(n) of protocols, not just one protocol.
suite
14. Two devices that limit network broadcasts are and .
switches, routers (any order)
4. The correct manner and arrangement in which a command is to be typed is referred to as the command .
syntax
16. Computers in a Token Ring network must seize the before they can communicate on the network.
token
55. The equivalent UNIX command is used in similar manner to the tracert command.
traceroute
18. The TCP and UDP protocols are directly associated with the layer of the OSI model.
transport
47. Anycast, , and are the three broad classifi cations of IPv6 addresses.
unicast, multicast (any order)
30. The SMB protocol is a(n) -layer protocol that initiates client requests to the server.
upper
39. Port number assignments from 0 to 1023 are referred to as port numbers.
well-known
36. AppleTalk zones are similar to Microsoft and .
workgroups, domains (any order