Networking Fundamentals Final Exam Review

Pataasin ang iyong marka sa homework at exams ngayon gamit ang Quizwiz!

What effect will an incorrectly-configured DHCP server have on hosts using static IP addresses?

Nothing ... hosts with static IP addresses would not request anything from a DHCP server.

Explain the purpose of OSPF on a computer network.

OPEN SHORTEST PATH FIRST is a router protocol used to fine the best path for packets as they pass through a set of connected networks

What is the decimal number 15 in hexadecimal? 1)A 2)B 3)F 4)E

3)F

The purpose of the ping command is to: Question options: Calculate physical distance to the next node Check connectivity and response time to another host Obtain an IP address from DHCP Configure firewall settings

Check connectivity and response time to another host

The____________ layer of the OSI model handles the connection of different networks - routers operate at this level.

Network

The layer of the OSI model that IP addresses are part of is the:______layer.

Network Layer

Which of the following is a broadcast MAC address? 1) FF:FF:FF:FF:FF:FF 2) FF:FF:FF:EE:EE:EE 3) 255 4) 255.255.255.255

1) FF:FF:FF:FF:FF:FF

When configuring a network adapter on a computer, does the IP Properties selection "Obtain an IP Address Automatically" indicate? 1) use IPv4 2) use DHCP 3) use DNS 4) use static IP address 5) use default gateway

2) use DHCP

You have a host at IP address 10.0.0.110/25 which needs to communicate to a host at IP address 10.0.0.64/25. Which of the following devices do you need to use in order for these hosts to communicate? 1) A switch 2) A DHCP server 3) You have no hope, actually ... one of these is not a valid IP address. 4) A router

A switch a 26-bit subnet mask leaves 6 bits for the host address, so the last octet has subnets starting at 0, 64, 128, and 192. 10.0.0.64 is invalid ... the host portion is all zeros, so it's a subnet address.

A socket consists of: Question options: An IP address A port An IP address and a port None of the above

An IP address and a port

You have the IP address 194.194.194.194/28. What does your subnet mask look like, in 255.255.x.x notation?

Answer: 255.255.255.240

What is a command (under Windows) that will display your IP address?

Answer: ipconfig

What command at the command prompt would display your computer's MAC address? Include parameters (hint: it is similar to what you would type for IP information at a command prompt, but you need to use a parameter to ask for more information to be shown)

Answer: ipconfig /all

Order the layers of the OSI model, starting at Layer 1, the Physical Layer. ____ Network ____ Transport ____ Application ____ Presentation ___ Datalink ____ Session ____ Physical

Application Presentation Session Transport Network Datalink Physical

The difference between a Class A IP address range and a Class B IP address range is: Question options: Class A address are only used by governments, but class B addresses can be used by anyone. Class A addresses use the first 8 bits to identify the network, while a class B address requires the use of 16 bits to properly identify the network. Class A addresses are always more secure than class B addresses.

Class A addresses use the first 8 bits to identify the network, while a class B address requires the use of 16 bits to properly identify the network.

Explain the benefits of using DHCP on networks with end-user devices.

DHCP automatically gives and ip address. This way we don't have to figure out which ones are available and potentially try to assign a IP address that's already in use.

STP (Spanning Tree Protocol) and SPB (shortest Path Bridging) Operate on what Layer

Data Link Layer

What is the hexidecimal value for the binary number 1110 1000 1) 232 2) E8 3) B8 4) 148

E8

In binary USING SPACES BETWEEN EACH GROUP OF 4 BITS (ie, 0000 0000) show what the CIDR notation of /26 represents._________

(1111 1111 1111 1111 1111 1111 1100 0000)

You have the HOST IP address 194.194.194.194/28. What is the network number for the network this IP address is in? (hint: it isn't .194...)

(194.194.194.192, 192) a 28-bit subnet mask is 255.255.255.240, which leaves 4 bits for host addresses. This means each subnet has 2^4=16 IP addresses, 16-2=14 of which can be assigned to hosts. It also means 4 bits of the last octet are subnet bits, so the subnet addresses are at .0, .16, .32, .48, .64, .80, .96, .112, .128, .144, .160, .176, .192, .208, .224, .240. The broadcast addresses are 1 below the next subnet address.

What is the CIDR notation for a 255.255.255.240 subnet mask? /27 /28 /29 /30

/28

Which of the following addresses is not routable across the Internet? Choose 2 answers. 1) 191.168.169.254 2) 191.192.168.1 3) 10.31.12.251 4) 192.168.201.11

1) 191.168.169.254 3) 10.31.12.251

A receiving host has consistently failed to receive all the segments that it should acknowledge in an agreed transmission set. What can it do to improve the reliability of the communication sessions? 1) Decrease the window size 2) Decrease the sequence number 3) Recompute the CRC (cyclical redundancy check or checksum) 4) Send to a different hardware or MAC address.

1) Decrease the window size

A host uses the______address to decide whether or not to read in a frame from the media (wire) and pass it up the protocol stack. It uses the_______address to decide if the packet is meant for it, and the______address to decide which process should get the message.

1) Physical 2) IP Address 3)Port

Spanning Tree Protocol and Shortest Path Bridging Steps 1) 2) 3)

1)Select root Bridge based on Bridge ID 2)Examine Possible Paths between network bridge and root Bridge 3)Disable Links not part of shortest Path

You have a computer in front of you that won't load a webpage and may have a network issue. What approach to troubleshooting would help you confirm where the issue is?

1. Go to Start 2. Click on Control Panel 3. Open Network and Local Settings 4. Observe is the connection is connected to the internet. If not, go to step 5. 5. Open up Local Host Connection 6. View IPv4 property details 7. Make sure that if you're using a dynamic IP that it is checked to automatically give you an IP address. If you are using a static IP, make sure that the addresses that you provide are the correct from the run -> cmd -> ipconfig /all command displayed from the cmd window before creating the static IP address

You have the IP address 194.194.194.194/28. How many valid host addresses are there in your subnet?

14 a 28-bit subnet mask is 255.255.255.240, which leaves 4 bits for host addresses. This means each subnet has 2^4=16 IP addresses, 16-2=14 valid host addresses. It also means 4 bits of the last octet are subnet bits, so the subnet addresses are at .0, .16, .32, .48, .64, .80, .96, .112, .128, .144, .160, .176, .192, .208, .224, .240. The broadcast addresses are 1 below the next subnet address.

Which of the following is a valid TCP/IP v4 IP address? 0001:FC22:FFFF:51DD::0012 192.168.1.1 255.255.255 172.16.200.20

192.168.1.1

How is the decimal value 123 represented in binary? 1) 0111 0111 2) 0111 1011 3) 0111 0110 4) 1000 0001

2) 0111 1011

What protocol is used to find the hardware address of a local device? 1) RARP 2) ARP 3) IP 4) ICMP 5) BootP

2) ARP

When you have runs of UTP or STP that will exceed the 100M limit, you put repeaters in the line to amplify the signal above the normal voltage specifications. 1) True 2) False

2) False

Your host is sending a message with 80 as the destination port address. What service are you trying to access on the destination host? 1) ARP 2) HTTP 3) HTTPS 4) DNS 5) DHCP

2) HTTP

Which of the following provides the longest cable run distance? 1) Category 6e STP 2) Single mode fibre 3) Coax 4) multi-mode fibre

2) Single mode fibre

Which statement regarding private IP addresses is most accurate? 1) Private addresses cannot be used in internal networks (intranets) that require routing between them. 2) Private addresses must be assigned by a registrar (such as IANA) or an ISP. 3) A remote host across the Internet cannot ping your host if it has a private address. 4) Private addresses can only be used by a single administrative domain.

3) A remote host across the Internet cannot ping your host if it has a private address.

Which of the folllowing describes a broadcast IP address? 1) All host bits are off (0s). 2) All network bits are off (0s). 3) All host bits are on (1s). 4) All network bits are on (1s).

3) All host bits are on (1s).

What type of connector does UTP cable typically use? 1) ST 2) SC 3) RJ-45 4) BNC

3) RJ-45

What is the decimal equivalent of this binary number: 11000000.10101000.01000000.11100001 1) 192.168.48.240 2)192.168.32.248 3) 192.168.48.192 4) 192.168.64.225

4) 192.168.64.225

Fibre-optic cable is immune to elctromagnetic interference (EMI) and radio frequency interference (RFI) because it: 1) transmits digital data using electricity 2) transmits analog data using light impulses 3) trasmits analog data using electricity 4) transmits digital data using light impulses

4) transmits digital data using light impulses

Your computer has the address of 3 DNS servers configured. Which one(s) will it ask to resolve a URL into an IP address? 1) The first one. If that returns a 'cannot find' response, it will try the next one ... and so on. 2) It cycles through them sequentially, so it'll be the one after the one it last used. 3) It selects them in a random pattern to spread the load. 4) The first one. If that fails to respond, it will ask the second one ... and so on.

4) The first one. If that fails to respond, it will ask the second one ... and so on.

Which of the following is NOT a private IP address? 172.16.20.1 192.168.20.5 10.50.0.20 50.50.0.1

50.50.0.1

I have 8 devices on my home network ... what subnet mask should I use to create the smallest subnet that will accomodate all my devices? 1) 255.255.255.192 2) 255.255.255.224 3) 255.255.255.0 4) 255.255.255.252 5) 255.255.255.248 6) 255.255.255.128 7) 255.255.255.240

7) 255.255.255.240

Which of the following is a broadcast MAC address? 1) FF:FF:FF:FF:FF:FF 2) FF:FF:FF:EE:EE:EE 3) 255 4) 255.255.255.255

FF:FF:FF:FF:FF:FF

DHCP servers provide information about DNS lookups when computers surf the internet. True False

False

DHCP servers provide information about DNS lookups when computers surf the internet. Question options: True False

False

Network devices that "fail open" are always best for security. Question options: True False

False

A switch and a computer have agreed to go full duplex on a 100baseT network. If the switch isn't transmitting, the computer can use both pairs to transmit at 200Mb/s. True False

False Full duplex is an aknowledgement that the switch and computer are the only devices on the line. They both turn off their collision-detection mechanism and the switch transmits full bore on lines 3-6 while the computer transmits full bore on lines 1-2. If either broke the agreement and transmitted on the other's lines, it runs the risk of overwritign the other's transmissions. Besides, the other device isn't listening there anyway ... you agreed not to do that.

DNS root servers: Hold information used to locate top level domain (TLD) servers. Contain information used for security purposes only. Are contacted by every host on the internet every time a host makes a DNS query, at any time

Hold information used to locate top level domain (TLD) servers.

for the FQDN of "www.conestoga.on.ca", the hostname is______and the domain name is______

Hostname: www Domain Name : Conestoga.on.ca

You're attempting to contact a server on a remote network. Why does your computer do an ARP to the local IP address of your default gateway?

In order to contact a remote server, you need your default gateway to forward it for you. It will only pay attention (read in) things addressed to its MAC (physical) address. Otherwise, you won't get past the hardware side of the data link layer and into the operating system

What are two major advantages of fibre optic cabling over twisted-pair (copper) cabling?

It is completely immune to EMI and RFI and can transmit up to 40 kilometres (about 25 miles). Will also accept that it's harder to eavesdrop or wire-tap.

Briefly describe what Network Address Translation is, including its purpose.

Network Address Translation (NAT) is the process where a network device, usually a firewall, assigns a public address to a computer (or group of computers) inside a private network. The main use of NAT is to limit the number of public IP addresses an organization or company must use, for both economy and security purposes.

Match up the following types of DNS records. 1: PTR record 2: Cname record 3:MX record 4:A record Stores name to address mapping___ Used for reverse lookups____ Stores an alternative name for a host______ identifies a mail server used for email traffic to a host_____

Stores name to address mapping: A record Used for reverse lookups: PTR record Stores an alternative name for a host: CNAME Record identifies a mail server used for email traffic to a host: A record

Briefly explain the difference between the TCP protocol and the UDP protocol, in respect to moving information. What are the key differences between the two? When might one be chosen over the other?

TCP uses Three way handshake while UDP doesn't have any error Checking TCP also requires a connection while UDP does not. TCP would be used more for things like FTP and UDP for torrents

The part of the OSI model that handles flow control, sequence, and error checking is the______layer.

Transport

If a network is making use of both IPv4 and IPv6, is is referred to as being "dual stacked". True False

True

If a network is making use of both IPv4 and IPv6, is is referred to as being "dual stacked". Question options: True False

True

Say your network is using CAT5e UTP. If you need to go through a busy factory area, you could run fibre-optic cable, with media converters at both ends to convert between light signals and electrical signals. 1) True 2) False

True

Match up the following IPv6 terms: Specifies a single node on a network, and may be a global or link local address. Packets are delivered to all nodes in the targeted group. This type of address can identify multiple addresses, however packets will only be delivered to the closest one. 1. Unicast address 2. Multicast address 3. Anycast address

Unicast address - Specifies a single node on a network, and may be a global or link local address. Multicast address-Packets are delivered to all nodes in the targeted group. Anycast address - This type of address can identify multiple addresses, however packets will only be delivered to the closest one.

What does VLAN stand for

Virtual Local area Network

What does the acronym VPN stand for?

Virtual Private Network

The______layer of the OSI model is responsible for converting data packets from the Data Link layer into electrical signals and sending those signal out on the wire/wireless. Provide the name, not its number.

the Physical layer connects to the physical media and puts electric pulses on it.

You have the IP address 194.194.194.194/28. What is the range of valid host IP addresses in your subnet?

a 28-bit subnet mask is 255.255.255.240, which leaves 4 bits for host addresses. This means each subnet has 2^4=16 IP addresses, 16-2=14 of which can be assigned to hosts. It also means 4 bits of the last octet are subnet bits, so the subnet addresses are at .0, .16, .32, .48, .64, .80, .96, .112, .128, .144, .160, .176, .192, .208, .224, .240. The broadcast addresses are 1 below the next subnet address. Your host addresses range from 194.194.194.193 to .206.

What is Trunking

a single Pysical Connection between switches through which many local VLANs can Trasnmit and Receive data

What gives IPv6 the ability to reference more hosts than IPv4?

an IPv6 address is 128 bits long, while IPv4's address is 32 bits long

Briefly explain what is the 127.0.0.1 address is and what it is used for.

loopback ... for a host to reference itself, without using a network interface card

Briefly describe the difference between switching and routing.

switching sends packets within the network using mac addresses. routing routes packets between networks using two ip addresses


Kaugnay na mga set ng pag-aaral

Forensic Chapter 4 Textbook Questions

View Set

MI Variable Life and Annuities Producer

View Set

Audit Midterm Exam Ch 7 Internal Control

View Set

Ch. 1 Personal Financial Planning

View Set

Information Management Quiz 1 (HW q's)

View Set

BUS 101//Chapter 8: Structuring Organizations for Today's Challenges

View Set

Ch 37 Musculoskeletal Trauma and Complications

View Set