Section C Review

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

44. The loopback address for IPv4 is , and the loopback address for IPv6 is 0:0:0:0:0:0:0:1 or .

127.0.0.1, ::1

51. IPv6 addresses have a total address length of bits.

128

41. Port is the default port used by IMAP service.

143

25. NetBIOS names are characters long.

15

34. The fi rst two octets of an IP address issued using the APIPA service is .

169.254

38. FTP uses port and by default.

20, 21 (any order)

5. Each octet represents a decimal number in the range of 0 through .

255

37. A Web server uses port for Web services.

80

41. The acronym ARP represents .

Address Resolution Protocol

56. The acronym ARP represents .

Address Resolution Protocol

34. Macintosh computers originally used the protocol, which consisted of its own set of protocols such as EtherTalk,LocalTalk, and TokenTalk.

AppleTalk

35. The acronym AARP represents .

AppleTalk Address Resolution Protocol

33. The acronym APIPA represents .

Automatic Private IP Addressing

7. A Class network uses a subnet mask of 255.255.0.0.

B

7. Ethernet networks use the access method to control and ensure the delivery of data.

CSMA/CD

29. The purpose of a(n) server is to supply IP addresses automatically to network devices.

DHCP

32. The server sets a lease period for IP address assignments.

DHCP

42. Port 53 is used by default by the .

Domain Name Service

28. The acronym DHCP represents .

Dynamic host control protocol

26. The acronym NetBEUI represents NetBIOS .

Extended User Interface

45. The default prefi x is used to identify the link-local IPv6 address assigned to the network adapter.

FE80

12. The acronym FQDM represents .

Fully Qualified Domain Name

22. DNS, DHCP, and similar upper-level protocols are associated with the , , and layers of the OSI model.

IP

25. The IP protocol adds the address during the encapsulation process.

IP

32. Novell NetWare introduced the protocol suite.

IPX/SPX

33. A(n) address consists of a network address, node address, and a socket number.

IPX/SPX

1. The two types of IP addressing schemes are and .

IPv4, IPv6 (any order)

42. The purpose of ARP is to resolve a(n) address to a(n) address.,

IPv4, MAC

8. The acronym ICS represents .

Internet Connection Sharing

39. TCP/IP was originally developed for WAN communications, but today it is commonly used on communications.

LAN

44. The protocol is designed to serve the same purpose as a DNS server.

LLMNR

43. is the core protocol used for Network and Sharing Center mapping function.

LLTD

10. The address is programmed into the network interface card.

MAC

23. UDP and TCP are typically encapsulated by the protocol.

MAC

57. ARP is used to map the host address to the logical host IP address.

MAC

6. The sublayer of the data link layer is responsible for formatting the data into frames and then placing the frame on the media.

MAC

9. Each computer on the network has a unique hex address called the address.

MAC

24. NetBIOS can identify a computer by its address, its name, or by the to which it belongs.

MAC, logical, group

27. NetBEUI was designed as an enhanced version of .

NetBIOS

27. WINS is used to resolve names to IP addresses.

NetBIOS

9. The acronym NAT represents .

Network Address Translation

40. Port 110 is the default port used by the service.

POP

29. The acronym SMB represents .

Server Message Block

1. All network operating systems provide a means of communication over the Internet by using the protocol.,

TCP/IP

37. The protocol is native to the UNIX operating system.

TCP/IP

40. Today, all major operating systems can communicate across the Internet and adhere to the naming rules of .

TCP/IP

46. Windows , Windows , and Windows operating systems automatically confi gure IPv6 by default.

Vista, 7, 8, 10 Server 2008 (any order)

17. The acronym WINS represents .

Windows Internet Naming Service

17. A(n) is responsible for monitoring activity on the Token Ring network.

active monitor

21. Ethernet is directly associated with the and the layer of the OSI model.

application, presentation, session (any order

21. A recovery process after a hardware failure occurs on a Token Ring network is called .

beaconing

11. A(n) storm is when collisions flood the network.

broadcast

8. CSMA/CD is a(n) method of communication.

broadcast

43. IPv6 is also referred to as IP addressing.

classless

12. A section of the network where collisions occur is called a(n) domain.

collision

3. In a command-line environment, commands are entered at the .

command prompt

18. The active monitor is selected through a process called monitor or monitor .

contention, election (any order)

45. LLDP works at the layer of the OSI model.

data link

5. Ethernet and Token Ring are associated with the layer of the OSI model.

data link

22. The term means the software became standard because of widely accepted use.

de facto

13. The Domain Name System associates a host or name with an IP address.

domain

15. Examples of top-level are .edu, .com, and .gov.

domains

30. When a workstation's IP address is assigned automatically, it is referred to as a(n) IP assignment.

dynamic

31. When a workstation's IP address is assigned manually, it is referred to as a(n) IP assignment.

dynamic

3. Each octet in an IPv4 address is composed of binary numbers.

eight

31. Together, NetBEUI and SMB span the upper layers of the OSI model.

five

4. An IPv4 address consists of a total of octets.

four

49. A(n) unicast IPv6 address is the same as a IPv4 public address.

global

2. The two types of user interface are and -based.

graphical, text

16. The text fi le used to resolve host names to IP addresses is .

hosts

13. Two devices that do not limit network broadcasts are and .

hubs, repeaters (any order)

10. To view the IP confi guration settings at a Linux workstation, you would type at the shell prompt.

ifconfig

11. To view the IP confi guration settings at a Windows XP or later computer, you would type at the command prompt.

ipconfig

53. The command is used to display NetBIOS over TCP statistics.

nbtstat

encapsulated as at the data link layer.

network

6. IP addressing is used to identify every or host on the network.

node

58. The UNIX/Linux operating systems use the command to query domain servers for information about domain names.

nslookup

2. A(n) is an eight-bit or one-byte value.

octet

20. The IP protocol is directly associated with the layer of the OSI model.

physical, data link (any order)

54. The command uses the Internet Control Message Protocol to carry data.

ping

19. The active monitor conducts a ring to identify new computers on the Token Ring.

poll

26. A DHCP server has a(n) of IP addresses to draw from.

pool

24. The Ethernet protocol adds the address during the encapsulation process.

port

35. To identify network services, numbers are used.

port

20. The active monitor performs a ring , which removes and replaces the defective token.

purge

14. At the top of the Domain Name System structure is the .

root

28. A protocol that can be transmitted across a router is referred to as a(n) protocol.

routable

15. Dividing a network into smaller sections to avoid collisions is called .

segmenting

19. In the encapsulation process, raw data is fi rst divided into , and then encapsulated into , which are then

segments, packets, frames

23. When communication is limited between two particular computers, it is referred to as a(n) .

session

36. The combination of a port number and an IP address creates a(n) .

socket

38. TCP/IP is actually a(n) of protocols, not just one protocol.

suite

14. Two devices that limit network broadcasts are and .

switches, routers (any order)

4. The correct manner and arrangement in which a command is to be typed is referred to as the command .

syntax

16. Computers in a Token Ring network must seize the before they can communicate on the network.

token

55. The equivalent UNIX command is used in similar manner to the tracert command.

traceroute

18. The TCP and UDP protocols are directly associated with the layer of the OSI model.

transport

47. Anycast, , and are the three broad classifi cations of IPv6 addresses.

unicast, multicast (any order)

30. The SMB protocol is a(n) -layer protocol that initiates client requests to the server.

upper

39. Port number assignments from 0 to 1023 are referred to as port numbers.

well-known

36. AppleTalk zones are similar to Microsoft and .

workgroups, domains (any order


Ensembles d'études connexes

NCLEX Renal, Urinary and reproductive systems

View Set

Digestive System A & P Questions

View Set

Tuckman's 5 Stages of Team Development

View Set

ECON 202 Final-Concept Questions

View Set

Econ ch 1 packet practice questions

View Set

Computer Literacy, Module 4 Computer Concepts Exam, TFS Module 2, IT 101, module 14 part 2, module 14

View Set