5. Comptia A+ 1101: Configuring Network Addressing and Internet Connections.

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

255.255.0.0 - A subnet mask field uses dotted decimal format. The/16 network prefix means that the first 16 bits in the mask are set to one: 11111111 11111111 00000000 00000000. A whole octet of ones converts to 255 in decimal. Therefore, the dotted decimal mask is 255.255.0.0.

A host is configured with the IP address 172.16.1.100 in the 172.16.1.0/16 IP network. What value should be entered as the subnet mask?

host name

A human-readable name that identifies a network host.

lease

Address configuration assigned by a DHCP server to a client for a limited period.

The WAN interface of the router must use an IPv4 address from a valid public range, so 52.165.16.254 is the only one it could be: 172.30.100.32 and 192.168.100.52 are in the class B and class C private ranges, 169.254.1.121 is in the range reserved for APIPA, and 224.100.100.1 is outside the range of valid public addresses (it is part of class D, which is used for a type of addressing called "multicasting").

Another technician has scribbled some notes about IPv4 addresses used in various networks associated with support tickets. One of them is assigned to the WAN interface of a SOHO router that requires troubleshooting. Which of these addresses must it be? 52.165.16.254 192.168.100.52 169.254.1.121 172.30.100.32 224.100.100.1

Port TCP/25 is used by the Simple Mail Transfer Protocol (SMTP) to send and receive email messages. Port TCP/3389 is used by Remote Desktop Protocol (RDP) to connect a computer's graphical shell over the network.

Another technician has scribbled some notes about a firewall configuration. The technician has listed only the port numbers 25 and 3389. What is the purpose of the protocols that use these ports by default.

Secure Shell (SSH)

Application protocol supporting secure tunneling and remote terminal emulation and file copy. ________ runs over TCP port 22.

Hypertext Transfer Protocol (HTTP)/HyperText Transfer Protocol Secure (HTTPS)

Application protocol used to provide web content to browsers. _______ uses port 80 & ________ provides for encrypted transfers using TLS and port 443.

cable modem

Cable-Internet-access digital modem that uses a coaxial connection to the service provider's fiber-optic core network.

Digital subscriber line (DSL)

Carrier technology to implement broadband Internet access for subscribers by transferring data over voice-grade telephone lines. There are various "flavors" of __________, notably S(ymmetric), A(symmetric), and V(ery HIgh Bit Rate).

DomainKeys Identified Mail (DKIM)

Cryptographic authentication mechanism for mail utilizing a public key published as a DNS record.

reserve

DHCP configuration that assigns either a prereserved or persistent IP address to a given host, based on its hardware address or other ID.

Sender Policy Framework (SPF)

DNS record identifying hosts authorized to send mail for the domain.

TXT record

DNS resource record for storing free-form string values.

resource records

Data file storing information about a DNS zone. The main records are as follows: A (maps a host name to an IPv4 address), AAAA (maps to an IPv6 address), CNAME (an alias for a host name), MX (the IP address of a mail server), and PTR (allows a host name to be identified from an IP address).

optical network terminal (ONT)

Device that converts between optical and electrical signaling deployed to facilitate full fiber Internet connection types.

Domain-based Message Authentication, Reporting and Conformance (DMARC)

Framework for ensuring proper application of SPF and DKIM utilizing a policy published as a DNS record.

public switched telephone network (PSTN)

Global network connecting national telecommunications systems.

default gateway

IP configuration parameter that identifies the address of a router on the local subnet that the host can use to contact other networks.

wireless internet service provider (WISP)

ISP offering Internet access over ground-based Line of Sight (LoS) microwave transmitters.

router

Intermediate system working at the Network layer capable of forwarding packets around logical networks of different layer 1 and layer 2 types.

spam

Junk, fraudulent, and malicious messaging sent over mail (or instant messaging, which is called spim). Spam can also be spread via social networking.

Virtual LAN (VLAN)

Logical network segment comprising a broadcast domain established using a feature of managed switches to assign each port a VALN ID. Even though hosts on two VLANs may be physically connected to the same switch, local traffic is isolated to each VLAN, so they must use a router to communicate.

Automatic Private IP Addressing (APIPA)

Mechanism for Windows hosts configured to obtain an address automatically that cannot contact a DHCP server to revert to using an address form the range 169.254.x.y. This is also called a link-local address.

Code Division Multiple Access (CDMA)

Method of multiplexing a communications channel using a code to key the modulation of a particular signal. ________ is associated with Sprint and Verizon cellular phone networks.

Internet Protocol (IP)

Network (Internet) layer protocol in the TCP/IP suite providing packet addressing and routing for all higher-level protocols in the suite.

Transmission Control Protocol/Internet Protocol (TCP/IP)

Network protocol suite used to implement the Internet and most WANs and LANs. It uses a four-layer network model that corresponds roughly to the OSI model as follows: Network Interface (Physical/Data Link), Internet (Network), Transport (Transport), Application (Session, Presentation, Application).

subnet mask

Number of bits applied to an IP address to mask the network ID portion from the host/interface ID portion.

plain old telephone system (POTS)

Parts of a telephone network "local loop" that use voice-grade cabling. Analog data transfer over __________ using dial-up modems is slow (33.3 Kb/s).

Transmission Control Protocol (TCP)

Protocol in the TCP/IP suite operating at the transport layer to provide connection-oriented, guaranteed delivery of packets.

User Datagram Protocol (UDP)

Protocol in the TCP/IP suite operating at the transport layer to provide connectionless, non-guaranteed communication.

Dynamic Host Configuration Protocol (DHCP)

Protocol used to automatically assign IP addressing information to hosts that have not been configured manually.

Internet service providers (ISPs)

Provides Internet connectivity and web services to its customers.

scope

Range of consecutive IP addresses in the same subnet that a DHCP server can lease to clients.

Network Address Translation (NAT)

Routing mechanism that conceals internal addressing schemes from the public internet by translating between a single public address on the external side of a router and private, non-routable addresses internally.

Virtual Private Network (VPN)

Secure tunnel created between tow endpoints connected via an unsecure transport network (typically the Internet).

Domain Name System (DNS)

Service that maps fully qualified domain name labels to IP addresses on most TCP/IP networks, including the internet.

firewall

Software or hardware device that protects a network segment or individual host by filtering packets to an access control list.

Public IP address

Some IP address ranges are designated for use on private networks only. Packets with source IP addresses in public ranges are permitted to be forwarded over the Internet. Packets with source IP addresses from private ranges should be blocked at Internet gateways or forwarded using some type of translation mechanism.

Global System for Mobile Communication (GSM)

Standard for cellular radio communications and data transfer. __________ phones use a SIM card to identify the subscriber and network provider. 4G and later data standards are developed for _______.

Cellular radio

Standards for implementing data access over cellular networks are implemented as successive generations. For 2G (up to about 48 Kb/s) and 3G (up to about 42 Mb/s), there are competing GSM and CDMA provider networks. Standards for 4G (up to about 90 Mb/s) and 5G (up to about 300 Mb/s) are developed under converged LTE standards.

satellite

System of microwave transmissions where orbital satellites relay signals between terrestrial receivers or other orbital satellites. ________ internet connectivity is enabled through a reception antenna connected to the PC or network through a DVB-S modem.

Port TCP/445 is used by the Server Message Block (SMB) protocol that implements Windows File/Printer Sharing. SMB is designed for use on local networks only. Allowing access from the internet would be a security risk.

The technician has made a note to check that port 445 is blocked by the firewall. What is the purpose of the protocol that uses this port by default, and why should it be blocked?

T. This service is implemented by the Dynamic Host Configuration Protocol (DHCP).

True or false? A SOHO router can be configured to provide an IPv4 address configuration to hosts without further administrator attention.

F. The modem and Ethernet interfaces use separate ports.

True or false? A SOHO router uses an embedded modem and Ethernet adapter to forward traffic between public and private network segments over a single hardware port.

F. The Domain Name System (DNS) uses root servers at the top of the hierarchy. The root is represented by a trailing dot at the end of a fully qualified domain name (FQDN), though this can very commonly omitted in ordinary usage.

True or false? A top-level domain such as .com represents the top of the DNS hierarchy.

T. In IPv6, the host ID portion of the address is always the last 64 bits. The network prefix length is used to determine which network a host is on, but a mask is not required.

True or false? A valid IPv6 configuration does not require a subnet mask.

F. The server application is identified by one port, but the client must also assign its own port to track the connection.

True or false? At the Transport layer, connections between hosts to exchange application data are established over a single port number.

T. These can work as an alternative to wired broadband or as a backup/failover Internet connection type. Many router models now come with a cellular radio. A subscribed identity module (SIM) card from the service provider must also be installed.

True or false? Both 4G and 5G cellular can be used for fixed access broadband as well as in mobile devices.

MX record

Type of DNS resource record used to identify the email servers used by a domain.

fully qualified domain name (FQDN)

Unique label specified in a DNS hierarchy to identify a particular host within a subdomain within a top-level domain.

IPv4

Version of the Internet Protocol that uses 32-bit address values and subnet masks typically expressed in dotted decimal notation.

IPv6

Version of the Internet Protocol that uses 64-bit address values typically expressed in canonical hex notation with slash notation network prefixes.

The Dynamic Host Configuration Protocol (DHCP) uses broadcast addressing, which is not supported by the connection-oriented Transmission Control Protocol (TCP). Consequently, DHCP uses the connectionless User Datagram Protocol (UDP).

What feature of DHCP means that it must use UDP at the transport layer?

DomainKeys Identified Mail (DKIM)

What type of TXT record uses cryptography to help recipient servers reject spoofed messages and spam?

An IPv6 address

What type of value would you expect a query for an AAAA resource record to return.

Virtual LAN (VLAN).

Which network configuration technology can be configured on switches to divide a local network into multiple broadcast domain segments?

The role of a name server is to respond to queries for the resource records of the specific domain(s) that it is responsible for. The role of the DNS server types listed in a client's IP configuration is to resolve requests for records in any valid domain. To do this, the resolver must take on the task of querying multiple name servers on behalf of the client. Mixing these roles on the same server machine is possible in theory, but for performance and security reasons, they are more commonly performed by separate servers.

You are advising another technician about typical DNS configuration. The technician thinks that the name server hosting the 515 support domain resource records on the Internet should be configured as the primary DNS server entry in the IP configuration of local clients. Why is this unlikely to be the case?

An RJ45 unshielded twisted pair (UTP) patch cable. The ONT converts the optical signal over the external fiber optic cable to an electrical one to connect to the local router.

You are assisting another customer with a full fiber connection terminated to an optical network terminal (ONT). The customer's router was disconnected while some building work was being completed, and the patch cable is now missing. The customer thinks that the cable should be a fiber optic one because the service is "full fiber." What type of cable do you need to locate?

The IPv4 address of the local router interface, entered in dotted decimal format.

You are setting up a printer to use static IPv4 addressing. What type of value is expected in the default gateway field?

Asymmetrical digital subscriber line (ADSL) connects to the phone line via a filter. You need an RJ11-terminated patch cord to make the connection.

You are setting up an ADSL router/modem for a client; unfortunately, the contents of the box have become scattered. What type of cable do you need to locate to connect the router's WAN interface?

The reservation should be configured with the media access control (MAC) address of the print device (plus the IP address to assign).

You need to ensure that a print device receives the same IP address when connecting to the network. What value do you need to configure on the DHCP server to enable a reservation?

fiber to the premises (FTTP)

internet connection type that uses a fiber link between the subscriber premises and ISP network. ______________ uses a full fiber link, while fiber to the curb (FTTC) retains a short segment of copper wire between the subscriber premises and a street cabinet.

Trivial File Transfer Protocol (TFTP)

is a simplified form of the File Transfer Protocol (FTP) and supports only file copying. _______ works over UDP port 69, whereas FTP work on port 21.


संबंधित स्टडी सेट्स

Worksheet 29.2: Directors and Officers

View Set

Intro to Public Policy - MIDTERM

View Set

Essay 2: U Curve and W curve adjustment

View Set

Ch. 6 Exam - Health Insurance Policies: Health Insurance Policy Provisions

View Set

Financial Management Final Spring 18

View Set

Chapter 11: Functional Organization of nervous tissue

View Set