A+ Guide to Software - 6th Edition - Chapter 7 - Reviewing the Basics

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

How many bits are in a MAC address?

48 bit - The original IEEE 802 MAC address comes from the original Xerox Ethernet addressing scheme. This 48-bit address space contains potentially 248 or 281,474,976,710,656 possible MAC addresses. All three numbering systems use the same format and differ only in the length of the identifier.

Which version of 802.11 technologies can use two antennas at both the access point and the network adapter?

802.11n MIMO - 2 or more antennas to improve performance

In Figure 7-9, the subnet mask is four notches tall and is considered a classless subnet mask for this network of sticks. How many notches tall would be a classful subnet mask for the same network?

A classful subnet mask for this network would be two notches tall because the first two notches of all sticks in the network are the same.

Which TCP/IP protocol that manages packet delivery guarantees that delivery? Which protocol does not guarantees delivery, but is faster?

TCP UDP

What type of protocol is used to present a public IP address to computers outside the LAN to handle requests to use the Internet from computers inside the LAN?

Telnet

Why is it unlikely that you will find the IP address 192.168.250.10 on the Internet?

The IP address 192.168.250.10 is a private address. Private addresses are for internal networks only and require NAT (Network Address Translation) to access the internet.

If a computer is found to have an IP address of 169.254.1.1, what can you assume about how it received that IP address?

The IP address was automatically assigned by Windows when it failed to lease an address from the DHCP server. The computer received an APIPA IP address. Class B address First 2 octets for network Last 2 octets for host or subnet

At what port does an SMTP email server listen to receive email from a client computer?

port 25

What are IP addresses called that begin with 10, 172.16, or 192.168?

private IP addresses

Would you expect WPS to be used when wireless network is using strong security, weak security, or no security as in a public hotspot?

strong security

Which type of IPv6 address is used to create multiple sites with a large organization?

unique local unicast address

When securing a Wi-Fi wireless network,, which is considered better security: to filter MAC addresses, use encryption, or not broadcast the SSID?

use encryption other two weak

Which email protocol allows a client application to manage email stored on an email server?

IMAP

Name at least three tunneling protocols that are used for IPv6 packets to travel over an IPv4 network.

ISATAP TEREDO 6TO4

What are the last 64 bits of a IPv6 address called? How are these bits used?

Interface ID These 64 bits or 4 blocks uniquely identify an interface on the local link

If no DHCP server is available when a computer configured for dynamic IP addressing connects to the network, what type of IP address is assigned of 169.254.1.11, what can you assume about how it received that IP address?

It uses an Automatic Private IP Address or APIPA

Which protocol is used when an application queries a database on a corporate network such as a database of printers?

LDAP

How many bits are in an IPv4 IP address? In an IPv6 address?

A. 32 bit - IPv4 addresses may be represented in any notation expressing a 32-bit integer value. They are most often written in the dot-decimal notation, which consists of four octets of the address expressed individually in decimal numbers and separated by periods. B. 128 - IPv6 addresses are 128-bit hexadecimal numbers. The IPv4 addresses we are all used to seeing are made up of four numerical octets that combine to form a 32-bit address. IPv6 addresses look nothing like IPv4 addresses. IPv6 addresses are 128 bits in length and are made up of hexadecimal characters.

In what class is the IP address 185.75.255.10?

Class B

In what class is the IP address 193.200.30.5?

Class C

What type of server serves up IP address to computer on a network?

DHCP

What type of server resolves fully qualified domain names to IP addresses?

FQDN fully qualified domain name

How is an IPv6 IP address used that begins with 2000::? That begins with FE80::?

Global unicast Link-local unicast

Which protocol does a web server use when transmissions are encrypted for security?

HTTPS

Describe the difference between public and private IP address. If a network is using private IP address, how can the computers on that network access the Internet?

The IP addresses available to the internet are called public IP addresses. A company conserves its public IP address by using private IP addresses that are not allowed on the internet. A computer using a private IP address on a private network can still access thhe Internet if a router or other device that stands between the network and the Internet is using NAT Network Address Translation.

How many bits are in the Subnet ID block? What are the value of these bits for a link-local IP address?

The Subnet ID block contains 16 bits. The value of these bits for a link-local address are 0000 0000 0000 0000. FE::/64

How does a cllient application identify a server application on another commputer on the network?

Transmission Control Protocol/Internet Protocol

What type of encryption protocol does Secure FTP SFTP use to secure FTP transmissions?

Variation of SSH

Which wireless encryption standard is stronger, WEP, WPA?

WPA2 WPA WEP

What two Windows a applications use the RDP protocol and port 3389?

Windows Remote Desktop Remote Assistance utilities


संबंधित स्टडी सेट्स

Unit 2: Understanding the Universe

View Set

정보처리기사 (신기술 동향 고급편)

View Set

Fluid & Electrolytes HURST REVIEW

View Set

Biography- Mother Teresa Grade 3(人物传记 德肋撒修女 三年级)

View Set

Karvonen Target Heart Rate Method

View Set

NHM 311 - Lessons 2, 3, & 4 - Quiz 2

View Set

Learning Outcomes BIOL1082 -- 3/8

View Set

Analytical Chemistry Book Chapter 3

View Set