networking
Which of the following is not one of the ranges of IP addresses defines in RFC 1918 that are commonly used behind a NAT server?
169.254.0.1 - 169.254.255.254
Which of the following IP address ranges is reserved for Automatic Private IP Addressing?
169.254.0.2 - 169.254.255.254
Which of the following is a valid MAC address?
C0-34-FF-15-01-8E
Which of the following is a valid IPv6 address?
FEC0::AB:9007
Which of the following protocols do e-mail clients use to download messages from a remote mail server?
POP3
Which of the following topologies connects each network device to a central hub?
Star
You have a small network that uses a hub to connect multiple devices. What physical topology is used?
Star
Which of the following LAN devices receives a signal on one port, and the forwards that signal only to the port where the destination device is connected?
Switch
Which of the following IP addresses are Class B addresses? (select three)
1) 129.0.0.0 2) 190.65.2.0 3) 132.12.0.0
Which of the following are valid IPv6 addresses? (select two)
1) 141:0:0:0:15:0:0:1 2) 6384:1319:7700:7631:446A:5511:8940:255
Which of the following are not valid IP addresses? (select three)
1) 145.8.260.7 2) 257.0.122.55 3) 45.22.156.256
Which of the following IP addresses have a default subnet mask of 255.255.0.0 (select three)
1) 168.16.5.1 2) 129.0.0.1 3) 191.168.2.15
You have a computer that is connected to the Internet through a NAT router. You want to use a private addressing scheme for your computer. Which of the following IP addresses could you assign to the computer? (select three)
1) 192.168.12.253 2) 172.18.188.67 3) 10.0.12.15
Which of the following is a valid IP address? (select two)
1) 2.2.2.2 2) 172.16.1.26
Which of the following IP addresses are Class C addresses? (select three)
1) 223.16.5.0 2) 222.55.0.0 3) 192.15.5.55
Which IEEE wireless standards specify transmission speeds up to 54 Mbps? (select two)
1) 802.11g 2) 802.11a
Which of the following correctly describe the most common format for expressing IPv6 addresses? (select two)
1) Hexadecimal numbers 2) 32 numbers, grouped using colons
Which tool in Windows would you use to browse all networks and shared folders to which a user has access? (select three)
1) Network 2) Computer 3) Windows Explorer
You want to allow your users to download files from a server running the IP protocol. You want to protect access to the files by requiring user authentication to access specific directories on the server. Which IP protocol should you implement to provide this capability?
FTP
Which of the following hardware devices regenerates a signal out all connected ports without examining the frame or packet contents?
Hub
Which of the following protocols is used by an e-mail client to retrieve messages from an e-mail server and gives users the option to keep mail messages on the server?
IMAP
You have implemented an ad-hoc wireless network that doesn't employ a wireless access point. Every wireless network card can communicate directly with any other wireless network card on the network. What type of physical network topology has been implemented in this type of network?
Mesh
You've used your Windows workstation to map a drive to a shared folder on a Windows server. Which protocol was used to access the share?
SMB
What protocol is used to send e-mail messages from a mail client to a mail server?
SMTP