Chapter 2: How computers Find Each Other on Networks
You have just brought online a new secondary DNS server and notice your monitoring software reports a significant increase in network traffic. Which two hosts on your network are likely to be causing the increased traffic and why?
The secondary and primary DNS servers, because the secondary server is requesting zone transfers from the primary server
What command below can be used to display a complete summary of all network interfaces in a Windows computer?
ipconfig /all
If you are connected to a network that uses DHCP, and you need to terminate your Windows workstation's DHCP lease, which command would you use?
ipconfig /release
What range of ports is referred to as the "well-known" range of ports?
0-1023
A loopback IP address begins with what number?
127
An IPv6 address consists of how many bits?
128
Select the name of the free, open source software that is by far the most popular DNS server software:
BIND
Select the IPv6 address below that indicates a global unicast address:
FE80::10
Select the protocol below that is used to synchronize clocks on computers on a network:
NTP
What RFC outlines recommendations for private IP addresses?
RFC 1918
Which protocol below is used to make an initial connection between hosts for transferring multimedia data, relying on other protocols once a connection is
SIP
What protocol is commonly used to request configuration files from another computer?
TFTP
A port number, which identifies an application on a host, exists at what level of the OSI model?
Transport
The Network Time Protocol service uses what port number?
UDP 123
In Linux systems, what file contains the settings for the DHCP service?
dhcpd.conf
What command on Linux will display TCP/IP information associated with every interface on the device?
ifconfig -a
When two IPv6 nodes are on the same network, they are referred to as which of the following?
neighbors
What utility is used to verify that TCP/IP installed, bound to the NIC, configured correctly, and communicating with the network?
ping
What top level domain is used for the air-transport industry?
.aero
How many clusters of root servers exist?
13
What decimal number corresponds to the binary number 11111111?
255
Suppose you send data to the 11111111 11111111 11111111 11111111 IP address on an IPv4 network. To which device(s) are you transmitting?
All devices on your local network
What version of SMB can be used across Windows, UNIX, and other operating systems?
CIFS (Common Internet File System)
What type of device does a computer turn to first when attempting to make contact with a host on another network?
Default gateway
When your computer first joins an IPv6 network, what is the prefix of the IP address the computer first configures for itself?
FE80::/10
What do the first 24 bits of a MAC address represent?
Organizationally Unique Identifier
What computers are the highest authorities in the Domain Name System hierarchy?
Root servers
Which statement actually describes SMTP?
SMTP is a connection-based protocol that uses TCP
Which part of a MAC address is unique to each manufacturer?
The OUI
What are the last two parts of a host name known as?
domain name