Chapter 2 Review Questions

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

What decimal number corresponds to the binary number 11111111? A. 225 B. 255 C.127 D. 11111111

255

List three signaling protocols discussed in the chapter that are used for communicating multimedia data.

H.323, MGCP, SIP

What is the IPv4 loopback address? What is the IPv6 loopback address?

IPV4 = 127.0.0.1 UPV6= ::1/128

Which type of DNS record identifies a mail server?

MX

If you know that your colleague's TCP/IP host name is JSMITH, and you need to find out his IP address, what command should you type at your shell prompt or command prompt?

Nslookup jsmith or Ping jsmith

You issue a transmission from your workstation to the following socket on your LAN: 10.1.1.145:110. Assuming your network uses standard port designations, what Application layer protocol are you using?

POP3

On what port is an IPv6 client listening for DHCP messages?

Port 547

While troubleshooting a network connection problem for a coworker, you discover that the computer has a static IP address and is giving a duplicate IP address error. What command-line utility can you use to find out what other device may already be using that IP address?

nslookup

When determining whether a local network has any NetBIOS traffic, do you use the nslookup utility in interactive mode or a packet analyzer such as Wireshark?

Wireshark

What version of the ping command do you use in Windows with IPv6 addresses? What version do you use on a Linux system

Ping6- On Linux, ping -6 -On Windows

FTP sometimes uses a random port for data transfer, but an FTP server always, unless programmed otherwise, listens to the same port for session requests from clients. What port is the FTP server listening on?

Port 21

When running a scan on your computer, you find that a session has been established with a host at the address 208.85.40.44:80. Which protocol is in use for this session? What command-line utility might you use to find out who the host is?

Port 80 NSlookup

How many bits does an IPv6 address contain?

128 bits

You have decided to use SNAT and PAT on your small office network. At minimum, how many IP addresses must you obtain from your ISP for all five clients in your office to be able to access servers on the Internet?

1

What veriosn of smb can be used across Windows, UNIX, and other operating systems? A. SIP (Session Initiation Protocol) B. RDP (Remote Desktop Protocol) C. CIFS (Common Internet File System) D. MGCP (Media Gateway Control Protocol)

CIFS (Common Internet File System)

You are the network manager for a computer training center that allows clients to bring their own laptops to class for learning and taking notes. Clients need access to the Internet, so you have configured your network's DHCP server to issue IP addresses automatically. What DHCP option should you modify to make sure you are not wast- ing addresses that were used by clients who have left for the day?

DHCP Lease

What type of device does a computer turn to first when attempting to make contact with a host on another network? A. Default gateway B. DNS server C. Root server D. DHCP server

Default gateway

What computers are the highest authorities in the DOMAN Name System hieracrchy? A. Authoritative name servers B. Root servers C. Top-level domain servers D. Primary DNS server

Root Servers

Which statement describes SMTP? A. SMTP is a connectionless protocol that uses UDP B. SMTP is a connection-based protocol that uses UDP C. SMTP is a connectionless protocol that uses TCP D. SMTP is a connection-based protocol that uses TCP

SMTP is a connection-based protocol that uses TCP

When you just brought online a new secondary DNS server and notice you monitoring software reports a significant increase in network traffic. Which two hosts on you network are likely to be causing the increased traffic and why? A. The caching and primary DNS servers, because the caching server is requesting zone transfer from the primary server B. The secondary and primary DNS servers, because the caching server is requesting zone transfers from the primary server. C. The root and primary DNS server, because the primary server is requesting zone transfers from the root server D.The Web server and primary DNS server, because the web server s requesting zone transfers from the primary DNS server.The secondary and primary DNS servers, because the secondary server is requesting zone transfers from the primary server

The secondary and primary DNS servers, because the secondary server is requesting zone transfers from the primary server

You have just set up a new wireless network in your house, and you want to determine whether your Linux laptop has connected to it and obtained a valid IP address. What command will give you the information you need?iof

ifconfig -a

What protocol does a network gateway use to keep track of which internal client is talking to which external Web server

PAT

When your computer first joins an IPv6 network, what is the prefix of the IP address the computer first configures for itself? A. FE80::/10 B. FF00::/8 C. 2001::/64 D. 2001::/3

FE80::/10

If you are connected to a network that uses DHCP,and you need to terminate your windows workstation DHCP lease, which command would you use? A. ipconfig /release B. ipconfig /renew C. ifconfig /release D. ifconfig /new

ipconfig /release

What is the range of IP addresses that might be assigned by APIPA?

169.254.0.1 - 169.254.255.254

Suppose you want to change the default port for RDP as a security precaution. What port does RDP use by default, and from what range of numbers should you select a private port number?

3389,49152-65535

Suppose you send data to 11111111 11111111 11111111 11111111 IP address on an IVP4 network. To which device are you transmitting? A. All devices on the Internet B. All devices on you local network C. The one device with this given IP address D. Because no device can have this given IP address, no devices receive the transmission.

All devices on your local network

The second 64 of an autoconfigured IPV6 address may either be random or generated from the computer MAC address, which contains 48 bits. What standard defines the conversion of the MAC address to the IPv6 64-bit device id?

EUI-64 Standard

Which part of a MAC address is unique to each manufacturer? A. The network identifier B. The OUI C. The device identifier D. The physical address

The OUI (Organizationally Unique Identifier) or block ID/Company ID

While troubleshooting a network connection problem for a coworker, you discover the computer is querying a nonexistent DNS server. What command-line utility can you use to assign the correct DNS server IP address?

nslookup


Set pelajaran terkait

Chapter 1: Nutrition, Food Choices, and Health

View Set

Cultural Anthropology: Midterm Exam

View Set

Chapter 5: Adult Health and Nutritional Assessment

View Set

Week 1: Intro/Navigating the System

View Set

introduction to Blackboard Ultra

View Set

Chapter 83 - Basic Principles of Antimicrobial Therapy

View Set