lesson 5 Configuring networking addressing and Internet Connections

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

A networking student is learning about IP addressing and discovers which of the following facts are NOT true regarding IPv6? Divided into two main parts. Will replace IPv4. Expressed in hexadecimal notation. Expressed in dotted decimal notation.

Expressed in dotted decimal notation.

A network technician is purchasing cellular phones for people who are travelling to a rural area and wants to make sure they will work with the most networks, as the areas do not have the latest cellular technology. What type of phones will help the technician accomplish this? CDMA GSM Firewall Router

GSM Global System for Mobile Communication (GSM)-based phones allow subscribers to use a removable subscriber identity module (SIM) card to use an unlocked handset with their chosen network provider.

GSM (Global System for Mobile Communications)

Global System for Mobile Communication (GSM)-based phones allow subscribers to use a removable subscriber identity module (SIM) card to use an unlocked handset with their chosen network provider.

What information about the local host is learned by running the probe 'ping www.comptia.org -c1' and obtaining reply packets? (choose TWO) Host can communicate with a remote host Host can resolve domain names Host's network link is low latency Host is using static addressing

Host can communicate with a remote host Host can resolve domain names

TFTP (Trivial File Transfer Protocol)

Network devices typically use Trivial File Transfer Protocol (TFTP) to obtain a configuration file. The application protocol uses its own acknowledgment messaging, so it does not require TCP.

Secure shell (SSH)

Secure shell (SSH) is a protocol that accesses the command-line interface of a computer from across the network and uses encryption to authenticate the server and user and protect the information

A network technician is purchasing a digital subscriber line (DSL) service for a business that transfers large amounts of data back and forth between branches. What is the best connection type for the business? ADSL ISP PSTN Symmetric DSL

Symmetric versions of DSL offer the same uplink and downlink speeds and are of more use to businesses and for branch office links, where more data passes upstream than with normal internet use

Alternate Domain System (DNS)

The Domain Name System (DNS) and alternate DNS servers provide resolution of host and domain names to their IP addresses and are essential for locating resources on the internet.

DMARC (Domain-based Message Authentication, Reporting & Conformance)

The Domain-Based Message Authentication, Reporting, and Conformance (DMARC) framework ensures that Sender Policy Framework (SPF) and DomainKeys Identified Mail (DKIM) are effective.

An application developer wants to ensure packets arrive at the destination in the correct order and none are lost when an application communicates across the network. Which protocol will the application developer use? UDP TCP IP DNS

The Transmission Control Protocol (TCP) can identify and recover from lost or out-of-order packets. Failing to receive a packet or processing it incorrectly can cause serious data errors.

TCP (Transmission Control Protocol)

The Transmission Control Protocol (TCP) can identify and recover from lost or out-of-order packets. Failing to receive a packet or processing it incorrectly can cause serious data errors.

Gateway Parameter

The gateway parameter is the IPv4 address of a router and is the IP address to which packets destined for a remote network should go by default. This will be changed for groups of locally connected devices

An application uses Transmission Control Protocol (TCP) as it requires data to make it to the destination 100% intact. Which of the following are functions of this protocol? (Select all that apply.) Uses SYN/ACK packets. Uses TFTP. Uses negative acknowledgment. Uses FIN.

Uses SYN/ACK packets. Uses negative acknowledgment. Uses FIN.

FTTC (Fiber to the Curb)

A fiber to the curb (FTTC) solution retains some sort of copper wiring to the customer premises while extending the fiber link to a communications cabinet servicing multiple subscribers

A company hires a network technician who is reviewing the network setup documentation. The technician sees that the company has fiber optic cable running all the way up to the building. This represents what type of connection? FTTC VDSL ONT FTTP

A fiber to the premises (FTTP) internet connection means that the service provider's fiber optic cable runs all the way to the customer's building

fully qualified domain name (FQDN)

A fully qualified domain name (FQDN) is a unique label specified in a DNS hierarchy to identify a particular host within a subdomain within a top-level domain.

MX (Mail Exchange)

A mail exchange (MX) record identifies an email server for the domain so that other servers can send messages to it.

FIREWALL

A network firewall is a software or hardware device that protects a network segment or individual host by filtering packets to an access control list.

ROUTER

A router is an intermediate system working at the network layer capable of forwarding packets around logical networks of different layer 1 and layer 2 types.

A network technician is checking the records to ensure all the host names match up with the proper IP addresses for the network. What records is the technician checking? (Select all that apply.) A MX FQDN AAAA

An address (A) record is a resource record that resolves a host name to an IPv4 address. Network technicians can create and update resource records manually (statically). An AAAA record is a resource record on a DNS server that resolves a host name to an IPv6 address. Client and server computers on the network can generate resource records dynamically.

ONT (optical network terminal)

An optical network terminal (ONT) is a device that converts between optical and electrical signaling deployed to facilitate full fiber internet connection types.

ADSL (asymmetric digital subscriber line)

Asymmetrical DSL (ADSL) provides a fast downlink but a slow uplink, with the latest (ADSL2+) offering downlink rates up to about 24 Mbps and uplink rates of 1.25 Mbps or 2.5 Mbps.

network technician is configuring hosts to request IP configuration from a server. What protocol is the technician configuring? HTTPS SSH DHCP TFTP

DHCP The technician is configuring Dynamic Host Configuration Protocol (DHCP) which is a protocol used by clients to request IP configuration information from a server.

IPv6 vs IPv4

IPv4: The most prevalent IP address format, which consists of four byte values (32 bits). This can yield 2^32 possible addresses. IPv6: In contrast to IPv4's 32-bit address space, IPv6 uses a 128 bit address space providing 2^128 possible addresses. This meets the demand of over 1.5 trillion Internet-connected devices. An IPv6 address divides into two main parts: the first 64 bits designate the network ID, while the second 64 bits designate a specific interface. The pool of available IPv4 public addresses is not very large, compared to the number of devices that need to connect to the internet, so IP version 6 (IPv6) will replace IPv4 completely. IPv6 addresses are in hexadecimal notation. To express a 128-bit IPv6 address in hex, the binary address divides into eight double-byte (16-bit) values delimited by colons.

Symmetric DSL

Symmetric versions of DSL offer the same uplink and downlink speeds and are of more use to businesses and for branch office links, where more data passes upstream than with normal internet use

FIN handshake

TCP allows the graceful termination of a session using a FIN handshake. The main drawback is that this connection information requires multiple header fields.

NACK (negative acknowledgement)

TCP allows the receiver to send a negative acknowledgment (NACK) to force retransmission of a missing or damaged packet.

A network technician is setting static IPv4 addresses on servers. Which settings would be considered optional for ensuring proper communications within a local area network? (Select all that apply.) The gateway The alternate DNS IP address Subnet mask

The gateway The alternate DNS

VDSL Very HIGH SPEED

The service providers with their roots in telephone networks use very high-speed DSL (VDSL) to support FTTC. VDSL achieves higher bit rates than other DSL types at the expense of range

subnet mask

The subnet mask is entered in dotted decimal notation, such as 255.255.255.0. When used with the IP address 192.168.0.100 , this mask identifies 192.168.0.0 as the network ID and means that the last octet ( .100 ) is the host ID.

Which of the following troubleshooting tools would be MOST useful when encountering this issue in the real world? Known good patch cable Cable tester Wi-Fi analyzer Cable crimper Punchdown tool

known good patch cable

CDMA

Code division multiple access (CDMA) is a method of multiplexing a communications channel using a code to key the modulation of a particular signal.

IP Address (Internet Protocol Address)

Each host must be configured with an IP address and subnet mask at a minimum to communicate on an IPv4 network.

HTTPS (Hypertext Transfer Protocol Secure)

HyperText Transfer Protocol Secure (HTTPS) is a protocol used to deliver web pages and other resources. It uses encryption to authenticate the server and protect the information.

ISP (Internet Service Provider)

Internet service providers (ISPs) establish high-speed links between their networks, using transit and peering arrangements to carry traffic to and from parts of the internet they do not physically own.

PTSN (Public Switched Telephone Network)

The public switched telephone network (PSTN) is the national and global telecommunications network that has fiber optic cabling at its core

A Dynamic Host Configuration Protocol (DHCP)

A Dynamic Host Configuration Protocol (DHCP) scope is the range of addresses that a DHCP server can offer to client hosts in a particular subnet

TCP (Transmission Control Protocol)

A connection-oriented, guaranteed-delivery protocol used to send data packets between computers over a network like the Internet.

VLAN

A virtual LAN (VLAN) is a logical network segment comprising a broadcast domain established using a feature of managed switches to assign each port a VLAN ID

A network technician must allow employee computers to securely connect to the corporate network from alternate locations. What is the best method for the technician to use? DMARC DHCP scope VPN VLAN

A virtual private network (VPN) enables hosts to connect to the LAN from locations other than the site by connecting to the local network via a secure remote access server.

Which of the following parameters is NOT required for a LAN host to access websites via the router? IP address Network prefix/subnet mask Default gateway IP address DNS server IP address All of the above are required

All of the above


Set pelajaran terkait

American National Gov. Final (jcjc)

View Set

2.3.6 Social Engineering techniques

View Set

Targeted Medical-Surgical: Endocrine

View Set

Lección 9 : Estructura: 9.1 (old)

View Set

Ch 29,30 Concept Check (Multiple Choice)

View Set

Chapter 13: Reformation & Religious Wars (16th century + first half of 17th c.)

View Set