Network + Unit 2
Which of the following IP addresses would be a loopback IP address? 169.254.0.1 192.168.1.1 224.0.0.1 127.0.0.1
127.0.0.1
In the classful addressing scheme, what range of network addresses is considered a Class B? 1.x.y.z to 126.x.y.z 128.0.x.y to 191.255.x.y 192.0.0.x to 223.255.255.x 224.x.y.z to 255.x.y.z
128.0.x.y to 191.255.x.y
A hexadecimal number is a number written in the base 10 number system. True or False?
False
DNS follows a centralized database model, allowing for easier management of DNS records. True or False?
False
ICANN is responsible for restrictions on use of the .com, .org, and .net TLDs. True or False?
False
The 1024 - 65535 range of ports is also known as the "well-known" range. True or False
False
The FTP protocol utilizes UDP, while TFTP uses TCP for data transmission. True or False
False
In the DNS hierarchy, where is information about how to find the top-level domain servers held? In the hosts file on the local machine. On the DNS root servers. On DNS caching-only servers. In the organization's forward lookup zone.
On the DNS root servers.
What utility is used to verify that TCP/IP installed, bound to the NIC, configured correctly, and communicating with the network? traceroute ifconfig ping route
ping
At the Transport layer of the OSI, what is used to find and communicate with a particular application running on a host? IP addresses port numbers domain names MAC addresses
port numbers
What text editor can be used on Linux to view and edit the contents of a configuration file? Notepad Microsoft Word vim edit
vim
In a DNS zone, what type of record holds the name-to-address mapping for IPv6 addresses? A record AAAA record PTR record TXT record
AAAA record
What part of a MAC address serves as the extension identifier, or device ID? The first 24 bits of the MAC address. The last 24 bits of the MAC address. The first 12 bits of the MAC address. The last 12 bits of the MAC address.
B.) The last 24 bits of the MAC address.
Which of the following protocols is used as a signaling protocol for the initial connection between hosts, but does not participate in data transfer during the session? NTP LDAP TFTP SIP
SIP
Encrypted control of remote computers using the RDP protocol is accomplished using what port number? TCP 22 UDP 161 TCP 3389 UDP 10000
TCP 3389
Each organization that provides host services on the public Internet is responsible for providing and maintaining DNS authoritative servers for public access. True or False
True
When using IPv6, two or more nodes on the same link are said to be neighbors. True or False?
True