Chapter 2
Unshielded twisted-pair cable capable with a specification of 100 MHz/100 Mbps is also called Category ________.
5 (five)
John is trying to simply connect three computers in a small network. He does not need any sort of routing capability and is not concerned about network traffic. What is the simplest device for connecting computers?
Hub
What protocol translates web addresses into IP addresses?
DNS
Which TCP/IP protocol operates on port 53 using UDP and translates URLs into Web addresses?
DNS
Which layer of the OSI model is divided into two sublayers?
Data Link
The IP command-line command to determine your computer's IP address, subnet mask, and default gateway is ping.
False
The TCP protocol works at the network layer of the OSI model.
False
The first four bytes of the MAC address identify the vendor.
False
The name you type into a browser's address bar, such as www.microsoft.com, is known as the IP locator.
False
Which TCP/IP protocol operates on port 80 and displays web pages?
HTTP
Mohammed needs to open a firewall port so that web traffic can be passed through the firewall. What protocol is used for web pages, and on which port does it work?
HTTP, port 80
Which of the following is a unique hexadecimal number that identifies your network card?
MAC Address
The IP address 127.0.0.1 always refers to your what?
Self
An IP version 4 address consists of four numbers, separated by dots. Each number is called a(n) ________.
Octet
A(n) __________ hides the internal network's IP address and presents a single IP address to the outside world.
Proxy server
You are assigned with attaching connectors to segments of cable. What type of connector is used with network cables?
RJ-45
Which device is used to boost a signal?
Repeater
Which device can relay packets from one network to another and is usually programmable?
Router
Which of the following is a device used to connect two or more networks?
Router
Which TCP/IP protocol operates on port 25 and sends email?
SMTP
What protocol is used to send email, and on what port does it work?
SMTP, port 25
Gunther is setting up encrypted remote communications so that the server administrators can remotely access servers. What protocol is used for remotely logging on to a computer in a secure manner?
SSH
You are explaining the history of networking to a group of freshmen students. What did Vince Cerf invent?
TCP
You are explaining the history of networking to a group of freshmen students. What did Tim Berners-Lee invent?
The World Wide Web
How big is a TCP packet header?
The size is always 20 bytes.
A host is a machine with data on it, to which you can connect.
True
MAC addresses are unique addresses for each NIC.
True
No protocols operate at the physical layer of the OSI model.
True
The notation used to perform variable-length subnet masking for IP addresses is CIDR.
True
The session layer of the OSI model provides the mechanism to manage the dialogue between end-user application processes.
True
Which of the following was one of the three universities involved in the original distributed network setup by a government agency?
UC Berkeley
Malek is purchasing cable to use in setting up small office networks. He wants to stock up on commonly used cable. What type of cable do most networks use?
UTP
Internet addresses in the form of www.chuckeasttom.com are called what?
Uniform resource locators
What type of cable is used in most networks?
Unshielded twisted-pair
Which device can connect many computers and sends data only out of one port based on MAC address?
switch
Sheryl is explaining the OSI model to new technicians at her company. She is trying to explain what protocols operate at the various layers of the OSI model. At what layer of the OSI model does TCP operate?
transport layer
You are examining a list of IP addresses. Some are internal, some external, and some are not valid. Which of the following is not a valid IP address? a. 131.156.5.2 b. 245.200.11.1 c. 127.0.0.1 d. 295.253.254.1
295.253.254.1
Juan has just installed a new T1 line into a doctor's office. The doctor's front desk receptionist has asked what speed they can expect. A T1 line sends data at what speed?
1.54Mbps
What is the binary equivalent of the decimal number 240?
11110000
Which U.S. government agency created the distributed network that formed the basis for the Internet?
Advanced Research Project Agency
If an IP address has the number 191 in the first octet, it is a class ______ address.
Class B
If an IP address has the number 194 in the first octet, it is a class _______ address.
Class C
What class of address is IP address 193.44.34.12?
Class C (Because Class C is from 192.0.1.1 to 223.255.254.254)
Which TCP/IP protocol operates on ports 20 and 21 and is used for transferring files between computers?
FTP
The IP command-line command to determine the number of hops it takes to get from your computer to its destination is ping.
False
Which device can connect many computers and sends packets out every port?
Hub
John is working with command-line utilities to gather diagnostic information about a computer that cannot connect to the network. Which utility provides information about a machine's network configuration?
IPConfig
Sharice is trying to teach a new technician basic networking terms. What should she tell this new technician NIC stands for?
Network Interface Card
What is the name for the point where the backbones of the Internet connect?
Network access point
The IP utility used to test connectivity (e.g. reachable) with a remote host is _______.
ping