NTA Lesson 3 Quiz

Ace your homework & exams now with Quizwiz!

b

A remote host connects to your system's Web server. Which of the following can you use to determine the port this remote client opened to connect to the Web server? a. The tracert command b. The netstat command c. The ping command d. The route command

a

DHCP assigns IP addresses automatically on a TCP/IP network. The DHCP server has a pool of IP addresses consisting of: a. a range of IP addresses that the network administrator enters into the server. b. a range of IP addresses assigned to the company by an ISP. c. a range of private IPv4 addresses generated by the Automatic Private IP Addressing (APIPA) service. d. a range of unique local IPv6 addresses generated by the Link-Local Addresses service.

a

For one computer to communicate with another computer over a TCP/IP network, it must know the other computer's: a. Internet address. b. MAC address. c. physical address. d. LAN address.

a

Fourth-generation (4G) wireless networks are considered a breakthrough because: a. they offer broadband speeds for mobile devices to access the Internet. b. they are the first to be digital in nature, which makes the transfer of data more efficient because modulation and demodulation of data are not necessary. c. they are the first to offer video capabilities. d. they are the first to offer the use of Code-Division Multiple Access (CDMA), which is a set of protocols that allow multiplexing of signals onto one channel.

d

How many fields are in an IPv4 Internet address? a. One b. Two c. Eight d. Four

c

IPv6 addresses consist of: a. eight groups of four hexadecimal digits separated by periods. b. four groups of eight hexadecimal digits separated by periods. c. eight groups of four hexadecimal digits separated by colons. d. four groups of eight hexadecimal digits separated by colons.

a

If you experience a loss of e-mail service or can no longer access the Web, what command can your network administrator use to locate the cause of the failure? a. The tracert command b. The route command c. The ping command d. The netstat command

c

In general, smartphones contain: a. small processors and no operating system software. b. very little memory and small screens. c. powerful processors and plenty of memory. d. high-speed Internet access but no GPS capabilities.

a

The operating system developed by Google for mobile devices is known as: a. Android. b. Metro. c. Windows Phone. d. Bluetooth.

b

The operating system's device driver, the corresponding network interface card and the physical connections are found at which layer of the Internet architecture? a. Application b. Network access c. Internet d. Transport

a

The tracert command: a. provides information about round-trip propagation time between each router and the source system. b. provides information about the services that are listening on your system. c. provides information about packets processed by your system on the network. d. displays and manually configures the routes in a routing table.

d

Transmission Control Protocol (TCP) is found at which layer of the Internet architecture? a. Internet b. Application c. Network access d. Transport

a

Two hosts exist on a TCP/IP Ethernet network. The first host, which knows the IP address of the second host, is unable to send data to the second host. Which command should you use to determine the physical (MAC) address of the second host to solve this problem? a. The arp command b. The ifconfig command c. The ipconfig command d. The ping command

d

What are Requests for Comments (RFCs)? a. Published documents that divide network protocols into layers b. Published documents that describe how routers share information and how they report routing information table changes to one another c. Published documents that identify the communication channels set aside for specific user processes d. Published documents that include detailed information about standardized Internet protocols and those in various stages of development

b

What do IPv6 addresses use to specify subnets? a. A subnet mask b. A subnet prefix length c. Colon notation d. Dotted decimal notation

c

What is a portable media player? a. A wireless protocol that is used to exchange data over short distances b. A compact personal computer that has many of the same features as a smartphone, and generally uses a solid-state drive instead of a traditional hard disk for storage c. A device that can connect to a PC or directly to the Internet to download and play audio files, videos, games and apps d. A more compact, Web-oriented version of a standard PC-based laptop computer

a

What is demultiplexing? a. The method that a destination computer uses to process an incoming packet b. A mechanism used on the Internet to translate host computer names into Internet (IP) addresses c. The process of sending a transmission to several nodes using a single IP address d. The process that determines the path that packets will travel across networks

c

What is routing? a. The process that dynamic routers use to calculate routes automatically using routing protocols b. The method that a destination computer uses to process an incoming packet c. The process of choosing a path over which to send packets d. The process that static routers use to calculate routes using routing information tables

c

What is the function of routing protocols? a. They forward packets from one physical network to another. b. They contain the location of all networks in relation to a router's location. c. They determine how routers share information and how they report routing information table changes to one another. d. They encapsulate packets in Ethernet frames and bind destination Internet addresses to Ethernet addresses.

d

What is the function of subnet masks? a. To distinguish the location of all networks in relation to a router's location. b. To identify a communication channel to a specific user process c. To ensure that each user on the Internet has a unique IP address d. To distinguish the network and host portions of IP addresses

b

What is the function of the Internet layer of the Internet architecture? a. It accepts higher-layer datagrams and transmits them over the attached network. b. It is responsible for addressing and routing packets on TCP/IP networks. c. It interacts with the transport-layer protocols to send or receive data. d. It accepts application-layer data and provides the flow of information between two hosts.

a

What is the function of the application layer of the Internet architecture? a. It interacts with the transport-layer protocols to send or receive data. b. It is responsible for addressing and routing packets on TCP/IP networks. c. It accepts higher-layer datagrams and transmits them over the attached network. d. It accepts application-layer data and provides the flow of information between two hosts.

b

What is the function of the hosts file? a. It enables IPv6 interfaces to communicate with each other if they are linked. b. It maps DNS host names to IP addresses. c. It assigns private IP addresses to clients. d. It assigns the IP address and subnet mask to your system.

a

What is the function of the network access layer of the Internet architecture? a. It accepts higher-layer datagrams and transmits them over the attached network. b. It interacts with the transport-layer protocols to send or receive data. c. It accepts application-layer data and provides the flow of information between two hosts. d. It is responsible for addressing and routing packets on TCP/IP networks.

b

What is the function of the transport layer of the Internet architecture? a. It is responsible for addressing and routing packets on TCP/IP networks. b. It accepts application-layer data and provides the flow of information between two hosts. c. It interacts with the transport-layer protocols to send or receive data. d. It accepts higher-layer datagrams and transmits them over the attached network.

b

What is the name of the end point of a connection, which usually includes the TCP or UDP port used and the IP address? a. Gateway b. Socket c. Port d. Bridge

c

What is the term for IPv4 addresses that are reserved for interal networks and cannot be used to access the Internet? a. Default gateways b. Unique local addresses c. Private IP addresses d. Loopback addresses

c

What is the term for a 16-bit integer value that identifies a communication channel to a specific user process? a. IP address b. Router c. Port d. MAC address

b

What is the term for a device that allows computers to communicate over a network by converting cable signals into a stream of data? a. Socket b. Cable modem c. Network analyzer d. Router

a

What is the term for a software application that enables a PC or mobile device to function as a telephone using VoIP technology? a. Soft phone b. Fully qualified domain name c. Bluetooth d. RFC

d

What is the term for a stand-alone device that connects wireless local area networks to wireless phone networks at broadband speeds? a. Bluetooth b. CDMA 2000 c. Wideband CDMA d. 4G mobile hotspot

b

What is the term for a very compact personal computer that relies on a touch screen for input, generally uses a solid-state drive instead of a traditional hard disk, and relies on wireless or mobile networks for connectivity? a. iPhone b. Tablet c. Netbook d. BlackBerry

b

What type of routing is occurring when a route changes and the routers automatically update themselves by recalculating routes? a. Indirect routing b. Dynamic routing c. Static routing d. Direct routing

c

What type of routing occurs between two computers located on the same physical network? a. Dynamic routing b. Static routing c. Direct routing d. Indirect routing

d

When troubleshooting connections, you should first check for basic connectivity by: a. pinging the hosts file. b. pinging DNS names. c. pinging the default gateway. d. pinging local IP addresses.

b

Which choice correctly describes the basic configuration parameters required for WAN communication? a. An IP address, a subnet mask, a default gateway and a DHCP client b. An IP address and a default gateway c. An IP address d. An IP address and a subnet mask

c

Which command should you use to determine your UNIX/Linux system's IP address? a. The netstat command b. The arp command c. The ifconfig command d. The ipconfig command

d

Which command should you use to determine your Windows system's IP address? a. The route command b. The netstat command c. The ifconfig command d. The ipconfig command

d

Which entity is a private, non-governmental organization that performs tasks such as Internet address space allocation? a. Internet Engineering Task Force (IETF) b. Institute of Electrical and Electronics Engineers (IEEE) c. Internet Assigned Numbers Authority (IANA) d. Internet Corporation for Assigned Names and Numbers (ICANN)

c

Which layer of the Internet architecture corresponds to the physical and data link layers of the OSI reference model? a. Transport b. Internet c. Network access d. Application

d

Which of the following can be used with the ping program to test local TCP/IP functionality? a. A private IP address b. A default gateway c. A unique local address d. A loopback address

b

Which of the following can you use to display and manually configure the routes in a routing table? a. The ping command b. The route command c. The netstat command d. The tracert command

c

Which of the following can you use to test the connectivity between source and destination systems? a. The tracert command b. The route command c. The ping command d. The netstat command

d

Which of the following indicates a client-side connectivity problem? a. You can ping an address on the other side of a router, but cannot ping your default gateway. b. You can ping your default gateway but cannot ping an address on the other side of the router. c. You can ping your default gateway by IP address but not by name. d. You cannot ping another system on your network.

c

Which of the following is a characteristic of Internet Protocol Version 6 (IPv6)? a. It is highly dependent on network routers to break down transmissions. b. It provides enough addresses for slightly more than 4.2 billion address assignments. c. It provides a practically unlimited number of IP addresses because it uses a 128-bit address. d. It does not provide native encryption or authentication mechanisms.

b

Which of the following is true of Bluetooth? a. There are more than 15 Bluetooth classifications, each with different signal strength and range. b. Bluetooth is not designed to replace wireless LAN technologies because its range is too limited. c. Bluetooth likely will replace wireless LANs because its range is greater than that of a LAN. d. Bluetooth is a wired protocol used to exchange data over relatively long distances.

a

Which of the following is true of a netbook? a. It is ideally suited for the cloud-computing model. b. It has many of the same features as a smartphone . c. It is an operating system developed by Google for mobile devices. d. It is Microsoft's answer to mobile operating systems.

c

Which of the following is typically true of mobile computing devices? a. They contain more processing power than traditional PCs. b. They connect to the Internet but do not allow data storage. c. Authentication mechanisms can be easily compromised. d. They are less portable than traditional PCs.

a

Which of the following may indicate an incorrect entry in the hosts file? a. You can ping your default gateway by IP address but not by name. b. You cannot ping another system on another LAN. c. You cannot ping another system on your network. d. You can ping your default gateway but cannot ping an address on the other side of the router.

c

Which of the following protocols is found at the transport layer of the Internet architecture? a. Internet Control Message Protocol (ICMP) b. Internet Protocol (IP) c. Transmission Control Protocol (TCP) d. Internet Group Management Protocol (IGMP)

c

Which of the following should you use to identify network trends, send alert messages about network problems, and test network connections, devices and cables? a. A Request for Comments (RFC) b. A routing information table c. A network analyzer d. The OSI/RM

a

Which of the following statements about mobile devices is true? a. Mobile devices rely on wireless network connections, usually forgoing the traditional wired connections completely. b. Mobile devices usually have all of the standard peripheral ports that a standard PC offers. c. Many mobile devices use a traditional hard disk. d. Mobile devices are often more difficult to use and maintain than traditional PCs.

c

Which of the following statements is true with regard to configuring a wireless network? a. You need only install software to configure each NIC. b. You need only install software to configure the wireless AP. c. You must install two different types of software: software to configure the wireless AP and software to configure each NIC. d. You need not configure each NIC to participate on the same network.

a

Which of the following supports automated TCP/IP host configuration, in which a query requesting configuration information is sent when the client starts up? a. Dynamic Host Configuration Protocol (DHCP) b. IPv6 Link-Local Addresses c. Domain Name System (DNS) d. IPv4 Automatic Private IP Addressing (APIPA)

d

Which protocol found at the application layer of the Internet architecture is a system for transferring files between computers on a TCP/IP network? a. Hypertext Transfer Protocol (HTTP) b. Simple Mail Transfer Protocol (SMTP) c. Network News Transfer Protocol (NNTP) d. File Transfer Protocol (FTP)

c

Which protocol is an interior routing protocol that contains features such as routing information table updates, load balancing, authenticated exchanges and defined route support? a. Exterior Gateway Protocol (EGP) b. Border Gateway Protocol (BGP) c. Open Shortest Path First (OSPF) d. Routing Information Protocol (RIP)

b

Which protocol is an interior routing protocol that maintains only the best route to a destination? a. Open Shortest Path First (OSPF) b. Routing Information Protocol (RIP) c. Border Gateway Protocol (BGP) d. Exterior Gateway Protocol (EGP)

b

Which protocol is found at the Internet layer of the Internet architecture and is responsible for translating Internet addresses to physical addresses? a. Domain Name System (DNS) b. Address Resolution Protocol (ARP) c. Dynamic Host Configuration Protocol (DHCP) d. Reverse Address Resolution Protocol (RARP)

a

Which type of routing requires that routing information tables be built and updated manually? a. Static routing b. Dynamic routing c. Direct routing d. Indirect routing

b

Why would you ping an IP address? a. To display the physical (MAC) address of the computer with which you are communicating b. To ensure that you have connectivity c. To ensure that DNS is working properly d. To determine the path between a source and destination system

a

Most IP-enabled systems are configured with a default gateway, which is an IP address that: a. specifies a routing device. b. requires the use of Network Address Translation (NAT). c. begins with 127. d. allows a client and server on the same host to communicate with each other.

a

Simple Mail Transfer Protocol (SMTP) is found at which layer of the Internet architecture? a. Application b. Transport c. Network access d. Internet


Related study sets

Lab: Cervical, Thoracic, and Lumbar Vertebrae

View Set

Chapter 25: Female Reproductive System

View Set

Quiz 2: The Spanish Colonization of California

View Set

AUD - Agreed-Upon Procedures and Prospective Financial Statements

View Set