Chapt 6 Flashcards

1
Q

TCP/IP (Transmission Control Protocol/Internet Protocol) is based on the _______ model

A

United States DOD (Department of Defense)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

the first octet of class A IP addresses lies in the range of ____ to _____

A

1 to 126

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

in order to communicate on a network, TCP/IP (Transmission Control Protocol/Internet Protocol) hosts must have a unique _____ and valid ______

A

IP address and Subnet Mask

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

which protocol in TCP/IP (Transmission Control Protocol/Internet Protocol) is responsible for resolving IP addresses to MAC (media access control) addresses?

A

ARP (Address Resolution Protocol)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

TCP (Transmission Control Protocol) is a _______ protocol that operates at the ______ layer of the OSI (Open System Interconnection) model

A

connection oriented

transport layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Class C private IP addresses are the the _______ (octet) range

A

192.168.0.0 to 192.168.255.255

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

class B private IP addresses are in the _____ (octet) range

A

172.16.0.0 to 172.31.255.255

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

FTP (File Transfer Protocol) uses ports ___ and ____, and Telnet uses port ______

A

20, 21 and telnet 23

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

a _____ server provides IP configuration information to clients on the network.

A

DHCP (Dynamic Host Configuration Protocol)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

APIPA (Automatic Private Internet Protocol Addressing) addresses are in the _____ range with a subnet mask of ____

A

169.254.0.0 to 169.254.255.255

subnet 255.255.0.0

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

the ____ protocol is used to send mail and operates on port ____

A

SMTP (Simple Mail Transfer Protocol)

Port 25

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

the address fe80::/10 is an example of an IPv6 ______ address

A

link-local

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

the ___ protocol is used to retrieve mail and operates on port _____

A

IMAP (Internet Message Access Protocol) port 143
or
POP3 (Post Office Protocol 3) Port 110

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

which type of DNS TXT (Domain Name System Text Record) record authenticates an email server via IP address?

A

SPF (sender policy framework)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

_____ is the database that contains the information that the DHCP (Dynamic Host Configuration Protocol) server gives to clients.

A

Scope

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

UDP (User Datagram Protocol) is a _____ protocol that operates at the ____ layer of the OSI (Open System Interconnection) Model.

A

connectionless

transport layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Logical addresses in TCP/IP (Transmission Control Protocol/Internet Protocol) are handled by the _______ (protocol), which operates at the _____ layer of the OSI (Open system Interconnection) model.

A

IP

Network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Physical network card addresses are called ____ addresses

A

MAC (Media Access Control)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

which protocol is responsible for delivering error messages in TCP/IP (Transmission Control Protocol/Internet Protocol)?

A

ICMP (Internet Control Message Protocol)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

the first octet of class B IP addresses lies in the range of ______ to ______

A

128 to 191

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

the first octet of class C IP addresses lies in the range of _________ to ______

A

192 to 223

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

HTTP (Hypertext Transfer Protocol) uses port _____ and HTTPS (Hypertext Transfer Protocol Secure) uses port ____

A

80

443

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

a ______ server resolves hostnames to IP addresses

A

DNS (Domain Name System)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

to communicate on a TCP/IP network, which two things do you need?

A

a unique IP address and a valid subnet mask

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
class A private IP addresses are in the _____ (octet) range.
10.0.0.0-10.255.255.255
26
the POP3(Post office Protocol 3) protocol is used to _____ mail and operates on port _____
retrieve port 110
27
to communicate with computers on an external network using TCP/IP, your computer needs to be configured with a ________
default gateway
28
the IPv6 address ::1/128 is the ______ address
loopback
29
multicast IPv6 addresses start with _____
FF00::
30
what is the DNS TXT (Domain Name System Text Record) record that authenticates email servers using a public-private key pair?
DKIM (Domain Keys Identified Mail)
31
what is the DNS TXT (Domain Name System Text Record) record that specifies how an email administrator wants flagged messages handled?
DMARC (Domain-based Message Authentication, Reporting and Conformance)
32
what is the configuration file on a DNS (Domain Name System) server called?
Zone file
33
to be able to contact a DHCP server on a remote subnetwork, you need to install a ____ on the local subnetwork.
DHCP relay agent
34
what is the name of the network type that is segmented using a managed switch?
VLAN (virtual local area network)
35
a secure point to point connection over a public network is called what ?
VPN (virtual private network)
36
You have just set up a network that will use the TCP/IP protocol, and you want client computers to obtain IP configuration information automatically. Which type of server do you need for this? DNS, DHCP, NAT, IP configuration server
DHCP. A Dynamic Host Configuration Protocol (DHCP) server provides IP configuration information to hosts when they join the network. A Domain Name System (DNS) server resolves hostnames to IP addresses. Network Address Translation (NAT) translates private IP addresses into public IP addresses. There is no IP configuration server (other than a DHCP server).
37
Which of the following protocols was designed to access information stored in an information directory, such as employee phone books? FTP, LDAP, RDP, CIFS
LDAP. Lightweight Directory Access Protocol (LDAP) is designed to access information stored in an information directory typically known as an LDAP directory or LDAP database. This typically includes employee data and network configuration data. FTP is designed to transfer files. RDP is a remote desktop protocol, and CIFS is used to share files and printers.
38
Which TCP/IP protocol uses port 80? HTTP, HTTPS, Telnet, POP3
HTTP. HTTP uses port 80. HTTPS uses port 443, Telnet uses port 23, and POP3 uses port 110.
39
What is the maximum number of IPv6 addresses that can be assigned to one IPv6 interface? A) One (unicast) B) Two (unicast and anycast) C) Three (unicast, anycast, and multicast) D) None of the above
None of the above. An IPv6 interface is not limited in the number of addresses that can be assigned, although there could be limitations based on practicality.
40
Which of the following are valid examples of IPv6 addresses? (Choose all that apply.) A) 2001:0db8:3c4d:0012:0000:0000:1234:56ab B) ::ffff:c0a8:173 C) 2001:db8:3c4d:12::1234:56ab D) 2001::1ab4::5468
A, B, C. An IPv6 address contains 128 bits, written in eight 16‐bit fields represented by four hexadecimal digits. Option A contains all eight fields expressed in full. Option B is an IPv4 address expressed in IPv6 form. Option C is the same address as option A, but written in accepted shorthand. Option D is not valid because the double colons (::) can be used only once within an address.
41
Which of the following IP addresses would not be valid for a DNS server on the Internet? 10.25.11.33 18.33.66.254 155.118.63.11 192.186.12.2
10.25.11.33. DNS servers resolve hostnames to IP addresses. On the Internet, a DNS server needs to have a public IP address. The address 10.25.11.33 is in a private address space, so that address would not be valid for a DNS server on the Internet.
42
The workstations on your network are configured to use a DHCP server. One of the workstations can't communicate with other computers. Its IP address is 169.254.1.18. What could be the problem? A) The subnet mask is wrong. B) It has a private IP address. C) The default gateway is wrong. D) It can't reach the DHCP server.
It can't reach the DHCP server. The address assigned to the computer is an APIPA address. Microsoft client computers (and others) will configure themselves with an address in this range if they are unable to reach a DHCP server.
43
Which of the following protocols is responsible for sending email? IMAP4, POP3, SMTP, SNMP
SMTP. Simple Mail Transfer Protocol (SMTP) is responsible for sending email. IMAP4 and POP3 both receive email. SNMP is a network management protocol.
44
What port does the RDP protocol work on? 53, 143, 389, 3389
3389. Remote Desktop Protocol (RDP) works on port 3389. DNS works on port 53, IMAP4 works on port 143, and LDAP works on port 389.
45
An email administrator wants to help protect against their server being spoofed to send spam. They were told that they can do this with a TXT record in their DNS server. If they want to authenticate emails using an encrypted security key, which TXT record would be most appropriate? DMARC, VLAN, SPF, DKIM
DKIM. DKIM authenticates messages from email servers using private‐public encrypted key pairs. SPF authenticates via IP addresses. DMARC is a TXT record that allows an administrator to specify how they want rejected emails to be handled. VLAN is a virtual LAN and is not a TXT record type.
46
What are advantages that TCP has over UDP? (Choose two.) Acknowledged delivery Faster delivery Lower overhead Virtual circuits
Acknowledged delivery and Virtual circuits. TCP is a connection‐oriented protocol that establishes virtual circuits and acknowledges delivery of packets. Because of these features, it has higher overhead than UDP and is a little slower.
47
Your friend is concerned about the security of making an online purchase. What should you tell them to look for in the address bar of the web browser? HTTP, HTTPS, SSH, TLS
HTTPS. The HTTP protocol is inherently unsecure, but the HTTPS protocol is secure. (SSH and TLS are secure as well, but they are not protocols used to connect to websites.)
48
You are manually configuring a TCP/IP host. Another administrator gives you the router's IP address. What is the TCP/IP term for this? Default gateway Subnet mask DNS server DHCP server
Default gateway. The router is your doorway out into other networks, and it is known in TCP/IP terms as the default gateway. Without this configuration option, you would not be able to get to external networks. The subnet mask tells a host which network it’s on. The DNS server resolves hostnames to IP addresses, and a DHCP server provides IP configuration information to hosts.
49
Your network is running IPv4. Which of the configuration options are mandatory for your host to communicate on the network? (Choose two.) IP address Subnet mask Default gateway DNS server address
IP address and Subnet mask A, B. The only mandatory IPv4 configuration items are an IP address and a subnet mask. If you are not connecting to another network, you do not need a default gateway. DNS servers resolve hostnames to IP addresses, but they are not mandatory.
50
Which of the following protocols is used for secure retrieval of email? SMTP, SNMP, POP3, IMAP4
IMAP4. IMAP4 and POP3 are the two protocols that are used for email retrieval. Of the two, only IMAP4 provides security features. SMTP sends email. SNMP is a network management protocol.
51
Which of the following is the name of a secure point-to-point connection made over a public network? NAT, APIPA, VLAN, VPN
VPN. A virtual private network (VPN) is a secure point‐to‐point connection made over a public network. NAT translates private IP addresses to public IP addresses. APIPA is an automatic IP address assignment if a client computer can’t reach a DHCP server. VLANs are virtual local area networks configured through switches.
52
Which network protocol is used for administration of networking devices such as routers and switches, and which port(s) does it use? SNMP, 161 and 162 SNMP, 25 SMTP, 25 SMTP, 161 and 162
SNMP, 161 and 162. Simple Network Management Protocol (SNMP) is used for networking device administration and management. It uses ports 161 and 162. Simple Mail Transfer Protocol (SMTP) is for sending email and uses port 25.
53
Which of the following is an IPv6 broadcast address? ::1 FE80:: FF00:: ::FFFF None of the above
None of the above. IPv6 does not have broadcasts. IPv6 does have multicasts, which are a bit like targeted broadcasts. FF00:: is the first part of a multicast address.
54
You are setting up a small network that will not connect to the Internet. You want computers to be able to locate each other by using hostnames. What service will do this? DNS, DHCP, FTP, APIPA
DNS. DNS is typically known as a name resolver on the Internet, but it will work on private networks as well. DNS resolves hostnames to IP addresses. DHCP automatically configures clients with IP address information. FTP is for file downloads. APIPA is a process used to assign clients a private IP address automatically when they can’t reach the DHCP server.
55
What port is: FTP
20 , 21
56
what port is: SSH
22
57
what port is: Telnet
23
58
what port is: SMTP
25
59
what port is: DNS
53
60
what port is: DHCP
67, 68
61
what port is: TFTP
69
62
what port is: HTTP
80
63
what port is: POP3
110
64
what port is: NetBIOS/NetBT
137, 139
65
what port is: IMAP4
143
66
what port is: SNMP
161, 162
67
what port is: LDAP
389
68
what port is: HTTPS
443
69
what port is: SMB/CIFS
445
70
what port is RDP
3389
71
_______ is the protocol most commonly used to send email messages. Because it's designed to send only, it's referred to as a push protocol
SMTP Port 25
72
_______ 's purpose is to resolve hostnames to IP addresses
Domain Name System (DNS) Port 53
73
________ dynamically assigns IP addresses and other IP configuration information to network clients
Dynamic Host Configuration Protocol (DHCP) Port 67/68
74
_______ can transfer files much like FTP, but it's much simpler and faster
Port 69—Trivial File Transfer Protocol (TFTP)
75
_______ manages the communication between a web server and client, and it lets you connect to and view all the content that you enjoy on the Internet (not secure)
Port 80—Hypertext Transfer Protocol (HTTP)
76
_______ was the preferred protocol for downloading email
Port 110—POP3
77
__________ is an application programming interface (API) that allows computers to communicate with each other over the network
Port 137/139—Network Basic Input/Output System (NetBIOS)/NetBIOS over TCP/IP (NetBT)
78
_______ is a secure protocol designed to download email. also it allows multiple clients to be simultaneously connected to the same inbox
Port 143—Internet Message Access Protocol (IMAP)
79
________ gathers and manages network performance information. Port number?
Port 161/162—Simple Network Management Protocol (SNMP)
80
______ is designed to access information stored in an information directory or database
Port 389—Lightweight Directory Access Protocol (LDAP)
81
To encrypt traffic between a web server and client securely, ______ can be used. _______ connections are secured using either Secure Sockets Layer (SSL) or Transport Layer Security (TLS). To use ______, the website needs to obtain an SSL/TLS certificate from a reputable certificate authority, which verifies the identity of the website.
Port 443—Hypertext Transfer Protocol Secure (HTTPS)
82
_______ is used to provide shared access to files, printers, and other network resources and is primarily implemented by Microsoft systems
Port 445—Server Message Block (SMB)/Common Internet File System (CIFS)
83
________ allows users to connect to remote computers and run programs on them
Port 3389—Remote Desktop Protocol (RDP)
84
An IPv4 address is a ____-bit hierarchical address
32
85
192.168.10.55. Each of the numbers in this example represents ______ (amount) of the address, also known as a(n) ______
8bits = 1 byte octet
86
Each IP address is made up of two components: the ______ ID and the _____ ID.
network and host ID
87
a(n) _______, identifies the IP address of the device that will allow the host to connect outside of the local network.
default gateway
88
______ runs on your router and handles the translation of private, nonroutable IP addresses into public IP addresses
NAT Network Address Translation
89
________ is the length of the subnet mask determines the structure of the network
variable length subnet masking (VLSM)
90
three standards used to battle email spam are :
Sender Policy Framework (SPF), Domain Keys Identified Mail (DKIM), and Domain-based Message Authentication, Reporting, and Conformance (DMARC)
91
_____ authenticates an email server based on its IP address.
SPF
92
_____ is a bit more involved, as it authenticates using encryption through a public-private key pair
DKIM
93
IPv4 has ___ bits of addressing space
32
94
IPv6 has ___ bits of addressing space
128
95
A ______ address identifies a single node on the network unicast, anycast, multicast
unicast
96
An ______ address refers to one that has been assigned to multiple nodes unicast, anycast, multicast
anycast
97
a _________ address is one used by multiple hosts, and is used to communicate to groups of computers unicast, anycast, multicast
multicast
98
IPv6 accomplishes the same task of APIPA with the ____ _____ adress of _____
link local address fe80::/10
99
in IPv6 the IPv4 loopback address of 127.0.0.1 has been replaced with ____
::1/128
100
The _____ is designed to help segment physical networks into multiple logical (virtual) networks
virtual local area network (VLAN)
101
The _____ is designed to help segment physical networks into multiple logical (virtual) networks
virtual local area network (VLAN)
102
A ____ is a secure (private) network connection that occurs through a public network
VPN
103
Link local IPv6 has a prefix of?
FE80::/10 NON routable, and can be used for communication only on the local network
104
IPv6 mulicast prefix
FF00::/8
105
Port 67
DHCP
106
Port 68
DHCP
107
Port 53
DNS