Chapt 6 Flashcards
TCP/IP (Transmission Control Protocol/Internet Protocol) is based on the _______ model
United States DOD (Department of Defense)
the first octet of class A IP addresses lies in the range of ____ to _____
1 to 126
in order to communicate on a network, TCP/IP (Transmission Control Protocol/Internet Protocol) hosts must have a unique _____ and valid ______
IP address and Subnet Mask
which protocol in TCP/IP (Transmission Control Protocol/Internet Protocol) is responsible for resolving IP addresses to MAC (media access control) addresses?
ARP (Address Resolution Protocol)
TCP (Transmission Control Protocol) is a _______ protocol that operates at the ______ layer of the OSI (Open System Interconnection) model
connection oriented
transport layer
Class C private IP addresses are the the _______ (octet) range
192.168.0.0 to 192.168.255.255
class B private IP addresses are in the _____ (octet) range
172.16.0.0 to 172.31.255.255
FTP (File Transfer Protocol) uses ports ___ and ____, and Telnet uses port ______
20, 21 and telnet 23
a _____ server provides IP configuration information to clients on the network.
DHCP (Dynamic Host Configuration Protocol)
APIPA (Automatic Private Internet Protocol Addressing) addresses are in the _____ range with a subnet mask of ____
169.254.0.0 to 169.254.255.255
subnet 255.255.0.0
the ____ protocol is used to send mail and operates on port ____
SMTP (Simple Mail Transfer Protocol)
Port 25
the address fe80::/10 is an example of an IPv6 ______ address
link-local
the ___ protocol is used to retrieve mail and operates on port _____
IMAP (Internet Message Access Protocol) port 143
or
POP3 (Post Office Protocol 3) Port 110
which type of DNS TXT (Domain Name System Text Record) record authenticates an email server via IP address?
SPF (sender policy framework)
_____ is the database that contains the information that the DHCP (Dynamic Host Configuration Protocol) server gives to clients.
Scope
UDP (User Datagram Protocol) is a _____ protocol that operates at the ____ layer of the OSI (Open System Interconnection) Model.
connectionless
transport layer
Logical addresses in TCP/IP (Transmission Control Protocol/Internet Protocol) are handled by the _______ (protocol), which operates at the _____ layer of the OSI (Open system Interconnection) model.
IP
Network
Physical network card addresses are called ____ addresses
MAC (Media Access Control)
which protocol is responsible for delivering error messages in TCP/IP (Transmission Control Protocol/Internet Protocol)?
ICMP (Internet Control Message Protocol)
the first octet of class B IP addresses lies in the range of ______ to ______
128 to 191
the first octet of class C IP addresses lies in the range of _________ to ______
192 to 223
HTTP (Hypertext Transfer Protocol) uses port _____ and HTTPS (Hypertext Transfer Protocol Secure) uses port ____
80
443
a ______ server resolves hostnames to IP addresses
DNS (Domain Name System)
to communicate on a TCP/IP network, which two things do you need?
a unique IP address and a valid subnet mask
class A private IP addresses are in the _____ (octet) range.
10.0.0.0-10.255.255.255
the POP3(Post office Protocol 3) protocol is used to _____ mail and operates on port _____
retrieve
port 110
to communicate with computers on an external network using TCP/IP, your computer needs to be configured with a ________
default gateway
the IPv6 address ::1/128 is the ______ address
loopback
multicast IPv6 addresses start with _____
FF00::
what is the DNS TXT (Domain Name System Text Record) record that authenticates email servers using a public-private key pair?
DKIM (Domain Keys Identified Mail)
what is the DNS TXT (Domain Name System Text Record) record that specifies how an email administrator wants flagged messages handled?
DMARC (Domain-based Message Authentication, Reporting and Conformance)
what is the configuration file on a DNS (Domain Name System) server called?
Zone file
to be able to contact a DHCP server on a remote subnetwork, you need to install a ____ on the local subnetwork.
DHCP relay agent
what is the name of the network type that is segmented using a managed switch?
VLAN (virtual local area network)
a secure point to point connection over a public network is called what ?
VPN (virtual private network)
You have just set up a network that will use the TCP/IP protocol, and you want client computers to obtain IP configuration information automatically. Which type of server do you need for this?
DNS, DHCP, NAT, IP configuration server
DHCP.
A Dynamic Host Configuration Protocol (DHCP) server provides IP configuration information to hosts when they join the network. A Domain Name System (DNS) server resolves hostnames to IP addresses. Network Address Translation (NAT) translates private IP addresses into public IP addresses. There is no IP configuration server (other than a DHCP server).
Which of the following protocols was designed to access information stored in an information directory, such as employee phone books?
FTP, LDAP, RDP, CIFS
LDAP.
Lightweight Directory Access Protocol (LDAP) is designed to access information stored in an information directory typically known as an LDAP directory or LDAP database. This typically includes employee data and network configuration data. FTP is designed to transfer files. RDP is a remote desktop protocol, and CIFS is used to share files and printers.
Which TCP/IP protocol uses port 80?
HTTP, HTTPS, Telnet, POP3
HTTP.
HTTP uses port 80.
HTTPS uses port 443,
Telnet uses port 23, and
POP3 uses port 110.
What is the maximum number of IPv6 addresses that can be assigned to one IPv6 interface?
A) One (unicast)
B) Two (unicast and anycast)
C) Three (unicast, anycast, and multicast)
D) None of the above
None of the above.
An IPv6 interface is not limited in the number of addresses that can be assigned, although there could be limitations based on practicality.
Which of the following are valid examples of IPv6 addresses? (Choose all that apply.)
A) 2001:0db8:3c4d:0012:0000:0000:1234:56ab
B) ::ffff:c0a8:173
C) 2001:db8:3c4d:12::1234:56ab
D) 2001::1ab4::5468
A, B, C. An IPv6 address contains 128 bits, written in eight 16‐bit fields represented by four hexadecimal digits. Option A contains all eight fields expressed in full. Option B is an IPv4 address expressed in IPv6 form. Option C is the same address as option A, but written in accepted shorthand. Option D is not valid because the double colons (::) can be used only once within an address.
Which of the following IP addresses would not be valid for a DNS server on the Internet?
10.25.11.33
18.33.66.254
155.118.63.11
192.186.12.2
10.25.11.33.
DNS servers resolve hostnames to IP addresses. On the Internet, a DNS server needs to have a public IP address. The address 10.25.11.33 is in a private address space, so that address would not be valid for a DNS server on the Internet.
The workstations on your network are configured to use a DHCP server. One of the workstations can’t communicate with other computers. Its IP address is 169.254.1.18. What could be the problem?
A) The subnet mask is wrong.
B) It has a private IP address.
C) The default gateway is wrong.
D) It can’t reach the DHCP server.
It can’t reach the DHCP server.
The address assigned to the computer is an APIPA address. Microsoft client computers (and others) will configure themselves with an address in this range if they are unable to reach a DHCP server.
Which of the following protocols is responsible for sending email?
IMAP4, POP3, SMTP, SNMP
SMTP.
Simple Mail Transfer Protocol (SMTP) is responsible for sending email. IMAP4 and POP3 both receive email. SNMP is a network management protocol.
What port does the RDP protocol work on?
53, 143, 389, 3389
- Remote Desktop Protocol (RDP) works on port 3389. DNS works on port 53, IMAP4 works on port 143, and LDAP works on port 389.
An email administrator wants to help protect against their server being spoofed to send spam. They were told that they can do this with a TXT record in their DNS server. If they want to authenticate emails using an encrypted security key, which TXT record would be most appropriate?
DMARC, VLAN, SPF, DKIM
DKIM.
DKIM authenticates messages from email servers using private‐public encrypted key pairs. SPF authenticates via IP addresses. DMARC is a TXT record that allows an administrator to specify how they want rejected emails to be handled. VLAN is a virtual LAN and is not a TXT record type.
What are advantages that TCP has over UDP? (Choose two.)
Acknowledged delivery
Faster delivery
Lower overhead
Virtual circuits
Acknowledged delivery and
Virtual circuits.
TCP is a connection‐oriented protocol that establishes virtual circuits and acknowledges delivery of packets. Because of these features, it has higher overhead than UDP and is a little slower.
Your friend is concerned about the security of making an online purchase. What should you tell them to look for in the address bar of the web browser?
HTTP, HTTPS, SSH, TLS
HTTPS.
The HTTP protocol is inherently unsecure, but the HTTPS protocol is secure. (SSH and TLS are secure as well, but they are not protocols used to connect to websites.)
You are manually configuring a TCP/IP host. Another administrator gives you the router’s IP address. What is the TCP/IP term for this?
Default gateway
Subnet mask
DNS server
DHCP server
Default gateway.
The router is your doorway out into other networks, and it is known in TCP/IP terms as the default gateway. Without this configuration option, you would not be able to get to external networks. The subnet mask tells a host which network it’s on. The DNS server resolves hostnames to IP addresses, and a DHCP server provides IP configuration information to hosts.
Your network is running IPv4. Which of the configuration options are mandatory for your host to communicate on the network? (Choose two.)
IP address
Subnet mask
Default gateway
DNS server address
IP address and Subnet mask
A, B. The only mandatory IPv4 configuration items are an IP address and a subnet mask. If you are not connecting to another network, you do not need a default gateway. DNS servers resolve hostnames to IP addresses, but they are not mandatory.
Which of the following protocols is used for secure retrieval of email?
SMTP, SNMP, POP3, IMAP4
IMAP4.
IMAP4 and POP3 are the two protocols that are used for email retrieval. Of the two, only IMAP4 provides security features. SMTP sends email. SNMP is a network management protocol.
Which of the following is the name of a secure point-to-point connection made over a public network?
NAT, APIPA, VLAN, VPN
VPN.
A virtual private network (VPN) is a secure point‐to‐point connection made over a public network. NAT translates private IP addresses to public IP addresses. APIPA is an automatic IP address assignment if a client computer can’t reach a DHCP server. VLANs are virtual local area networks configured through switches.
Which network protocol is used for administration of networking devices such as routers and switches, and which port(s) does it use?
SNMP, 161 and 162
SNMP, 25
SMTP, 25
SMTP, 161 and 162
SNMP, 161 and 162.
Simple Network Management Protocol (SNMP) is used for networking device administration and management. It uses ports 161 and 162. Simple Mail Transfer Protocol (SMTP) is for sending email and uses port 25.
Which of the following is an IPv6 broadcast address?
::1
FE80::
FF00::
::FFFF
None of the above
None of the above.
IPv6 does not have broadcasts. IPv6 does have multicasts, which are a bit like targeted broadcasts. FF00:: is the first part of a multicast address.
You are setting up a small network that will not connect to the Internet. You want computers to be able to locate each other by using hostnames. What service will do this?
DNS, DHCP, FTP, APIPA
DNS.
DNS is typically known as a name resolver on the Internet, but it will work on private networks as well. DNS resolves hostnames to IP addresses. DHCP automatically configures clients with IP address information. FTP is for file downloads. APIPA is a process used to assign clients a private IP address automatically when they can’t reach the DHCP server.
What port is: FTP
20 , 21
what port is: SSH
22
what port is: Telnet
23
what port is: SMTP
25
what port is: DNS
53
what port is: DHCP
67, 68
what port is: TFTP
69
what port is: HTTP
80
what port is: POP3
110
what port is: NetBIOS/NetBT
137, 139
what port is: IMAP4
143
what port is: SNMP
161, 162
what port is: LDAP
389
what port is: HTTPS
443
what port is: SMB/CIFS
445
what port is RDP
3389
_______ is the protocol most commonly used to send email messages. Because it’s designed to send only, it’s referred to as a push protocol
SMTP
Port 25
_______ ‘s purpose is to resolve hostnames to IP addresses
Domain Name System (DNS)
Port 53
________ dynamically assigns IP addresses and other IP configuration information to network clients
Dynamic Host Configuration Protocol (DHCP)
Port 67/68
_______ can transfer files much like FTP, but it’s much simpler and faster
Port 69—Trivial File Transfer Protocol (TFTP)
_______ manages the communication between a web server and client, and it lets you connect to and view all the content that you enjoy on the Internet
(not secure)
Port 80—Hypertext Transfer Protocol (HTTP)
_______ was the preferred protocol for downloading email
Port 110—POP3
__________ is an application programming interface (API) that allows computers to communicate with each other over the network
Port 137/139—Network Basic Input/Output System (NetBIOS)/NetBIOS over TCP/IP (NetBT)
_______ is a secure protocol designed to download email. also it allows multiple clients to be simultaneously connected to the same inbox
Port 143—Internet Message Access Protocol (IMAP)
________ gathers and manages network performance information.
Port number?
Port 161/162—Simple Network Management Protocol (SNMP)
______ is designed to access information stored in an information directory or database
Port 389—Lightweight Directory Access Protocol (LDAP)
To encrypt traffic between a web server and client securely, ______ can be used. _______ connections are secured using either Secure Sockets Layer (SSL) or Transport Layer Security (TLS). To use ______, the website needs to obtain an SSL/TLS certificate from a reputable certificate authority, which verifies the identity of the website.
Port 443—Hypertext Transfer Protocol Secure (HTTPS)
_______ is used to provide shared access to files, printers, and other network resources and is primarily implemented by Microsoft systems
Port 445—Server Message Block (SMB)/Common Internet File System (CIFS)
________ allows users to connect to remote computers and run programs on them
Port 3389—Remote Desktop Protocol (RDP)
An IPv4 address is a ____-bit hierarchical address
32
192.168.10.55. Each of the numbers in this example represents ______ (amount) of the address, also known as a(n) ______
8bits = 1 byte
octet
Each IP address is made up of two components: the ______ ID and the _____ ID.
network and host ID
a(n) _______, identifies the IP address of the device that will allow the host to connect outside of the local network.
default gateway
______ runs on your router and handles the translation of private, nonroutable IP addresses into public IP addresses
NAT Network Address Translation
________ is the length of the subnet mask determines the structure of the network
variable length subnet masking (VLSM)
three standards used to battle email spam are :
Sender Policy Framework (SPF),
Domain Keys Identified Mail (DKIM), and
Domain-based Message Authentication, Reporting, and Conformance (DMARC)
_____ authenticates an email server based on its IP address.
SPF
_____ is a bit more involved, as it authenticates using encryption through a public-private key pair
DKIM
IPv4 has ___ bits of addressing space
32
IPv6 has ___ bits of addressing space
128
A ______ address identifies a single node on the network
unicast, anycast, multicast
unicast
An ______ address refers to one that has been assigned to multiple nodes
unicast, anycast, multicast
anycast
a _________ address is one used by multiple hosts, and is used to communicate to groups of computers
unicast, anycast, multicast
multicast
IPv6 accomplishes the same task of APIPA with the ____ _____ adress of _____
link local address fe80::/10
in IPv6 the IPv4 loopback address of 127.0.0.1 has been replaced with ____
::1/128
The _____ is designed to help segment physical networks into multiple logical (virtual) networks
virtual local area network (VLAN)
The _____ is designed to help segment physical networks into multiple logical (virtual) networks
virtual local area network (VLAN)
A ____ is a secure (private) network connection that occurs through a public network
VPN
Link local IPv6 has a prefix of?
FE80::/10
NON routable, and can be used for communication only on the local network
IPv6 mulicast prefix
FF00::/8
Port 67
DHCP
Port 68
DHCP
Port 53
DNS