Chapter 3 Flashcards
T or F: A hexadecimal number is a number written in the base 16 number system.
T
T or F: DNS follows a centralized database model, allowing for easier management of DNS records.
F
T or F: ICANN is responsible for restrictions on use of the .com, .org, and .net TLDs
F
T or F: Each organization that provides host services on the public Internet is responsible for providing and maintaining DNS authoritative servers for public access.
T
T or F: An IPv6 address consists of 128 bits that are written as 10 blocks of hexadecimal numbers separated by colons.
F
T or F: At the root level of the DNS hierarchical structure, 13 clusters of root servers hold information used to locate TLD servers.
T
T or F: The 1024 - 65535 range of ports is also known as the “well-known” range.
F
T or F: UDP port 123 is utilized by the Network Time Protocol service.
T
T or F: When using IPv6, two or more nodes on the same link are said to be neighbors.
T
T or F: The FTP protocol utilizes UDP, while TFTP uses TCP for data transmission
F
At the Transport layer of the OSI, what is used to find and communicate with a particular application running on a host?
A. IP addresses
B. MAC addresses
C. port numbers
D. domain names
Port numbers
With a FQDN of ftp1.dallas.mycompany.com, what part is the domain name?
A. ftp1
B. ftp1.dallas.mycompany.
C. ftp1.dallas
D. mycompany.com
mycompany.com
How can you determine the manufacturer of a NIC card based on the MAC address?
A. The first 24 bits, known as the Organizationally Unique Identifier, identify the manufacturer.
B. The middle 24 bits, known as the Organization Universal Identifier, identify the manufacturer.
C. The first 12 bits and last 12 bits combined are known as the Organizationally Unique Identifier.
D. The last 24 bits, known as the Organizationally Unique Identifier, identify the manufacturer.
The first 24 bits, known as the Organizationally Unique Identifier, identify the manufacturer.
What command can you utilize to display TCP/IP configuration information for each network adapter installed?
A. ipconfig /all
B. ipconfig /list
C. ipconfig /show
D. ipconfig /full
ipconfig /all
Which of the following IP addresses would be a loopback IP address?
A. 224.0.0.1
B. 192.168.1.1
C. 127.0.0.1
D. 169.254.0.1
127.0.0.1
What text editor can be used on Linux to view and edit the contents of a configuration file?
A. vim
B. Microsoft Word
C. edit
D. Notepad
Vim
On a Linux-based system, what command can be used to display TCP/IP information associated with every interface on the system?
A. ip show
B. if status
C. ipconfig /all
D. ifconfig -a
ifconfig -a
Which of the following IPv6 addresses represents a global unicast address?
A. FD00::/8
B. FE80::10
C. FC00::/7
D. 2000::/3
2000::/3
Which of the following protocols is used as a signaling protocol for the initial connection between hosts, but does not participate in data transfer during the session?
A. NTP
B. LDAP
C. SIP
D. TFTP
SIP
What is by far the most popular DNS server software available?
A. Oracle Resolver
B. Dnsmasq
C. Microsoft DNS
D. BIND
BIND
Your supervisor has asked you to configure a new prototype network with a dual stack configuration. What does this mean?
A. The router serving the network will have a redundant spare.
B. The network will exist on two separate segments, separated by a proxy.
C. Both IPv4 and IPv6 protocols will be used on the network.
D. Two different IPv4 address spaces will exist on the same network segment.
Both IPv4 and IPv6 protocols will be used on the network.
What utility is used to verify that TCP/IP installed, bound to the NIC, configured correctly, and communicating with the network?
A. ifconfig
B. traceroute
C. ping
D. route
Ping
You are troubleshooting a network issue on a client computer and discover that the network card has an IP address of 169.254.196.200. What does this mean?
A. The network card has been erroneously assigned a loopback address.
B. The computer has been assigned a routed public IP address.
C. The network card is set up for multicast communication.
D. The computer is configured to use DHCP, but was unable to lease an address.
The computer is configured to use DHCP, but was unable to lease an address.
What part of a MAC address serves as the extension identifier, or device ID?
A. The last 24 bits of the MAC address.
B. The first 24 bits of the MAC address.
C. The last 12 bits of the MAC address.
D. The first 12 bits of the MAC address.
The last 24 bits of the MAC address.