Lesson 5: Configuring Network Addressing and Internet Connections Flashcards
An application uses Transmission Control Protocol (TCP) as it requires data to make it to the destination 100% intact. Which of the following are functions of this protocol? (Select all that apply.)
A.Uses SYN/ACK packets.
B.Uses TFTP.
C.Uses negative acknowledgment.
D.Uses FIN.
A.Uses SYN/ACK packets, C.Uses negative acknowledgment and D.Uses FIN.
A. TCP establishes a connection between the sender and recipient using a handshake sequence of SYN, SYN/ACK, and ACK packets.
C. TCP allows the receiver to send a negative acknowledgment (NACK) to force retransmission of a missing or damaged packet.
D. TCP allows the graceful termination of a session using a FIN handshake. The main drawback is that this connection information requires multiple header fields.
Other options
B. Network devices typically use Trivial File Transfer Protocol (TFTP) to obtain a configuration file. The application protocol uses its own acknowledgment messaging, so it does not require TCP.
An application developer wants to ensure packets arrive at the destination in the correct order and none are lost when an application communicates across the network. Which protocol will the application developer use?
A.UDP
B.TCP
C.IP
D.DNS
B. The Transmission Control Protocol (TCP) can identify and recover from lost or out-of-order packets. Failing to receive a packet or processing it incorrectly can cause serious data errors.
Other options
A. The User Datagram Protocol (UDP) is faster than TCP and comes with less of a transmission overhead because it does not need to send extra information to establish reliable connections.
C. The Internet Protocol (IP) provides packet addressing and routing within a network of networks. For data to travel from one IP network to another, an intermediate system must forward it.
D. The Domain Name System (DNS) is a service that maps fully qualified domain name labels to IP addresses on most TCP/IP networks, including the internet.
A company hires a network technician who is reviewing the network setup documentation. The technician sees that the company has fiber optic cable running all the way up to the building. This represents what type of connection?
A.FTTC
B.VDSL
C.ONT
D.FTTP
D. A fiber to the premises (FTTP) internet connection means that the service provider’s fiber optic cable runs all the way to the customer’s building.
Other options
A. A fiber to the curb (FTTC) solution retains some sort of copper wiring to the customer premises while extending the fiber link to a communications cabinet servicing multiple subscribers.
B. The service providers with their roots in telephone networks use very high-speed DSL (VDSL) to support FTTC. VDSL achieves higher bit rates than other DSL types at the expense of range.
C. An optical network terminal (ONT) is a device that converts between optical and electrical signaling deployed to facilitate full fiber internet connection types.
A network technician is checking the records to ensure all the host names match up with the proper IP addresses for the network. What records is the technician checking? (Select all that apply.)
A.A
B.MX
C.FQDN
D.AAAA
A. An Address (A) record is a resource record that resolves a host name to an IPv4 address. Network technicians can create and update resource records manually (statically).
D. An AAAA record is a resource record on a DNS server that resolves a host name to an IPv6 address. Client and server computers on the network can generate resource records dynamically.
Other options
B. A mail exchange (MX) record identifies an email server for the domain so that other servers can send messages to it.
C. A fully qualified domain name (FQDN) is a unique label specified in a DNS hierarchy to identify a particular host within a subdomain within a top-level domain.
A network technician must allow employee computers to securely connect to the corporate network from alternate locations. What is the best method for the technician to use?
A.DMARC
B.DHCP scope
C.VPN
D.VLAN
C. A virtual private network (VPN) enables hosts to connect to the LAN from locations other than the site by connecting to the local network via a secure remote access server.
Other options
A. The Domain-Based Message Authentication, Reporting, and Conformance (DMARC) framework ensures that Sender Policy Framework (SPF) and DomainKeys Identified Mail (DKIM) are effective.
B. A Dynamic Host Configuration Protocol (DHCP) scope is the range of addresses that a DHCP server can offer to client hosts in a particular subnet.
D. A virtual LAN (VLAN) is a logical network segment comprising a broadcast domain established using a feature of managed switches to assign each port a VLAN ID.
A network technician is purchasing a digital subscriber line (DSL) service for a business that transfers large amounts of data back and forth between branches. What is the best connection type for the business?
A.ADSL
B.ISP
C.PSTN
D.Symmetric DSL
D. Symmetric versions of DSL offer the same uplink and downlink speeds and are of more use to businesses and for branch office links, where more data passes upstream than with normal internet use.
Other options
D. Asymmetrical DSL (ADSL) provides a fast downlink but a slow uplink, with the latest (ADSL2+) offering downlink rates up to about 24 Mbps and uplink rates of 1.25 Mbps or 2.5 Mbps.
B. Internet service providers (ISPs) establish high-speed links between their networks, using transit and peering arrangements to carry traffic to and from parts of the internet they do not physically own.
C. The public switched telephone network (PSTN) is the national and global telecommunications network that has fiber optic cabling at its core.
A networking student is learning about IP addressing and discovers which of the following facts are NOT true regarding IPv6?
A.Divided into two main parts.
B.Will replace IPv4.
C.Expressed in hexadecimal notation.
D.Expressed in dotted decimal notation.
D. To make IPv4 addresses easier to use, they are in dotted decimal notation. IPv6 addresses are in hexadecimal notation.
Other options
A. An IPv6 address divides into two main parts: the first 64 bits designate the network ID, while the second 64 bits designate a specific interface.
B. The pool of available IPv4 public addresses is not very large, compared to the number of devices that need to connect to the internet, so IP version 6 (IPv6) will replace IPv4 completely.
C. IPv6 addresses are in hexadecimal notation. To express a 128-bit IPv6 address in hex, the binary address divides into eight double-byte (16-bit) values delimited by colons.
A network technician is configuring hosts to request IP configuration from a server. What protocol is the technician configuring?
A.HTTPS
B.SSH
C.DHCP
D.TFTP
C. The technician is configuring Dynamic Host Configuration Protocol (DHCP) which is a protocol used by clients to request IP configuration information from a server.
Other options
A. HyperText Transfer Protocol Secure (HTTPS) is a protocol used to deliver web pages and other resources. It uses encryption to authenticate the server and protect the information.
B. Secure shell (SSH) is a protocol that accesses the command-line interface of a computer from across the network and uses encryption to authenticate the server and user and protect the information.
D. Network devices typically use Trivial File Transfer Protocol (TFTP) to obtain a configuration file. The application protocol uses its own acknowledgment messaging, so it does not require TCP.
A network technician is setting static IPv4 addresses on servers. Which settings would be considered optional for ensuring proper communications within a local area network? (Select all that apply.)
A.The gateway
B.The alternate DNS
C.IP address
D.Subnet mask
A. The Gateway and B. The Alternate
DNS
A. The gateway parameter is the IPv4 address of a router and is the IP address to which packets destined for a remote network should go by default. This will be changed for groups of locally connected devices.
B. The Domain Name System (DNS) and alternate DNS servers provide resolution of host and domain names to their IP addresses. While the primary DNS may be essential for locating resources on the internet, an alternate is optional.
Other options
C. Each host must be configured with an IP address and subnet mask at a minimum to communicate on an IPv4 network.
D. The subnet mask is entered in dotted decimal notation, such as 255.255.255.0. When used with the IP address 192.168.0.100 , this mask identifies 192.168.0.0 as the network ID and means that the last octet ( .100 ) is the host ID.
A technician is sent to the personal office space of the organizations board to set up a SOHO environment for the executive. While preparing for the home installation, the technician creates a list of items that will be needed to successfully setup and configure the SOHO network. What is the function of using a switch in a SOHO environment?
A.It connects to the service provider cabling and transfers frames over the link
B.It allows local computers and other host types to connect to the network via RJ-45 ports
C.It forwards packets over the WAN interface if a location destination IP address is not available
D.It allows hosts to connect to the network over Wi-Fi
B. When setting up and configuring a SOHO Network, a switch allows local computers and other host types to connect to the network via RJ-45 ports. This will be an unmanaged switch, so no configuration is necessary.
Other options
A. A modem, versus a switch, connects to the service provider cabling and transfers frames over the link. The modem type must be matched to the network type (ADSL, VDSL, or cable).
C. Routers, and not switches, forward packets over the WAN (Internet) interface if they do not have a local destination IP address.
D. An access point allows hosts to connect to the network over Wi-Fi.
You are setting up an ADSL router/modem for a client; unfortunately, the contents of the box have become scattered. What type of cable do you need to locate to connect the router’s WAN interface?
Asymmetrical Digital Subscriber Line (ADSL) connects to the phone line via a filter. You need an RJ11-terminated patch cord to make the connection.
You are assisting another customer with a full fiber connection terminated to an optical network terminal (ONT). The customer’s router was disconnected while some building work was being completed, and the patch cable is now missing. The customer thinks that the cable should be a fiber optic one because the service is “full fiber.” What type of cable do you need to locate?
An RJ45 unshielded twisted pair (UTP) patch cable. The ONT converts the optical signal over the external fiber optic cable to an electrical one to connect to the local router.
True or false? Both 4G and 5G cellular can be used for fixed access broadband as well as in mobile devices.
True. These can work as an alternative to wired broadband or as a backup/failover Internet connection type. Many router models now come with a cellular radio. A subscribed identity module (SIM) card from the service provider must also be installed.
True or false? A SOHO router uses an embedded modem and Ethernet adapter to forward traffic between public and private network segments over a single hardware port.
False. The modem and Ethernet interfaces use separate ports.
A host is configured with the IP address 172.16.1.100 in the 172.16.1.0/16 IP network. What value should be entered as the subnet mask?
A subnet mask field uses dotted decimal format. The /16 network prefix means that the first 16 bits in the mask are set to one: 11111111 11111111 00000000 00000000. A whole octet of ones converts to 255 in decimal. Therefore, the dotted decimal mask is 255.255.0.0.