Lesson 5: Configuring Network Addressing and Internet Connections Flashcards

1
Q

An application uses Transmission Control Protocol (TCP) as it requires data to make it to the destination 100% intact. Which of the following are functions of this protocol? (Select all that apply.)

A.Uses SYN/ACK packets.
B.Uses TFTP.
C.Uses negative acknowledgment.
D.Uses FIN.

A

A.Uses SYN/ACK packets, C.Uses negative acknowledgment and D.Uses FIN.

A. TCP establishes a connection between the sender and recipient using a handshake sequence of SYN, SYN/ACK, and ACK packets.

C. TCP allows the receiver to send a negative acknowledgment (NACK) to force retransmission of a missing or damaged packet.

D. TCP allows the graceful termination of a session using a FIN handshake. The main drawback is that this connection information requires multiple header fields.

Other options

B. Network devices typically use Trivial File Transfer Protocol (TFTP) to obtain a configuration file. The application protocol uses its own acknowledgment messaging, so it does not require TCP.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

An application developer wants to ensure packets arrive at the destination in the correct order and none are lost when an application communicates across the network. Which protocol will the application developer use?

A.UDP
B.TCP
C.IP
D.DNS

A

B. The Transmission Control Protocol (TCP) can identify and recover from lost or out-of-order packets. Failing to receive a packet or processing it incorrectly can cause serious data errors.

Other options

A. The User Datagram Protocol (UDP) is faster than TCP and comes with less of a transmission overhead because it does not need to send extra information to establish reliable connections.

C. The Internet Protocol (IP) provides packet addressing and routing within a network of networks. For data to travel from one IP network to another, an intermediate system must forward it.

D. The Domain Name System (DNS) is a service that maps fully qualified domain name labels to IP addresses on most TCP/IP networks, including the internet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

A company hires a network technician who is reviewing the network setup documentation. The technician sees that the company has fiber optic cable running all the way up to the building. This represents what type of connection?

A.FTTC
B.VDSL
C.ONT
D.FTTP

A

D. A fiber to the premises (FTTP) internet connection means that the service provider’s fiber optic cable runs all the way to the customer’s building.

Other options

A. A fiber to the curb (FTTC) solution retains some sort of copper wiring to the customer premises while extending the fiber link to a communications cabinet servicing multiple subscribers.

B. The service providers with their roots in telephone networks use very high-speed DSL (VDSL) to support FTTC. VDSL achieves higher bit rates than other DSL types at the expense of range.

C. An optical network terminal (ONT) is a device that converts between optical and electrical signaling deployed to facilitate full fiber internet connection types.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

A network technician is checking the records to ensure all the host names match up with the proper IP addresses for the network. What records is the technician checking? (Select all that apply.)

A.A
B.MX
C.FQDN
D.AAAA

A

A. An Address (A) record is a resource record that resolves a host name to an IPv4 address. Network technicians can create and update resource records manually (statically).

D. An AAAA record is a resource record on a DNS server that resolves a host name to an IPv6 address. Client and server computers on the network can generate resource records dynamically.

Other options

B. A mail exchange (MX) record identifies an email server for the domain so that other servers can send messages to it.

C. A fully qualified domain name (FQDN) is a unique label specified in a DNS hierarchy to identify a particular host within a subdomain within a top-level domain.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

A network technician must allow employee computers to securely connect to the corporate network from alternate locations. What is the best method for the technician to use?

A.DMARC
B.DHCP scope
C.VPN
D.VLAN

A

C. A virtual private network (VPN) enables hosts to connect to the LAN from locations other than the site by connecting to the local network via a secure remote access server.

Other options

A. The Domain-Based Message Authentication, Reporting, and Conformance (DMARC) framework ensures that Sender Policy Framework (SPF) and DomainKeys Identified Mail (DKIM) are effective.

B. A Dynamic Host Configuration Protocol (DHCP) scope is the range of addresses that a DHCP server can offer to client hosts in a particular subnet.

D. A virtual LAN (VLAN) is a logical network segment comprising a broadcast domain established using a feature of managed switches to assign each port a VLAN ID.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

A network technician is purchasing a digital subscriber line (DSL) service for a business that transfers large amounts of data back and forth between branches. What is the best connection type for the business?

A.ADSL
B.ISP
C.PSTN
D.Symmetric DSL

A

D. Symmetric versions of DSL offer the same uplink and downlink speeds and are of more use to businesses and for branch office links, where more data passes upstream than with normal internet use.

Other options

D. Asymmetrical DSL (ADSL) provides a fast downlink but a slow uplink, with the latest (ADSL2+) offering downlink rates up to about 24 Mbps and uplink rates of 1.25 Mbps or 2.5 Mbps.

B. Internet service providers (ISPs) establish high-speed links between their networks, using transit and peering arrangements to carry traffic to and from parts of the internet they do not physically own.

C. The public switched telephone network (PSTN) is the national and global telecommunications network that has fiber optic cabling at its core.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

A networking student is learning about IP addressing and discovers which of the following facts are NOT true regarding IPv6?

A.Divided into two main parts.
B.Will replace IPv4.
C.Expressed in hexadecimal notation.
D.Expressed in dotted decimal notation.

A

D. To make IPv4 addresses easier to use, they are in dotted decimal notation. IPv6 addresses are in hexadecimal notation.

Other options

A. An IPv6 address divides into two main parts: the first 64 bits designate the network ID, while the second 64 bits designate a specific interface.

B. The pool of available IPv4 public addresses is not very large, compared to the number of devices that need to connect to the internet, so IP version 6 (IPv6) will replace IPv4 completely.

C. IPv6 addresses are in hexadecimal notation. To express a 128-bit IPv6 address in hex, the binary address divides into eight double-byte (16-bit) values delimited by colons.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

A network technician is configuring hosts to request IP configuration from a server. What protocol is the technician configuring?

A.HTTPS
B.SSH
C.DHCP
D.TFTP

A

C. The technician is configuring Dynamic Host Configuration Protocol (DHCP) which is a protocol used by clients to request IP configuration information from a server.

Other options

A. HyperText Transfer Protocol Secure (HTTPS) is a protocol used to deliver web pages and other resources. It uses encryption to authenticate the server and protect the information.

B. Secure shell (SSH) is a protocol that accesses the command-line interface of a computer from across the network and uses encryption to authenticate the server and user and protect the information.

D. Network devices typically use Trivial File Transfer Protocol (TFTP) to obtain a configuration file. The application protocol uses its own acknowledgment messaging, so it does not require TCP.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

A network technician is setting static IPv4 addresses on servers. Which settings would be considered optional for ensuring proper communications within a local area network? (Select all that apply.)

A.The gateway
B.The alternate DNS
C.IP address
D.Subnet mask

A

A. The Gateway and B. The Alternate
DNS

A. The gateway parameter is the IPv4 address of a router and is the IP address to which packets destined for a remote network should go by default. This will be changed for groups of locally connected devices.

B. The Domain Name System (DNS) and alternate DNS servers provide resolution of host and domain names to their IP addresses. While the primary DNS may be essential for locating resources on the internet, an alternate is optional.

Other options

C. Each host must be configured with an IP address and subnet mask at a minimum to communicate on an IPv4 network.

D. The subnet mask is entered in dotted decimal notation, such as 255.255.255.0. When used with the IP address 192.168.0.100 , this mask identifies 192.168.0.0 as the network ID and means that the last octet ( .100 ) is the host ID.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

A technician is sent to the personal office space of the organizations board to set up a SOHO environment for the executive. While preparing for the home installation, the technician creates a list of items that will be needed to successfully setup and configure the SOHO network. What is the function of using a switch in a SOHO environment?

A.It connects to the service provider cabling and transfers frames over the link
B.It allows local computers and other host types to connect to the network via RJ-45 ports
C.It forwards packets over the WAN interface if a location destination IP address is not available
D.It allows hosts to connect to the network over Wi-Fi

A

B. When setting up and configuring a SOHO Network, a switch allows local computers and other host types to connect to the network via RJ-45 ports. This will be an unmanaged switch, so no configuration is necessary.

Other options

A. A modem, versus a switch, connects to the service provider cabling and transfers frames over the link. The modem type must be matched to the network type (ADSL, VDSL, or cable).

C. Routers, and not switches, forward packets over the WAN (Internet) interface if they do not have a local destination IP address.

D. An access point allows hosts to connect to the network over Wi-Fi.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

You are setting up an ADSL router/modem for a client; unfortunately, the contents of the box have become scattered. What type of cable do you need to locate to connect the router’s WAN interface?

A

Asymmetrical Digital Subscriber Line (ADSL) connects to the phone line via a filter. You need an RJ11-terminated patch cord to make the connection.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

You are assisting another customer with a full fiber connection terminated to an optical network terminal (ONT). The customer’s router was disconnected while some building work was being completed, and the patch cable is now missing. The customer thinks that the cable should be a fiber optic one because the service is “full fiber.” What type of cable do you need to locate?

A

An RJ45 unshielded twisted pair (UTP) patch cable. The ONT converts the optical signal over the external fiber optic cable to an electrical one to connect to the local router.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

True or false? Both 4G and 5G cellular can be used for fixed access broadband as well as in mobile devices.

A

True. These can work as an alternative to wired broadband or as a backup/failover Internet connection type. Many router models now come with a cellular radio. A subscribed identity module (SIM) card from the service provider must also be installed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

True or false? A SOHO router uses an embedded modem and Ethernet adapter to forward traffic between public and private network segments over a single hardware port.

A

False. The modem and Ethernet interfaces use separate ports.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

A host is configured with the IP address 172.16.1.100 in the 172.16.1.0/16 IP network. What value should be entered as the subnet mask?

A

A subnet mask field uses dotted decimal format. The /16 network prefix means that the first 16 bits in the mask are set to one: 11111111 11111111 00000000 00000000. A whole octet of ones converts to 255 in decimal. Therefore, the dotted decimal mask is 255.255.0.0.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

You are setting up a printer to use static IPv4 addressing. What type of value is expected in the default gateway field?

A

The IPv4 address of the local router interface, entered in dotted decimal format.

17
Q

Another technician has scribbled some notes about IPv4 addresses used in various networks associated with support tickets. One of them is assigned to the WAN interface of a SOHO router that requires troubleshooting. Which of these addresses must it be?

  • 52.165.16.254
  • 192.168.100.52
  • 169.254.1.121
  • 172.30.100.32
  • 224.100.100.1
A

The WAN interface of the router must use an IPv4 address from a valid public range, so 52.165.16.254 is the only one it could be

172.30.100.32 and 192.168.100.52 are in the class B and class C private ranges, 169.254.1.121 is in the range reserved for APIPA, and 224.100.100.1 is outside the range of valid public addresses (it is part of class D, which is used for a type of addressing called “multicasting”).

18
Q

True or false? A SOHO router can be configured to provide an IPv4 address configuration to hosts without further administrator attention.

A

True. This service is implemented by the Dynamic Host Configuration Protocol (DHCP).

19
Q

True or false? A valid IPv6 configuration requires a subnet mask.

A

True. In IPv6, while there is no separate entity called a subnet mask, as in IPv4, the concept of dividing the address into network and host portions still exists and is necessary. This division is indicated by the prefix length in IPv6, such as /64, /48, etc. The prefix length in IPv6 serves the same purpose as the subnet mask in IPv4, specifying how many bits of the address are allocated for the network portion.

20
Q

True or false? At the Transport layer, connections between hosts to exchange application data are established over a single port number.

A

False. The server application is identified by one port, but the client must also assign its own port to track the connection.

21
Q

What feature of DCHP means that it must use UDP at the transport layer?

A

The Dynamic Host Configuration Protocol (DHCP) uses broadcast addressing, which is not supported by the connection-oriented Transmission Control Protocol (TCP). Consequently, DHCP uses the connectionless User Datagram Protocol (UDP).

22
Q

Another technician has scribbled some notes about a firewall configuration. The technician has listed only the port numbers 25 and 3389. What is the purpose of the protocols that use these ports by default?

A
  • Port TCP/25 is used by the Simple Mail Transfer Protocol (SMTP) to send and receive email messages.
  • Port TCP/3389 is used by Remote Desktop Protocol (RDP) to connect to a computer’s graphical shell over the network.
23
Q

The technician has made a note to check that port 445 is blocked by the firewall. What is the purpose of the protocol that uses this port by default, and why should it be blocked?

A

Port TCP/445 is used by the Server Message Block (SMB) protocol that implements Windows File/Printer Sharing. SMB is designed for use on local networks only. Allowing access from the Internet would be a security risk.

24
Q

You need to ensure that a print device receives the same IP address when connecting to the network. What value do you need to configure on the DHCP server to enable a reservation?

A

The reservation should be configured with the Media Access Control (MAC) address of the print device (plus the IP address to assign).

25
Q

True or false? A top-level domain such as .com represents the top of the DNS hierarchy.

A

False. The Domain Name System (DNS) uses root servers at the top of the hierarchy. The root is represented by a trailing dot at the end of a fully qualified domain name (FQDN), though this can very commonly be omitted in ordinary usage.

26
Q

You are advising another technician about typical DNS configuration. The technician thinks that the name server hosting the 515 support domain resource records on the Internet should be configured as the primary DNS server entry in the IP configuration of local clients. Why is this unlikely to be the case?

A

The role of a name server is to respond to queries for the resource records of the specific domain(s) that it is responsible for. The role of the DNS server types listed in a client’s IP configuration is to resolve requests for records in any valid domain. To do this, the resolver must take on the task of querying multiple name servers on behalf of the client. Mixing these roles on the same server machine is possible in theory, but for performance and security reasons, they are more commonly performed by separate servers.

27
Q

What type of value would you expect a query for an AAAA resource record to return?

A

An IPv6 address.

28
Q

What type of TXT record uses cryptography to help recipient servers reject spoofed messages and spam?

A

DomainKeys Identified Mail (DKIM).

29
Q

Which network configuration technology can be configured on switches to divide a local network into multiple broadcast domain segments?

A

Virtual LAN (VLAN).

If we compare LAN to a house, then the kitchen would be VLAN. Another example can be a campus with LAN, with a single faculty using its own VLAN. WLAN (Wireless LAN) is a type of LAN, in which devices communicate wirelessly.