Networking 2.5 - IP addressing SOHO Flashcards

1
Q

fe80::200:f8ff:fe21:67cf is an example of IPv4 or IPV6?

A

IPv6

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

192.1.0.1 & 127.0.0.1 are IPv4 or IPV6?

A

IPv4

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

00-0C-F1-56-98-AD is an example of a

A

MAC address

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

10.0.0.0 to 10.255.255.255
172.16.0.0 to 172. 31.255.255
192.168.0.0 to 192.168.255.255
are examples of

A

IP addresses for private networks; cannot get to internet directly, need proxy server
10. = Class A
172. = Class B
192. = Class C

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

You should connect the wireless access point to a

A

router = ensure that the wireless clients can connect to the internal network & Internet.
Routers = connection devices that manage separate subnets in a network
* No part of your internal network should be directly connected to an Internet access point.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Hubs are connected to

A

routers
Hubs aren’t used much anymore

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

A gateway interconnects two …

A

networks with different network protocols.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

You can use MAC filtering on a wireless network to ensure that only

A

certain clients are able to connect to the wireless network
MAC filtering = most effective in a small office where a defined number of specific wireless devices are used.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

169.254.0.1 to 169.254.255.254

A

An Automatic Private IP Addressing (APIPA) address is an automatic IP address that is assigned when computers that are configured for DHCP cannot contact a DHCP server. Addresses in this range are 169.254.0.1 to 169.254.255.254. They can also be referred to as link-local addresses. In IPv6, they are ONLY referred to as a link-local addresses and start with the fe80::/10 prefix.
These addresses are not routable and are therefore only usable on the local subnet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

fe80::/10

A

APIPA

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

fc00::/7

A

Private

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

::1/128

A

Loopback

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

To prevent the use of APIPA addresses, you should change the default settings on the

A

Alternate Configuration tab of the Internet Protocol Version 4 Properties dialog box. On this tab, you can specifically configure a static IP address that the computer should use if the DHCP server is unavailable.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Class A

A

-The first octet of a Class A IP address is from 1 through 126 in decimal notation
-The first octet of a Class A IP address is the network address
-The default subnet mask for a Class A subnet is 255.0.0.0.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Class B

A

-The first octet of a Class B IP address is from 128 through 191 in decimal notation
-The first two octets of a Class B IP address are the network address
- The default subnet mask for a Class B network is 255.255.0.0

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Class C

A
  • The first octet of a Class C IP address is from 191 through 223
  • The first three octets of a Class C IP address are the network address
  • The default subnet mask for a Class C network is 255.255.255.0
    The network prefix /24 is used to denote an unsubnetted Class C IP address
17
Q

Subnetting was introduced to enable more efficient use

A

of the IP address space
- In subnetting, some host bits of a class-based IP address are used as network address bits to enable smaller groupings of IP addresses to be created than the groupings offered by class-based IP addresses. For example, you have an office with 200 computers that reside on four separate networks consisting of 50 computers each. If each network has been assigned its own Class C IP address range, then 204 IP addresses will not be used in each range, for a total of 816 wasted IP addresses.

With subnetting, a single Class C IP address range can provide IP addresses for the hosts on all four networks. If you subnetted a single Class C IP address range, then only 48 IP addresses would be wasted.

18
Q

A subnet mask is (4 octets)

A

a 32-bit binary number that can be compared to an IP address to determine which part of the IP address is the host address and which part of the IP address is the network address. Every 1 bit in a subnet mask indicates a bit in the network address, and every 0 bit in the subnet mask indicates a bit in the host address. For example, on a network that uses an unsubnetted Class C IP address range, the IP address 192.168.0.1 has a subnet mask of 255.255.255.0. In binary notation, 255 is represented as 11111111. In binary notation, the subnet mask 255.255.255.0 is represented as 11111111 11111111 11111111 00000000.

The binary representation of the IP address 192.168.0.1 is:
11000000 10101000 00000000 00000001

The following is a comparison of the binary subnet mask and the binary IP address:
11111111 11111111 11111111 00000000 Subnet Mask
11000000 10101000 00000000 00000001 IP Address

From this comparison, you can see that the first 24 bits of the IP address, or 192.168.0 in decimal notation, are the network address, and the last eight bits of the IP address, or 1 in decimal notation, are the host address.

19
Q

a network prefix

A

is also used to determine which part of an IP address is the network address and which part of an IP address is the host address. The network prefix method appends a slash (/) character and a number after the IP address, as in the following example:

192.168.0.1/24

In this example, the network prefix indicates that the first 24 bits of the IP address, or 192.168.0 in decimal notation, are the network address, and the last eight bits of the IP address are the host address.

20
Q

Classless Inter-Domain Routing (CIDR) notation

A

A range of IP addresses can be expressed very simply with Classless Inter-Domain Routing (CIDR) notation. CIDR notation looks like an IP address followed by a slash with a number–for example, 192.168.0.0/24. The number after the slash is the bit mask for the network. Simply put, it tells you how many bits are the same for each IP on the subnet. This also tells you which parts of the IP addresses can vary, and that gives you the range. 192.168.0.0/24 indicates that the first 24 bits are all the same on this range of IP addresses. The CIDR notation for the range of IP addresses from 192.168.0.0 through 192.168.0.255 is 192.168.0.0/24. The CIDR notation for the 128.1.0.1 through 191.255.255.254 range is 128.1.0.1/2. The CIDR notation for the 69.4.128.0 through 69.4.159.255 is 69.4.128.0/19.

21
Q

IPv6 (version 6) or IPng (next generation) offers 6 improvements over IPv4:

A
  1. IP address size increases from 32 bits to 128 bits.
  2. Some of the header fields have been dropped.
  3. Version 6 has less rigid length limits and the ability to introduce new options.
  4. Packets will indicate particular traffic type.
  5. Support will be provided for data integrity and confidentiality.
  6. The IPv6 header is 40 fixed bytes and has eight fields of information.
22
Q

Whenever creating a network that is made up of many different network components, it is important to implement SDNs

A

software-defined networks (SDNs) technologies. SDN technologies allow a network administrator to direct and prioritize traffic, and connections, over virtual switches, from a centralized console. SDNs can control the access to switches and routers, but do not have anything to do with allowing traffic to traverse a switch or rout

23
Q

SSID

A

You must provide the service set identifier (SSID) to a wireless device to enable it to connect to a wireless network. The SSID in a wireless network is the name of the network to which a wireless device connects. Only one SSID can be associated with an access point. When a wireless device sends data packets over a wireless network, each data packet contains a 32-character identifier that is used to identify the wireless network. The 32-character identifier is the SSID of the wireless network. Wireless networks are differentiated by SSID. By default, the SSID is broadcast. To provide better security, you should configure the wireless access point not to broadcast the SSID.

24
Q

Thin client computers will not

A

store any data, but rather serve as a means to collect patient data. The data will be stored on the server at the central office. Because the exam-room computers do not need extensive functionality or an array of productivity applications, thin clients would be sufficient. Thin client computers typically have limited functionality, and they may not even have an operating system.

25
Q

Thick client computers

A

Thick client computers can have an extensive set of applications, and would allow the user to perform operations that a thin client would not. In addition, thick clients perform the majority of their operations on the local client machine instead of on the server. If you installed thick clients in the examination rooms, data would be stored on those machines. If the machines were ever stolen, then the data could be compromised, which is a violation of HIPAA regulations.

26
Q

Port forwarding allows you to

A

enable a specific port in the firewall and direct traffic that comes from outside your network to a specific IP address.

27
Q

Port triggering allows you to

A

open an incoming connection to one computer based on an outgoing connection

28
Q

Universal Plug-and-Play (UPnP) UPnP devices automatically

A

configure themselves to work with other devices when they are plugged in or connected to the network.

29
Q

demilitarized zones (DMZs) adds another level of

A

A DMZ, also referred to as a screened subnet, adds another level of security for LANs by using a firewall to isolate certain devices from the rest of the network. The resources on the DMZ are protected by the firewall and can be accessed over the Internet.

30
Q

IPv4 vs IPv6 (# of bits & addresses)

A

IPv6 uses 128-bit IP addresses and allows for the use of 340 undecillion addresses.
IPv4 uses 32-bit addresses and allows for the use of 4 billion addresses.