Chapter 9

25 July 2022
4.7 (114 reviews)
50 test answers

Unlock all answers in this set

Unlock answers (46)
question
The Telnet protocol encrypts transmitted data, which therefore cannot be read by others on the network.
answer
False
question
When using static IP addressing, software automatically configures the network connection on each device.
answer
False
question
Wireless networks are either public, unsecured hotspots or private, secured hotspots.
answer
True
question
When connecting to a private and secured wireless access point, you must provide the information that proves you have the right to use the network.
answer
True
question
On a SOHO network, a router is the gateway to the Internet.
answer
True
question
What is the name of a 32-bit or 128-bit number that is assigned to a network connection? a. port number b. protocol number c. IP address d. IP version
answer
C
question
How are IP addresses available to the Internet classified? a. public b. private c. non-routable d. standard
answer
A
question
Which type of IP address is configured by a server when a device first initiates a connection to the network? a. default b. dynamic c. static d. configured
answer
B
question
Which is used to identify the network portion and the host portion of an IP address? a. dynamic address b. DHCP address c. default gateway d. subnet mask
answer
D
question
Which command can be used to display TCP/IP configuration information and refresh the IP address? a. msconfig b. netstat c. ipconfig d. netcfg32
answer
C
question
Using a ______________, packets are delivered to a single node on a network. a. anycast address b. default gateway address c. multicast address d. unicast address
answer
D
question
Which protocol makes a connection, checks whether the data is received, and resends it if it is not? a. TCP b. UDP c. IP d. DNS
answer
A
question
Which of the following is the IPv6 Link-local unicast address prefix? a. 2000::/3 b. FE80::/64 c. FC00::/7 d. FF00::/8
answer
B
question
Which TCP/IP protocol is used by Windows to share files and printers on a network? a. Server Message Block (SMB) b. Lightweight Directory Access Protocol (LDAP) c. File Transfer Protocol (FTP) d. Hypertext Transfer Protocol (HTTP)
answer
A
question
Which utility starts looking for problems, applying solutions, and making suggestions when there is a problem with a network connection? a. My Network Places b. Device Manger c. Windows Network Diagnostics d. Control Panel
answer
C
question
If the computer you are using is a laptop that moves from one network to another, you can click the _____ tab and configure static IP address settings for a second network. a. General Configuration b. Alternate Configuration c. Secondary Configuration d. Fallback Configuration
answer
B
question
What is used to identify a wireless access point? a. secure key b. MAC address c. Network ID d. SSID
answer
D
question
What type of device can be used to block unwanted traffic initiated from the Internet and can also restrict Internet access from an internal network? a. hub b. switch c. firewall d. VPN
answer
C
question
What type of IP address should be configured on a wireless access point so that it can always be located by the devices that it serves? a. static IP address b. dynamic IP address c. private IP address d. default IP address
answer
A
question
What is it called when a router is configured to open or close certain ports so they can or cannot be used. a. port triggering b. demilitarized zone (DMZ) c. port filtering d. port forwarding
answer
C
question
Which wireless networking radio frequency yields faster speeds but offers shorter range? a. 2.4 GHz b. 5 GHz c. 7 GHz d. 11 GHz
answer
B
question
Which of the following are types of unicast IPv6 addresses? (Choose all that apply). a. global b. anycast c. multicast d. link-local
answer
A, D
question
Which of the following are levels of network communication discussed in this chapter? (Choose all that apply). a. Hardware b. Application c. Protocol d. Operating System
answer
A,B,D
question
Which of the following are functions that a SOHO router might perform besides the normal duty of routing packets between networks? (Choose all that apply). a. directory server b. firewall c. wireless access point d. Email server
answer
B, C
question
Which of the following are some changes that might need to be made to a SOHO router's initial configuration? (Choose all that apply). a. Change the router password b. Enable all ports for port forwarding c. Change the SSID d. Configure routing protocols
answer
A, C
question
Before data is transmitted on a network, it is first broken up into ____________________.
answer
segments or packets
question
Communication between two computers happens at three levels (layers) and these levels include the application, operating system, and ____________________.
answer
hardware
question
A ____________________ is the name of a computer and can be used in place of its IP address.
answer
host name
question
The first part of an IPv4 address identifies the network, and the last part identifies the ____________________.
answer
host
question
Using __________________, when a firewall receives a request for communication from the Internet to a specific computer and port, the request will be allowed and forwarded to that computer on the network.
answer
port forwarding
question
When a firewall opens a port because a computer behind the firewall initiates communication on another port
answer
port triggering
question
A command that can be used to display the TCP/IP configuration
answer
ipconfig
question
A protocol used by various client applications when the application needs to query a database
answer
Lightweight Directory Access Protocol (LDAP)
question
Assigns an IP address to a computer when it first attempts to initiate a connection to the network
answer
DHCP server
question
A group of computers on a peer-to-peer network that are sharing resources
answer
workgroup
question
Protocol used to pass login information to a remote computer and control that computer over a network
answer
Secure Shell (SSH)
question
Designed to make it easier for users to connect their computers to a wireless network when a hard-to-remember SSID and security key are used
answer
Wi-Fi Protected Setup (WPS)
question
Used by a computer or other device to determine if an IP address of another computer is on its network or another network
answer
subnet mask
question
An unsecure client/server application protocol to allow an administrator or other user to control a computer remotely.
answer
telnet
question
A protocol used to convert private IP addresses on a LAN to a public IP address before a data packet is sent over the Internet
answer
Network Address Translation (NAT)
question
Describe communications at the application level - give an example.
answer
Each client and server application installed on a computer listens at a predetermined address that uniquely identifies the application on the computer. This address is a number and is called a port number, port, or port address. For example, you can address a web server by entering into a browser address box an IP address followed by a colon and then the port number. These values are known as a socket. For example, an email server waiting to send email to a client listens at port 25, and a web server listens at port 80. Suppose a computer with an IP address of 136.60.30.5 is running both an email server and a web server application. If a client computer sends a request to 136.60.30.5:25, the email server that is listening at that port responds. On the other hand, if a request is sent to 136.60.30.5:80, the web server listening at port 80 responds.
question
Describe the contents and purpose of a subnet mask.
answer
The subnet mask used with IPv4 identifies which part of an IP address is the network portion and which part is the host portion. Using a subnet mask, a computer or other device can know if an IP address of another computer is on its network or another network. A subnet mask is a string of ones followed by a string of zeros. The ones in a subnet mask say, "On our network, this part of an IP address is the network part," and the group of zeros says, "On our network, this part of an IP address is the host part."
question
Describe how a computer with a Private IP address accesses the Internet.
answer
A computer using a private IP address on a private network can still access the Internet if a router or other device that stands between the network and the Internet is using NAT (Network Address Translation). NAT is a TCP/IP protocol that substitutes the public IP address of the router for the private IP address of the other computer when these computers need to communicate on the Internet.
question
Describe a domain name and provide examples of domain names.
answer
A domain name identifies a network. Examples of domain names are the names that appear before the period in Microsoft.com, course.com, and mycompany.com. The letters after the period are called the top-level domain and tell you something about the domain. Examples are .com (commercial), .org (nonprofit), .gov (government), and .info (general use).
question
What is DNS and how does it work?
answer
This process of associating a character-based name with an IP address is called name resolution. The DNS (Domain Name System or Domain Name Service) protocol is used by a DNS server to find an IP address for a computer when the fully qualified domain name is known. When Windows is trying to resolve a computer name to an IP address, it first looks in the DNS cache it holds in memory. If the computer name is not found in the hosts file, Windows then turns to a DNS server if it has the IP address of the server. When Windows queries the DNS server for a name resolution, it is called the DNS client.
question
Describe TCP and how it provides reliability of packet delivery.
answer
In TCP/IP, the protocol that guarantees packet delivery is TCP (Transmission Control Protocol). TCP makes a connection, checks whether the data is received, and resends it if it is not. TCP is, therefore, called a connection-oriented protocol. TCP is used by applications such as web browsers and email. Guaranteed delivery takes longer and is used when it is important to know that the data reached its destination. For TCP to guarantee delivery, it uses protocols at the IP layer to establish a session between client and server to verify that communication has taken place. When a TCP packet reaches its destination, an acknowledgment is sent back to the source. If the source TCP does not receive the acknowledgment, it resends the data or passes an error message back to the higher-level application protocol.
question
Discuss User Datagram Protocol.
answer
UDP (User Datagram Protocol) does not guarantee delivery by first connecting and checking whether data is received; thus, UDP is called a connectionless protocol or best-effort protocol. UDP is used for broadcasting, such as streaming video or sound over the web, where guaranteed delivery is not as important as fast transmission. UDP is also used to monitor network traffic.
question
Describe the Lightweight Directory Access Protocol.
answer
Lightweight Directory Access Protocol (LDAP) is used by various client applications when the application needs to query a database. For example, an email client on a corporate network might query a database that contains the email addresses for all employees. Another example is when an application looks for a printer by querying a database of printers supported by an organization on the corporate network or Internet. Data sent and received using the LDAP protocol is not encrypted; therefore, an encryption layer is sometimes added to LDAP transmissions.
question
Describe two methods that a wireless access point might use to secure a wireless network.
answer
A security key is required. This is the most common method of securing a wireless network. A network that uses a security key encrypts data on the network using an encryption standard. You learn about these standards later in the chapter. The SSID is not broadcast. The wireless device might not be broadcasting its name, which is called the Service Set Identifier (SSID). If the SSID is not broadcasting, the name of the wireless network will appear as Unnamed or Unknown Network. When you select this network, you are given the opportunity to enter the name. If you don't enter the name correctly, you will not be able to connect. Only computers with registered MAC addresses are allowed to connect. If MAC address filtering is used, you must give the network administrator the MAC address of your wireless adapter. This address is entered into a table of acceptable MAC addresses kept by the wireless access point.
question
List three functions of a typical SOHO router.
answer
Function 1: As a router, it stands between the ISP network and the local network, routing traffic between the two networks. Function 2: As a switch, it manages several network ports that can be connected to wired computers or to a switch that provides more ports for more computers. Function 3: As a DHCP server, all computers can receive their IP address from this server. Function 4: As a wireless access point, a wireless computer can connect to the network. This wireless connection can be secured using wireless security features. Function 5: As a firewall, it blocks unwanted traffic initiated from the Internet and provides Network Address Translation (NAT) so that computers on the LAN can use private or link local IP addresses. Another firewall feature is to restrict Internet access for computers behind the firewall. Restrictions can apply to days of the week, time of day, keywords used, or certain web sites. Function 6: As an FTP server, you can connect an external hard drive to the router, and the FTP firmware on the router can be used to share files with network users.