What protocol can be used by a host on a network to find the MAC address of another device based on an IP address quizlet?

Upgrade to remove ads

Only ₩37,125/year

  1. Other
  2. Computer Skills
  3. Cisco

  • Flashcards

  • Learn

  • Test

  • Match

  • Flashcards

  • Learn

  • Test

  • Match

Terms in this set (20)

Which of the following protocols is responsible for resolving IP addresses to hardware addresses?

ARP

The Address Resolution Protocol (ARP) resolves IP addresses to hardware (MAC) addresses. RARP does the reverse—it resolves MAC addresses to IP addresses. DNS resolves hostnames to IP addresses. DHCP automatically configures TCP/IP clients.

You are setting up a small network that will not connect to the Internet. You want computers to be able to locate each other by using hostnames. What service will do this?

DNS

DNS is typically known as a name resolver on the Internet, but it will work on private networks as well. DNS resolves hostnames to IP addresses. DHCP automatically configures clients with IP address information. FTP is for file downloads. APIPA is a process used to assign clients a private IP address automatically when they can't reach the DHCP server.

Which of the following protocols uses TCP port 23?

Telnet

Telnet uses port 23. SSH uses port 22. FTP uses ports 21 and 20. DNS uses port 53.

Which protocol was developed to be a secure alternative to Telnet?

SSH

The Secure Shell (SSH) was developed as a secure alternative to Telnet. SMB is Server Message Block, which is a network file system. SNMP is for network management. SFTP is designed for secure file downloads. It's a secure alternative to FTP, not a replacement for Telnet.

Which of the following protocols is used for retrieving email messages from a mail server?

IMAP4

Internet Message Access Protocol (IMAP4) is a protocol used for retrieving email messages from a mail server. Simple Mail Transfer Protocol (SMTP) is a communication protocol that enables sending email from a client to a server or between servers. Simple Network Management Protocol (SNMP) is a network management protocol. Hypertext Transfer Protocol Secure (HTTPS) provides a secure connection between a web browser and a server.

Your friend is concerned about the security of making an online purchase. What should you tell her to look for in the address bar of the web browser?

HTTPS

The HTTP protocol is inherently unsecure, but the HTTPS protocol is secure. (SSH and SFTP are secure as well, but they are not protocols used to connect to websites.)

What are the two advantages that TCP has over UDP?

-Acknowledged delivery
-Virtual circuits

TCP is a connection-oriented protocol that establishes virtual circuits and acknowledges delivery of packets. Because of these features, it has higher overhead than UDP and is a little slower.

Which two TCP/IP protocols work at the Host-to-Host layer of the Department of Defense (DoD) model?

TCP
UDP

The two protocols that work at the Host-to-Host layer are TCP and UDP. FTP and HTTP both work at the Application layer.

What port does the RDP protocol work on?

3389

Remote Desktop Protocol (RDP) works on port 3389. DNS works on port 53, IMAP4 works on 143, and LDAP works on 389.

Which of the following protocols is responsible for sending email?

SMTP

Simple Mail Transfer Protocol (SMTP) is responsible for sending email. IMAP4 and POP3 both receive email. SNMP is a network management protocol

The workstations on your network are configured to use a DHCP server. One of the workstations can't communicate with other computers. Its IP address is 169.254.1.18. What could be the problem?

It can't reach the DHCP server.

Which of the following IP addresses would not be valid for a DNS server on the Internet?

10.25.11.33

DNS servers resolve hostnames to IP addresses. On the Internet, a DNS server needs to have a public IP address.

Which TCP/IP protocol uses port 80?

HTTP

HTTP uses port 80. HTTPS uses port 443, NTP uses 123, and FTP uses 20/21.

You have just set up a network that will use the TCP/IP protocol, and you want client computers to obtain IP configuration information automatically. Which type of server do you need for this?

DHCP

A Dynamic Host Configuration Protocol (DHCP) server provides IP configuration information to hosts when they join the network.

Which of the following is an IPv6 broadcast address?

None of these

IPv6 does not have broadcasts. IPv6 does have multicasts, which are a bit like targeted broadcasts.

Your network is running IPv4. Which of the configuration options are mandatory for your host to communicate on the network?

IP address
Subnet Mask

The only mandatory IPv4 configuration items are an IP address and a subnet mask. If you are not connecting to another network, you do not need a default gateway. DNS servers resolve hostnames to IP addresses, but they are not mandatory.

You are manually configuring a TCP/IP host. Another administrator gives you the router's IP address. What is the TCP/IP term for this?

Default gateway

The router is your doorway out into other networks, and it is known in TCP/IP terms as the default gateway. Without this configuration option, you will not be able to get to external networks.

Which of the following are valid examples of IPv6 addresses?

2001:0db8:3c4d:0012:0000:0000:1234:56ab

::ffff:c0a8:173

2001:db8:3c4d:12::1234:56ab

An IPv6 address contains 128 bits, written in eight 16-bit fields represented by four hexadecimal digits.

What is the maximum number of IPv6 addresses that can be assigned to one IPv6 interface?

None of these

An IPv6 interface is not limited in the number of addresses that it can be assigned, although there could be limitations based upon practicality.

You have a computer with the IP address 171.226.18.1. What class is this address?

Class B

Class A addresses have a first octet between 1 and 126, Class B between 128 and 191, and Class C between 192 and 223. With a first octet of 171, this is a Class B address.

Sets with similar terms

Security+ Chapter 3 Practice

20 terms

killacam31044

Data Comm Exam 2

69 terms

HemoGoblin117

Other sets by this creator

Project Management + PT#2

50 terms

soulhouse

Chapter 16: Freedom

5 terms

soulhouse

Chapter 15: Nature

7 terms

soulhouse

Chapter 14: Life Affirmation

5 terms

soulhouse

Other Quizlet sets

Application Defenses

56 terms

icecityx1221

Test 3 Mr Kirkby

57 terms

s29296662

CG information to technology

14 terms

mudfisher

Related questions

QUESTION

Which setting ensures that repeated attempts to guess a user's password is not possible beyond the configured value?

15 answers

QUESTION

A computer program containing malicious segment that attaches itself to an application program or other executable component is called

15 answers

QUESTION

Using encryption, you make it impossible for attackers to read your messages even if they intercept them. This is

3 answers

QUESTION

A portable access point that facilitates connections to a High-Speed Packet Access (HSPA+) or 4G network for multiple devices is referred to as: *

13 answers

What protocol can be used by a host on a network to find the MAC address of another device based on an IP address?

ARP (Address Resolution Protocol) is the protocol in charge of finding MAC addresses with IPs in local network segments. It operates with frames on the data link layer.

Which of the following protocols is used for resolving host names to IP addresses?

DNS is an acceptable method for resolving names to addresses, but it requires the use of host files, and DNS servers must be overseen and updated manually as names and addresses are modified. This adds to tasks that a TCP/IP network administrator must perform, although it does simplify network access for users.

Which type of attack broadcasts a network request to multiple computers but changes the address from which the request came to the victim's computer quizlet?

A SYN flood attack broadcasts a network request to multiple computers but changes the address from which the request came to the victim's computer.

What type of additional attack does ARP?

What Type of Additional Attack does ARP Spoofing Rely on? The additional attack that ARP Spoofing relies on is MAC Spoofing. MAC Spoofing is the process of altering the assigned Media Access Control (MAC) address of a networked device.

Toplist

Neuester Beitrag

Stichworte