Upgrade to remove ads
Only ₩37,125/year
- Other
- Computer Skills
- Cisco
-
Flashcards
-
Learn
-
Test
-
Match
-
Flashcards
-
Learn
-
Test
-
Match
Terms in this set (20)
Which of the following protocols is responsible for resolving IP addresses to hardware addresses?
ARP
The Address Resolution Protocol (ARP) resolves IP addresses to hardware (MAC) addresses. RARP does the reverse—it resolves MAC addresses to IP addresses. DNS resolves hostnames to IP addresses. DHCP automatically configures TCP/IP clients.
You are setting up a small network that will not connect to the Internet. You want computers to be able to locate each other by using hostnames. What service will do this?
DNS
DNS is typically known as a name resolver on the Internet, but it will work on private networks as well. DNS resolves hostnames to IP addresses. DHCP automatically configures clients with IP address information. FTP is for file downloads. APIPA is a process used to assign clients a private IP address automatically when they can't reach the DHCP server.
Which of the following protocols uses TCP port 23?
Telnet
Telnet uses port 23. SSH uses port 22. FTP uses ports 21 and 20. DNS uses port 53.
Which protocol was developed to be a secure alternative to Telnet?
SSH
The Secure Shell (SSH) was developed as a secure alternative to Telnet. SMB is Server Message Block, which is a network file system. SNMP is for network management. SFTP is designed for secure file downloads. It's a secure alternative to FTP, not a replacement for Telnet.
Which of the following protocols is used for retrieving email messages from a mail server?
IMAP4
Internet Message Access Protocol (IMAP4) is a protocol used for retrieving email messages from a mail server. Simple Mail Transfer Protocol (SMTP) is a communication protocol that enables sending email from a client to a server or between servers. Simple Network Management Protocol (SNMP) is a network management protocol. Hypertext Transfer Protocol Secure (HTTPS) provides a secure connection between a web browser and a server.
Your friend is concerned about the security of making an online purchase. What should you tell her to look for in the address bar of the web browser?
HTTPS
The HTTP protocol is inherently unsecure, but the HTTPS protocol is secure. (SSH and SFTP are secure as well, but they are not protocols used to connect to websites.)
What are the two advantages that TCP has over UDP?
-Acknowledged delivery
-Virtual circuits
TCP is a connection-oriented protocol that establishes virtual circuits and acknowledges delivery of packets. Because of these features, it has higher overhead than UDP and is a little slower.
Which two TCP/IP protocols work at the Host-to-Host layer of the Department of Defense (DoD) model?
TCP
UDP
The two protocols that work at the Host-to-Host layer are TCP and UDP. FTP and HTTP both work at the Application layer.
What port does the RDP protocol work on?
3389
Remote Desktop Protocol (RDP) works on port 3389. DNS works on port 53, IMAP4 works on 143, and LDAP works on 389.
Which of the following protocols is responsible for sending email?
SMTP
Simple Mail Transfer Protocol (SMTP) is responsible for sending email. IMAP4 and POP3 both receive email. SNMP is a network management protocol
The workstations on your network are configured to use a DHCP server. One of the workstations can't communicate with other computers. Its IP address is 169.254.1.18. What could be the problem?
It can't reach the DHCP server.
Which of the following IP addresses would not be valid for a DNS server on the Internet?
10.25.11.33
DNS servers resolve hostnames to IP addresses. On the Internet, a DNS server needs to have a public IP address.
Which TCP/IP protocol uses port 80?
HTTP
HTTP uses port 80. HTTPS uses port 443, NTP uses 123, and FTP uses 20/21.
You have just set up a network that will use the TCP/IP protocol, and you want client computers to obtain IP configuration information automatically. Which type of server do you need for this?
DHCP
A Dynamic Host Configuration Protocol (DHCP) server provides IP configuration information to hosts when they join the network.
Which of the following is an IPv6 broadcast address?
None of these
IPv6 does not have broadcasts. IPv6 does have multicasts, which are a bit like targeted broadcasts.
Your network is running IPv4. Which of the configuration options are mandatory for your host to communicate on the network?
IP address
Subnet Mask
The only mandatory IPv4 configuration items are an IP address and a subnet mask. If you are not connecting to another network, you do not need a default gateway. DNS servers resolve hostnames to IP addresses, but they are not mandatory.
You are manually configuring a TCP/IP host. Another administrator gives you the router's IP address. What is the TCP/IP term for this?
Default gateway
The router is your doorway out into other networks, and it is known in TCP/IP terms as the default gateway. Without this configuration option, you will not be able to get to external networks.
Which of the following are valid examples of IPv6 addresses?
2001:0db8:3c4d:0012:0000:0000:1234:56ab
::ffff:c0a8:173
2001:db8:3c4d:12::1234:56ab
An IPv6 address contains 128 bits, written in eight 16-bit fields represented by four hexadecimal digits.
What is the maximum number of IPv6 addresses that can be assigned to one IPv6 interface?
None of these
An IPv6 interface is not limited in the number of addresses that it can be assigned, although there could be limitations based upon practicality.
You have a computer with the IP address 171.226.18.1. What class is this address?
Class B
Class A addresses have a first octet between 1 and 126, Class B between 128 and 191, and Class C between 192 and 223. With a first octet of 171, this is a Class B address.
Sets with similar termsSecurity+ Chapter 3 Practice
20 terms
killacam31044
Data Comm Exam 2
69 terms
HemoGoblin117
Other sets by this creatorProject Management + PT#2
50 terms
soulhouse
Chapter 16: Freedom
5 terms
soulhouse
Chapter 15: Nature
7 terms
soulhouse
Chapter 14: Life Affirmation
5 terms
soulhouse
Other Quizlet setsApplication Defenses
56 terms
icecityx1221
Test 3 Mr Kirkby
57 terms
s29296662
CG information to technology
14 terms
mudfisher
Related questionsQUESTION
Which setting ensures that repeated attempts to guess a user's password is not possible beyond the configured value?
15 answers
QUESTION
A computer program containing malicious segment that attaches itself to an application program or other executable component is called
15 answers
QUESTION
Using encryption, you make it impossible for attackers to read your messages even if they intercept them. This is
3 answers
QUESTION
A portable access point that facilitates connections to a High-Speed Packet Access (HSPA+) or 4G network for multiple devices is referred to as: *
13 answers