The secondary and primary DNS servers, because the secondary server is requesting zone transfers from the primary server. Suppose you send data to the IP address on an IPv4 network. To which device s are you transmitting? All devices on the Internet. All devices on your local network C. The one device with this given IP address D. Because no device can have this given IP address, no devices receive the transmission Answer: B.
All devices on your local network 8. What computers are the highest authorities in the Domain Name System hierarchy? Authoritative name servers B. Root servers C. Top-level domain servers D. Root servers Suppose you want to change the default port for RDP as a security precaution.
What port does RDP use by default, and from what range of numbers should you select a private port number? Answer: ; through Which type of DNS record identifies a mail server? Answer: MX. How many bits does an IPv6 address contain? Answer: EUI You issue a transmission from your workstation to the following socket on your LAN: Assuming your network uses standard port designations, what Application layer protocol are you using? Answer: POP3 What protocol does a network gateway use to keep track of which internal client is talking to which external Web server?
You are the network manager for a computer training center that allows clients to bring their own laptops to class for learning and taking notes. What DHCP option should you modify to make sure you are not wasting addresses that were used by clients who have left for the day? Answer: The lease duration for client computers Answer: Range While troubleshooting a network connection problem for a coworker, you discover the computer is querying a nonexistent DNS server. Answer: nslookup in interactive mode FTP sometimes uses a random port for data transfer, but an FTP server always, unless programmed otherwise, listens to the same port for session requests from clients.
What port is the FTP server listening on? While troubleshooting a network connection problem for a coworker, you discover that the computer has a static IP address and is giving a duplicate IP address error. What commandline utility can you use to find out what other device may already be using that IP address? Answer: ping or nslookup What is the IPv4 loopback address?
What is the IPv6 loopback address? You have just set up a new wireless network in your house, and you want to determine whether your Linux laptop has connected to it and obtained a valid IP address. What command will give you the information you need? Answer: ifconfig -a At minimum, how many IP addresses must you obtain from your ISP for all five clients in your office to be able to access servers on the Internet? Answer: 1 Answer: nslookup jsmith or ping jsmith When determining whether a local network has any NetBIOS traffic, do you use the nslookup utility in interactive mode or a packet analyzer such as Wireshark?
Answer: A packet analyzer such as Wireshark. List three signaling protocols discussed in the chapter that are used for communicating multimedia data. Answer: SIP, H. What version of the ping command do you use in Windows with IPv6 addresses? What version do you use on a Linux system?
Answer: ping -6 Answer: ping6 When running a scan on your computer, you find that a session has been established with a host at the address Which protocol is in use for this session? What command-line utility might you use to find out who the host is? Answer: nslookup can identify the domain name of the host at that IP address. However, the Web server needs a hardware upgrade and will be down for two days. Your network administrator has asked you to configure the router so that requests to the IP address What is the private IP address of the backup Web server?
For the subnet masks, use the default subnet mask for a Class C IP address license. Include appropriate comment lines in your table. A host has been overloading your Web server with a flood of requests and you want to investigate whether this is some kind of network attack.
You look up the IP address on arin. What should you do? Complain to the owner of the lacnic. What might happen if no organization were responsible for IP addressing on the Internet?
Choose all that apply. Organizations might try to use the same ranges of IP addresses. Anyone could host their own Web server. Nothing would happen. The Internet would use another protocol besides IP. You look up an IP address on arin. What does this mean? The two organizations share the IP address assignment. That IP address is currently involved in a network attack.
The RIR made a mistake. One organization delegated the IP address to the second. What is a Regional Internet Registry responsible for? Maintaining Internet connectivity b. Assigning IP addresses d. Signing up users with ISP accounts 5. In which of the following situations would it be useful to contact the owner of an IP address? A host outside your network has been attempting to log on to your servers without your permission. A host inside your network has been attempting to log on to your servers without your permission.
A host outside your network has been attempting to send large amounts of unsolicited commercial email or spam. A host outside your network has been accessing your Web site once an hour. Lab 2. Which of the following information is included in the results of the ping command? The operating system used by the remote computer b. The IP address or name of the remote computer c.
The number of packets that were lost d. The time it took for the reply to be received 2. How can you verify that two hosts are connected and communicating properly? From one host, run the ping command to the other host. From a third host, run the ping command to both hosts.
Run the arp command on both hosts. Run the ipconfig command on both hosts. What protocol does the ping command use? UDP c. ICMP d. ARP 5. Why might this be useful to a network administrator? However, DHCP is rarely used to assign addresses for servers. DHCP is too expensive. DHCP is not scalable enough.
It would be more difficult for a client to find a server if its IP address changes. What is the class of network that you configured in this activity? Class A. Class D 2. What is the purpose of a subnet mask? To indicate which protocols a particular network uses b. To further subdivide a network c. To mask, or prevent access to the whole network d. To limit the protocols used in a particular network 3. A network has a subnet mask of How many usable IP addresses are available for network hosts?
This address is reserved for multicast. This address is reserved for experimental uses. This address describes the network. This address is the broadcast address. Which of the following commands can you use in Windows to display information about the subnet mask configured for a particular NIC? What was the IP address the Windows computer obtained in Step 23? A: Answers will vary, but should be between When does the DHCP lease you obtained in this lab expire?
Which of the following are valid methods of assigning IP addresses to workstations, servers, and network devices? Manual configuration b. DHCP c. BOOTP d. POST 4. You would like to assign a WINS server to each workstation. Can you accomplish this via DHCP? A: Yes. Your colleague placed a second DHCP server on the network by mistake. What might happen as a result? The second DHCP server might give out incorrect settings to its clients. You might need to configure IP addresses on some hosts manually.
Which of the following information could not be given out by a DHCP server? WINS server address b. DNS server address c. Default gateway d. Additional network protocols to be used. All of the following configuration information can be supplied by a DHCP server. IP address b. Subnet mask c.
DNS servers d. Default gateway. What is the purpose of a name server? To maintain the MAC address database for an entire zone b. To supply clients with IP address resolution for requested hosts c. What is the term for the group of devices that a name server manages? Hierarchy b. Tree c. Zone d. Directory 3. Which of the following are examples of top-level domains?
When a DNS server retrieves the host name associated with an IP address, what type of lookup is it accomplishing? Forward b. Adjacent c. Backward d. Reverse 5. What is one advantage of using DNS instead of hosts files? DNS does not require manual updating of files on multiple networked nodes. Do you like this book? Please share with your friends, let's read it!! Search Ebook here:. Book Preface Knowing how to install, configure, and troubleshoot a computer network is a highly marketable and exciting skill.
Designed by readallbooks. Download here Download Now here. Read Now Ads.
0コメント