Author:
Da1JL1
ID:
245563
Filename:
Ch 15 Review.txt
Updated:
2013-11-06 21:46:42
Tags:
Reviewing basics
Folders:

Description:
Windows OS
Show Answers:

  1. How many bits  in MAC address?
    48
  2. How bits  in IPv4 IP address? In IPv6 IP ?
    32, 128
  3. How does a client app identify a server app on another computer on the network?
    • The app installed on a computer listens @ a predetermined address that uniquely i.ds app on the computer; this address # called the port #, port / port address.
    • or is it subnet mask?
  4. What are IP addresses called that begin with 10,172.161 or 192.168?
    Private IP addresses
  5. In what class is the IP address 185.75.255.10 ?
    class b
  6. In what class is the IP address 193.200.30.5?
    class c
  7. Describe the difference between public and private IP addresses. If a network is using private IP addresses, how can the computers on that network access the internet?
    Public IP addresses are available for use on the Internet. private IP addresses are not allowed on the Internet. private IP addresses can still access the internet if a writer or other device that stands between the network and Internet is using NAT ( Network Address Translation).
  8. Why is it unlikely that you will find the IP address 192.168.250.10 on the internet?
    This is a private IP address not available on the network.
  9. If no DHCP server is available when a computer configured for dynamic IP addressing connects to the network, what type of IP address is assigned to the computer?
    Automatic Private IP Address (APIPA)
  10. If a computer is found that have an IP address of 169.254.1.1, what can you assume about how it received that IP address?
    It was unable to lease an IP address from the DHCP server
  11. What are the last 64 bits of a IPv6 IP address called? How are these bits used?
    • interface ID or interface identifier
    • They uniquely identify an interface on the local link
  12. Name at least three tunneling protocols that are used for IPv6 packets to travel over an IPv4 network.
    • ISATAP
    • teredo
    • 6TO4
  13. How is an IPv6 address used that begins with 2000::? That begins with FE80::?
    • 2000:: global address can be routed
    • on the internet, these addresses are similar to IPv4 public IP addresses
    • FE80:: use for communicating with nodes in the same link
  14. How many bits are in the Subnet ID block? What are the values of those bits for a link- local IP address?
    16 bits-those 16 bits are all zeros in link-local
  15. Which type of IPv6 address is used to create multiple sites within a large organization?
    ULA Unique Local Address
  16. What type of server serves up IP addresses to computers on a network?
    DNS Domain Name System or Domain Name Service
  17. Which TCP/IP protocol that manages packet delivery guarantees that delivery? Which protocol does not guarantee delivery, but is faster?
    • TCP Transmission Control Protocol
    • UDP User Datagram Protocol
  18. At what port does an SMTP email server listen to receive email from a client computer?
    port 25
  19. Which protocol does a web server use when transmissions are encrypted for security?
    HTTPS  (HTTP secure)
  20. What type of server resolves fully qualified domain names to IP addresses?
    DNS
  21. Which email protocol allows a client app to manage email stored on an email server?
    IMAP
  22. What type of protocol is used to present a public IP address to computers outside the LAN to handle requests to use the Internet from computers inside the LAN?
    NAT
  23. What type of encryption protocol does Secure FTP (SFTP) use to secure FTP transmissions?
    A variation of the SSH (Secure Shell Protocol)
  24. What two Windows apps use the RDP protocol and port 3389?
    Remote Desktop Server Application & Skype
  25. Which version of 802.11 technologies can use two antennas at both the access point and the network adapter?
    802.11n
  26. Which wireless encryption standard is stronger, WEP or WPA?
    WPA
  27. When securing a Wi-Fi wireless network, which is considered better security: to filter MAC addresses, use encryption, or not broadcast the SSID?
    encryption
  28. List five typical configuration changes for a SOHO router, and identify which of the five changes should always be done.
    • Always Change the router password,
    • changethe SSID and configure the DHCP server,
    • View assignments made by ISP
    • Assign static IP addresses
    • Config firewall to disable all ports
    • Improve QOS for an app
  29. What does the "ipconfig" command do?
    Displays your TCP/IP configuration for all network connections
  30. Describe the four steps to connect a computer to a network using a wired Ethernet connection:
    • Install network adaptor
    • Connect network cable to Ethernet port (RJ-45) ,to network wall jack / directly to a switch/router
    • Find out if connection is working: go into my network places verify you can access the resources,
    • Verify if you have internet connectivity, open Internet Explorer & browse website.
  31. List four troubleshooting steps from pages 724-725 for checking network settings:
    • 1. Verify Device Manager recognizes the network adapter without errors.
    • -if error found, update network adapter drivers & if that doesn’t work, uninstall adapter drivers & reinstall the drivers
    • 2. Open Network and Sharing Center to see reported problem
    • 3. If a red x found, it indicates a problem. Click x to get help and resolve the problem
    • Windows Network Diagnostics opens to look for problems, applying solutions, and makes suggestions
    • 4. After problem resolved, try again to use Windows Explorer to access resources on local network and then use Internet Explorer to access the internet.
  32. List 6 functions of typical SOHO routers.
    Function 1 as a router, it stands between ISP network and local network, routing traffic between the two networks.

    Function 2. As a switch, it manages several network ports that can be connected to wired computers or to switch that provides more ports for more computers.
  33. Function 3. As a DHCP server, all computers can receive their IP address from this server.
  34. Function 4. As a wireless access point, a wireless computer can connect to the network. This wireless connection can be secured using wireless security features.
    • Function 5. As a firewall, it blocks unwanted traffic initiated from the Internet & provides Network Address Translation (NAT) so that computers on the LAN can use private or link local IP addresses.
    • Function 6. As an FTP server, you connect an external hard drive to the router, and the FTP firmware on the router can be used to share files with network users.