Study Guide Client Chapter 5 Multiple Choice



Download 89,95 Kb.
Date conversion28.06.2017
Size89,95 Kb.
Study Guide Client Chapter 5
Multiple Choice

Identify the choice that best completes the statement or answers the question.
____ 1. __________ are the rules or languages in which networking is possible.


a.

Protocols

c.

Topologies

b.

Electrical signaling

d.

Connectors

____ 2. What type of connector does an unshielded twisted pair (UTP) cable use?





a.

RJ11

c.

RG58

b.

RJ45

d.

RG59

____ 3. Which layer of the OSI model covers the cabling and electrical signaling?





a.

Physical

c.

Network

b.

Data-link

d.

Transport

____ 4. What layer of the OSI model are the Media Access Control addresses part of?





a.

Physical

c.

Network

b.

Data-link

d.

Transport

____ 5. What is the primary protocol used by Windows to communicate over a network?





a.

TCP/IP

c.

DLC

b.

IPX/SPX

d.

SNA

____ 6. On which layer of the OSI model is IPv4 Addressing included?





a.

Physical

c.

Network

b.

Data-link

d.

Transport

____ 7. What is used to specify which bits of an IPv4 address are used for the network identifier and which bits are used for the host identifier?




a.

Default gateway

c.

MAC address

b.

Subnet mask

d.

OSI model

____ 8. In what class is the address of 156.43.75.212?





a.

Class A

c.

Class C

b.

Class B

d.

Class D

____ 9. What is the default subnet mask for 198.54.65.3?





a.

255.0.0.0

c.

255.255.255.0

b.

255.255.0.0

d.

255.255.255.255

____ 10. What is used to avoid assigning entire addresses of a particular class to networks that didn’t have that many hosts?




a.

IANA

c.

CIDR

b.

NAT

d.

APIPA

____ 11. If you have an IPv4 address of 123.54.34.77 with a subnet mask of 255.255.240.0, what is the CIDR notation?




a.

/16

c.

/24

b.

/20

d.

/28

____ 12. Which of the following is NOT an IPv4 private address range?





a.

10.0.0.0 through 10.255.255.255

c.

192.168.0.0 through 192.168.255.255

b.

172.16.0.0 through 172.31.255.255

d.

224.0.0.0 through 224.255.255.255

____ 13. What would a corporation use to allow private IPv4 addresses to communicate with the Internet?




a.

DHCP

c.

MAC

b.

APIPA

d.

NAT

____ 14. What address is assigned to a computer that fails to locate a DHCP server?




a.

NAT

c.

APIPA

b.

MAC

d.

CIDR

____ 15. What server automatically assigns IP addresses?




a.

NAT

c.

DHCP

b.

DNS

d.

CIDR

____ 16. What type of address is the FCC0:0:0:0B5D:FF:BE3B:F4F7:3311?





a.

MAC

c.

IPv6

b.

IPv4

d.

WINS

____ 17. Which type of address defines a single network interface in a computer or other device?





a.

Unicast

c.

Multicast

b.

Anycast

d.

Public

____ 18. Which type of IPv6 address is unique throughout the IPv6 universe?





a.

Node-local

c.

Site-local

b.

Link-local

d.

Global

____ 19.

What type of address mechanism is a tunneling protocol that enables computers to transmit IPv6 packets through NAT routers that do not support IPv6?



a.

IPv4-compatible addresses

c.

6to4

b.

IPv4-mapped addresses

d.

Teredo

____ 20. TCP is considered a __________ protocol.





a.

Connection-oriented

c.

Classful

b.

Connectionless

d.

Classless

____ 21. What do you call codes that identify specific applications running on the system?





a.

Ports

c.

TCP

b.

Protocol

d.

UDP

____ 22. What utility or tool allows you to view and manage all your network connections?




a.

Computer Management console

c.

Network Discovery console

b.

Network and Sharing Center

d.

Windows Firewall with Advanced Security

____ 23. What is a software routine that acts as a virtual barrier between a computer and the network to which it is attached?




a.

Filter watcher

c.

Protocol analyzer

b.

Firewall

d.

SNMP

____ 24. What command is used to test network connectivity between two hosts?




a.

Ipconfig

c.

Netsh

b.

Ping

d.

Nslookup



Completion

Complete each statement.
25. A __________ is a device that connects one network to another.
26. The IPv4 addresses are __-bit addresses.
27. The IPv6 addresses are __-bit addresses.
28. __________ is the command used to configure the basic IP parameters for a network connections.
Short Answer
29. You have a computer that cannot communicate on the network. You find out that it has been assigned an IPv4 address of 169.254.0.5 with a subnet mask of 255.255.0.0. What is the problem?
Essay
30. The IPv4 is broken into two parts. List and describe the two parts.


The database is protected by copyright ©sckool.org 2016
send message

    Main page