Você está na página 1de 38

Lesson 1: Understanding Local Area Networking

Multiple Choice
1. You have a key network administrator leave a company. Therefore, what
does the company
depend on to continue to use the network?
a) the user’s password
b) Active Directory
c) master network switch
d) network documentation
Answer: d
Difficulty: Easy
Section Reference: Defining a LAN
Explanation: To understand your LAN better, it helps to write down what
its structure is—in
other words, to document it. Network documentation is any information
that helps describe,
define, and otherwise explain how the network computers are connected
physically and logically.
2. What is the most common central device used today to connect
computers to a network?
a) hub
b) switch
c) SOHO router
d) VPN router
Answer: b
Difficulty: Easy
Section Reference: Defining a LAN
Explanation: Hubs are considered legacy devices and have been replaced
by switches. Switches
allow multiple computers to connect together. The advantage of a switch
over a hub is that it can
handle several conversations at the same time.
3. What is the most common adapter or connector used to connect a
computer to a wired
network?
a) RG6
b) RG58
c) RJ45
d) RJ8
Answer: c
Difficulty: Easy
Section Reference: Defining a LAN
Explanation: RJ-45, which is associated with Ethernet networks, is the
most common wired
adapter by default and is found on virtually every computer these days.
4. Which of the following does a switch use for increased performance?
a) simplex
b) half duplex
c) full duplex
d) sliding duplex
Answer: c
Difficulty: Hard
Section Reference: Defining a LAN
Explanation: A switch switches very fast between multiple connections,
which allow multiple
computers to communicate at the same time. As a result, each client can
send and receive at the
same time (full duplex), which gives better performance.
5. What do you use to isolate a group of computers within your
organization?
a) WLAN
b) WAN
c) VLAN
d) Internet
Answer: c
Difficulty: Medium
Section Reference: Identifying Types of LANs
Explanation: A virtual LAN (VLAN) is a group of hosts with a common set
of requirements that
communicate as though they were connected together as normal on one
switch, regardless of
their physical location. A VLAN is implemented to segment a network,
reduce collisions,
organize the network, boost performance, and increase security.
6. What do you use to create VLANs
a) router
b) switch
c) firewall
d) proxy server
Answer: b
Difficulty: Medium
Section Reference: Identifying Types of LANs
Explanation: Switches usually control the VLAN. Like subnetting, a VLAN
compartmentalizes a
network and can isolate traffic.
7. What zone is used to publish external websites for an organization?
a) intranet
b) exanet
c) internetwork
d) DMZ
Answer: d
Difficulty: Easy
Section Reference: Getting to Know Perimeter Networks
Explanation: A perimeter network (also known as a demilitarized zone or
DMZ) is a small
network that is set up separately from a company’s private LAN and the
Internet. It is called a
perimeter network because it is usually on the edge of the LAN,
8. Which topology is the most redundant and the most expensive?
a) star
b) ring
c) mesh
d) bus
Answer: c
Difficulty: Medium
Section Reference: Identifying Network Topologies
Explanation: A network topology defines the physical connections of hosts
in a computer
network. With the mesh topology, every computer connects to every other
computer. No central
connecting device is needed. Since every computer connects to every
other computer, it requires
the most cabling, which increases the cost.
9. What standard describes CSMA/CD?
a) 801.2
b) 802.3
c) 802.5
d) 802.11
Answer: b
Difficulty: Hard
Section Reference: Defining Ethernet Standards
Explanation: IEEE 802.3 defines carrier sense multiple access with collision
detection
(CSMA/CD). Because computers on a default Ethernet LAN all share the
same channel,
CSMA/CD governs the way computers coexist with limited collisions.
10. What mechanism do wireless networks use to access the network?
a) CSMA/CD
b) CSMA/CA
c) token passing
d) polling
Answer: b
Difficulty: Medium
Section Reference: Defining Ethernet Standards
Explanation: If an organization uses wireless Ethernet, carrier sense
multiple access with
collision avoidance (CSMA/CA) is used.
11. What model promises the most processing power?
a) centralized computing
b) distributive computing
c) switching computing
d) dumb computing
Answer: b
Difficulty: Medium
Section Reference: Identifying the Differences between Client/Server and
Peer-to-Peer
Distributed Networks
Explanation: During the days of the mainframe, all devices that connected
to the one super
computer were known as terminals (or dumb terminals). Today’s
computing is known as
distributive computing and is used for both client/server and peer-to-peer
networks. This means
that every device or workstation has its own processing power.
12. Which model users a central database for authentication?
a) peer-to-peer
b) workgroup
c) client/server
d) distributive
Answer: c
Difficulty: Easy
Section Reference: Defining the Client/Server Model
Explanation: The client/server model is an architecture that distributes
applications between
servers such as Windows Server 2008 and client computers such as
Windows 7 or Windows
Vista machines. It also distributes the necessary processing power. This is
extremely common in
today’s LANs and with most applications an average user would utilize
when connecting to the
Internet.
13. What type of server does Active Director run on?
a) file server
b) print server
c) database server
d) network controller
Answer: d
Difficulty: Easy
Section Reference: Defining the Client/Server Model
Explanation: A controlling server, such as a Microsoft domain controller, is
in charge of user
accounts, computer accounts, network time, and the general well-being of
an entire domain of
computers and users.
14. Which model has each host have their own security database?
a) peer-to-peer
b) client/server
c) distributive
d) sliding
Answer: a
Difficulty: Easy
Section Reference: Defining the Peer-to-Peer Model
Explanation: Peer-to-peer networking means that each computer is
treated as an equal—
meaning, each computer has an equal ability to serve and to access data,
just like any other
computer on the network. Each computer also has its own security
database.
15. What type of communication is sent to a single designated host?
a) unicast
b) broadcast
c) multicast
d) anycast
Answer: a
Difficulty: Medium
Section Reference: Defining Data Transfer on a LAN
Explanation: Unicast describes the situation in which information is sent to
one host only. This
reduces network traffic greatly, and helps with packet loss and duplicates.
16. What is used to uniquely identify a host on a TCP/IP network?
a) IP address
b) MAC address
c) bit pattern
d) router name
Answer: a
Difficulty: Easy
Section Reference: Configuring Internet Protocol
Explanation: An IP address is the cornerstone of networking because it
defines the computer or
host you are working on. Today, every computer and many other devices
have such an address.
An IP address allows each computer to send and receive information in an
orderly and efficient
manner.
Fill in the Blank
17. A _________ is a single computer or device that connects to a TCP/IP
network.
Answer: host
Difficulty: medium
Section Reference: Configuring Internet Protocol
Explanation: IP addresses are usually applied to your network adapter, but
they can also be
applied to other devices like switches, routers, and so on. A device or
computer that has an IP
address is a host.
Short Answer
18. What is the central device used in wireless LANs?
Answer: wireless access point
Difficulty: Easy
Section Reference: Identifying Types of LANs
Explanation: The wireless access point (WAP) acts as the central
connecting device for the
network. Today, such networks can consist of many types of devices other
than traditional PCs,
including smart phones, PDAs, tablet computers, and microcomputers.
19. What is the difference between a switch and a hub?
Answer: A hub allows only one device to communicate to another device
at a time. If two
devices try to communicate at the same time, a collision will result. A
switch allows multiple
conversations to occur at the same time. In addition, a switch also
supports full-duplex, which
means that a computer or host can send and receive at the same time.
Difficulty: Medium
Section Reference: Defining a LAN
Explanation: Because a hub is considered a legacy item, purchasing a new
one today is difficult.
Also, a hub communicates in half duplex, whereas switches support full
duplex.
20. What command do you use to test the TCP/IP stack on a computer?
Answer: ping localhost (or ping 127.0.0.1 or ping loopback)
Section Reference: Defining a LAN
Explanation: You can ping your own computer using the loopback address,
also known as the
local loopback. When pinging this address, no network traffic is incurred;
because the network
adapter is really just looping the ping back to the OS, it never places any
packets on to the
network. Therefore, this is a solid way to test whether TCP/IP is installed
correctly to a network
adapter, even if you aren’t physically connected to a network.

1. What will Sidney need to install for Josh to be able to access


Fourth Coffee’s server from his home
and mobile phones?
a. a firewall
**b. a VPN
c. an intranet

2. A firewall is to a network as:


***a. a door is to a classroom
b. an eraser is to a pencil
c. a movie is to a screen

3. The primary goal of an intranet is to:


a. allow different businesses to share information
b. let users access different websites
***c. provide company information to internal employees

1. What type of network is Kim trying to connect to?


a. WAN
***b. LAN
c. PAN
2. To verify that Kim’s NIC (network interface card) works,
Michael pings 127.0.0.1,
which is known as the:
**a. loopback address
b. dynamic address
c. static address
3. A NIC is to a LAN as:
a. lyrics are to a song
***b. a key is to a door
c. a movie is to a TV

1. When Brian connects a cable from his laptop’s NIC into an RJ45
jack he is connecting to the:
a. VLAN
***b. wired LAN
c. wireless LAN
2. A VLAN is also called a:
***a. logical network
b. internal network
c. external network
3. What will be Erin’s best solution for providing Internet
connectivity
to the pool area?
a. expand the hotel’s wired network
***b. expand the hotel’s wireless network
c. add a new WAN

1. To link all three of Fourth Coffee’s LANs together, Sidney will


create a:
a. LAN
b. PAN
***c. WAN
2. Between the original coffee shop and the first expansion
location, Sidney decides to order
***a private, dedicated line from the phone company known as:
a. a leased line
b. dial-up
c. ISDN
3. Sidney reassures Josh that the existing VPN is secure because
the data
transferred across the public network is:
a. defragmented
***b. encrypted
c. zipped

1. Cristian determines that the point-to-point, dedicated, digital


circuit that is available in Paris and
meets the minimum bandwidth of 1 Mbps is the:
***a. E1
b. F1
c. T1
2. Allie determines that the United States’ equivalent to Cristian’s
chosen
digital circuit is the:
a. E1
***b. T1
c. U1
3. One home connection that Allie researches is a high-speed
digital
communication technology over standard copper telephone wire
called:
a. Cable TV
***b. DSL
c. VPN

1. The most current wireless networking standard is:


**a. 802.11n
b. 802.3
c. Bluetooth
2. To provide strong encryption protection without an enterprise
authentication
server, Scott uses:
a. SSID
b. WEP
**c. WPA-PSK
3. After the wireless network is completed, Scott’s Dad sits on the
deck and
successfully connects the laptop to the Internet through their
new,
private, and secure:
a. Gigahertz
b. VLAN
**c. Wi-Fi hotspot

1. The topology concerned with how data gets transferred within


the network is the:
**a. logical topology
b. mesh topology
c. physical topology
2. The topology considered more reliable because all of the nodes
are connected
to each other is the:
a. bus topology
**b. mesh topology
c. star topology
3. What topology should Jack choose for Molly’s network?
a. bus
b. ring
**c. star

Essential details
Essential details
• VPNs create a private network and provide a secure tunnel across the
Internet.
• Firewalls can be hardware devices.
• For security zones, keep the security level as high as possible.
• In Microsoft® Internet Explorer® click Tools and then click Internet
Options to set your security settings.
• Mobile phones can be used to connect to a company’s servers.

Essential details
• LANs connect local computers together in a small geographical area.
• Perimeter networks provide an extra layer of security for a company’s
internal network.
• Computers connect to a LAN through a NIC (network interface card).
• The loopback address is a reserved, static address of 127.0.0.1.
• In Microsoft Windows® 7, right-click Network and select Properties to
view your network configuration.

Essential details
• VLANs are created on switches and help improve network performance.
• Wired networks take time to install because wires need to be pulled to
all of the connection jacks.
• Wireless LANs are easy to expand to remote areas.
• Security can be implemented in both wired and wireless LANs.
• In Microsoft Windows 7, click the wireless network icon (on the right side
of the taskbar) to view the available
wireless networks.

1. A computer’s MAC address is:


a. assigned by a Network Administrator
**b. located on the NIC
c. acquired from an ISP (Internet Service Provider)
2. The OSI model is to networking as:
a. music is to a Zune
b. cookies are to milk
**c. fashion rules are to fashion
3. A smart Layer 2 device that has an IP address, connects the
office computers
together, and provides full bandwidth to each port is called a:
a. managed hub
**b. managed switch
c. unmanaged switch

1. A Layer 3 switch performs:


a. Layer 2 forwarding and Layer 3 switching in hardware
b. Layer 2 segmenting and Layer 3 switching in hardware
***c. Layer 2 switching and Layer 3 forwarding in hardware
2. A switch is to a network as:
a. a frame is to a picture
***b. a portal is to the web
c. a case is to a computer
3. A motherboard is to a computer as:
***a. a backplane is to a switch
b. a MAC address is to a switch
c. a certificate is to a switch

1. The Humane Society cannot afford a router but they do have a


switch and a Windows Server.
What should Scott do?
a. tell Justin that they’ll have to wait until they can afford a router
b. use the switch because a Layer 2 device can perform the same
functions as a router
***c. use the switch to connect the desktops and servers and then install
routing software
on the server
2. One week later a router is installed and Scott needs to figure
out what routes
the router knows, so he:
a. accesses the router’s NAT database and views the routes
***b. accesses the router’s routing table and views the routes
c. pings the router and it returns the routes
3. When Scott views the routes he sees that the router is learning
new routes
because of:
***a. dynamic routing
b. NAT
c. static routing

1. The best media choice for data to travel long distances without
the risk of interference is:
***a. fiber
b. thin coax
c. unshielded twisted-pair
2. Fiber:
a. can only be used for short distances
b. is extremely inexpensive
***c. transmits data in the form of light
3. Any type of undesirable electromagnetic emission or
electrical/electronic
disturbance is known as:
a. EIGRP
***b. EMI
c. STP

1. Based on the media goals, the type of cable that should be run
to the classrooms is:
a. coaxial
b. fiber
***c. UTP
2. Based on the media goals, the type of cable that should be
used for the backbone is:
***a. fiber
b. STP
c. wireless
3. Jon asks Mary Kay what media she would recommend for the
common areas.
She replies:
***a. “Wireless, because of ease of installation and flexibility.”
b. “Fiber, because of its low cost.”
c. “Wireless because it is secure by default without any configuration

1. The OSI model contains:


a. three layers
b. five layers
***c. seven layers
2. Data is placed onto the physical network medium at the:
a. application layer
b. network layer
***c. physical layer
3. OSI is to networking as:
a. a text message is to a mobile phone
***b. a game rule is to football
c. a word is to a boo

1. The TCP/IP model contains:


a. four layers and is not used today
***b. four layers and follows the standards of the OSI reference model
c. seven layers and was created before the OSI model
2. All hosts participating in a TCP/IP network, including Brian’s
computer,
are assigned:
a. a MAC address
b. a port number
***c. an IP address
3. A packet at Layer 3 becomes:
***a. a frame at Layer 2
b. a packet at Layer 2
c. a network address

1. An IP address is to a computer as:


**a. a student identification number is to a student
b. chocolate is to a chocolate chip cookie
c. fur is to a polar bear
2. Characteristics of IPv4 include:
**a. classes and 32-bit addresses
b. classes and 64-bit addresses
c. zones and 32-bit addresses
3. A default gateway is also known as:
a. an access point
b. a switch
**c. a router

1. IPv4 is to IPv6 as:


a. English is to Danish
***b. Microsoft Windows XP is to Microsoft Windows 7
c. Microsoft Word 2010 is to Microsoft Word 2007
2. If Randy buys the IPv6 phone and uninstalls IPv4 support, he
can still
communicate with an IPv4 device when he:
a. is connected to a IPv4 default gateway
***b. is connected to a Dual Stack Architecture network
c. converts his IPv6 address to an IPv4 address manually
3. Randy’s new IPv6 phone would have a:
a. 32-bit IP address
b. 64-bit IP address
***c. 128-bit IP address

1. At the Networking Layer, in an IPv6 network, data is


encapsulated into an IPv6:
a. envelope
b. header
***c. packet
2. An IPv6 subnet mask is written in:
a. decimal
***b. hexadecimal
c. octal
3. Subnet masks are to an IP address as a:
a. keyboard is to a computer
b. website is to a link
***c. zip code is to a postal address

1. The DHCP server will provide a:


**a. dynamic IP addresses to the clients
b. static IP addresses to the clients
c. static IP addresses to the servers
2. A Remote Access Server is to a client as a:
a. lion is to Africa
***b. locked car door is to a car
c. pixel is to a digital camera
3. Regarding Josh’s question, IPsec is:
a. a protocol suite used for securing IP communications
b. used to assign static and dynamic IPv6 address to clients
c. used to provide security to IPv6 addresses

1. A domain name is to an IP address as:


***a. a kangaroo is to Australia
***b. Laura Steele’s name is to her driver’s license number
c. Laura Steele’s student identification number is to her name
2. When Laura Steele browses the Web on her mobile phone and
types
in http://www.microsoft.com and presses Enter:
***a. the domain name Microsoft.com is resolved to an IP address
b. the IP address is a calculated address based on the domain name
c. WINS checks the local LMHOSTS file and determines the MAC address
of the domain name
3. The server that translates domain names to their
corresponding
IP addresses is called a:
a. DHCP server
***b. DNS server
c. WINS server

1. Sara first decides to use the pathping tool because it:


a. acts as a terminal emulation program that will automatically
troubleshoot the issue
***b. determines the degree of packet loss along the path the data is
traveling
c. shows the route that is taken by the packet as it moves across the IP
network
2. Next Sara tries to see if she can reach the default gateway by
using the…
a. netstat tool
***b. ping tool
c. loopback address
3. Based on the results, Sara decides that she needs to refresh
her
DHCP settings by using the:
a. telnet tool
***b. ipconfig tool
c. local loopback IP

Which of the following regenerates a signal and broadcasts that signal to


every computer
connected to it?
a. Hub
b. Switch
c. Router
d. Firewall
Answer: A, Hub
Which of the following is not a central connecting device?
a. Hub
b. Switch
c. SOHO router
d. Windows 7 client
Answer: D, Windows 7 Client
You need to install a network adapter to a computer so that it can be
connected to a network
that uses twisted-pair cabling. What type of port does the network adapter
need to use?
a. RJ11
b. RJ45
c. RG-58
d. Fiber optic
Answer: B, RJ45
Where can you go in Windows 7 to access the Properties of a network
adapter?
a. Device Manager
b. Ping
c. Advanced Firewall
d. Task Manager
Answer: A, Device Manager
You need to connect a computer's network adapter to a switch. You want
the connection
to be able to send and receive data simultaneously. What type of
connection do you need?
a. Half duplex
b. Full duplex
c. Simplex
d. 100 Mbps
Answer: B, Full Duplex
You need to connect a computer at a rate of 100,000,000 bits per second.
What speed
network adapter should you install?
a. 10 Mbps
b. 100 MB/s
c. 100 Mbps
d. 1000 Mbps
Answer: C, 100 Mbps
You need to connect to a router that has the IP address 192.168.1.100 on
a standard,
default Class C network using the subnet mask 255.255.255.0. Which of
the following
is a valid IP address for your network adapter?
a. 192.168.0.1
b. 192.168.1.1
c. 192.168.100.1
d. 192.168.1.100
Answer: B, 192.168.1.1
You have just installed a network adapter and configured an IP address
and subnet
mask. What command can you use to verify that the IP address is
configured and listed
properly?
a. Ping
b. Tracert
c. CMD
d. Ipconfig
Answer: D, Ipconfig
You need to ping your own computer to see if it is alive. Which of the
following would
qualify as command-line syntax to do so?
a. Ping localclient
b. Ping 128.0.0.1
c. Ping loopback
d. Ping network adapter
Answer: C, Ping loopback
You have been instructed to connect a computer to a group of hosts that
have been
segmented from the regular network. What kind of network is this?
a. LAN
b. WLAN
c. WAN
d. VLAN
Answer: D, VLAN
The manager of IT asks you to connect a perimeter network to the
firewall, which will
be separate from the LAN. This type of network is known as a
______________.
Answer: DMZ
A ______________ topology can be defined by connecting several hubs to a
switch.
Answer: Star
802.3u Ethernet networks run at ____________ Mbps.
Answer: 100 Mbps
A ____________ is a program used to download files quickly from a P2P
network.
Answer: BitTorrent Client
The ______________ network architecture is physically a star and logically a
ring.
Answer: Token Ring
802.3ab Ethernet networks run at ____________ Mbps.
Answer: 1000 Mbps
A ___________ connection is one in which data can be both sent and
received, but not
at the same time.
Answer: Half Duplex
A ______________ topology can be defined as connecting several computers
together
in a circle without the use of a hub or a switch.
Answer: Ring
When several computers are connected in a small geographic area, it is
known
as a ____________.
Answer: LAN (Local Area Network)
A _______________ acts as a central connecting device and allows laptops,
PDAs, and
handheld computers to communicate with each other.
WAP (Wireless Access Point)

Terms in this set (20)


How many layers are incorporated in the OSI model communications
subnetwork?
a. 2
b. 7
c. 3
d. 4
Answer: C, 3
Which of the following layers deals with the serial transfer of data?
a. Physical
b. Data link
c. Network
d. Session
Answer: A, Physical
You need to install a router on your company's network that will allow
access to the
Internet. What layer of the OSI does this device reside on?
a. Physical
b. Data link
c. Network
d. Transport
Answer: C, Network
You run a netstat -an command in the command prompt and notice many
connections being
made that say TCP in the left-most column. What layer of the OSI is TCP
referring to?
a. Layer 1
b. Layer 2
c. Layer 3
d. Layer 4
Answer: D, Layer 4
You suspect a problem with your computer's network adapter and its
ability to send the
correct frames of data that correspond with the network architecture used
by the rest
of your computers. What layer should you attempt to use as a
troubleshooting starting
point?
a. Physical
b. Data link
c. Network
d. Transport
Answer: B, Data link
A standard such as 100BASE-T refers to which OSI layer?
a. Physical
b. Data link
c. Network
d. Transport
Answer: A, Physical
Almost all of your users connect to Web sites with Internet Explorer. They
usually type
domain names such as www.microsoft.com. What protocol is initiated by
default when
they press Enter after typing the domain name?
a. FTP
b. HTTPS
c. HTTP
d. HTP
Answer: C, HTTP
You need to find out the MAC address of your director's computer. He has
given you
permission to access his computer. You access the command prompt.
What command
should you type to see the computer's MAC address?
a. ipconfig
b. ipconfig/all
c. arp
d. netstat -an
Answer: B, Ipconfig /all
You need to find out the MAC addresses of all the computers that a
particular user's
computer has connected to in the recent past. What command should you
use to accomplish
this?
a. ping 127.0.0.1
b. netstat -a
c. arp -a
d. arp -s
Answer: C, arp -a
You have been instructed to capture and analyze packets on a server.
What tool will allow
you to do this? (Select the two best answers.)
a. Protocol analyzer
b. Command Prompt
c. netstat -an
d. Wireshark
Answer: A, Protocal Analyzer and D, Wireshark

Terms in this set (20)


You are in charge of installing 200 twisted-pair cable drops. What wiring
standard
should you most likely use?
a. 568A
b. BOGB
c. 568B
d. 586B
Answer: C, 568B
Your boss wants you to connect two of his laptops directly to each other
using their
network adapters. What kind of cable should you use?
a. Rolled cable
b. Crossover cable
c. Straight through cable
d. Patch cable
Answer: B, Crossover cable
You are making a specialized wired connection for a server that will
operate on an
Ethernet network. Which two wiring colors should you use?
a. Orange and green
b. Orange and blue
c. Orange and brown
d. White and blue
Answer: A, Orange and green
One of the network connections to a programmer's computer has failed.
You suspect it
involves a problem with the twisted-pair cable. What tool should you use
to test for any
problems in the cable?
a. Patch tester
b. Wireshark
c. Continuity tester
d. Fox and hound
Answer: C, Continuity tester
The IT director has asked you to connect three new super computers to
the backbone of
a network that runs at 1 Gbps. The pressure is on! What type of cable will
be sufficient
for this task?
a. Category 3
b. Category 5
c. Category 5e
d. Category 10a
Answer: C, Category 5e
Your network contains many fiber optic connections. Which one of the
following does
not belong in your fiber network?
a. FC connector
b. ST connector
c. TOSLINK
d. 8P8C
Answer: D, 8P8C
You need to connect 802.11a, 802.11b, and 802.11n wireless networks
together. What
wireless tool will guarantee you connectivity between these networks?
a. Wireless network adapter
b. Wireless hub
c. Wireless router
d. Wireless bridge
Answer: D, Wireless bridge
Your boss has asked you to connect three new laptops to the wireless
network
"WLAN42." It runs at a speed of 54 Mbps only and a frequency of 2.4 GHz
only. What
IEEE 802.11 standard should you implement when connecting the laptops
to the WAP?
a. 802.11a
b. 802.11b
c. 802.11g
d. 802.11n
Answer: C, 802.11g
You need to connect a desktop computer to a WLAN using the strongest
encryption
type possible. Of the following choices, which is the strongest?
a. WEP
b. RADIUS
c. WPA2
d. WPA
Answer: C, WPA2
You have connected thirteen PCs and laptops to a wireless network. To
make your
WLAN more secure, what should you do to disallow additional client
access to the WAP?
a. Enable channel bonding
b. Enable frame aggregation
c. Disable SSID broadcasting
d. Disable WPA2
Answer C, Disable SSID broadcasting

Terms in this set (20)


Your client requires that you install 284 computers on a single IP network.
Which of the
following IP classes would be your best option?
a. Class A
b. Class B
c. Class C
d. Class D
Answer: B, Class B.
Your boss wants you to set up three computers on a classful network with
a default subnet
mask of 255.0.0.0. What class does he want the computers to be set up
on?
a. Class A
b. Class B
c. Class C
d. Class D
Answer: A, Class A.
Proseware, Inc., needs you to set up 100 computers on a private Class A
network. Which
of the following IP network numbers meet all of the criteria for a private
Class A network?
a. 100.10.1.0
b. 192.168.1.0
c. 172.16.0.0
d. 10.0.0.0
Answer: D, 10.0.0.0
You need to subnet a 192.168.1.0 network. You decide to use the
255.255.255.240 subnet
mask. What is 240 equal to in binary?
a. 11100000
b. 11000000
c. 11110000
d. 10000000
Answer: C, 11110000
The IT director has asked you to set up 14 separate IP networks that can
each have up
to 400 computers. What IANA private IP range should you select?
a. 10.0.0.0-10.255.255.255
b. 172.16.0.0-172.31.255.255
c. 192.168.0.0-192.168.255.255
d. 169.254.0.0-169.254.255.255
Answer: B, 172.16.0.0 - 172.31.255.255
You are troubleshooting a computer that cannot obtain the proper IP
address from a
DHCP server. When you run an ipconfig/all, you see that the computer has
obtained
the address 169.254.67.110 automatically. What has occurred? (Select the
best answer.)
a. The DHCP server has auto-assigned an IP address to the computer.
b. APIPA has auto-assigned an IP address to the computer.
c. A SOHO router has auto-assigned an IP address to the computer.
d. The ISP has auto-assigned an IP address to the computer.
Answer: B, APIPA has auto-assigned an IP address to the computer.
You need to connect 802.11a, 802.11b, and 802.11n wireless networks
together. What
wireless tool will guarantee connectivity between these networks?
a. Wireless network adapter
b. Wireless hub
c. Wireless router
d. Wireless bridge
Answer: D, Wireless Bridge.
Your boss's computer cannot connect to the Internet. Examine the
following ipconfig
results and select the best answer explaining why this has occurred.
IPv4 Address ............................................. : 10.254.254.1
Subnet Mask .............................................. : 255.255.255.0
Default Gateway......................................... : 10.254.254.255
a. The subnet mask is incorrect.
b. The IP address is incorrect.
c. The default gateway is incorrect.
d. The subnet mask and the IP address are incorrect.
Answer: C, The default gateway is incorrect. (255 is a broadcast address)
A user cannot connect to any Web sites. Review the ipconfig results that
follow and
select the best answer explaining why this has occurred.
Windows IP Configuration
Host Name ........................................... : Computer1
Primary Dns Suffix ................................. :
Node Type ............................................ : Hybrid
IP Routing Enabled................................ : No
WINS Proxy Enabled ............................... : No
Ethernet adapter lan:
Connection-specific DNS Suffix.:
Description ........................................... : Intel(R)
82566DC-2 Gigabit Network Connection
Physical Address ................................... : 00-1C-C0-A1-55-16
DHCP Enabled ....................................... : No
Autoconfiguration Enabled ..................... : Yes
IPv4 Address ........................................ : 10.254.254.105(Preferred)
Subnet Mask ......................................... : 255.255.255.0
Default Gateway .................................... : 10.254.254.1
DNS Servers .......................................... : 10.255.254.1
a. The MAC address is incorrect.
b. The DNS server address is incorrect.
c. The default gateway address is incorrect.
d. The computer has no IP address.
Answer: B, The DNS server is incorrect.
You have installed a device that has two IP addresses. One address,
64.51.216.27, is
displayed to the Internet. The other address, 192.168.50.254,
communicates with the
LAN. What type of technology have you implemented?
a. Subnetting
b. IPv6
c. Network address translation
d. Class A public IP address
Answer: C, Network Address Translation.
The manager of IT asks you to subnet a group of computers on the
192.168.50.0/28
network. This will provide you with ____________ number of subnets.
Answer: 16
You have configured IP network 192.168.1.0 with the subnet mask
255.255.255.240.
Two computers have the IP addresses 192.168.1.113 and 192.168.1.114.
Another computer cannot communicate with them. That computer is using
the IP address
192.168.1.145. Here, the third computer cannot communicate with the
others because
it is on Subnet ID ____________.
Answer: 9
Your network uses the subnetted IP network 192.168.100.0/26. Its subnet
mask
is ____________.
Answer: 255.255.255.192
You are troubleshooting an IP network with the following number:
10.254.254.0/24.
This type of IP network number is known as ____________.
Answer: Classless Inter-Domain Routing
Your boss worries about how many IPv4 addresses are left and inquires
about installing
IPv6. Whereas IPv4 is a 32-bit system, IPv6 is a ____________ -bit system.
Answer: 128
A client wants you to set up a group of IPv6 network interfaces in such a
way that
each of them will have all packets delivered to them. Here, you should
implement
a ____________ address.
Answer: Multicast
You are troubleshooting a server that needs to connect directly to the
Internet. After
you run an ipconfig/all, you see that the server has been auto-assigned
the IPv6 address
fe80::260:8ff:fec0:98d%4. The server won't connect to the Internet due to
the fact that
this is a ____________ address.
Answer: Link-local
To save time when working with IPv6 addresses in the command line, you
like to truncate
them. The truncated version of
2001:4860:0000:2001:0000:0000:0000:0068 would
be ____________.
Answer: 2001:4860:0:2001::68
You see an IPv6 address displayed as fe80::5efe:10.0.0.2%2. This is an
example
of ____________.
Answer: IPv6 Tunneling
You are troubleshooting a client's network. The client is using the following
IP network
scheme:
IP network: 192.168.50.0
Subnet mask: 255.255.255.240
The client has 196 computers that are functioning properly, but another
30 computers
will not connect to the network. This is because ____________.
Answer: They have run out of addresses

Terms in this set (20)


You are troubleshooting a network connectivity problem and see the
command results
listed here. What command was typed to acquire these results?
Request timed out.
Request timed out.
Request timed out.
Request timed out.
Packets: Sent = 4, Received = 0, Lost = 4 (100% loss),
a. ipconfig
b. netstat
c. ping
d. nbtstat
Answer: C, Ping
You are told to determine the MAC address of a Windows computer. Which
command
should you use to find this information?
a. ipconfig
b. ipconfig /all
c. ipconfig /release
d. ipconfig /flushdns
Answer: B, ipconfig /all
Proseware, Inc., needs you to decipher the command results listed here.
What command
was typed to acquire these results?
Active Connections
Proto Local Address Foreign Address State
TCP 0.0.0.0:80 0.0.0.0:0 LISTENING
TCP 0.0.0.0:135 0.0.0.0:0 LISTENING
TCP 0.0.0.0:445 0.0.0.0:0 LISTENING
TCP 10.254.254.205:139 0.0.0.0:0 LISTENING
TCP 127.0.0.1:2804 127.0.0.1:49159 ESTABLISHED
UDP 0.0.0.0:123 :
UDP 0.0.0.0:500 :
UDP 0.0.0.0:2190 :
UDP 0.0.0.0:3702 :
UDP 0.0.0.0:3702 :
UDP 0.0.0.0:4500 :
UDP 0.0.0.0:62038 :
UDP 10.254.254.205:137 :
UDP 10.254.254.205:138 :
a. netstat
b. nbtstat
c. netstat -an
d. nbtstat -an
Answer: C, netstat –an

A.make resources available to the intranet.B.link campus area


networks (CANs).C.link local area networks (LANs).D.make
resources available to the Internet.
Correct Answer:
D
Section: (none)ExplanationExplanation/Reference:QUESTION 75
Which protocol can be used to encrypt packets on the
Internet? A.SNMPB . H T T P S C . T F T P D . H T T P
Correct Answer:
B
Section: (none)ExplanationExplanation/Reference:QUESTION 76
The service that resolves fully qualified domain names (FQDN) to IP
addresses is: A.Windows Internet Name Service (WINS).B.Domain Name
Service (DNS).C.Internet Service Provider (ISP).D.Address
Resolution Protocol (ARP).
Correct Answer:
B
Section: (none)ExplanationExplanation/Reference:QUESTION 77
If a router is installed so that it separates a DHCP server from its clients,
the clients will: A.immediately lose connectivity to all segments.B.be
unable to obtain their leases from the server.C.immediately lose
connectivity to the local segment.D.receive an immediate renewal
of their lease.
Correct Answer:
B
Section: (none)ExplanationExplanation/Reference:QUESTION 78
Which of the following services masks internal IP addresses from outside
the network?

A.DHCPB . W I N S C . N A T D . D N S
Correct Answer:
C
Section: (none)ExplanationExplanation/Reference:QUESTION 79
The query protocol used to locate resources on a network is: A.user Datagram
Protocol (UDP).B.Lightweight Directory Access Protocol
(LDAP),C . T r a c e r t D . T e l n e t .
Correct Answer:
B
Section: (none)ExplanationExplanation/Reference:QUESTION 80
Tracert is used to: A.manage routing tables dynamically.B.manage
session-oriented connections between nodes.C.report the route taken by
packets across an IP network.D.report the shortest route between different
networks.
Correct Answer:
C
Section: (none)ExplanationExplanation/Reference:QUESTION 81
In which OSI layer does routing occur? A.TransportB . N e t w o r k C . D a t a
LinkD.Physical
Correct Answer:
B
Section: (none)ExplanationExplanation/Reference:QUESTION 82
What type of record does DNS use to find a mail service? A.Service (SRV)
DNS recordB.Canonical (CNAME) DNS recordC.Mail Exchanger (MX)
DNS recordD . H o s t ( A ) D N S re c o rd
Correct Answer:
C
Section: (none)ExplanationExplanation/Reference:QUESTION 83
The default gateway address identifies the: A.device that will connect the
computer to the local network.B.device that will connect the
computer to a remote network. C.server that will provide name
services for the computer.D.server that will authenticate the user of the
computer.
Correct Answer:
B
Section: (none)ExplanationExplanation/Reference:QUESTION 84
How many bits are there in an Internet Protocol version 6 (IPv6)
address? A.32B . 6 4 C . 1 2 8 D . 2 5 6
Correct Answer:
C
Section: (none)ExplanationExplanation/Reference:QUESTION 85
Which of the following is a public IP
address? A.10.156.89.1B . 6 8 . 2 4 . 7 8 . 2 2 1 C . 1 7 2 . 1 6 . 1 5 2 . 4 8 D . 1 9 2 .
168.25.101
Correct Answer:
B
Section: (none)ExplanationExplanation/Reference:
QUESTION 86
What is the minimum cabling requirement for a 100BaseTX network? A.Category 3
UTP cableB . C a t e g o r y 5 U T P c a b l e C . C a t e g o r y 6 U T P
c a b l e D . M u l t i m o d e fi b e r c a b l e
Correct Answer:
A

A coworker asks for your help in analyzing the table shown here. What
kind of table is this?
Network
Destination Netmask Gateway Interface
0.0.0.0 0.0.0.0 10.254.254.1 10.254.254.205
10.254.254.0 255.255.255.0 On-link 10.254.254.205
10.254.254.205 255.255.255.255 10.254.254.205
127.0.0.0 255.0.0.0 On-link 127.0.0.1
a. ARP table
b. DNS table
c. Local ARP table
d. Local routing table
Answer: D, Local Routing Table.
The IT director has asked you to ping a computer continuously. Which of
the following
is the best command to use?
a. ping -n
b. ping -t
c. ping -1
d. ping 127.0.0.1
Answer: ping -t
You are troubleshooting a computer that cannot obtain the proper IP
address from a
DHCP server. Of the following commands, which should you try first?
a. ipconfig /release
b. ipconfig /renew
c. ipconfig /displaydns
d. ipconfig /source=dhcp
Answer: A, ipconfig /release
You see the following results in the command prompt. What command did
you just type?
Resolved By Broadcast = 0
Resolved By Name Server = 0
Registered By Broadcast = 9
Registered By Name Server = 0
a. nbtstat -r
b. nbtstat -RR
c. nbtstat -R
d. nbtstat -s
Answer: nbstat -r
Your boss's computer can ping other computers, but it cannot connect to
Web sites.
Examine the following ipconfig results and select the best answer to
explain why this has
occurred.
IPv4 Address . . . . . . . . . . . . . . . . . . . . . . . : 10.254.254.1
Subnet Mask . . . . . . . . . . . . . . . . . . . . . . . : 255.255.255.0
Default Gateway. . . . . . . . . . . . . . . . . . . . . : 10.254.254.255
DNS Servers. . . . . . . . . . . . . . . . . . . . . . . . : 127.0.0.1
a. The subnet mask is incorrect.
b. The IP address is incorrect.
c. The default gateway is incorrect.
d. The DNS server is incorrect.
Answer: C, The default gateway is incorrect.
A user cannot connect to the 192.168.1.0 network. Review the ipconfig
results that follow
and select the best answer to explain why this has occurred.
Windows IP Configuration
Host Name . . . . . . . . . . . . . . . . . . . . . . : Computer1
Primary Dns Suffix . . . . . . . . . . . . . . . . . :
Node Type. . . . . . . . . . . . . . . . . . . . . . . : Hybrid
IP Routing Enabled. . . . . . . . . . . . . . . . . : No
WINS Proxy Enabled . . . . . . . . . . . . . . . . : No
Ethernet adapter LAN:
Connection-specific DNS Suffix.:
Description . . . . . . . . . . . . . . . . . . . . . . : Intel(R)
82566DC-2 Gigabit Network Connection
Physical Address . . . . . . . . . . . . . . . . . . : 00-1C-C0-A1-55-16
DHCP Enabled . . . . . . . . . . . . . . . . . . . . : No
Autoconfiguration Enabled . . . . . . . . . . . : Yes
IPv4 Address . . . . . . . . . . . . . . . . . . . . . : 10.254.254.105(Preferred)
Subnet Mask . . . . . . . . . . . . . . . . . . . . . : 255.255.255.0
Default Gateway. . . . . . . . . . . . . . . . . . . : 10.254.254.1
DNS Servers . . . . . . . . . . . . . . . . . . . . . . : 10.255.254.1
a. The MAC address is incorrect.
b. The DNS server address is incorrect.
c. The default gateway address is incorrect.
d. The IP address is incorrect.
Answer: D, The IP address is incorrect.
You are troubleshooting a network connectivity problem and see the
command results
listed here. What command was typed to acquire these results?
1 15 ms 19 ms 19 ms 10.21.80.1
2 12 ms 22 ms 12 ms 208.59.252.1
3 152 ms 216 ms 149 ms 207.172.15.38
4 14 ms 24 ms 37 ms 207.172.19.222
5 21 ms 16 ms 25 ms 207.172.19.103
6 17 ms 23 ms 30 ms 207.172.9.126
7 15 ms 14 ms 15 ms 72.14.238.232
8 15 ms 35 ms 18 ms 209.85.241.148
9 30 ms 23 ms 44 ms 66.249.91.104
a. ipconfig
b. netstat
c. tracert
d. pathping
Answer: C, tracert
The manager of IT asks you to explain to her what command issued the
following
results:
Reply from 10.254.254.1: bytes=32 time=1ms TTL=64
Reply from 10.254.254.1: bytes=32 time<1ms TTL=64
Reply from 10.254.254.1: bytes=32 time<1ms TTL=64
Reply from 10.254.254.1: bytes=32 time<1ms TTL=64
Reply from 10.254.254.1: bytes=32 time<1ms TTL=64
Reply from 10.254.254.1: bytes=32 time<1ms TTL=64
Reply from 10.254.254.1: bytes=32 time<1ms TTL=64
Reply from 10.254.254.1: bytes=32 time<1ms TTL=64
Reply from 10.254.254.1: bytes=32 time<1ms TTL=64
Reply from 10.254.254.1: bytes=32 time<1ms TTL=64
The command typed was ____________.
Answer: Ping -n 10 10.254.254.1
A coworker cannot finish troubleshooting a computer before the end of the
day. Before
leaving, your coworker tells you the following results took over three
minutes to acquire,
and he asks you not to delete them from his screen:
Tracing route to google.com [66.249.91.104]
over a maximum of 30 hops:
0 Desktop-Lamp1 [10.254.254.205]
1 bdl1.eas-ubr16.atw-eas.pa.cable.rcn.net [10.21.80.1]
2 vl4.aggr1.phdl.pa.rcn.net [208.59.252.1]
3 tge1-1.core3.phdl.pa.rcn.net [207.172.15.38]
4 tge2-4.core1.nyw.ny.rcn.net [207.172.19.222]
5 tge1-1.border1.nyw.ny.rcn.net [207.172.19.103]
6 207.172.9.126
7 72.14.238.232
8 209.85.241.148
9 lga15s02-in-f104.1e100.net [66.249.91.104]
Computing statistics for 225 seconds . . .
Source to Here This Node/Link
Hop RTT Lost/Sent = Pct Lost/Sent = Pct Address
0 Desktop-Lamp1
[10.254.254.205]
0/ 100 = 0% |
1 14ms 0/ 100 = 0% 0/ 100 = 0% bdl1.eas-ubr16.atw-eas.
pa.cable.rc
n.net [10.21.80.1]
0/ 100 = 0% |
2 25ms 0/ 100 = 0% 0/ 100 = 0% vl4.aggr1.phdl.pa.rcn.net
[208.59.
252.1]
0/ 100 = 0% |
3 33ms 0/ 100 = 0% 0/ 100 = 0% tge1-1.core3.phdl.pa.rcn.
net [207.
172.15.38]
0/ 100 = 0% |
4 38ms 0/ 100 = 0% 0/ 100 = 0% tge2-4.core1.nyw.ny.rcn.
net [207.1
72.19.222]
0/ 100 = 0% |
5 32ms 0/ 100 = 0% 0/ 100 = 0% tge1-1.border1.nyw.
ny.rcn.net [207
.172.19.103]
0/ 100 = 0% |
6 21ms 0/ 100 = 0% 0/ 100 = 0% 207.172.9.126
0/ 100 = 0% |
7 23ms 0/ 100 = 0% 0/ 100 = 0% 72.14.238.232
0/ 100 = 0% |
8 22ms 0/ 100 = 0% 0/ 100 = 0%
The command that was typed to produce these results is ____________.
...
You need to add the IP address 192.168.1.1 to the network adapter via the
command
line. It also needs to have a gateway address of 192.168.1.100. The
command you
should type is ____________.
Answer: Netsh interface ip add address name="Local Area Connection"
192.168.1.1 255.255.255.0 192.168.1.100
You are troubleshooting a computer that is making strange connections to
the Internet
on its own. The ____________ command will show you the network sessions
to various
computers on the Internet.
Answer: netstat
Your boss wants you to download some manuals from an FTP site. He
wants you to do so
via the command line. The ____________ command will allow you to
accomplish this goal.
Answer: FTP
A coworker has determined the IP address of a domain name as shown in
the following results:
DNS request timed out.
timeout was 2 seconds.
Server: UnKnown
Address: 10.254.254.1
Non-authoritative answer:
Name: google.com
Address: 66.249.91.104
Your coworker typed the ____________ command to acquire these results.
Answer: Nslookup google.com
You are troubleshooting a server and decide to refresh the NetBIOS
names. You type a
command that yields the following results:
The NetBIOS names registered by this computer have been refreshed.
You typed the ___________ command.
Answer: Nbstat -RR
You are simulating network traffic to a remote host. Examine the following
results of a
TCP/IP command:
Reply from 10.254.254.1: bytes=1500 time=2ms TTL=64
Reply from 10.254.254.1: bytes=1500 time<1ms TTL=64
Reply from 10.254.254.1: bytes=1500 time<1ms TTL=64
Reply from 10.254.254.1: bytes=1500 time<1ms TTL=64
Ping statistics for 10.254.254.1:
Packets: Sent = 4, Received = 4, Lost = 0 (0% loss),
Approximate round trip times in milli-seconds:
Minimum = 0ms, Maximum = 2ms, Average = 0ms
The exact command that was issued was ____________.
Answer:
You are told by your boss to empty the DNS cache of a computer and
reconnect to the
nearest DNS server. You need to type the ____________ and ____________
commands.
Answer: ipconfig/flushdns
ipconfig/registerdns
You are troubleshooting a client's network. The client is using the following
IP network
scheme:
IP network: 10.254.254.0
Subnet mask: 255.255.255.0
The client cannot access the 10.253.253.0 network. You go to the server
that is also
acting as the router between the two networks and type a command. You
see the
following results:
Network
Destination Netmask Gateway Interface
0.0.0.0 0.0.0.0 10.254.254.1 10.254.254.205
10.254.254.0 255.255.255.0 On-link 10.254.254.205
10.254.254.205 255.255.255.255 10.254.254.205
127.0.0.0 255.0.0.0 On-link 127.0.0.1
You typed the ____________ command. The reason the client cannot access
the
10.253.253.0 network is because ____________.
Answer:

Essential details
• WANs can span completely around the world–from the United States to
Australia!
• A WAN link selection depends upon a company’s goals for speed,
availability, cost, and so on.
• The Plain Old Telephone Service (POTS) is the oldest communications
network.
• For small companies, leased lines are a great WAN solution for
connecting two locations.
• Always protect data by encrypting it prior to transferring it across the
Internet.

Essential details
• E1 and E3 are WAN connections available in Europe versus T1 and T3 for
the United States.
• DSL and Cable broadband Internet access technologies each have a
corresponding modem.
• Dial-up and ISDN have decreased in popularity while DSL and Cable
have become more popular.
• Even more WAN technologies exist, such as Frame Relay and ATM
(Asynchronous Transfer Mode).
• WAN links need to be optimized for efficient and fast performance.

Essential details
• Each of the wireless networking standards has different characteristics,
such as speed, distance, frequency,
and so on.
• Connect a WAP (wireless access point) to a wired router to provide
connectivity between the wireless devices
and wired network.
• WPA (Wi-Fi Protected Access) and WPA2 is more secure than WEP (Wired
Equivalent Privacy).
• WP-Enterprise and WP2-Enterprise are used in business environments
and work with an
802.1X authentication server.
• The 802.1X authentication method is used in business environments and
requires
a certificate or smart card for network access.
Essential details
• Bus topologies were popular along with coaxial cable.
• Mesh topologies are more expensive because of the redundant wiring.
• In star topologies a switch is usually used as the central device along
with twisted pair cable.
• Ring topologies are used as backbones for large networks with fiber
cable and may contain redundant rings.
• CSMA/CD is similar to a chat room, while CSMA/CA (Collision Avoidance)
is similar
to a classroom.

E ssential details
• Know the layers of the ISO’s (International Standards Organization) OSI
model.
• Hubs and repeaters are Layer 1 devices, switches and NICs are Layer 2,
and routers are Layer 3.
• Switches can create VLANs (Virtual Local Area Networks), which isolate
network broadcast traffic.
• Bandwidth is the throughput or the data transfer rate.
• If you have a fast port but a slow cable, the network will operate at the
slowest speed, which is the cable’s
speed.

E ssential details
• Switches are more than just a connection point for computers in a LAN.
• Choose the right networking device for the specific goal.
• Hardware redundancy provides highly available networks.
• Managed switches provide more options for network support.
• Use VLANs to segment systems from each other, which in turn enhances
security.

E ssential details
• Routing tables are shared between neighboring routers.
• The router always chooses the best path with the lowest cost from
source to destination.
• NAT allows a private address to be translated to a public address for
Internet access.
• Computers, routers, and other IP devices need a unique 32-bit IP
address and a 32-bit IP subnet mask to
communicate in an IP network.
• Computers also need a gateway address, which is the connected
router’s IP address.

E ssential details
• Fiber has a variety of different type of connectors that connect into
switches, routers, and so on.
• Fiber is available in single-mode and multimode.
• Coax is commonly used for TV connections today rather than enterprise
network installations.
• UTP is commonly used today in star and extended star topologies
because it is inexpensive and easy
to install.
• Wireless provides many advantages over traditional cabling choices and
therefore continues to increase
in popularity.

E ssential details
• UTP cables in LANs contain RJ45 connectors.
• Cat 5e and 6 are popular for new UTP installations.
• Because of safety concerns, it is relatively easy to create UTP cables and
a lot more difficult
to create fiber cables.
• Cables need to be organized efficiently and properly labeled.
• Know and follow the maximum distances for cable runs and even for
wireless
deployments.

Essential details
• Know the OSI model’s seven layers and the standards they represent.
• Standards are followed so that computers and devices can speak the
same language in order to
communicate with each other.
• Each layer communicates with the other layers directly above and
below.
• Data is encapsulated or wrapped up at each layer within a different
wrapper.
• Protocols are a set of rules that provide guidelines for computer
communication

Essential details
• The TCP/IP model, or the TCP/IP protocol suit, contains four layers and
protocols at each layer.
• Different encapsulation types exist at the different layers, such as
packets at the Network layer.
• TCP operates at the Transport layer and IP operates at the Network layer.
• All computers and devices participating in a TCP/IP network require an IP
address,
subnet mask, and default gateway.
• There are a few ports that should be remembered including: 53 (DNS),
80 (HTTP), 25 (SMTP), 110 (POP3).

Essential details
• IP addresses contain four octets and each octet contains eight bits.
• Ranges of IP addresses are reserved for private networks.
• A broadcast address is similar to an e-mail distribution list because
information that is sent to a specific
broadcast address will be sent to all devices on that specific subnet.
• Servers use static addresses; clients use dynamic IP addresses.
• DHCP servers provide IP addresses to clients for a set lease time.

Essential details
• IPv4 addresses contain the numbers 0-255 and IPv6 addresses contain
hexadecimal characters.
• Hexadecimal characters include the numbers 0-9 and letters A-F.
• IPv6 is becoming the new standard.
• Windows provides support for both IPv4 and IPv6 through the Dual Stack
Architecture.
• Teredo, ISATAP, and 6to4 are tunneling technologies that provide
transitional and
backward compatibility between IPv6 and IPv4 networks.

Essential details
• IPv4 and IPv6 packets both contain the source and destination IP
addresses that are used by the router to
route the packet.
• IPv6 addresses contain a dedicated subnetting portion.
• Identify the subnet that an IP address belongs to in a network by
performing a bitwise AND operation of the
subnet mask and IP address.
• The loopback address for IPv4 is 127.0.0.1 and for IPv6 is 0:0:0:0:0:0:0:1
or ::1 (compressed
format).

Essential details
• WINS servers resolve NetBIOS names to IP addresses and assist in
reducing NetBIOS traffic on subnets.
• DNS servers resolve domain names to IP addresses.
• DNS servers are part of the Internet’s infrastructure.
• DNS servers are also used in both enterprise and small business
networks.
• Different DNS record types exist on a DNS server.

Essential details
• Clients are generally assigned dynamic address.
• Servers are assigned static address so that they may be easily located
on a network.
• DHCP servers assign dynamic addresses to clients.
• Remote Access Servers, also known as Communication Servers, provide
access
to remote network resources.
• IPsec, created by IETF (Internet Engineering Task Force), secures IP
communications
through secure authentication and encryption.

Essential details
• To check connectivity, first ping your loopback address (127.0.0.1), then
ping your computer’s IP address, then
ping your default gateway, and finally ping the remote host.
• Ping contains different options for IPv4 and IPv6.
• Ipconfig/all displays lots of useful information, including DNS servers.
• Tracert traces the route a packet takes from the source to destination.
• Telnet logs into a router or computer.

Você também pode gostar