CIT 1122 - Chapter 14 ( Connecting to and Setting up a Network)

48 bit

How many bits are in a MAC address?

32 bit, 128 bit

How many bits are in an IPv4 IP address? In an IPv6 IP address?

Transmission Control Protocol/Internet Protocol

How does a client application identify a server application on another computer
on the
network?

Private IP addresses

What are IP addresses called that begin with 10, 172.16, or 192.168?

Class B

. In what class is the IP address 185.75.255.10?

Class C

. In what class is the IP address 193.200.30.5?

Public IP addresses are available for use on the Internet. private IP addresses are not allowed on the Internet. private IP addresses can still access the internet if a writer or other device that stands between the network and Internet is using NAT ( Net

Describe the difference between public and private IP addresses. If a network is
using private IP addresses, how can the computers on that network access the
Internet?

This is a private IP address not available on the network.

Why is it unlikely that you will find the IP address 192.168.250.10 on the
Internet?

...

In Figure 15-9, the subnet mask is four notches tall and is considered a classless
subnet mask for this network of sticks. How many notches tall would be a
classful subnet mask for the same network?

Automatic Private IP Address (APIPA)

If no DHCP server is available when a computer configured for dynamic IP
addressing connects to the network, what type of IP address is assigned to the
computer?

It was unable to lease an IP address from the DHCP server

If a computer is found to have an IP address of 169.254.1.1, what can you
assume about how it received that IP address?

1) interface ID or interface identifier
2) They uniquely identify an interface on the local link

What are the last 64 bits of a IPv6 IP address called? How are these bits used?

-ISATAP
-teredo
-6TO4

Name at least three tunneling protocols that are used for IPv6 packets to travel
over an IPv4 network.

-2000:: global address can be routed
on the internet
-these addresses are similar to
IPv4 public IP addresses

How is an IPv6 IP address used that begins with 2000::? That begins with
FE80::?

-16 bits
-those 16 bits are all zeros in link�local

How many bits are in the Subnet ID block? What are the values of these bits fora linklocal IP address?

DNS Domain Name System or Domain Name Service

Which type of IPv6 address is used to create multiple sites within a large
organization?

DNS or called Domain Name System

What type of server serves up IP addresses to computers on a network?

#NAME?

Which TCP/IP protocol that manages packet delivery guarantees that delivery?
Which protocol does not guarantee delivery, but is faster?

Port 25

At what port does an SMTP email server listen to receive email from a client
computer?

HTTPS (HTTP secure)

Which protocol does a web server use when transmissions are encrypted for
security?

DNS

What type of server resolves fully qualified domain names to IP addresses?

IMAP

Which email protocol allows a client application to manage email stored on an
email server?

NAT

What type of protocol is used to present a public IP address to computers outside
the LAN to handle requests to use the Internet from computers inside the
LAN?

2 LDAP (Lightweight Directory Access Protocol)

Which protocol is used when an application queries a database on a corporate network such as a database of printers?

A variation of the SSH (Secure Shell Protocol)

What type of encryption protocol does Secure FTP (SFTP) use to secure FTP
transmissions?

Remote Desktop Server Application & Skype

What two Windows applications use the RDP protocol and port 3389?

802.11n

Which version of 802.11 technologies can use two antennas at both the access
point and the network adapter?

WPA

Which wireless encryption standard is stronger, WEP or WPA?

Encryption

When securing a Wi-Fi wireless network, which is considered better security:
to filter MAC addresses, use encryption, or not broadcast the SSID?

Strong security

Would you expect WPS to be used when a wireless network is using strong
security, weak security, or no security (as in a public hotspot)?

b. Is the computer using dynamic or static IP addressing?

You have just installed a network adapter and have booted up the system,
installing the drivers. You open Windows Explorer on a remote computer and don't
see the computer on which you just installed the NIC. What is the first thing you check?

a. Telnet transmissions are not encrypted.

Your boss asks you to transmit a small fi le that includes sensitive personnel data
to a server on the network. The server is running a Telnet server and an FTP server. Why is it not a good idea to use Telnet to reach the remote computer?

...

Your job is to support the desktop computers in a small company of 32 employee. A consulting firm is setting up a private web server to be used internally by company employees. The static IP address of the server is 192.168.45.200. Employee will open their web browser and enter personal.mycompany.com in the URL address box to browse this web site. What step do you take so that each computer in the company can browse the site using this URL?