IP Networking Study Guide

MAC Address

A unique hexadecimal identifier burned into the ROM if every network interface.

Logical Network Address

The numerical address that identifies a subnet.

Logical Host Address

The numerical address that identifies a specific host on the network.

IP Address

A 32-bit binary number represented as four octets (can be represented as a decimal or binary).

IP Address Class

The default network address portion of the IP address. The classes are A,B,C,D, and E.

Protocol

A rule that identifies some aspect of how computers communicate on a network.

Transmission Control Protocol (TCP)

A communication standard for establishing and maintaining a network connection in which application programs can exchange data.

User Data Protocol (UDP)

An alternative to TCP designed to establish low-latency and loss-tolerant connections between applications on the internet.

Network Basic Input/Output System (NetBIOS)

An industry standard network communication protocol originally developed by IBM.

Encapsulation/Tunneling

A process in which non-IP packets are re-packaged as IP packets at the sending device.

Hypertext Transfer Protocol (HTTP)

A protocol used by the web browsers and servers to exchange files from the World Wide Web and intranets. This protocol uses port 80.

Hypertext Transfer Protocol Secure (HTTPS)

A secure form of HTTP that uses SSL as a sublayer for security. This protocol uses port 443.

File Transfer Protocol (FTP)

A generic method of transferring files that uses port 21.

Simple Mail Transfer Protocol (SMTP)

A protocol that routes electronic mail through the internet using port 25.

Internet Message Access Protocol (IMAP)

An email retrieval protocol that enables users to access their email from various locations without transferring messages or files back and forth between computers. this protocol uses port 143.

Post Office Protocol 3 (POP3)

A part of the IP protocol suite used to retrieve email from a remote sever to a local client over and IP connection. This protocol uses port 110.

Telnet Protocol

This protocol allows an attached computer to act as a dumb terminal, with data processing taking place on the IP host computer. Telnet uses port 23.

Secure Shell Protocol (SSH)

This protocol allows secure interactive control of remote systems and uses port 22.

Secure File Transfer Protocol (SFTP)

This protocol has the same functionality as FTP but uses SSH to secure data transmissions. SFTP uses port 22.

Domain Name System (DNS) Protocol

A system distributed throughout the inter network to provide address/name resolution using port 53.

Remote Desktop Protocol (RDP)

This protocol allows users to view and use the graphical desktop of a remote computer system. RDP uses port 3389.

Dynamic Host Configuration Protocol (DHCP)

This protocol dynamically assigns IP addressing information to network hosts when they come online. It uses ports 67 and 68.

Lightweight Directory Access Protocol (LDAP)

This protocol accesses information about network resources stored by a directory service. It uses ports 389 and 636.

Simple Network Management Protocol (SNMP)

This protocol monitors and manages network devices. It uses ports 161 and 162.

Sever Message Block (SMB) Protocol

This protocol enables the sharing of folders and printers on the network. It uses port 445.

Service Location Protocol (SLP)

This protocol organizes and locates various network devices and services. It uses port 427.

Apple Filing Protocol (AFP)

This protocol is used by systems running Mac OS X or newer to support file sharing on the network. It uses port 548.

What is NetBIOS?

NetBIOS is the term used to describe the combination of two protocols: NetBEUI and NetBIOS. NetBIOS was used in early Windows networks. Because NetBIOS is a non-routable protocol, it was often combined with IP to enable internetwork communications.

IPv6

It was developed because IPv4 addresses have been exhausted. The address is a 128-bit binary number.

Prefix

It's the first 64 buts of the IPv6 address.

Interface ID

It's the last 64 bits of the IPv6 address.

What class is this?
126.255.255.254

Class A. It is in between 1.0.0.0 and 126.255.255.255

What class is this?
191.255.255.254

Class B. It is in between 128.0.0.0 and 191.255.255.255

What class is this?
223.255.255.254

Class C. It is in between 192.0.0.0 and 223.255.255.255

What class is this?
239.255.255.254

Class D. It is in between 224.0.0.0 and 239.255.255.255

What class is this?
255.255.255.254

Class E. It is in between 240.0.0.0 and 255.255.255.255

What is the default subnet mask for an address range of 1.0.0.0 to 126.255.255.255?

255.0.0.0

What is the default subnet mask for an address range of 128.0.0.0 to 191.255.255.255?

255.255.0.0

What is the default subnet mask for an address range of 192.0.0.0 to 223.255.255.255?

255.255.255.0

What is the default subnet mask for an address range of 224.0.0.0 to 239.255.255.255?

This range does not have a default subnet mask.

What is the default subnet mask for an address range of 240.0.0.0 to 255.255.255.255?

This range does not have a default subnet mask.

What is the default subnet mask for class A?

255.0.0.0

What is the default subnet mask for class B?

255.255.0.0

What is the default subnet mask for class C?

255.255.255.0

What is the default subnet mask for class D?

This range does not have a default subnet mask.

What is the default subnet mask for class E?

This range does not have a default subnet mask.

What is the CIDR for the default submask 255.0.0.0?

/8

What is the CIDR for the default submask 255.255.0.0?

/16

What is the CIDR for the default submask 255.255.255.0?

/24

What is the CIDR for class A?

/8

What is the CIDR for class B?

/16

What is the CIDR for class C?

/24

What service is used to automatically assign TCP/IP configuration information to hosts?

DHCP

When assigning IP addresses to hosts, which portions of the configuration must match values used by other hosts in the same subnet?

Must share the same first octet.

A router has two network interfaces, each connected to a different subnet. When configuring the default gateway value on a host, which IP address would you use?

You would use the IP of the router's interface that is on the same subnet as the host.

What capability does the DNS server address provide? What would happen if the computer was not configured to use a DNS server?

They maintain a directory of domain names and translate them to Internet Protocol (IP) addresses. If the computer is not configured to use a DNS server, they could not perform name resolutions.

How many addresses does IPv4 have?

4.3 billion addresses.

How many addresses does IPv6 have?

2.4 x 1038 addresses.

What is the primary reason for developing IPv6?

Overcome depletion of the 32-bit addresses.

How many hexadecimal numbers are in an IPv6 address?

32 organized into 8 quartets, separated by colons.

What do you add to an IPv6 address when you remove one or more quartets with all 0's?

Replace it with a double colon ::
You can only omit one block within the address.

What information is included within the IPv6 address prefix?

Similar to subnet. First three digits(internet registries). Use the first 12 bits of information. The 3rd and 4th quartet individual business or site.

How many numbers are used for the interface ID?

64 bit number. The interface ID can be based off of the MAC address (FFFE).

What is the difference between a MAC address and an IP address? Which address can you assign to a computer?

A Mac address is the address of the physical device. This address cannot be changed very easily. An IP address is a logical address which is configured by the operating system. You can assign an IP address to a computer. The manufacturer burns the MAC add

How does the IP address indicate both the network and the host address? What is used to identify each part of the address?

An IP address expresses the network and host through the use of a subnet mask. You can identify each part of the address through the octets, with numbers between 1-255.

What is the address class of IP address 133.66.155.189?

Class B

What is the default subnet mask for the IP address 166.88.1.45? What is the network address? What is the host address?

The default subnet mask is 255.255.0.0. The host is 1.45.

What happens to the MAC address when you move a computer to another network?

Stays the same.

What is the first layer of OSI?

Physical

What is the second layer of OSI?

Data Link

What is the third layer of OSI?

Network

What is the fourth layer of OSI?

Transport

What is the fifth layer of OSI?

Session

What is the sixth layer of OSI?

Presentation

What is the seventh layer of OSI?

Application

What port(s) does File Transferr Protocol (FTP) use?

Port 21

What port(s) does Dynamic Host Configuration Protocol (DHCP) use?

Ports 67 and 68

What port(s) does Hypertext Transfer Protocol (HTTP) use?

Port 80

What port(s) does Internet Message Access Protocol (IMAP) use?

Port 143

What port(s) does Simple Network Management Protocol (SNMP) use?

Ports 161 and 162

What port(s) does Hypertext Transfer Protocol Secure (HTTPS) use?

Port 443

What port(s) does Secure Shell Protocol (SSH) use?

Port 22

What port(s) does Simple Mail Transfer Protocol (SMTP) use?

Port 25

What port(s) does Post Office Protocol 3 (POP3) use?

Port 110

What port(s) does Telnet Protocol use?

Port 23

What port(s) does Secure File Transfer Protocol (SFTP) use?

Port 22

What port(s) does Domain Name System (DNS) Protocol use?

Port 53

What port(s) does Remote Desktop Protocol (RDP) use?

Port 3389

What port(s) does Lightweight Directory Access Protocol (LDAP) use?

Ports 389 and 636

What port(s) does Sever Message Block (SMB) Protocol use?

Port 445

What port(s) does Service Location Protocol (SLP) use?

Port 427

What port(s) does Apple Filing Protocol (AFP) use?

Port 548

Which protocol in IPsec provides both authentication and encryption?

Encapsulation Security Payload (ESP) is a part of IPsec which provides both authentication and encryption. The Authentication Header (AD) only provides authentication, not encryption.

Your purchasing department has purchased new 802.11ac wireless routers. You want to make sure all of your wireless devices are compatible with his new router. Besides 802.11ac, which warless standards will work with these wireless routers?

802.11ac runs on the 5GHz frequency. Thus, 802.11a and 802.11n devices will work within this wireless network.

You need to connect three wireless networks together: an 802.11a, an 802.11g, and an 802.11n. Which wireless tool should you use to accomplish this task?

A wireless bridge enables the connectivity of different wireless networking standards. Wireless network adapters connect clients to WAPs.

Which role needs to be added to Windows Server 2016 in order to enable routing through the server?

In order for routing to be added to a Windows server, the Remote Access role needs to be installed.

You need to find the MAC address of the network adapter for the computer you are currently working on. What command will give you the information you need?

The ipconfig/all command lists in-depth IP address information in the command line.
Ipconfig by itself only shows the IP address, subnet mask, and gateway address, not the MAC address. Arp by itself and without a switch will simply show the arp help file.

You need to set up a group of IPv6 network interfaces in such a way that each packet is delivered to each interface. You should implement a(an) _____address.

Multicast addresses are assigned to a group of interfaces and the packets are sent to every interface.

What is the local loopback address of IPv6?

::1

Which file resolves NetBIOS names to IP addresses?

The LMHOSTS file resolves NetBIOS names to IP addresses. WINS is a service that resolves NetBIOS names to IP addresses. DNS and HOST files resolve hostnames to IP addresses.

Which data transmission method uses a private tunnel over a public network?

A Virtual Private Network (VPN) is a private network that uses public means, usually the Internet, to transmit data. Layer 2 Tunneling Protocol (L2TP) and Point-to-Point (PPTP) are both protocols used within a VPN. IPsec is an encryption suite used in con

What is true about Microsoft security zones?

Internet Explorer has four security zones: Internet, Local intranet, Trusted sites, or Restricted sites.
The default security level for Internet is Medium High. The default security level for Local intranet and Trusted sites is the same, which is Medium.

How many T1 lines are used for a full T3 connection?

28 T1 lines are used for a T3 connection. 16 E1 lines are used for an E3 connection.

Which IP address in a routing table signifies a default route?

0.0.0.0 signifies a default route. For any route not defined in a routing table, packets will be sent to the next hop on the 0.0.0.0 address, which is usually the default gateway.

Your IT Manager has asked you to identify and label a box of miscellaneous networking components. In the box is a cable wired as in the following image:

To determine the type of cable, look at the 8 colored wires that are visible through the clear-plastic connectors on both ends the cable. If the orange-white/orange and the green-white/green wire positions are swapped between one end and the other as seen

Tell if each statement is true or false:
*Microwave ovens tend to cause interference in wired networks.
*Fluorescent lighting can cause EMI.
*Cordless phones cause interference for wireless networks.

Microwave ovens and cordless phones can cause interference to signals in wireless networks. Fluorescent lighting tends to cause electromagnetic interference (EMI) in wired networks.

What is the port speed of Cat3?

10 Mbps

What is the port speed of Cat5?

100 Mbps

What is the port speed of Cat5e?

1 Gbps

What is the corresponding TCP/IP port to Point-to-Point Protocol (PPTP)?

Uses TCP/UDP port 1723

What is the corresponding TCP/IP port to Layer Two Tunneling Protocol (L2TP)?

Uses UDP port 1701

What is the corresponding TCP/IP port to Secure Socket Tunneling Protocol (SSTP)?

Uses TCP port 443 to pass traffic through firewalls and Web proxies that might block PPTP and L2TP/IPsec traffic.

What is the function of a Router?

Connects two networks using different protocols.

Ethernet

A technology used on Layer 1 of the OSI model to transmit data.

Layer 2 Switch

Uses MAC addressing to determine which port to forward a frame.

You are troubleshooting a friend's computer that will not connect to a specific website on the Internet, yet it can connect to other websites. You can connect to the website with no problems using your smartphone. Using a TCP/IP tool on your friend's comp

The results displayed are the entries in the computer's Domain Name Service (DNS) cache. The command used to display the DNS cache is ipconfig /displaydns.
When a user requests to connect to another computer, they typically enter a DNS name (or URL). This

What do A records do?

Resolve hostnames to 32-bit IP addresses, specifically IPv6 addresses.

What do AAAA records do?

Resolve hostnames to 128-bit IP addresses, specifically IPv6 addresses.

What does the ipconfig /release do?

Deletes an IP address bound to an interface.

What does the ipconfig /renew do?

Acquires an IP address from a DHCP server.

...

The net stat -a command shows information on listening and established ports. The netstat -p tcp command shows the same information but only for two connections.

Which DNS servers hold complete tables of mappings of Internet addresses to IP addresses?

Root

Your ISP recently installed a T1 line. What is the maximum throughput of a T1 line?

1.544 Mbps

Which type of wireless network does not have a centralized device, such as a wireless access point or wireless router?

Ad hoc. A peer-to-peer (P2P) wireless connection is a direct connection between two devices. An infrastructure network is a wireless network with a centralized device. A wireless bridge connects multiple wireless networks.

A ____ is a device that sets up different collision domains for each device connected to it, allowing the networked devices to run in Full Duplex without collisions.

Switch

Layer 3 Switching uses Logical Addresses such as ____ to determine the destination of the packet.

IP addresses

In Hyper-V, what is used to separate a virtual network with no Internet connection with one that has an Internet connection?

Virtual Switch

If a 16-port switch has all ports set to 100 Mbps, sharing the same chassis, what is the incoming backplane speed of the switch?

The incoming backplane speed for ports sharing the same chassis is the number of ports X the speed. In this case, 16 ports X 100 Mbps = 1.6 Gbps. The formula also works for outgoing backplane speed, thus the speed is not split between incoming and outgoin

Which type of route is manually configured by an administrator?

Static

You have been tasked with installing a routing protocol that monitors the network for routers that have changed their link state. Which routing protocol will accomplish this?

The Open Shortest Path First (OSPF) protocol monitors the network routers that have a link state change (for example, if a router has been turned on or off).

Which IEEE standard is used for wireless networks?

802.11

All of your users connect to Web sites using Internet Explorer. They usually type domain names such as www.microsoft.com. What protocol is initiated by default when they press Enter after typing the domain name?

HTTP, although HTTPS can both be used in the browser, it would have to be specifically typed before the domain name.

You need to set up 200 computers on a Class A private network. Which of the following network IDs meet all the criteria of a Class A private network?

The only Class A private network listed is 10.0.0.0 Although, 100.10.1.0 is Class A, it is a public network number though.

You are troubleshooting a server that needs to connect directly to the Internet. After you run an ipconfig /all, you discover the problem. The server has been auto-assigned the IPv6 address fe80::260:8ff:fec0:98d%4. The server won't connect to the Interne

Link-Local address. Link-local addresses are auto-assigned by windows so that computer on the LAN can easily communicate with each other. However, if a server needs to communicate directly with the Internet, it would need a global unicast address.

You can truncate IPv6 addresses to save time. The fully truncated version of 2001:4860:0000:2001:0000:0000:0000:0068

2001:4860:0:2001::68. The first group of 4 0s can be abbreviated as 0. The second group of 14 0s can be truncated as ::

You have just scanned the ports of your server and notice that port 3389 is open. What can you tell from this information?

Remote Desktop Services is running.

You work in the IT Department of a small corporation. The company's network is protected by a firewall and it provides several servers within a perimeter network for access by access by customers and partners. The layout of your network is similar to the

The Internet is a global system of interconnected computer networks that use the standard Internet protocol suite (TCP/IP) to link several billion devices worldwide. It is an international network of networks that consists of millions of private, public,

Which best describes a VPN?

A secure tunnel used to pass through the Internet.

Which two types of servers are typically placed in a perimeter network?

Servers that usually need to face both the private and public portions of a network (or internal and external) are often placed in a perimeter network, also known as the demilitarized zone, or the DMZ. Web servers and Email servers often need to face both