Chapter 15: Connecting to and Setting up a Network

Unlock all answers in this set

Unlock answers
question
How many bits are in a MAC address?
answer
48 bit
question
How many bits are in an IPv4 IP address? In an IPv6 address?
answer
32 bit, 128 bit
question
How does a cllient application identify a server application on another commputer on the network?
answer
Transmission Control Protocol/Internet Protocol
question
What are IP addresses called that begin with 10, 172.16, or 192.168?
answer
private IP addresses
question
In what class is the IP address 185.75.255.10?
answer
Class B
question
In what class is the IP address 193.200.30.5?
answer
Class C
question
Describe the difference between public and private IP address. If a network is using private IP address, how can the computers on that network access the Internet?
answer
The IP addresses available to the internet are called public IP addresses. A company conserves its publec IP address by using private IP addresses that are not allowed on the internet. A computer using a private IP address on a private network can still aaccess thhe Internet if a routter or other device thatt stands between the netwrrok and tthe Internet is using NAT Network Address Translation.
question
Why is it unlikely that you will find the IP address 192.168.250.10 on the Internet?
answer
...
question
In Figure 15-9, the subnet mask is four notches tall and is considered a classless subnet mask for this network of sticks. How many notches tall wouldd be a classful subnet mask for the same network?
answer
...
question
If no DHCP server is available when a computer connfigured for dynamic IP addressing connects to the network, what type of IP address is assigned of 169.254.1.11, what can you assume about how it received that IP address?
answer
It uses an Automatic Private IP Address APIPA
question
If a computer is found to have an IP address of 169.254.1.1, what can you assume about how it received that IP address?
answer
...
question
What are the last 64 bits of a IPv6 address called? How are these bits used?
answer
...
question
Name at least three tunnelling protocols that aaure used for IIPv6 packets to travel over an IPv4 network.
answer
...
question
HOw iss an IPv6 IP address used that begins with 2000::? That beegins wwith FEE80::?
answer
...
question
How many bits are in the Subnet ID block? What are the value of these bits for a link-local IP address?
answer
...
question
Which type of IPv6 address is uused to create multiple ssites with a llarge organization?
answer
...
question
What type of server serves up IP address to computer on a network?
answer
...
question
Which TCP/IP protocol that manages ppacket delivery guaranttees thatt dllelivery? Which protoocol does not guarantees delivery, but is faster?
answer
...
question
At what port does an SMTP email server listen to receive email from a client computer?
answer
...
question
Which protocol does a web server use when transmissions are encrypted for security?
answer
...
question
What type of server resolves fully qualified domain namess to IP addresses?
answer
...
question
Which email protocol allows a client application to manage email stored on an email server?
answer
...
question
What type of protocol is used to present a ppublic IPP address to ccomputters outside the LAN to handlle requests to use the Internett from computeers inside the LAN?
answer
...
question
Which protocol is used when an application queeries a database on a corporate network such as a database of printers?
answer
...
question
What type oof encryptiion protocol does Secure FTP SFTP use to secure FTP transsmissions?
answer
...
question
What two Windows aapplications use the RDDP protocol and port 3389?
answer
...
question
Which version of 802.11 techhnologies can usee twoo antennas at bboth the access point and the network adapter?
answer
...
question
Which wireless encryption standard is sstronger, WEP, WPA?
answer
...
question
When securing a Wi-Fi WIRELESS NETWORK,, WHICH IS cconsidered better security: to filter MAC addrresses, use encryption, or not broadcast the SSID?
answer
...
question
Would you expect WPS to be used when wireless network is using strong security, weak securrity, or no seccurity as in a public hotspot?
answer
...
Get an explanation on any task
Get unstuck with the help of our AI assistant in seconds
New