network + 1

  1. To identify resources by location on the Internet, you would use which addressing feature?
    - URLExplanation:When the browser user enters file requests by either "opening" a Web file (typing in a Uniform Resource Locator or URL) or clicking on a hypertext link, the browser builds an HTTP request and sends it to the Internet Protocol address indicated by the URL.
  2. . Which of the following provides a connectionless
    transport service?
    - UDP

    Explanation:

    • Protocols such as IPX, IP and UDP are considered to be
    • connectionless. They place the packet on the network and assume the address
    • will get it through. This is similar to the U.S. Mail system. When the
    • connectionless protocol is used, packet sequencing and sorting are handled at
    • higher levels. This allows faster delivery. Packets in connectionless service
    • are called datagrams.
  3. . Which of the following is a legal class B IP address?
    Correct Answer(s):

    - 128.17.29.62

    Explanation:

    • Remember, You can tell the Class of network address by
    • looking at the first octet of the IP address. \nClass A - ranges from 1 to 127\nClass
    • B - ranges from 128 to 191\nClass C - ranges from 192 to 223\n
  4. Which WI-Fi security protocol provides better
    protection?
    - WPA

    Explanation:

    • When WEP was found to be less secure than initially
    • anticipated Wi-Fi Protected Access was developed to enhance the security of
    • User Authentication using EAP, and add a more secure encryption method with
    • TKIP.
  5. Which of the following protocols is responsible for
    converting the hardware address 00-4A-2B-E9-AF-37 to an IP address?
    RARP

    Explanation:

    • When IP has a datagram to send, it has already been
    • informed by upper-layer protocols of the destination's address. However, IP
    • must also inform a Network Access protocol such as Ethernet or Token Ring, of
    • the destination's hardware address. If IP doesn't know the hardware address, it
    • uses the ARP protocol to find this information.
  6. An Ipv6 address for which uniqueness has been verified
    and from which unicast traffic can be sent and received is classified as which
    of the following?
    - Valid

    Explanation:

    • A Valid address is
    • an address for which uniqueness has been verified and from which unicast
    • traffic can be sent and received. The valid state covers both the preferred and
    • deprecated states.
  7. A protocol used to map an IP address to a physical MAC
    address is:
    • Remember, when IP has a datagram to send, it has already
    • been informed by upper-layer protocols of the destination's address. However,
    • IP must also inform a Network Access protocol such as Ethernet or Token Ring,
    • of the destination's hardware address. If IP doesn't know the hardware address,
    • it uses the ARP protocol to find this information.
  8. Which of the following are connectionless protocols?
    (Choose two)
    - TFTP

    - UDP

    Explanation:

    Remember, TFTP and UDP are connectionless, opting for speed over guaranteed delivery.
  9. 255.255.255.0 is the subnet mask for which class of IP
    network?
    - C

    Explanation:

    • The default subnet masks for Class A, B and C networks
    • are: \nClass A - 255.0.0.0\nClass B - 255.255.0.0\nClass C - 255.255.255.0\n
  10. Of the IEEE specifications listed, which is (are) capable
    of operating at 11Mbps? (choose all that apply)
    - 802.11b

    - 802.11a

    - 802.11g

    Explanation:

    • The highest speed an 802.11b can reach is 11Mbps. 802.11a
    • and 802.11g devices, while capable of higher speeds, will also communicate at
    • lower speeds.
  11. . Which of the following represents a mac
    address?
    - 00-E0-29-27-37-46

    Explanation:

    • MAC address are factory assigned hardware that are burned
    • into your device's ROM. They are hexidecimal numbers containing values from 0-9
    • and A-F. You may find these values separated by dashes or colons.
  12. Which routing method requires more administrative
    overhead?
    - Static

    Explanation:

    • Remember, with static routing you must manually enter the
    • address information as well as any changes.
  13. In an E-mail system, which of the following is the
    location of all user messages?
    - Post office

    Explanation:

    • Remember, the POP server is where inbound e-mail waits
    • until retrieved by the user.
Author
Anonymous
ID
46696
Card Set
network + 1
Description
network + 1
Updated