Term
1. What port number is used by a Web server process to listen to incoming requests?
A. 21
B. 22
C. 80
D. 81
|
|
Definition
|
|
Term
Which of the following protocols is used by Email servers to exchange messages with one another?
A) SMTP
B) IMAP
C) POP |
|
Definition
A,
SMTP
(Simple Mail Transfer Protocol) |
|
|
Term
Microsoft Exchange server is an example of a ____.
A) Mail Server
B) File Server
C) Web Server
D) Print Server |
|
Definition
|
|
Term
Microsoft IIs is an example of a ____.
A) Mail Server
B) File Server
C) Web Server
D) Print Server |
|
Definition
|
|
Term
What command do you use to see the DNS cache on a Windows system?
A) ping dnscache
B) nsloookup cache
C) ipconfig/displaydns |
|
Definition
|
|
Term
Which type of DNS record is used by mail servers to determine where to send email?
A) Type A record
B) Type CNAME record
C) Type SMTP record
D) Type MX record |
|
Definition
D,
MX record.
SMTP is the protocol used to access the record! |
|
|
Term
____ is the transport layer protocol responsible for reliable delivery of data.
A) UDP
B) TCP
C) FTP |
|
Definition
B,
TCP ensures reliable delivery of data. |
|
|
Term
____ is a name-to-address resolution protocol.
A) DNS
B) HTTP
C) DHCP |
|
Definition
A,
DNS (Domain Name System). |
|
|
Term
FTP is based on ____.
A) TCP
B) UDP |
|
Definition
A,
TCP is the primary protocol used by FTP (File Transfer Protocol) |
|
|
Term
Which of the following does NOT use TCP as its transport protocol?
A) HTTP
B) E-mail
C) FTP
D) Real-time multimedia applications |
|
Definition
D,
Real-time multipmedia "applications," are on the Application Layer (not Transport Layer like TCP) and thusly use the UDP (Userdatagram Protocol) protocol |
|
|
Term
Which of the following protocols is used by the ping command?
A) HTTP
B) FTP
C) ICMP
D) SMTP |
|
Definition
C,
Internet Control Message Protocol.
Used to relay error messages within networks to the NOS. |
|
|
Term
An IP address is divided into 2 distinct parts:
- one part designates the logical network the computer is a part of
- the remainder of the address represents the ______
A) Domain Name
B) Host ID
C) Subnet Mask |
|
Definition
|
|
Term
Which of the following is the most accurate value of 1GB (gigabyte)?
A) 106 bytes
B) 109 bytes
C) 210 bytes
D) 220 bytes |
|
Definition
B,
109 bytes
1,000,000,000 |
|
|
Term
Which of the following is a valid subnet mask?
A) 255.252.255.0
B) 255.255.252.255
C) 255.255.128.0
D) 128.128.128.0 |
|
Definition
|
|
Term
Given a CIDR address of 192.168.220.0/25, what is the subnet mask of it?
A) 192.168.220.25
B) 192.168.220.0
C) 255.255.255.25
D) 255.255.255.128
|
|
Definition
D,
255.255.255.128, because:
192.168.220.0/25
1) 32 - 25 = 7
2) 27 = 128 is the subnet mask
|
|
|
Term
In subnet 192.168.220.0/28, there are totally ___ addresses that can be allocated to hosts.
A) 4
B) 14
C) 16
D) 28 |
|
Definition
C,
16, because:
192.168.220.0/28
1) 32 - 28 = 4
2) 24 = the subnet mask
3) 24 - 2 = 16, total # of addresses that can be allocated, because 2 are always reserved. |
|
|
Term
An IPv4 address is ___ bits long.
A) 32
B) 64
C) 128
D) 256 |
|
Definition
A,
IPv4 = 32 bits long
(IPv6 = 128 bits long) |
|
|
Term
An IPv6 address is ___ bits long.
A) 32
B) 64
C) 128
D) 256 |
|
Definition
C,
IPv6 = 128 bits long
(IPv4 = 32 bits long)
|
|
|
Term
There are totally _____ IP addresses in IP IPv4's address space.
A) 32
B) 2 x 32
C) 232
D) 322 |
|
Definition
|
|
Term
The users on your network haven't been able to connect to the server for 30 minutes. You checked and reboot the servers, but it's unable to PING either its own loopback address or any of your client system. What should you do?
A) Restart the DNS server
B) Replace the NIC on the server, because it has failed.
C) Ping the server from the client computers. |
|
Definition
B,
Replace the NIC on the server, because it has failed. |
|
|
Term
In TCP/IP protocol suite, TCP stands for __________, and IP stands for __________. |
|
Definition
TCP stands for Transmission Control Protocol.
IP stands for Internet Protocol. |
|
|
Term
|
Definition
Simple Mail Transfer Protocol |
|
|
Term
|
Definition
|
|
Term
If a computer uses the address 192.168.127.4 and a subnet mask of 255.255.254.0, it means that the first _____ bits are the network portion, and the remaining _____ bits contain the host ID portion. |
|
Definition
The first 23 bits are the network portion,
The remaining 9 bits are the host ID portion
|
|
|
Term
Convert binary number 00001010 to its decimal number |
|
Definition
00001010
step 1) 7 6 5 4 3 2 1 0
step 2) 0 0 0 0 1 0 1 0
23 + 21 = (8) + (2) = 10 |
|
|
Term
Convert decimal number 25 to a binary number: |
|
Definition
answer remainder position
25/2 12.5 1 0th
12/2 6 0 1st
6/2 3 0 2nd
3/2 1.5 1 3rd
1/2 0.5 1 4th
0/2 0 0 5th
0/2 0 0 6th
0/2 0 0 7th
Step 2) re-align:
position
7 6 5 4 3 2 1 0
0 0 0 1 1 0 0 1
Step 3) Calculate:
24 + 23 + 20= (16) + (8) + (1) = 25 |
|
|
Term
Host A has a CIDR format IP address of 192.168.131.129/25, and host B has a CIDR format IP address of 192.168.131.192/25.
Do these 2 hosts belong to the same subnet? |
|
Definition
Yes...
192.168.131.10000001
192.168.131.11000000 |
|
|