|
|
1. | The main advantage of the TCP/IP protocol is ___________________.
|
|
2. | Which feature listed below is not available in NetBEUI/NetBIOS?
|
|
3. | The Class B address range for the first octet is ___________________.
|
|
4. | What does a subnet mask separate?
|
|
5. | HTTP usually connects to a web server on port number __________.
|
|
6. | The port number for POP3 mail is ___________________.
|
|
7. | FTP usually connects to the server on port number _______________.
|
|
8. | Internet mail is sent between mail servers via which protocol?
|
|
9. | What is the default subnet mask for a Class C address?
|
|
10. | Network Address Translation, or NAT, is found in _______________.
|
|
11. | DHCP is an acronym for ___________________.
|
|
12. | Which protocol is considered connection-oriented?
|
|
13. | Which of the following is a feature of IPX? (Choose all that apply.)
|
|
14. | SMTP normally operates through port number _________________.
|
|
15. | FQDN is an acronym for ___________________.
|
|
16. | What delimiter separates domain spaces?
|
|
17. | Which of the following is used to begin a comment in a HOSTS file?
|
|
18. | FTP is the abbreviation for ___________________.
|
|
19. | Which of the following is not a feature of a proxy server?
|
|
20. | What is the primary purpose of a VLAN?
|
|
Answers
1. | B. The main advantage is that the TCP/IP protocol stack is available for just about every operating system. Although TCP/IP is easy to set up and can be exported, these are not the primary reasons that TCP/IP enjoys such popularity. |
2. | D. The NetBEUI/NetBIOS protocol stack does not contain a Network layer routing protocol, as it was intended for LAN use only and, as such, cannot be routed. |
3. | B. The range of the numbers for the first octet in a Class B IP addressing scheme is 128–191. The range of 1–127 is for Class A, 192–223 is for Class C, and 224–255 is reserved for other classes and purposes. |
4. | A. The purpose of a subnet mask is to separate the network portion and the host portion of an IP address. In the Internet Protocol addressing scheme, it is a group of selected bits whose values serve to identify a subnetwork. All members of the subnetwork share the mask value. Once each portion is identified using the mask, members of each subnet can be referenced more easily. |
5. | C. Port 80 is the TCP port number used to initiate HTTP connections between web client (browser) and web server. Port 23 is used for Telnet, port 25 is used for SMTP, and port 147 is used for other IP communications. |
6. | D. The TCP port number used to initiate connections between POP3 clients and servers is 110. As previously mentioned, port 25 is used for SMTP, and port 80 is used for HTTP connections. Port 100 is not normally used in typical Internet communications. |
7. | A. FTP clients connect to FTP servers using TCP port 21. As already mentioned, port 25 is used for SMTP, port 80 is used for HTTP, and port 110 is used for POP3 mail communications. |
8. | B. Internet e-mail servers send mail between themselves using the SMTP protocol. The SNMP protocol is used for the management and monitoring of various network devices. The POP protocol is used to download e-mail from mail servers. Telnet is used for remote terminal emulation. |
9. | C. 255.255.255.0 is the default subnet mask for a Class C address, 255.0.0.0 is the default for a Class A, 255.255.0.0 is the default for Class B, and 255.255.255.255 is the universal broadcast address. |
10. | D. Most often, NAT is used in routers and Internet gateways to translate between two different IP addresses. |
11. | B. The only correct acronym expansion for DHCP is Dynamic Host Configuration Protocol. On a TCP/IP-based network, DHCP is used to get information about a client’s host (i.e., a network node’s) configuration from a DHCP server, which is a specially designated network node. |
12. | B. Of those listed, the only one that maintains a virtual “connection” is TCP. UDP and NetBEUI are both connectionless, and DDP is a fictitious protocol. |
13. | B, C, D. IPX is an efficient, self-addressing, scalable protocol. It is not, however, connection-oriented. IPX is, in fact, a connectionless protocol. |
14. | B. SMTP initiates connections between servers using TCP port number 25. |
15. | D. The correct acronym expansion for FQDN is Fully Qualified Domain Name. The FQDN is the complete name of an Internet host (e.g., www.sybek.com) that is used when referencing a host from outside that host’s LAN. |
16. | D. Domain names are normally separated by a period (.). An example of this syntax would be www.sybek.com. |
17. | B. When inserting comments into a HOSTS file, you must use a pound sign (#) to begin each comment line. This is done so that you can make notes about changes made. |
18. | D. The proper expansion of FTP is File Transfer Protocol. The acronym is more commonly used when referring to file-transferring protocols. There can be several protocols for transferring files between machines and/or networks. For example, FTAM provides file-transfer service for networks that use the OSI reference model, and FTP provides these services for TCP/IP protocols. |
19. | D. Proxy servers act on behalf of clients to provide Internet access and other Internet services. Generally speaking, however, a proxy server does not convert a nonroutable protocol to a routable protocol. |
20. | C. Virtual LANs allow a network to be segmented virtually, inside a network switch or device, so that several ports are grouped together and function collectively as a network segment. |
|
|