Review Questions

1. 

The main advantage of the TCP/IP protocol is ___________________.

  1. Ease of setup

  2. Interfaces without regard to operating system

  3. Not routable

  4. Can be exported to other countries

b.the main advantage is that the tcp/ip protocol stack is available for just about every operating system. although tcp/ip is easy to set up and can be exported, these are not the primary reasons that tcp/ip enjoys such popularity.

2. 

Which feature listed below is not available in NetBEUI/NetBIOS?

  1. It is self-tuning.

  2. It is fast in small networks.

  3. It requires little configuration.

  4. It is routable.

d.the netbeui/netbios protocol stack does not contain a network layer routing protocol, as it was intended for lan use only and, as such, cannot be routed.

3. 

The Class B address range for the first octet is ___________________.

  1. 1–127

  2. 128–191

  3. 192–223

  4. 224–255

b.the range of the numbers for the first octet in a class b ip addressing scheme is 128 191. the range of 1 127 is for class a, 192 223 is for class c, and 224 255 is reserved for other classes and purposes.

4. 

What does a subnet mask separate?

  1. Network ID and host ID

  2. Workgroups from each other

  3. Host IDs

  4. All the above

a.the purpose of a subnet mask is to separate the network portion and the host portion of an ip address. in the internet protocol addressing scheme, it is a group of selected bits whose values serve to identify a subnetwork. all members of the subnetwork share the mask value. once each portion is identified using the mask, members of each subnet can be referenced more easily.

5. 

HTTP usually connects to a web server on port number __________.

  1. 21

  2. 25

  3. 80

  4. 147

c.port 80 is the tcp port number used to initiate http connections between web client (browser) and web server. port 23 is used for telnet, port 25 is used for smtp, and port 147 is used for other ip communications.

6. 

The port number for POP3 mail is ___________________.

  1. 25

  2. 80

  3. 100

  4. 110

d.the tcp port number used to initiate connections between pop3 clients and servers is 110. as previously mentioned, port 25 is used for smtp, and port 80 is used for http connections. port 100 is not normally used in typical internet communications.

7. 

FTP usually connects to the server on port number _______________.

  1. 21

  2. 25

  3. 80

  4. 110

a.ftp clients connect to ftp servers using tcp port 21. as already mentioned, port 25 is used for smtp, port 80 is used for http, and port 110 is used for pop3 mail communications.

8. 

Internet mail is sent between mail servers via which protocol?

  1. SNMP

  2. SMTP

  3. POP

  4. Telnet

b.internet e-mail servers send mail between themselves using the smtp protocol. the snmp protocol is used for the management and monitoring of various network devices. the pop protocol is used to download e-mail from mail servers. telnet is used for remote terminal emulation.

9. 

What is the default subnet mask for a Class C address?

  1. 255.0.0.0

  2. 255.255.0.0

  3. 255.255.255.0

  4. 255.255.255.255

c.255.255.255.0 is the default subnet mask for a class c address, 255.0.0.0 is the default for a class a, 255.255.0.0 is the default for class b, and 255.255.255.255 is the universal broadcast address.

10. 

Network Address Translation, or NAT, is found in _______________.

  1. Windows 3.x

  2. Windows 98

  3. NIC protocol drivers

  4. Routers

d.most often, nat is used in routers and internet gateways to translate between two different ip addresses.

11. 

DHCP is an acronym for ___________________.

  1. Dynamic Host Carrier Protocol

  2. Dynamic Host Configuration Protocol

  3. Dynamic Host Client Protocol

  4. Dynamic Host Control Protocol

b.the only correct acronym expansion for dhcp is dynamic host configuration protocol. on a tcp/ip-based network, dhcp is used to get information about a client s host (i.e., a network node s) configuration from a dhcp server, which is a specially designated network node.

12. 

Which protocol is considered connection-oriented?

  1. DDP

  2. TCP

  3. NetBEUI

  4. UDP

b.of those listed, the only one that maintains a virtual connection is tcp. udp and netbeui are both connectionless, and ddp is a fictitious protocol.

13. 

Which of the following is a feature of IPX? (Choose all that apply.)

  1. Connection-oriented

  2. Very efficient

  3. No addressing problems

  4. Excellent scaling without performance issues

b, c, d.ipx is an efficient, self-addressing, scalable protocol. it is not, however, connection-oriented. ipx is, in fact, a connectionless protocol.

14. 

SMTP normally operates through port number _________________.

  1. 21

  2. 25

  3. 80

  4. 110

b.smtp initiates connections between servers using tcp port number 25.

15. 

FQDN is an acronym for ___________________.

  1. Fully Qualified Division Name

  2. Fully Qualified DNS Name

  3. Fully Qualified Dynamic Name

  4. Fully Qualified Domain Name

d.the correct acronym expansion for fqdn is fully qualified domain name. the fqdn is the complete name of an internet host (e.g., www.sybek.com ) that is used when referencing a host from outside that host s lan.

16. 

What delimiter separates domain spaces?

  1. : (colon)

  2. # (pound)

  3. ~ (tilde)

  4. . (period)

d.domain names are normally separated by a period (.). an example of this syntax would be www.sybek.com .

17. 

Which of the following is used to begin a comment in a HOSTS file?

  1. : (colon)

  2. # (pound)

  3. ~ (tilde)

  4. . (period)

b.when inserting comments into a hosts file, you must use a pound sign (#) to begin each comment line. this is done so that you can make notes about changes made.

18. 

FTP is the abbreviation for ___________________.

  1. Formal Transfer Protocol

  2. Full Transfer Protocol

  3. Final Transfer Protocol

  4. File Transfer Protocol

d.the proper expansion of ftp is file transfer protocol. the acronym is more commonly used when referring to file-transferring protocols. there can be several protocols for transferring files between machines and/or networks. for example, ftam provides file-transfer service for networks that use the osi reference model, and ftp provides these services for tcp/ip protocols.

19. 

Which of the following is not a feature of a proxy server?

  1. It can reduce Internet traffic requests.

  2. It can assist with security.

  3. It can reduce user wait time for a request.

  4. It can convert a nonroutable protocol to a routable protocol.

d.proxy servers act on behalf of clients to provide internet access and other internet services. generally speaking, however, a proxy server does not convert a nonroutable protocol to a routable protocol.

20. 

What is the primary purpose of a VLAN?

  1. Demonstrating the proper layout for a network

  2. Simulating a network

  3. Segmenting a network inside a switch or device

  4. Connecting a LAN to another LAN

c.virtual lans allow a network to be segmented virtually, inside a network switch or device, so that several ports are grouped together and function collectively as a network segment.

Answers

1. 

B.  The main advantage is that the TCP/IP protocol stack is available for just about every operating system. Although TCP/IP is easy to set up and can be exported, these are not the primary reasons that TCP/IP enjoys such popularity.

2. 

D.  The NetBEUI/NetBIOS protocol stack does not contain a Network layer routing protocol, as it was intended for LAN use only and, as such, cannot be routed.

3. 

B.  The range of the numbers for the first octet in a Class B IP addressing scheme is 128–191. The range of 1–127 is for Class A, 192–223 is for Class C, and 224–255 is reserved for other classes and purposes.

4. 

A.  The purpose of a subnet mask is to separate the network portion and the host portion of an IP address. In the Internet Protocol addressing scheme, it is a group of selected bits whose values serve to identify a subnetwork. All members of the subnetwork share the mask value. Once each portion is identified using the mask, members of each subnet can be referenced more easily.

5. 

C.  Port 80 is the TCP port number used to initiate HTTP connections between web client (browser) and web server. Port 23 is used for Telnet, port 25 is used for SMTP, and port 147 is used for other IP communications.

6. 

D.  The TCP port number used to initiate connections between POP3 clients and servers is 110. As previously mentioned, port 25 is used for SMTP, and port 80 is used for HTTP connections. Port 100 is not normally used in typical Internet communications.

7. 

A.  FTP clients connect to FTP servers using TCP port 21. As already mentioned, port 25 is used for SMTP, port 80 is used for HTTP, and port 110 is used for POP3 mail communications.

8. 

B.  Internet e-mail servers send mail between themselves using the SMTP protocol. The SNMP protocol is used for the management and monitoring of various network devices. The POP protocol is used to download e-mail from mail servers. Telnet is used for remote terminal emulation.

9. 

C.  255.255.255.0 is the default subnet mask for a Class C address, 255.0.0.0 is the default for a Class A, 255.255.0.0 is the default for Class B, and 255.255.255.255 is the universal broadcast address.

10. 

D.  Most often, NAT is used in routers and Internet gateways to translate between two different IP addresses.

11. 

B.  The only correct acronym expansion for DHCP is Dynamic Host Configuration Protocol. On a TCP/IP-based network, DHCP is used to get information about a client’s host (i.e., a network node’s) configuration from a DHCP server, which is a specially designated network node.

12. 

B.  Of those listed, the only one that maintains a virtual “connection” is TCP. UDP and NetBEUI are both connectionless, and DDP is a fictitious protocol.

13. 

B, C, D.  IPX is an efficient, self-addressing, scalable protocol. It is not, however, connection-oriented. IPX is, in fact, a connectionless protocol.

14. 

B.  SMTP initiates connections between servers using TCP port number 25.

15. 

D.  The correct acronym expansion for FQDN is Fully Qualified Domain Name. The FQDN is the complete name of an Internet host (e.g., www.sybek.com) that is used when referencing a host from outside that host’s LAN.

16. 

D.  Domain names are normally separated by a period (.). An example of this syntax would be www.sybek.com.

17. 

B.  When inserting comments into a HOSTS file, you must use a pound sign (#) to begin each comment line. This is done so that you can make notes about changes made.

18. 

D.  The proper expansion of FTP is File Transfer Protocol. The acronym is more commonly used when referring to file-transferring protocols. There can be several protocols for transferring files between machines and/or networks. For example, FTAM provides file-transfer service for networks that use the OSI reference model, and FTP provides these services for TCP/IP protocols.

19. 

D.  Proxy servers act on behalf of clients to provide Internet access and other Internet services. Generally speaking, however, a proxy server does not convert a nonroutable protocol to a routable protocol.

20. 

C.  Virtual LANs allow a network to be segmented virtually, inside a network switch or device, so that several ports are grouped together and function collectively as a network segment.




Network+ Study Guide
Network+ Study Guide
ISBN: 470427477
EAN: N/A
Year: 2002
Pages: 151

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net