Network+ guide to networks 7th edition pdf download free






















When determining whether a local network has any NetBIOS traffic, do you use the nslookup utility in interactive mode or a packet analyzer such as Wireshark? Answer: A packet analyzer such as Wireshark. List three signaling protocols discussed in the chapter that are used for communicating multimedia data.

Answer: SIP, H. What version of the ping command do you use in Windows with IPv6 addresses? What version do you use on a Linux system? Answer: ping -6 Answer: ping6 When running a scan on your computer, you find that a session has been established with a host at the address Which protocol is in use for this session?

What command-line utility might you use to find out who the host is? Answer: nslookup can identify the domain name of the host at that IP address. However, the Web server needs a hardware upgrade and will be down for two days. Your network administrator has asked you to configure the router so that requests to the IP address What is the private IP address of the backup Web server? For the subnet masks, use the default subnet mask for a Class C IP address license.

Include appropriate comment lines in your table. A host has been overloading your Web server with a flood of requests and you want to investigate whether this is some kind of network attack. You look up the IP address on arin.

What should you do? Complain to the owner of the lacnic. What might happen if no organization were responsible for IP addressing on the Internet? Choose all that apply. Organizations might try to use the same ranges of IP addresses. Anyone could host their own Web server. Nothing would happen. The Internet would use another protocol besides IP. You look up an IP address on arin.

What does this mean? The two organizations share the IP address assignment. That IP address is currently involved in a network attack. The RIR made a mistake. One organization delegated the IP address to the second. What is a Regional Internet Registry responsible for?

Maintaining Internet connectivity b. Assigning IP addresses d. Signing up users with ISP accounts 5. In which of the following situations would it be useful to contact the owner of an IP address? A host outside your network has been attempting to log on to your servers without your permission. A host inside your network has been attempting to log on to your servers without your permission. A host outside your network has been attempting to send large amounts of unsolicited commercial email or spam.

A host outside your network has been accessing your Web site once an hour. Lab 2. Which of the following information is included in the results of the ping command? The operating system used by the remote computer b. The IP address or name of the remote computer c. The number of packets that were lost d. The time it took for the reply to be received 2. How can you verify that two hosts are connected and communicating properly?

From one host, run the ping command to the other host. From a third host, run the ping command to both hosts. Run the arp command on both hosts. Run the ipconfig command on both hosts. What protocol does the ping command use? UDP c. ICMP d. ARP 5. Why might this be useful to a network administrator? However, DHCP is rarely used to assign addresses for servers. DHCP is too expensive. DHCP is not scalable enough.

It would be more difficult for a client to find a server if its IP address changes. What is the class of network that you configured in this activity?

Class A. Class D 2. What is the purpose of a subnet mask? To indicate which protocols a particular network uses b. To further subdivide a network c. To mask, or prevent access to the whole network d. To limit the protocols used in a particular network 3. A network has a subnet mask of How many usable IP addresses are available for network hosts?

This address is reserved for multicast. This address is reserved for experimental uses. This address describes the network. This address is the broadcast address. Which of the following commands can you use in Windows to display information about the subnet mask configured for a particular NIC? What was the IP address the Windows computer obtained in Step 23? A: Answers will vary, but should be between When does the DHCP lease you obtained in this lab expire? Which of the following are valid methods of assigning IP addresses to workstations, servers, and network devices?

Manual configuration b. DHCP c. BOOTP d. POST 4. You would like to assign a WINS server to each workstation. Can you accomplish this via DHCP? A: Yes. Your colleague placed a second DHCP server on the network by mistake.

What might happen as a result? The second DHCP server might give out incorrect settings to its clients. You might need to configure IP addresses on some hosts manually. Which of the following information could not be given out by a DHCP server? WINS server address b.

DNS server address c. Default gateway d. Additional network protocols to be used. All of the following configuration information can be supplied by a DHCP server. IP address b. Subnet mask c. DNS servers d. Default gateway. What is the purpose of a name server? To maintain the MAC address database for an entire zone b. To supply clients with IP address resolution for requested hosts c.

What is the term for the group of devices that a name server manages? Hierarchy b. Tree c. Zone d. Directory 3. Which of the following are examples of top-level domains? When a DNS server retrieves the host name associated with an IP address, what type of lookup is it accomplishing? Forward b. Adjacent c.

Backward d. Reverse 5. What is one advantage of using DNS instead of hosts files? DNS does not require manual updating of files on multiple networked nodes.

DNS is more compatible with Linux systems. Using DNS is more secure than using hosts files. On what Transport layer protocol does FTP rely? TCP b. NTP 3. What is the term for an FTP site that allows any user to access its directories?

Anonymous b. Restricted c. Private d. Unlimited 4. What command allows you to list the contents of a directory on an FTP server? What two file types can you specify when transferring files via FTP?

ASCII and binary b. Alphabetical and numeric c. Program and data d. Dynamic and static. What symbol is used to separate the computer name from the port number in a URL assuming that IP version 4 is in use? What is the default port number for the Telnet service? What is the default port number for the HTTP service? What range of port numbers comprises the well-known port numbers?

What is a socket? A method of identifying the IP addresses belonging to clients as they connect to servers c. A logical address assigned to a specific process running on a computer d. A discrete unit of data. Which of the following addresses could represent the SMTP service using its default port on a mail server? Overview In Chapter 1, students learned that the OSI model can be used describe just about every aspect of networking.

In this chapter, students learn the several methods used to address and find software, computers, and other devices on a network. They will take a top-down approach to the OSI model as they explore these topics, starting at the Application layer and working their way down to the Data Link layer.

At the end of this chapter, they will learn how to troubleshoot addressing problems by using an OSI top-down or bottom-up approach to solving the problem. Teaching Tips Overview of Addressing on Networks 1. Give students a quick overview of the four addressing methods, starting at the top of the OSI model. Describe the two components of a MAC address: a. Block ID b. Device ID 4. Note the use of hexadecimal notation to represent the MAC address.

Explain how this is great for computers; however, most people can remember words better than numbers. Define and explain a domain name. Explain how domain names are registered. Use Table to illustrate some well-known top-level domains. Legacy Networking: Host Files 1. Use Figure to illustrate an example of a host file. Define and describe a namespace. Define and describe name servers. This book explains technical concepts logically and in a clear, approachable style. These real-world examples, along with Applying Concepts activities, Hands-On Projects, and Case Projects in each chapter, make this book a practical learning tool.

The numerous tables and illustrations, along with the glossaries, appendices, and study questions, make the book a valuable reference for any networking professional. Do you like this book? Please share with your friends, let's read it!! Search Ebook here:.

Book Preface Knowing how to install, configure, and troubleshoot a computer network is a highly marketable and exciting skill.



0コメント

  • 1000 / 1000