Exam 3: Addressing on Networks

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Which of the following IPv6 addresses represents a global unicast address?

(Multiple Choice)
4.9/5
(41)

An IPv6 address consists of 128 bits that are written as 10 blocks of hexadecimal numbers separated by colons.

(True/False)
4.8/5
(46)

What does the MX record do in a forward DNS zone?

(Multiple Choice)
4.8/5
(32)

Which of the following is NOT a range of IP addresses recommended for use in private networks?

(Multiple Choice)
4.9/5
(39)

Your supervisor has asked you to configure a new prototype network with a dual stack configuration. What does this mean?

(Multiple Choice)
4.8/5
(38)

ICANN is responsible for restrictions on use of the .com, .org, and .net TLDs.

(True/False)
4.9/5
(34)

You are setting up a DNS zone and have been asked to create SPF and DKIM records. What type of DNS record will hold this information?

(Multiple Choice)
4.8/5
(42)

What utility is used to verify that TCP/IP installed, bound to the NIC, configured correctly, and communicating with the network?

(Multiple Choice)
4.8/5
(30)

The FTP protocol utilizes UDP, while TFTP uses TCP for data transmission.

(True/False)
4.8/5
(39)

When using IPv6, two or more nodes on the same link are said to be neighbors.

(True/False)
4.7/5
(34)

What is the difference between a port and a socket?

(Essay)
4.8/5
(35)

How might an organization configure a DNS server for use on their network?

(Essay)
4.8/5
(34)

What statement regarding the Server Message Block protocol is accurate?

(Multiple Choice)
4.9/5
(41)

What command can be used to check a domain computer's time source from a Command Prompt window?

(Multiple Choice)
4.8/5
(39)

Why are the Class D and Class E IPv4 address ranges not available for general use?

(Essay)
4.8/5
(26)

The 1024 - 65535 range of ports is also known as the "well-known" range.

(True/False)
4.7/5
(32)

What text editor can be used on Linux to view and edit the contents of a configuration file?

(Multiple Choice)
4.9/5
(35)

Encrypted control of remote computers using the RDP protocol is accomplished using what port number?

(Multiple Choice)
4.9/5
(37)

UDP port 123 is utilized by the Network Time Protocol service.

(True/False)
4.9/5
(32)

Which of the following IP addresses would be a loopback IP address?

(Multiple Choice)
4.7/5
(34)
Showing 21 - 40 of 50
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)