Exam 2: How Computers Find Each Other on Networks

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Describe the two different types of NAT.

Free
(Essay)
4.9/5
(25)
Correct Answer:
Verified

Two variations of NAT you need to be aware of are:
SNAT- Using Static Network Address Translation (SNAT),the gateway assigns the samepublic IP address to a host each time it makes a request to access the Internet.This methodworks well when a local host is running a server that is accessed from the Internet.It' sused on home networks that have only a single public IP address provided by an ISP.DNAT or Dynamic NAT- Using Dynamic Network Address Translation (DNAT),thegateway has a pool of public IP addresses that it is free to assign to a local host wheneverthe local host makes a request to access the Internet.Large organizations that leasemany public IP addresses use DNAT.

What utility is used to verify that TCP/IP installed,bound to the NIC,configured correctly,and communicating with the network?

Free
(Multiple Choice)
4.8/5
(26)
Correct Answer:
Verified

C

Explain the three different tunneling protocols developed for transmission of IPv6 packets over or through an IPv4 network.

Free
(Essay)
4.9/5
(34)
Correct Answer:
Verified

Three tunneling protocols developed for IPv6 packets to travel over or through anIPv4 network are:
6to4is the most common tunneling protocol.IPv6 addresses intended to be used bythis protocol always begin with the same 16-bit prefix (called fixed bits),which is 2002and the prefix is written as 2002::/16.The next 32 bits of the IPv6 address are the 32bits of the IPv4 address of the sending host.ISATAP (pronounced " eye-sa-tap" )stands for Intra-Site Automatic Tunnel AddressingProtocol .This protocol works only on a single organization' s intranet.By default,ISATAPis enabled in Windows 7 and Windows 8.1.Teredo (pronounced " ter-EE-do" )is named after the Teredo worm,which bores holes inwood.IPv6 addresses intended to be used by this protocol always begin with 2001 andthe prefix is written as 2001::/32.Teredo is enabled by default in Windows 7,but notWindows 8.1.On UNIX and Linux systems that don' t have Teredo installed by default,you can install third-party software such as Miredo to provide the Teredo service.

Select the name of the free,open source software that is by far the most popular DNS server software:

(Multiple Choice)
4.8/5
(43)

NetBIOS applications should be replaced as they are out-of-date.

(True/False)
4.8/5
(25)

Describe how an IPv6 address is written and displayed.

(Essay)
4.9/5
(44)

An IPv6 address consists of how many bits?

(Multiple Choice)
4.8/5
(40)

Matching Match each correct item with the statement below. -A unique set of characters assigned toeach NIC by its manufacturer.In the traditional,48-bitphysical addressing scheme,the extension identifier is 24 bitslong.In EUI-64,the extension identifier is 40 bits long.

(Multiple Choice)
4.8/5
(24)

Which protocol below is used to make an initial connection between hosts for transferring multimedia data,relying on other protocols once a connection is established?

(Multiple Choice)
4.8/5
(38)

A hexadecimal number is a number written in the base 16 number system.

(True/False)
4.8/5
(26)

Matching Match each correct item with the statement below. -A type ofaddress translation in which a gateway has a pool of publicIP addresses that it is free to assign to a local host wheneverthe local host makes a request to access the Internet.

(Multiple Choice)
4.8/5
(41)

Select the protocol below that is used to synchronize clocks on computers on a network:

(Multiple Choice)
4.8/5
(31)

Matching Match each correct item with the statement below. -The nonprofit corporation currently designated bythe U.S.government to maintain and assign IP addresses.

(Multiple Choice)
4.7/5
(35)

When two IPv6 nodes are on the same network,they are referred to as which of the following?

(Multiple Choice)
4.8/5
(40)

Select the IPv6 address below that indicates a global unicast address:

(Multiple Choice)
4.8/5
(39)

ICANN is responsible for restrictions on use of the .com,.org,and .net TLDs.

(True/False)
4.9/5
(35)

How many clusters of root servers exist?

(Multiple Choice)
4.9/5
(37)

________________ are not used to find noes on networks other than the local network.

(Short Answer)
4.9/5
(41)

What protocol is commonly used to request configuration files from another computer?

(Multiple Choice)
4.8/5
(32)

Matching Match each correct item with the statement below. -A type of DNS data record that is usedfor reverse lookups,to provide a host name when the IPaddress is known.

(Multiple Choice)
4.8/5
(39)
Showing 1 - 20 of 49
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)