Deck 10: In-Depth TCP/IP Networking

Full screen (f)
exit full mode
Question
On a network using TCP/IP,some nodes may use multiple IP addresses.
Use Space or
up arrow
down arrow
to flip the card.
Question
IMAP4 servers require less storage space and usually more processing resources than POP servers do.
Question
Because the octets equal to 0 and 255 are ____,only the numbers 1 through 254 can be used for host information in an IPv4 address.

A) unobtainable
B) out-of-range
C) reserved
D) open for general use
Question
In classful addressing,the Class B IPv4 address network ID is located in the ____.

A) last 8 bits
B) last 16 bits
C) first 8 bits
D) first 16 bits
Question
An example of a popular client email software is ____.

A) MIME
B) Microsoft Outlook
C) Sendmail
D) Microsoft Exchange Server
Question
When using classful IPv4 addressing,a network ID always ends with an octet of ____.

A) 0
B) 00000000
C) 1
D) 255
Question
In CIDR,conventional network class distinctions do not exist.
Question
Within a classful addressing,____ is the default subnet mask for a Class C address.

A) 255.255.255.255
B) 255.255.255.0
C) 255.255.0.0
D) 255.0.0.0
Question
In ____ addressing,only Class A,Class B,and Class C addresses are recognized.

A) classful
B) subnet
C) stateful
D) limited
Question
An example of a popular mail server is ____.

A) Eudora
B) Microsoft Outlook
C) AOL mail
D) Microsoft Exchange Server
Question
In classful addressing,Class C IPv4 address host information is located in the ____.

A) last 8 bits
B) last 16 bits
C) first 8 bits
D) first 16 bits
Question
The gateways that make up the Internet backbone are called ____ gateways.

A) proxy
B) core
C) Internet
D) default
Question
POP3's design makes it best suited to users who retrieve their mail from the same workstation all the time.
Question
Within a classful addressing subnet mask,the ____ bits indicate that corresponding bits in an IPv4 address contain network information.

A) 0
B) 1
C) first eight
D) last eight
Question
CIDR notation takes the form of the network ID followed by a(n)____,followed by the number of bits that are used for the extended network prefix.

A) dash ( - )
B) underscore ( _ )
C) backward slash ( \ )
D) forward slash ( / )
Question
The result from ANDing 11001111 with 10010001 is ____.

A) 11001111
B) 10010001
C) 10000001
D) 00000001
Question
The MIME standard replaces SMTP.
Question
A class ____ network class is reserved for special purposes.

A) A
B) B
C) C
D) D
Question
SMTP operates from port ____.

A) 25
B) 11
C) 110
D) 250
Question
The ____ gateway is the gateway that first interprets its outbound requests to other subnets,and then interprets its inbound requests from other subnets.

A) proxy
B) core
C) Internet
D) default
Question
The standard message format specified by SMTP allows for lines that contain no more than ____ ASCII characters.

A) 100
B) 1000
C) 10,000
D) 1,000,000
Question
POP3 (Post Office Protocol,version 3)relies on TCP and operates over port ____.

A) 25
B) 11
C) 110
D) 250
Question
MATCHING
Match each item with a statement below:
a.ipconfig utility
f.dig utility
b.ifconfig utility
g.nslookup utility
c.netstat utility
h.whois utility
d.nbstat utility
i.traceroute utility
e.host utility
Allows an administrator to query a DNS database and find the host name associated with a specific IP address or vice versa.
Question
_____________________________________________ is a standard for encoding and interpreting binary files,images,video,and non-ASCII character sets within an e-mail message.
Question
IMAP (Internet Message Access Protocol)is a mail retrieval protocol that was developed as a more sophisticated alternative to ____.

A) POP3
B) POP
C) SMTP
D) MIME
Question
The combination of additional bits used for subnet information plus the existing network ID is known as the _________________________.
Question
MATCHING
Match each item with a statement below:
a.ipconfig utility
f.dig utility
b.ifconfig utility
g.nslookup utility
c.netstat utility
h.whois utility
d.nbstat utility
i.traceroute utility
e.host utility
Allows an administrator to query the DNS database from any computer on the network and find the host name of a device by specifying its IP address,or vice versa.
Question
MATCHING
Match each item with a statement below:
a.ipconfig utility
f.dig utility
b.ifconfig utility
g.nslookup utility
c.netstat utility
h.whois utility
d.nbstat utility
i.traceroute utility
e.host utility
Useful only on networks that run Windows-based operating systems and NetBIOS.
Question
The ____ utility allows you to view a host's routing table.

A) nbstat
B) pathping
C) dig
D) route
Question
________________________________________ is the protocol responsible for moving messages from one mail server to another over TCP/IP-based networks.
Question
____________________ separates a network into multiple logically defined segments,or subnets.
Question
MATCHING
Match each item with a statement below:
a.ipconfig utility
f.dig utility
b.ifconfig utility
g.nslookup utility
c.netstat utility
h.whois utility
d.nbstat utility
i.traceroute utility
e.host utility
Displays TCP/IP statistics and details about TCP/IP components and connections on a host.
Question
An administrator can discover the host name assigned to a client by using the ____ utility.

A) host
B) nbstat
C) hostname
D) nslookup
Question
MATCHING
Match each item with a statement below:
a.ipconfig utility
f.dig utility
b.ifconfig utility
g.nslookup utility
c.netstat utility
h.whois utility
d.nbstat utility
i.traceroute utility
e.host utility
The TCP/IP configuration and management utility used on UNIX and Linux systems.
Question
MATCHING
Match each item with a statement below:
a.ipconfig utility
f.dig utility
b.ifconfig utility
g.nslookup utility
c.netstat utility
h.whois utility
d.nbstat utility
i.traceroute utility
e.host utility
The TCP/IP administration utility for use with Windows NT,2000,XP,Vista,Server 2003,and Server 2008 operating systems.
Question
MATCHING
Match each item with a statement below:
a.ipconfig utility
f.dig utility
b.ifconfig utility
g.nslookup utility
c.netstat utility
h.whois utility
d.nbstat utility
i.traceroute utility
e.host utility
Queries a DNS registration database and obtain information about a domain.
Question
MATCHING
Match each item with a statement below:
a.ipconfig utility
f.dig utility
b.ifconfig utility
g.nslookup utility
c.netstat utility
h.whois utility
d.nbstat utility
i.traceroute utility
e.host utility
Uses ICMP ECHO requests to trace the path from one networked node to another,identifying all intermediate hops between the two nodes.
Question
MATCHING
Match each item with a statement below:
a.ipconfig utility
f.dig utility
b.ifconfig utility
g.nslookup utility
c.netstat utility
h.whois utility
d.nbstat utility
i.traceroute utility
e.host utility
Used if an administrator already know a host's name and wants to learn its IP address.
Question
The gateways that make up the Internet backbone are called ____________________.
Question
A program similar to mtr,____,is available as a command-line utility in Windows XP,Vista,Server 2003,and Server 2008.

A) nbstat
B) pathping
C) dig
D) route
Question
Explain how the traceroute utility uses ICMP ECHO requests to trace the path from one networked node to another,identifying all intermediate hops between the two nodes.
Question
Describe what PAT is and how it works.
Question
Explain how hiding IP addresses on private networks allows network managers more flexibility in assigning addresses.
Question
Explain why SNAT is considered static and describe why it useful.
Question
Describe four features of IMAP4.
Question
Explain what happens when an administrator issues the mtr command.
Question
Describe the formula determining how to modify a default subnet mask to create subnets.
Question
Explain how to calculate a host's network ID given its IPv4 address and subnet mask.
Question
Describe the function of the route utility and provide examples of how it is entered on a UNIX or Linux system,a Windows-based system,and a Cisco-brand router.
Question
If subnetting is used on a LAN,explain how devices interpret subnetting information.
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/50
auto play flashcards
Play
simple tutorial
Full screen (f)
exit full mode
Deck 10: In-Depth TCP/IP Networking
1
On a network using TCP/IP,some nodes may use multiple IP addresses.
True
2
IMAP4 servers require less storage space and usually more processing resources than POP servers do.
False
3
Because the octets equal to 0 and 255 are ____,only the numbers 1 through 254 can be used for host information in an IPv4 address.

A) unobtainable
B) out-of-range
C) reserved
D) open for general use
C
4
In classful addressing,the Class B IPv4 address network ID is located in the ____.

A) last 8 bits
B) last 16 bits
C) first 8 bits
D) first 16 bits
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
5
An example of a popular client email software is ____.

A) MIME
B) Microsoft Outlook
C) Sendmail
D) Microsoft Exchange Server
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
6
When using classful IPv4 addressing,a network ID always ends with an octet of ____.

A) 0
B) 00000000
C) 1
D) 255
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
7
In CIDR,conventional network class distinctions do not exist.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
8
Within a classful addressing,____ is the default subnet mask for a Class C address.

A) 255.255.255.255
B) 255.255.255.0
C) 255.255.0.0
D) 255.0.0.0
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
9
In ____ addressing,only Class A,Class B,and Class C addresses are recognized.

A) classful
B) subnet
C) stateful
D) limited
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
10
An example of a popular mail server is ____.

A) Eudora
B) Microsoft Outlook
C) AOL mail
D) Microsoft Exchange Server
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
11
In classful addressing,Class C IPv4 address host information is located in the ____.

A) last 8 bits
B) last 16 bits
C) first 8 bits
D) first 16 bits
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
12
The gateways that make up the Internet backbone are called ____ gateways.

A) proxy
B) core
C) Internet
D) default
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
13
POP3's design makes it best suited to users who retrieve their mail from the same workstation all the time.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
14
Within a classful addressing subnet mask,the ____ bits indicate that corresponding bits in an IPv4 address contain network information.

A) 0
B) 1
C) first eight
D) last eight
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
15
CIDR notation takes the form of the network ID followed by a(n)____,followed by the number of bits that are used for the extended network prefix.

A) dash ( - )
B) underscore ( _ )
C) backward slash ( \ )
D) forward slash ( / )
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
16
The result from ANDing 11001111 with 10010001 is ____.

A) 11001111
B) 10010001
C) 10000001
D) 00000001
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
17
The MIME standard replaces SMTP.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
18
A class ____ network class is reserved for special purposes.

A) A
B) B
C) C
D) D
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
19
SMTP operates from port ____.

A) 25
B) 11
C) 110
D) 250
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
20
The ____ gateway is the gateway that first interprets its outbound requests to other subnets,and then interprets its inbound requests from other subnets.

A) proxy
B) core
C) Internet
D) default
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
21
The standard message format specified by SMTP allows for lines that contain no more than ____ ASCII characters.

A) 100
B) 1000
C) 10,000
D) 1,000,000
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
22
POP3 (Post Office Protocol,version 3)relies on TCP and operates over port ____.

A) 25
B) 11
C) 110
D) 250
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
23
MATCHING
Match each item with a statement below:
a.ipconfig utility
f.dig utility
b.ifconfig utility
g.nslookup utility
c.netstat utility
h.whois utility
d.nbstat utility
i.traceroute utility
e.host utility
Allows an administrator to query a DNS database and find the host name associated with a specific IP address or vice versa.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
24
_____________________________________________ is a standard for encoding and interpreting binary files,images,video,and non-ASCII character sets within an e-mail message.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
25
IMAP (Internet Message Access Protocol)is a mail retrieval protocol that was developed as a more sophisticated alternative to ____.

A) POP3
B) POP
C) SMTP
D) MIME
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
26
The combination of additional bits used for subnet information plus the existing network ID is known as the _________________________.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
27
MATCHING
Match each item with a statement below:
a.ipconfig utility
f.dig utility
b.ifconfig utility
g.nslookup utility
c.netstat utility
h.whois utility
d.nbstat utility
i.traceroute utility
e.host utility
Allows an administrator to query the DNS database from any computer on the network and find the host name of a device by specifying its IP address,or vice versa.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
28
MATCHING
Match each item with a statement below:
a.ipconfig utility
f.dig utility
b.ifconfig utility
g.nslookup utility
c.netstat utility
h.whois utility
d.nbstat utility
i.traceroute utility
e.host utility
Useful only on networks that run Windows-based operating systems and NetBIOS.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
29
The ____ utility allows you to view a host's routing table.

A) nbstat
B) pathping
C) dig
D) route
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
30
________________________________________ is the protocol responsible for moving messages from one mail server to another over TCP/IP-based networks.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
31
____________________ separates a network into multiple logically defined segments,or subnets.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
32
MATCHING
Match each item with a statement below:
a.ipconfig utility
f.dig utility
b.ifconfig utility
g.nslookup utility
c.netstat utility
h.whois utility
d.nbstat utility
i.traceroute utility
e.host utility
Displays TCP/IP statistics and details about TCP/IP components and connections on a host.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
33
An administrator can discover the host name assigned to a client by using the ____ utility.

A) host
B) nbstat
C) hostname
D) nslookup
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
34
MATCHING
Match each item with a statement below:
a.ipconfig utility
f.dig utility
b.ifconfig utility
g.nslookup utility
c.netstat utility
h.whois utility
d.nbstat utility
i.traceroute utility
e.host utility
The TCP/IP configuration and management utility used on UNIX and Linux systems.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
35
MATCHING
Match each item with a statement below:
a.ipconfig utility
f.dig utility
b.ifconfig utility
g.nslookup utility
c.netstat utility
h.whois utility
d.nbstat utility
i.traceroute utility
e.host utility
The TCP/IP administration utility for use with Windows NT,2000,XP,Vista,Server 2003,and Server 2008 operating systems.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
36
MATCHING
Match each item with a statement below:
a.ipconfig utility
f.dig utility
b.ifconfig utility
g.nslookup utility
c.netstat utility
h.whois utility
d.nbstat utility
i.traceroute utility
e.host utility
Queries a DNS registration database and obtain information about a domain.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
37
MATCHING
Match each item with a statement below:
a.ipconfig utility
f.dig utility
b.ifconfig utility
g.nslookup utility
c.netstat utility
h.whois utility
d.nbstat utility
i.traceroute utility
e.host utility
Uses ICMP ECHO requests to trace the path from one networked node to another,identifying all intermediate hops between the two nodes.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
38
MATCHING
Match each item with a statement below:
a.ipconfig utility
f.dig utility
b.ifconfig utility
g.nslookup utility
c.netstat utility
h.whois utility
d.nbstat utility
i.traceroute utility
e.host utility
Used if an administrator already know a host's name and wants to learn its IP address.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
39
The gateways that make up the Internet backbone are called ____________________.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
40
A program similar to mtr,____,is available as a command-line utility in Windows XP,Vista,Server 2003,and Server 2008.

A) nbstat
B) pathping
C) dig
D) route
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
41
Explain how the traceroute utility uses ICMP ECHO requests to trace the path from one networked node to another,identifying all intermediate hops between the two nodes.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
42
Describe what PAT is and how it works.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
43
Explain how hiding IP addresses on private networks allows network managers more flexibility in assigning addresses.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
44
Explain why SNAT is considered static and describe why it useful.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
45
Describe four features of IMAP4.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
46
Explain what happens when an administrator issues the mtr command.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
47
Describe the formula determining how to modify a default subnet mask to create subnets.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
48
Explain how to calculate a host's network ID given its IPv4 address and subnet mask.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
49
Describe the function of the route utility and provide examples of how it is entered on a UNIX or Linux system,a Windows-based system,and a Cisco-brand router.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
50
If subnetting is used on a LAN,explain how devices interpret subnetting information.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
locked card icon
Unlock Deck
Unlock for access to all 50 flashcards in this deck.