Deck 3: Networking with Windows Server 2008

Full screen (f)
exit full mode
Question
Switches work at Layer 3 of the OSI model and forward frames between ports based on MAC addresses.
Use Space or
up arrow
down arrow
to flip the card.
Question
Network bridges connect one or more network segments.
Question
The term ____ refers to how networks occupy geographic space.

A) logical layout
C) network scale
B) frame
D) Ethernet
Question
A ____ is a group of protocols that work together to provide network services.

A) protocol suite
C) bridge
B) frame
D) switch
Question
____ is a set of rules to exchange messages with other Internet points at the information packet level, and guarantees the delivery of packets.

A) Multicast
C) TCP
B) DHCP
D) UDP
Question
A ____ can determine the network and host ID portions of an IP address.

A) subnet mask
C) CIDR block
B) mesh network
D) hub
Question
The Transport layer of the OSI model is responsible for defining the syntax that two network hosts use to communicate.
Question
NICs can provide access to fiber-optic, wireless LAN, or Ethernet networks.
Question
____ is the process of creating multiple smaller networks, or subnets, from an IP network address.

A) CIDR
C) ISATAP
B) Autoconfguration
D) Subnetting
Question
____ are hardware cards installed in computers so the computers can connect to a physical network.

A) Bridges
C) Network interface cards
B) Switches
D) Routers
Question
____ addresses allow clients on the same subnet to communicate without DHCP or manual configuration.

A) DHCP
C) APIPA
B) UDP
D) TCP
Question
A ____ is a unit of data transferred between a sender and receiver on a network.

A) frame
C) repeater
B) hub
D) router
Question
____ performs local and remote network configuration tasks.

A) CIDR
C) netsh
B) RIP
D) ipconfig
Question
Manually configuring IP addresses is often referred to as a ____.

A) node
C) packet
B) static IP address
D) multilayer switch
Question
A(n) ____ is a private network that interconnects one or more subnets using high-speed network connections.

A) IP
C) NIC
B) LAN
D) MAC
Question
A ____ is the most basic of the hardware devices that interconnect multiple nodes.

A) bridge
C) repeater
B) hub
D) router
Question
____ categorizes networks based on the physical and logical relationship among devices.

A) Network protocol
C) Network layout
B) Network topology
D) Network architecture
Question
A(n) ____ is a group of two or more nodes, such as computers, printers, and other hardware devices, linked together for sharing data.

A) packet
C) network
B) switch
D) NIC
Question
The Application layer of the OSI model is responsible for establishing process-to-process communications between networked hosts.
Question
____ is the practice of designing, implementing, and managing a collection of computers and devices or a network.

A) Networking
C) Routing
B) Subnetting
D) Linking
Question
Provide a brief description of the tasks performed by Neighbor Discovery.
Question
A(n) ____________________ is a hardware device that receives a signal and then resends it at a higher level or power so that it can travel longer distances between the start and end points of communication.
Question
____ stores the IPv4 address of the ISATAP router in bits 17 to 48.

A) 6to4
C) NAT
B) Teredo
D) ISATAP
Question
The term ____________________ describes the amount of data that can travel from one network point to another within a specified time.
Question
____ allows IPv6 routers and hosts to communicate across IPv4 networks.

A) 6to4
C) ARPANET
B) DHCP
D) ISATAP
Question
What is the difference between the Physical layer and the Data Link layer of the OSI model?
Question
_________________________ defines the type of hardware technology used for connecting network nodes.
Question
____ main function is to provide clients with secondary network configuration information such as DNS servers.

A) DHCP's
C) TCP's
B) UDP's
D) CIDR's
Question
What is the difference between an intranet and an extranet?
Question
What is the difference between stateless and stateful configuration?
Question
____ is a mechanism used in IPv4 networks for hiding a private IP network behind a public IP address.

A) 6to4
C) NAT
B) Teredo
D) ISATAP
Question
What is the difference between a local area network and metropolitan area network?
Question
____ should always be implemented with a client-based stateful firewall such as the Windows Firewall in Windows Server 2008.

A) 6to4
C) NAT
B) Teredo
D) ISATAP
Question
What are the rules provided by IPv6 that allows you to shorten addresses?
Question
____________________ are responsible for forwarding packets between subnets, or networks with differing IP addressing schemes.
Question
A(n) _________________________ is a group of networks spread across different geographic areas.
Question
What is the difference between the following ICMPv6 messages: router solicitation and router advertisement?
Question
____ allows IPv6 hosts to communicate over IPv4 networks that use NAT.

A) 6to4
C) DHCP
B) Teredo
D) ISATAP
Question
Briefly describe the three IPv6 over IPv4 tunnels that can be created.
Question
What is the purpose of tracert?
Question
What is the difference between ipconfig and ping?
Question
Match between columns
Uses physical cables to connect network devices.
TCP/IP
Uses physical cables to connect network devices.
Network bridges
Uses physical cables to connect network devices.
RFC
Uses physical cables to connect network devices.
Binary numbers
Uses physical cables to connect network devices.
Classless Interdomain Routing
Uses physical cables to connect network devices.
IPv6
Uses physical cables to connect network devices.
Ethernet
Uses physical cables to connect network devices.
Ping
Uses physical cables to connect network devices.
Switches
Connect one or more network segments.
TCP/IP
Connect one or more network segments.
Network bridges
Connect one or more network segments.
RFC
Connect one or more network segments.
Binary numbers
Connect one or more network segments.
Classless Interdomain Routing
Connect one or more network segments.
IPv6
Connect one or more network segments.
Ethernet
Connect one or more network segments.
Ping
Connect one or more network segments.
Switches
A document that describes the specifications for a recommended technology.
TCP/IP
A document that describes the specifications for a recommended technology.
Network bridges
A document that describes the specifications for a recommended technology.
RFC
A document that describes the specifications for a recommended technology.
Binary numbers
A document that describes the specifications for a recommended technology.
Classless Interdomain Routing
A document that describes the specifications for a recommended technology.
IPv6
A document that describes the specifications for a recommended technology.
Ethernet
A document that describes the specifications for a recommended technology.
Ping
A document that describes the specifications for a recommended technology.
Switches
Works by sending an ICMP echo request packet to the target.
TCP/IP
Works by sending an ICMP echo request packet to the target.
Network bridges
Works by sending an ICMP echo request packet to the target.
RFC
Works by sending an ICMP echo request packet to the target.
Binary numbers
Works by sending an ICMP echo request packet to the target.
Classless Interdomain Routing
Works by sending an ICMP echo request packet to the target.
IPv6
Works by sending an ICMP echo request packet to the target.
Ethernet
Works by sending an ICMP echo request packet to the target.
Ping
Works by sending an ICMP echo request packet to the target.
Switches
Deals with the limitations of classful addressing by allowing the allocation of IP addresses based on need, not general classification.
TCP/IP
Deals with the limitations of classful addressing by allowing the allocation of IP addresses based on need, not general classification.
Network bridges
Deals with the limitations of classful addressing by allowing the allocation of IP addresses based on need, not general classification.
RFC
Deals with the limitations of classful addressing by allowing the allocation of IP addresses based on need, not general classification.
Binary numbers
Deals with the limitations of classful addressing by allowing the allocation of IP addresses based on need, not general classification.
Classless Interdomain Routing
Deals with the limitations of classful addressing by allowing the allocation of IP addresses based on need, not general classification.
IPv6
Deals with the limitations of classful addressing by allowing the allocation of IP addresses based on need, not general classification.
Ethernet
Deals with the limitations of classful addressing by allowing the allocation of IP addresses based on need, not general classification.
Ping
Deals with the limitations of classful addressing by allowing the allocation of IP addresses based on need, not general classification.
Switches
Uses source and destination addresses that are 128 bits, or 16 bytes, in length.
TCP/IP
Uses source and destination addresses that are 128 bits, or 16 bytes, in length.
Network bridges
Uses source and destination addresses that are 128 bits, or 16 bytes, in length.
RFC
Uses source and destination addresses that are 128 bits, or 16 bytes, in length.
Binary numbers
Uses source and destination addresses that are 128 bits, or 16 bytes, in length.
Classless Interdomain Routing
Uses source and destination addresses that are 128 bits, or 16 bytes, in length.
IPv6
Uses source and destination addresses that are 128 bits, or 16 bytes, in length.
Ethernet
Uses source and destination addresses that are 128 bits, or 16 bytes, in length.
Ping
Uses source and destination addresses that are 128 bits, or 16 bytes, in length.
Switches
The basis for the Internet, the World Wide Web, and almost all networks.
TCP/IP
The basis for the Internet, the World Wide Web, and almost all networks.
Network bridges
The basis for the Internet, the World Wide Web, and almost all networks.
RFC
The basis for the Internet, the World Wide Web, and almost all networks.
Binary numbers
The basis for the Internet, the World Wide Web, and almost all networks.
Classless Interdomain Routing
The basis for the Internet, the World Wide Web, and almost all networks.
IPv6
The basis for the Internet, the World Wide Web, and almost all networks.
Ethernet
The basis for the Internet, the World Wide Web, and almost all networks.
Ping
The basis for the Internet, the World Wide Web, and almost all networks.
Switches
By design, cannot route traffic based on IP addresses.
TCP/IP
By design, cannot route traffic based on IP addresses.
Network bridges
By design, cannot route traffic based on IP addresses.
RFC
By design, cannot route traffic based on IP addresses.
Binary numbers
By design, cannot route traffic based on IP addresses.
Classless Interdomain Routing
By design, cannot route traffic based on IP addresses.
IPv6
By design, cannot route traffic based on IP addresses.
Ethernet
By design, cannot route traffic based on IP addresses.
Ping
By design, cannot route traffic based on IP addresses.
Switches
Represented by either a 1 or a 0. 1
TCP/IP
Represented by either a 1 or a 0. 1
Network bridges
Represented by either a 1 or a 0. 1
RFC
Represented by either a 1 or a 0. 1
Binary numbers
Represented by either a 1 or a 0. 1
Classless Interdomain Routing
Represented by either a 1 or a 0. 1
IPv6
Represented by either a 1 or a 0. 1
Ethernet
Represented by either a 1 or a 0. 1
Ping
Represented by either a 1 or a 0. 1
Switches
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/42
auto play flashcards
Play
simple tutorial
Full screen (f)
exit full mode
Deck 3: Networking with Windows Server 2008
1
Switches work at Layer 3 of the OSI model and forward frames between ports based on MAC addresses.
False
2
Network bridges connect one or more network segments.
True
3
The term ____ refers to how networks occupy geographic space.

A) logical layout
C) network scale
B) frame
D) Ethernet
C
4
A ____ is a group of protocols that work together to provide network services.

A) protocol suite
C) bridge
B) frame
D) switch
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
5
____ is a set of rules to exchange messages with other Internet points at the information packet level, and guarantees the delivery of packets.

A) Multicast
C) TCP
B) DHCP
D) UDP
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
6
A ____ can determine the network and host ID portions of an IP address.

A) subnet mask
C) CIDR block
B) mesh network
D) hub
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
7
The Transport layer of the OSI model is responsible for defining the syntax that two network hosts use to communicate.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
8
NICs can provide access to fiber-optic, wireless LAN, or Ethernet networks.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
9
____ is the process of creating multiple smaller networks, or subnets, from an IP network address.

A) CIDR
C) ISATAP
B) Autoconfguration
D) Subnetting
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
10
____ are hardware cards installed in computers so the computers can connect to a physical network.

A) Bridges
C) Network interface cards
B) Switches
D) Routers
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
11
____ addresses allow clients on the same subnet to communicate without DHCP or manual configuration.

A) DHCP
C) APIPA
B) UDP
D) TCP
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
12
A ____ is a unit of data transferred between a sender and receiver on a network.

A) frame
C) repeater
B) hub
D) router
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
13
____ performs local and remote network configuration tasks.

A) CIDR
C) netsh
B) RIP
D) ipconfig
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
14
Manually configuring IP addresses is often referred to as a ____.

A) node
C) packet
B) static IP address
D) multilayer switch
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
15
A(n) ____ is a private network that interconnects one or more subnets using high-speed network connections.

A) IP
C) NIC
B) LAN
D) MAC
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
16
A ____ is the most basic of the hardware devices that interconnect multiple nodes.

A) bridge
C) repeater
B) hub
D) router
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
17
____ categorizes networks based on the physical and logical relationship among devices.

A) Network protocol
C) Network layout
B) Network topology
D) Network architecture
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
18
A(n) ____ is a group of two or more nodes, such as computers, printers, and other hardware devices, linked together for sharing data.

A) packet
C) network
B) switch
D) NIC
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
19
The Application layer of the OSI model is responsible for establishing process-to-process communications between networked hosts.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
20
____ is the practice of designing, implementing, and managing a collection of computers and devices or a network.

A) Networking
C) Routing
B) Subnetting
D) Linking
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
21
Provide a brief description of the tasks performed by Neighbor Discovery.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
22
A(n) ____________________ is a hardware device that receives a signal and then resends it at a higher level or power so that it can travel longer distances between the start and end points of communication.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
23
____ stores the IPv4 address of the ISATAP router in bits 17 to 48.

A) 6to4
C) NAT
B) Teredo
D) ISATAP
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
24
The term ____________________ describes the amount of data that can travel from one network point to another within a specified time.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
25
____ allows IPv6 routers and hosts to communicate across IPv4 networks.

A) 6to4
C) ARPANET
B) DHCP
D) ISATAP
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
26
What is the difference between the Physical layer and the Data Link layer of the OSI model?
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
27
_________________________ defines the type of hardware technology used for connecting network nodes.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
28
____ main function is to provide clients with secondary network configuration information such as DNS servers.

A) DHCP's
C) TCP's
B) UDP's
D) CIDR's
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
29
What is the difference between an intranet and an extranet?
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
30
What is the difference between stateless and stateful configuration?
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
31
____ is a mechanism used in IPv4 networks for hiding a private IP network behind a public IP address.

A) 6to4
C) NAT
B) Teredo
D) ISATAP
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
32
What is the difference between a local area network and metropolitan area network?
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
33
____ should always be implemented with a client-based stateful firewall such as the Windows Firewall in Windows Server 2008.

A) 6to4
C) NAT
B) Teredo
D) ISATAP
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
34
What are the rules provided by IPv6 that allows you to shorten addresses?
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
35
____________________ are responsible for forwarding packets between subnets, or networks with differing IP addressing schemes.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
36
A(n) _________________________ is a group of networks spread across different geographic areas.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
37
What is the difference between the following ICMPv6 messages: router solicitation and router advertisement?
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
38
____ allows IPv6 hosts to communicate over IPv4 networks that use NAT.

A) 6to4
C) DHCP
B) Teredo
D) ISATAP
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
39
Briefly describe the three IPv6 over IPv4 tunnels that can be created.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
40
What is the purpose of tracert?
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
41
What is the difference between ipconfig and ping?
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
42
Match between columns
Uses physical cables to connect network devices.
TCP/IP
Uses physical cables to connect network devices.
Network bridges
Uses physical cables to connect network devices.
RFC
Uses physical cables to connect network devices.
Binary numbers
Uses physical cables to connect network devices.
Classless Interdomain Routing
Uses physical cables to connect network devices.
IPv6
Uses physical cables to connect network devices.
Ethernet
Uses physical cables to connect network devices.
Ping
Uses physical cables to connect network devices.
Switches
Connect one or more network segments.
TCP/IP
Connect one or more network segments.
Network bridges
Connect one or more network segments.
RFC
Connect one or more network segments.
Binary numbers
Connect one or more network segments.
Classless Interdomain Routing
Connect one or more network segments.
IPv6
Connect one or more network segments.
Ethernet
Connect one or more network segments.
Ping
Connect one or more network segments.
Switches
A document that describes the specifications for a recommended technology.
TCP/IP
A document that describes the specifications for a recommended technology.
Network bridges
A document that describes the specifications for a recommended technology.
RFC
A document that describes the specifications for a recommended technology.
Binary numbers
A document that describes the specifications for a recommended technology.
Classless Interdomain Routing
A document that describes the specifications for a recommended technology.
IPv6
A document that describes the specifications for a recommended technology.
Ethernet
A document that describes the specifications for a recommended technology.
Ping
A document that describes the specifications for a recommended technology.
Switches
Works by sending an ICMP echo request packet to the target.
TCP/IP
Works by sending an ICMP echo request packet to the target.
Network bridges
Works by sending an ICMP echo request packet to the target.
RFC
Works by sending an ICMP echo request packet to the target.
Binary numbers
Works by sending an ICMP echo request packet to the target.
Classless Interdomain Routing
Works by sending an ICMP echo request packet to the target.
IPv6
Works by sending an ICMP echo request packet to the target.
Ethernet
Works by sending an ICMP echo request packet to the target.
Ping
Works by sending an ICMP echo request packet to the target.
Switches
Deals with the limitations of classful addressing by allowing the allocation of IP addresses based on need, not general classification.
TCP/IP
Deals with the limitations of classful addressing by allowing the allocation of IP addresses based on need, not general classification.
Network bridges
Deals with the limitations of classful addressing by allowing the allocation of IP addresses based on need, not general classification.
RFC
Deals with the limitations of classful addressing by allowing the allocation of IP addresses based on need, not general classification.
Binary numbers
Deals with the limitations of classful addressing by allowing the allocation of IP addresses based on need, not general classification.
Classless Interdomain Routing
Deals with the limitations of classful addressing by allowing the allocation of IP addresses based on need, not general classification.
IPv6
Deals with the limitations of classful addressing by allowing the allocation of IP addresses based on need, not general classification.
Ethernet
Deals with the limitations of classful addressing by allowing the allocation of IP addresses based on need, not general classification.
Ping
Deals with the limitations of classful addressing by allowing the allocation of IP addresses based on need, not general classification.
Switches
Uses source and destination addresses that are 128 bits, or 16 bytes, in length.
TCP/IP
Uses source and destination addresses that are 128 bits, or 16 bytes, in length.
Network bridges
Uses source and destination addresses that are 128 bits, or 16 bytes, in length.
RFC
Uses source and destination addresses that are 128 bits, or 16 bytes, in length.
Binary numbers
Uses source and destination addresses that are 128 bits, or 16 bytes, in length.
Classless Interdomain Routing
Uses source and destination addresses that are 128 bits, or 16 bytes, in length.
IPv6
Uses source and destination addresses that are 128 bits, or 16 bytes, in length.
Ethernet
Uses source and destination addresses that are 128 bits, or 16 bytes, in length.
Ping
Uses source and destination addresses that are 128 bits, or 16 bytes, in length.
Switches
The basis for the Internet, the World Wide Web, and almost all networks.
TCP/IP
The basis for the Internet, the World Wide Web, and almost all networks.
Network bridges
The basis for the Internet, the World Wide Web, and almost all networks.
RFC
The basis for the Internet, the World Wide Web, and almost all networks.
Binary numbers
The basis for the Internet, the World Wide Web, and almost all networks.
Classless Interdomain Routing
The basis for the Internet, the World Wide Web, and almost all networks.
IPv6
The basis for the Internet, the World Wide Web, and almost all networks.
Ethernet
The basis for the Internet, the World Wide Web, and almost all networks.
Ping
The basis for the Internet, the World Wide Web, and almost all networks.
Switches
By design, cannot route traffic based on IP addresses.
TCP/IP
By design, cannot route traffic based on IP addresses.
Network bridges
By design, cannot route traffic based on IP addresses.
RFC
By design, cannot route traffic based on IP addresses.
Binary numbers
By design, cannot route traffic based on IP addresses.
Classless Interdomain Routing
By design, cannot route traffic based on IP addresses.
IPv6
By design, cannot route traffic based on IP addresses.
Ethernet
By design, cannot route traffic based on IP addresses.
Ping
By design, cannot route traffic based on IP addresses.
Switches
Represented by either a 1 or a 0. 1
TCP/IP
Represented by either a 1 or a 0. 1
Network bridges
Represented by either a 1 or a 0. 1
RFC
Represented by either a 1 or a 0. 1
Binary numbers
Represented by either a 1 or a 0. 1
Classless Interdomain Routing
Represented by either a 1 or a 0. 1
IPv6
Represented by either a 1 or a 0. 1
Ethernet
Represented by either a 1 or a 0. 1
Ping
Represented by either a 1 or a 0. 1
Switches
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
locked card icon
Unlock Deck
Unlock for access to all 42 flashcards in this deck.