Sie sind auf Seite 1von 8

Lesson 5: Connecting to a Network Multiple Choice 1. __________ are the rules or languages in which networking is possible.

a) Protocols b) Electrical signaling c) Topologies d) Connectors Answer: a Difficulty: Easy Section Reference: Networking Basics Explanation: Computers on a network communicate using protocols, which are nothing more than languages that computers understand. These protocols operate on different levels and form what is commonly known as a networking stack or protocol stack. 2. What type of connector does an unshielded twisted pair (UTP) cable use? a) RJ11 b) RJ45 c) RG58 d) RG59 Answer: b Difficulty: Easy Section Reference: The Physical Layer The RJ45 connector used in Ethernet networks is similar to RJ11 connectors used in analog phones. The RJ45 connector has eight connectors. 3. Which layer of the OSI model covers the cabling and electrical signaling? a) Physical b) Data-link c) Network d) Transport Answer: a Difficulty: Medium Section Reference: The Physical Layer Explanation: The physical layer of the OSI model consists of the cable or the radio signals that carry data from one system to another and the network interface adapters, which are the hardware components in the computers that provide the connection to the physical network. 4. What layer of the OSI model are the Media Access Control addresses part of? a) Physical b) Data-link c) Network d) Transport Answer: b Difficulty: Medium Section Reference: The Data-Link Layer

Page 1 of 8

Explanation: The addresses computers used at the data-link layer are 6-byte hexadecimal sequences, hardcoded into each network interface adapter by the manufacturer. These sequences are called hardware addresses or media access control (MAC) addresses. 5. What is the primary protocol used by Windows to communicate over a network? a) TCP/IP b) IPX/SPX c) DLC d) SNA Answer: a Difficulty: Easy Section Reference: The Network Layer The protocols that Windows uses by default at the network and transport layers are collectively called TCP/IP. TCP is the Transmission Control Protocol and IP is the Internet Protocol. Early versions of Windows used a different protocol called NetBIOS, but TCP/IP is the native protocol of the Internet, and the explosive growth in the Internets popularity eventually led the developers of all network operating systems to adopt TCP/IP as their default protocol. 6. On which layer of the OSI model is IPv4 Addressing included? a) Physical b) Data-link c) Network d) Transport Answer: c Difficulty: Medium Section Reference: The Network Layer Explanation: IP has its own addressing system, which it uses to identify all the devices on a network. Every network interface in a computer and every device that is directly connected to a TCP/IP network must have an IP address. IP addresses are independent of the hardware addresses assigned to network interface adapters. A Windows 7 computer that is connected to a LAN has both a hardware address and an IP address. 7. What is used to specify which bits of an IPv4 address are used for the network identifier and which bits are used for the host identifier? a) Default gateway b) Subnet mask c) MAC address d) OSI model Answer: b Difficulty: Medium Section Reference: IPv4 Addressing Explanation: IP addresses can have variable numbers of network bits and host bits. To locate the division between the network identifier and the host identifier, TCP/IP systems use a mechanism called a subnet mask. 8. In what class is the address of 156.43.75.212? a) Class A b) Class B

Page 2 of 8

c) Class C d) Class D Answer: a Difficulty: Medium Section Reference: Subnet Masking Explanation: Because the address begins with 156, it is a Class A address. 9. What is the default subnet mask for 198.54.65.3? a) 255.0.0.0 b) 255.255.0.0 c) 255.255.255.0 d) 255.255.255.255 Answer: c Difficulty: Medium Section Reference: Subnet Masking Explanation: Because the address begins with a 198, it is a Class C address. Therefore, the subnet mask is 255.255.255.0. 10. What is used to avoid assigning entire addresses of a particular class to networks that didnt have that many hosts? a) IANA b) NAT c) CIDR d) APIPA Answer: c Difficulty: Medium Section Reference: Assigning IP Addresses Explanation: To avoid assigning entire addresses of a particular class to networks that didnt have that many hosts, the IETF eventually published a new standard for assigning IP addresses called classless inter-domain routing (CIDR). CIDR differs from traditional addressing (now called classful addressing) by allowing the division between the network identifier and the host identifier to fall anywhere in an IPv4 address; it does not have to fall on one of the 8-bit boundaries. 11. If you have an IPv4 address of 123.54.34.77 with a subnet mask of 255.255.240.0, what is the CIDR notation? a) /16 b) /20 c) /24 d) /28 Answer: b Difficulty: Medium Section Reference: Classless Inter-Domain Routing (CIDR) Explanation: CIDR also introduced a new syntax for IP network address references. In classful notation, an address like 172.23.0.0 was assumed to be a Class B address and use the standard 255.255.0.0 Class B subnet mask. In CIDR notation, the network address is followed by a slash and the number of bits in the network identifier. Therefore, 172.23.0.0/16 would be the CIDR equivalent of a Class B address. An

Page 3 of 8

address that used the 255.255.240.0 subnet mask described earlier would look something like 172.23.0.0/20. 12. Which of the following is NOT an IPv4 private address range? a) 10.0.0.0 through 10.255.255.255 b) 172.16.0.0 through 172.31.255.255 c) 192.168.0.0 through 192.168.255.255 d) 224.0.0.0 through 224.255.255.255 Answer: d Difficulty: Medium Section Reference: Private IP Addressing Explanation: The 224.0.0.0 through 224.255.255.255 are Class D addresses, which are used for multicasting. 13. What would a corporation use to allow private IPv4 addresses to communicate with the Internet? a) DHCP b) APIPA c) MAC d) NAT Answer: d Difficulty: Medium Section Reference: Private IP Addressing Explanation: Internet routers do not forward these private addresses, so computers that use them are theoretically not accessible from the Internet. However, most networks today that use private IP addresses provide their computers with Internet access using a technology such as network address translation (NAT). 14. What address is assigned to a computer that fails to locate a DHCP server? a) NAT b) MAC c) APIPA d) CIDR Answer: c Difficulty: Medium Section Reference: Assigning IP Addresses Explanation: When a Windows 7 computer with no IP address starts and fails to locate a DHCP server on the network, the TCP/IP client automatically configures itself using an Automatic Private IP Addressing (APIPA) address in the 169.254.0.0/16 network. This enables computers on a small network with no DHCP server to communicate without the need for manual configuration. 15. What server automatically assigns IP addresses? a) NAT b) DNS c) DHCP d) CIDR Answer: c Difficulty: Easy

Page 4 of 8

Section Reference: Assigning IP Addresses Explanation: Dynamic Host Configuration Protocol (DHCP) is a client/server application and protocol that enables clients to obtain IP addresses from a pool provided by a server, and then return the addresses to the pool when the clients no longer need them. Windows 7 includes a DHCP client, which it uses by default. 16. What type of address is the FCC0:0:0:0B5D:FF:BE3B:F4F7:3311? a) MAC b) IPv4 c) IPv6 d) WINS Answer: c Difficulty: Medium Section Reference: IPv6 Address Format Explanation: Unlike IPv4 addresses, which use decimal notation, IPv6 addresses use hexadecimal notation, in the form of eight 2-byte values, separated by colons. 17. Which type of address defines a single network interface in a computer or other device? a) Unicast b) Anycast c) Multicast d) Public Answer: a Difficulty: Easy Section Reference: Understanding IPv6 Address Types Explanation: Much as IPv4 supports unicast, broadcast, and multicast addresses, IPv6 has three address types. Unicast identifies a single network interface in a computer or other device. Packets addressed to a unicast address are delivered to one node only. 18. Which type of IPv6 address is unique throughout the IPv6 universe? a) Node-local b) Link-local c) Site-local d) Global Answer: d Difficulty: Medium Section Reference: Understanding IPv6 Address Types Explanation: The Global IPv6 is unique throughout the IPv6 universe; it is required to communicate directly over the Internet. 19. What type of address mechanism is a tunneling protocol that enables computers to transmit IPv6 packets through NAT routers that do not support IPv6? a) IPv4-compatible addresses b) IPv4-mapped addresses c) 6to4 d) Teredo Answer: d

Page 5 of 8

Difficulty: Hard Section Reference: IPv6 Transition Explanation: Teredo is a tunneling protocol that enables computers to transmit IPv6 packets through NAT routers that do not support IPv6. A Teredo address consists of a 32-bit prefix, 2001:0000, followed by the IPv4 address of the Teredo server, 16 flag bits, and the UDP port number and public IPv4 address of the NAT router. These last 48 bits are obfuscated by having their bit values reversed. 20. TCP is considered a __________ protocol. a) Connection-oriented b) Connectionless c) Classful d) Classless Answer: a Difficulty: Medium Section Reference: The Transport Layer Explanation: A connection-oriented protocol is one in which two communicating systems establish a connection before they transmit any data. After the connection is established, the computers exchange packets with complex headers designed to provide error detection and correction. A connection-oriented protocol ensures bit-perfect data transmissions, but at the price of greatly increased overhead. 21. What do you call codes that identify specific applications running on the system? a) Ports b) Protocol c) TCP d) UDP Answer: a Difficulty: Easy Section Reference: Ports and Sockets Explanation: As with the protocol codes included in IP headers, the TCP and UDP headers both contain codes that identify specific applications running on the system. The codes, called ports, are again published by the IANA, and the combination of an IP address and a port number is called a socket. 22. What utility or tool allows you to view and manage all your network connections? a) Computer Management console b) Network and Sharing Center c) Network Discovery console d) Windows Firewall with Advanced Security Answer: b Difficulty: Easy Section Reference: Using the Network and Sharing Center Explanation: The Windows 7 Network and Sharing Center provides a central access point for all the network connections on the computer. Many of the common network configuration and administration tasks that technicians perform on Windows 7 computers start by opening the Network and Sharing Center. 23. What is a software routine that acts as a virtual barrier between a computer and the network to which it is attached? a) Filter watcher

Page 6 of 8

b) Firewall c) Protocol analyzer d) SNMP Answer: b Difficulty: easy Section Reference: Understanding Network Discovery Explanation: A firewall is a software routine that acts as a virtual barrier between a computer and the network to which it is attached. A firewall is essentially a filter that enables certain types of incoming and outgoing traffic to pass through the barrier, while blocking other types. 24. What command is used to test network connectivity between two hosts? a) Ipconfig b) Ping c) Netsh d) Nslookup Answer: b Difficulty: Easy Section Reference: Using Ping.exe Explanation: Ping is the most basic of TCP/IP utilities and is included in some form with every TCP/IP implementation. On Windows 7 systems, the program is called Ping.exe. Ping.exe can tell you if the TCP/IP stack of another system on the network is functioning normally. Fill in the Blank 25. A __________ is a device that connects one network to another. Answer: Router Difficulty: Section Reference: IP Routing Explanation: The Internet as we know it (with a capital I) is a huge conglomeration of networks, all connected together by devices called routers. A router is simply a device that connects one network to another. 26. The IPv4 addresses are __-bit addresses. Answer: 32 Difficulty: Easy Section Reference: IPv4 Addressing Explanation: The current standard for IP is version 4 (IPv4), which defines a 32-bit address space. 27. The IPv6 addresses are __-bit addresses. Answer: 128 Difficulty: Medium Section Reference: IPv6 Addressing Explanation: The current standard for IP is version 4 (IPv4), which defines a 128-bit address space, usually expressed in hexadecimal format. 28. __________ is the command used to configure the basic IP parameters for a network connections.

Page 7 of 8

Answer: Netsh Difficulty: Hard Section Reference: Configuring IPv4 Settings Explanation: The command line alternative to this graphical interface is a program called Netsh.exe. Netsh.exe is a powerful tool that you can use interactively or with command line parameters to configure virtually any Windows 7 networking setting. Short Answer 29. You have a computer that cannot communicate on the network. You find out that it has been assigned an IPv4 address of 169.254.0.5 with a subnet mask of 255.255.0.0. What is the problem? Answer: The computer cannot locate a DHCP server. Difficulty: Hard Section Reference: Assigning IP addresses Explanation: When a Windows 7 computer with no IP address starts and it fails to locate a DHCP server on the network, the TCP/IP client automatically configures itself using an Automatic Private IP Addressing (APIPA) address in the 169.254.0.0/16 network. This enables computers on a small network with no DHCP server to communicate without the need for manual configuration. Essay 30. The IPv4 is broken into two parts. List and describe the two parts. Answer: The current standard for IP is version 4 (IPv4), which defines a 32-bit address space. Each address is split into two parts: Network identifier: Specifies the network on which a particular system is located. Host identifier: Specifies a particular network interface (also called a host) on the network. Difficulty: Hard Section Reference: IPv4 Addressing

Page 8 of 8

Das könnte Ihnen auch gefallen