Connecting to and Setting Up a Network



Similar documents
1 Data information is sent onto the network cable using which of the following? A Communication protocol B Data packet

Study Guide CompTIA A+ Certification, Domain 2 Networking

CompTIA Exam N CompTIA Network+ certification Version: 5.1 [ Total Questions: 1146 ]

CONNECTING WINDOWS XP PROFESSIONAL TO A NETWORK

Exam Questions SY0-401

Network Configuration Settings

Virtual Server and DDNS. Virtual Server and DDNS. For BIPAC 741/743GE

Chapter 6 Configuring the SSL VPN Tunnel Client and Port Forwarding

Chapter 1 Network Security

Wireless Cable Gateway CG3100Dv3

Security. TestOut Modules

COMPUTER NETWORK TECHNOLOGY (300)

Computer Networks. Secure Systems

Connecting with Computer Science, 2e. Chapter 5 The Internet

Mailstation & DM Series Communications Device, LAN Constant Connection, PC Meter Connect, and Wi Fi Connection Networking Guide

Configuring Network Address Translation (NAT)

Wifi Pan/Tilt IP Camera User Manual

Fundamentals of Windows Server 2008 Network and Applications Infrastructure

PePWave Surf Series PePWave Surf Indoor Series: Surf 200, AP 200, AP 400

Transport and Network Layer

TCP/IP Basis. OSI Model

University of Hawaii at Manoa Professor: Kazuo Sugihara

Chapter 5. Data Communication And Internet Technology

LESSON Networking Fundamentals. Understand TCP/IP

EXPLORER. TFT Filter CONFIGURATION

Network: several computers who can communicate. bus. Main example: Ethernet (1980 today: coaxial cable, twisted pair, 10Mb 1000Gb).

Networking Test 4 Study Guide

MN-700 Base Station Configuration Guide

Wireless Encryption Protection

Administrator's Guide

CONCEPTRONIC C54BRS4A g Wireless Broadband Router

Lab Organizing CCENT Objectives by OSI Layer

IPv6 in Axis Video Products

CompTIA Network+ (Exam N10-005)

DV230 Web Based Configuration Troubleshooting Guide

CUSTOMIZED ASSESSMENT BLUEPRINT COMPUTER SYSTEMS NETWORKING PA. Test Code: 8148 Version: 01

A host-based firewall can be used in addition to a network-based firewall to provide multiple layers of protection.

Configuring the WT-4 for Upload to a Computer (Infrastructure Mode)

Networking Basics for Automation Engineers

Chapter 4 Managing Your Network

Internetworking Microsoft TCP/IP on Microsoft Windows NT 4.0

3.1 RS-232/422/485 Pinout:PORT1-4(RJ-45) RJ-45 RS-232 RS-422 RS-485 PIN1 TXD PIN2 RXD PIN3 GND PIN4 PIN5 T PIN6 T PIN7 R+ PIN8 R-

LAN TCP/IP and DHCP Setup

Chapter 6 Using Network Monitoring Tools

2006 Network + Domain 2 - Study Guide

Lesson 1 Quiz Certification Partners, LLC. All Rights Reserved. Version 2.0

Basic Network Configuration

9 Simple steps to secure your Wi-Fi Network.

Static Business Class HSI Basic Installation NETGEAR 7550

NETGEAR ProSAFE WC9500 High Capacity Wireless Controller

Copyright 2006 Comcast Communications, Inc. All Rights Reserved.

Cyber Essentials. Test Specification

First Workshop on Open Source and Internet Technology for Scientific Environment: with case studies from Environmental Monitoring

Step-by-Step Configuration

Network User s Guide

Network Interface Table of Contents

COMPUTER NETWORK TECHNOLOGY (40)

Network User s Guide

Internet Privacy Options

Configuring the WT-4 for ftp (Infrastructure Mode)

User s Manual TCP/IP TO RS-232/422/485 CONVERTER. 1.1 Introduction. 1.2 Main features. Dynamic DNS

If you never used nor intend to use the wired-connection, then please disregard the following info.

Chapter 6 Using Network Monitoring Tools

Firewall Firewall August, 2003

Broadband Module Manual. M I T E L. EMEA CALA. Global Headquarters U.S. Asia Pacific

Pre-lab and In-class Laboratory Exercise 10 (L10)

How To Check If Your Router Is Working Properly

PIXMA MX920. series. Setup Guide

CCT vs. CCENT Skill Set Comparison

108Mbps Super-G TM Wireless LAN Router with XR USER MANUAL

Networking. Systems Design and. Development. CRC Press. Taylor & Francis Croup. Boca Raton London New York. CRC Press is an imprint of the

Microsoft. CompTIA Network+ Rapid Review. (Exam N10-005) Craig Zacker

Unit Objectives. IP Addressing Basics. Component 4: Introduction to Information and Computer Science. Unit 7: Networks & Networking Lecture 2

Slide 1 Introduction cnds@napier 1 Lecture 6 (Network Layer)

H0/H2/H4 -ECOM100 DHCP & HTML Configuration. H0/H2/H4--ECOM100 DHCP Disabling DHCP and Assigning a Static IP Address Using HTML Configuration

Protecting the Home Network (Firewall)

Broadband Router User s Manual

LevelOne WBR-3405TX. User`s Manual. 11g Wireless AP Router

Network Terminology Review

A Division of Cisco Systems, Inc. GHz g. Wireless-G. USB Network Adapter with RangeBooster. User Guide WIRELESS WUSB54GR. Model No.

CT LANforge WiFIRE Chromebook a/b/g/n WiFi Traffic Generator with 128 Virtual STA Interfaces

Router User Guide. Table of Contents

Wireless Cable Gateway CG3100

Nokia Siemens Networks. CPEi-lte User Manual

How to configure your Thomson SpeedTouch 780WL for ADSL2+

UIP1868P User Interface Guide

Digicom Remote Control for the SRT

Chapter 4 Customizing Your Network Settings

TCP/IP Networking An Example

ClickShare Network Integration

Guide to Network Defense and Countermeasures Third Edition. Chapter 2 TCP/IP

Network User s Guide

Multi-Homing Security Gateway

Guideline for setting up a functional VPN

Advanced Configuration Guide. Vodafone Mobile Broadband Sharing Dock Vodafone R101

Internetworking and IP Address

JOB READY ASSESSMENT BLUEPRINT COMPUTER NETWORKING FUNDAMENTALS - PILOT. Test Code: 4514 Version: 01

Wireless Cable Gateway CG3000

NETWORK USER S GUIDE MFC-9125CN MFC-9325CW

Transcription:

Chapter 9 Connecting to and Setting Up a Network Reviewing the Basics 1. How many bits are in a MAC address? 48 bits 2. How many bits are in an IPv4 IP address? In an IPv6 IP address? 32 bits, 128 bits 3. How does a client application identify a server application on another computer on the network? By a port number 4. What are IP addresses called that begin with 10, 172.16, or 192.168? Private IP addresses 5. In what class is the IP address 185.75.255.10? Class B 6. In what class is the IP address 193.200.30.5? Class C 7. Describe the difference between public and private IP addresses. If a network is using private IP addresses, how can the computers on that network access the Internet? Public IP addresses are licensed and authorized to use the Internet. Private IP addresses are not authorized or licensed to use the Internet. A computer with a private IP address uses a NAT router to access the Internet. 8. Why is it unlikely that you will fi nd the IP address 192.168.250.10 on the Internet? IP addresses that begin with 192.168 are private IP addresses. 1

9. In Figure 15-9, the subnet mask is four notches tall and is considered a classless subnet mask for this network of sticks. How many notches tall would be a classful subnet mask for the same network? A classful subnet mask for this network would be two notches tall because the first two notches of all sticks in the network are the same. 10. If no DHCP server is available when a computer confi gured for dynamic IP addressing connects to the network, what type of IP address is assigned to the computer? Automatic private IP address (APIPA) 11. If a computer is found to have an IP address of 169.254.1.1, what can you assume about how it received that IP address? The IP address was automatically assigned by Windows when it failed to lease an address from the DHCP server. The computer received an APIPA IP address. 12. What are the last 64 bits of a IPv6 IP address called? How are these bits used? The Interface ID which is used to uniquely identify the network connection on the local link. 13. Name at least three tunneling protocols that are used for IPv6 packets to travel over an IPv4 network. ISATP, Teredo, and 6TO4 14. How is an IPv6 IP address used that begins with 2000::? That begins with FE80::? IP addresses that begin with 2000:: are global addresses used on the Internet. Addresses that begin with FE80:: are link local addresses used on a private network. 15. How many bits are in the Subnet ID block? What are the values of these bits for a linklocal IP address? The Subnet ID block contains 16 bits. The value of these bits for a link-local address are 0000 0000 0000 0000. 16. Which type of IPv6 address is used to create multiple sites within a large organization? Unique local addresses 2

17. What type of server serves up IP addresses to computers on a network? DHCP server 18. Which TCP/IP protocol that manages packet delivery guarantees that delivery? Which protocol does not guarantee delivery, but is faster? TCP, UDP 19. At what port does an SMTP email server listen to receive email from a client computer? Port 25 20. Which protocol does a web server use when transmissions are encrypted for security? HTTPS uses either HTTP together with SSL or TLS encryption protocols 21. What type of server resolves fully qualifi ed domain names to IP addresses? DNS server 22. Which email protocol allows a client application to manage email stored on an email server? IMAP 23. What type of protocol is used to present a public IP address to computers outside the LAN to handle requests to use the Internet from computers inside the LAN? NAT 24. Which protocol is used when an application queries a database on a corporate network such as a database of printers? LDAP 25. What type of encryption protocol does Secure FTP (SFTP) use to secure FTP transmissions? SSH 26. What two Windows applications use the RDP protocol and port 3389? Remote Desktop and Remote Assistance 3

27. Which version of 802.11 technologies can use two antennas at both the access point and the network adapter? 802.11n 28. Which wireless encryption standard is stronger, WEP or WPA? WPA 29. When securing a Wi-Fi wireless network, which is considered better security: to fi lter MAC addresses, use encryption, or not broadcast the SSID? To use encryption 30. Would you expect WPS to be used when a wireless network is using strong security, weak security, or no security (as in a public hotspot Strong security Thinking Critically 1. You have just installed a network adapter and have booted up the system, installing the drivers. You open Windows Explorer on a remote computer and don t see the computer on which you just installed the NIC. What is the fi rst thing you check? a. Has TCP/IPv6 been enabled? b. Is the computer using dynamic or static IP addressing? c. Are the lights on the adapter functioning correctly? d. Has the computer been assigned a computer name? Answer: c. Are the lights on the adapter functioning correctly? 2. Your boss asks you to transmit a small fi le that includes sensitive personnel data to a server on the network. The server is running a Telnet server and an FTP server. Why is it not a good idea to use Telnet to reach the remote computer? a. Telnet transmissions are not encrypted. b. Telnet is not reliable and the fi le might arrive corrupted. c. FTP is faster than Telnet. d. FTP running on the same computer as Telnet causes Telnet to not work. Answer: a. Because Telnet transmissions are not encrypted 3. Your job is to support the desktop computers in a small company of 32 employees. A consulting fi rm is setting up a private web server to be used internally by company employees. The static IP address of the server is 192.168.45.200. Employees will open their web 4

browser and enter personnel.mycompany.com in the URL address box to browse this web site. What steps do you take so that each computer in the company can browse the site using this URL? Answer: Make this entry in the Hosts file on each computer: 192.168.45.200 personnel.mycompany.com 5