Vous êtes sur la page 1sur 10

Classful network addressing has replaced classless network addressing due to a shortage of public IP address. True or False?

Base-2 numbering is used instead of Base-10 numbering in IP addressing. True or False? Internet Protocol (IP) is the primary protocol used on the World Wide Web. True or False? On a 100 Mbps hub, each port can use the full bandwidth (100 Mbps) without affecting other ports. True or False? As a best practice, switches are used to connect clients on a subnet and routers are used to connect subnets to other subnets. True or False? The subnet mask that helps determine what portion of an IP address belongs to the network and what portion belongs to the host. True or False? 7. Which of the following network protocols is not supported in Windows Server 2008? a. IPX b. IP c. TCP d. UDP You are responsible for deploying clients to a new four-story office building in Chicago. You are deploying 500 Windows Vista workstations, 30 network printers, and 5 Windows Server 2008 servers to this building. Your network administrator has provided you with the following private network address: 192.168.200.0 /23. Based on the information provided, will you be able to deploy as planned? (Choose the best two answers.) a. Yes, this solution has 768 usable addresses. b. No, this solution has only 2 available subnets. c. No, this solution has only 254 useable addresses. d. You should request a network address range of 192.168.200.0 /24 e. You should request a network address range of 192.168.200.0 /22 9. Which of the following is not a commonly used network topology? a. Star network

False

True

True

False

True

True

a. IPX

b. No, this solution has only 2 available subnets. You should request a network address range of 192.168.200.0 /22

c. Local area network

b. Ring network c. Local area network d. Mesh network Which of the following networks scales is used for highly-connected private networks like a single office building or a home network? a. Metropolitan Area Network b. Private Area Network c. Local Area Network d. Wide Area Network Which of the following are true about Network Interface Cards? Choose two answers. a. They are assigned a unique MAC address by the manufacturer. b. They are assigned a unique static IP address by the manufacturer. c. They allow devices to connect to a physical network. d. Multiple Network Interface Cards cannot be used on a single device. You need to create a create a CIDR addressing scheme that meets the following criteria: You have a minimum of 8 Network address ranges Each Network Address range supports at least 25 hosts The address scheme is based on a private IP addressing scheme Base on the criteria above, which of the following solutions meet the criteria? a. Use 192.168.100.0 /27 b. Use 192.168.100.0 /28 c. Use 192. 165.100.0 /27 d. Use 192.165.100.0 /28 e. Use 192. 165. 100.0 /21 Choose the binary conversion that best matches the IP address, 192.168.100.212 a. 11000000.10101000.0011010.11010100 b. 11000001.10010001.0011010.11010100 c. 11000000.10101000.0011011.11010100 IPv4 addresses are represented by ____-bit numbers that are broken into _____ octets using dotted decimal notation. IPv6 addresses are represented by ____-bit numbers that are broken into _____groups of hexadecimal 128, 8 32, 4 a. 11000000.10101000.0011010.11010100 a. Use 192.168.100.0 /27 a. They are assigned a unique MAC address by the manufacturer c. They allow devices to connect to a physical network. c. Local Area Network

numbers. Which IPv6 transition technology is used on IPv4 networks currently using NAT? a. ISATAP b. 6TO4 c. Teredo d. IPv6overNAT ______ configuration is often used for devices that need a static IP Receiving the IP address of 169.254.100.1 is a good indication that your client cannot contact a ______ server. ______ servers and _______ are server roles that are good candidates for using a manually configured IP address CIDR notation of _______ will divide the IP address 192.168.100.0 into 16 networks with 16 hosts. Use _______ from the command to view a clients detailed IP information. __uses ICMP requests to determine whether a target host is available Name two command line utilities that can be used to map the network route between two hosts: a. Netstat b. Tracert c. PingAll d. Pathping What is the proper syntax for initiating a looping ping to the IP address of 192.168.100.100? a. Ping -T 192.168.100.100 b. Ping -L 192.168.100.100 c. Ping -t 192.168.100.100 d. Ping -l 192.168.100.100 When using the ping utility, how do you use ping for testing name resolution to the target of Server01.abc.com at 192.168.100.100? a. ping 192.168.100.100 /hostname b. ping 192.168.100.100 /h c. ping server01.abc.com /hostname d. ping 192.168.100.100 c. Ping -t 192.168.100.100 b. Tracert d. Pathping Ping ipconfig /all /28 DNS, Domain Controller DHCP Alternate c. Teredo

d. ping 192.168.100.100 Bonus: What protocols that work at the network layer of the OSI model? Bonus: What are the 2 most commonly used protocols TCP and UDP that work at the transport level of the OSI model? Bonus: which of the following is a typical IPv6 Link Local address? A. fe80::1278:36ac34:119b B. fd00::1278:36ac34:119b C. ff00::1278:36ac34:119b D. 2001::3:1278:36ac34:119b Bonus: which of the following is a typical IPv6 Unique Local address? A. fe80::1278:36ac34:119b B. fd00::1278:36ac34:119b C. ff00::1278:36ac34:119b D. 2001::3:1278:36ac34:119b Bonus: When using the Windows Deployment services Domain Name Services (DNS), Active Directory role to remotely deploy OSs via the network, what other services must be present? Network Scale It refers to how networks occupy geographic space such as ranging from a small home office to a network that covers multiple locations and continents. Local Area Network (LANs) One of the two most common types of networks, a LAN is a private network that interconnects with one or more subnets - subnet works or smaller networks using high speed network connections. Wide Area Network (WAN) One of the two most common types of networks, WANs cover a relatively broad geographic area and often uses transmission facilities provided by common carriers such as telephone companies. (Note: it can cover one city to another city or to another country or a country another country) WAN connections often use connections that have ____ speeds than LAN connections WANs commonly run through an ____ which allocates WAN connections for private networks. internet service provider (ISP) lower (AD), Dynamic Host Configuration Protocol (DHCP) B. fd00::1278:36ac34:119b A. fe80::1278:36ac34:119b IPv4, IPv6, ARP, ICMP, IPsec, IGMP, IPX, X.25

Connection methodology

This defines the type of hardware technology used for connecting the network nodes.

fiber optics

A medium that uses glass fibers for transmitting data via light.

Network Architecture

A characteristic of networks that categorizes needs on the needs of a functional relationships between nodes. (Note: client-server, work group or peer-to-peer for example of a network architecture)

protocol suite

a group of protocols that works together to provide network services.

What layer of the OSI model do MAC addresses work on?

Layer 2 (Note: MAC adresses are designed to be globally unique and allow clients to communicate on certain networks.) (Note2: Data-Link Layer/Layer 2 - Ensures the reliability of the physical layer at Link 1. Responsible for adjacent network nodes such as, hubs & switches.)

Reapeater

recieves a single then resends it at a higher level or power so that the single can travel farther distances between the start and end points of communication.

a Hub works at what layer of the OSI model?

Layer 1 (Note: Physical Layer/Layer 1- responsible for bitlevel transmission between network nodes. Cabling and connection types are defined at this layer.)

___ connects to one or more network segments. this device uses MAC addresses for managing traffic as well as learns from the traffic it processes so it can associate a port with the specific MAC address to which it is connected. This device only sends traffic to the port it assocaites with. A bridge examines the source address of ____ traveling across its ports. The information from these are used by bridges to

Network Bridge (Note: this device works on the Data Link/Layer 2 of the OSI model.)

Frames (Note:Frames are units of data transferred between sender & receiver on a network)

associate bridge ports and MAC addresses then stored for future use. By design ____ cannot route traffic based on IP addresses. Although some are designated as Layer 3 (Network Layer) which means they can route by IP address, they are basically a router. and ___ combined. As noted the a switch is like a combination of a switch multi layer switches and router combined therefore; a switch spans layers of the OSI model. A device such as this is referred to as a _____ Within a normal network, all network nodes connect to one or more switches which are connected to a ___ for connectivity to other subnets or the internet. (Note: routers are also needed for forwarding traffic to other subnets or public networks in this situation.) Routers They forward packets between subnets or networks with differing IP address schemes by viewing the header of a data packet and using routing tables for determining the best destination route for the packets. (Note: routers work on Layer 3 of the OSI model) ____ use dynamic routing protocols and preconfigured static routes to deliver packets using the best route possible between two subnets. they are always cnnected to at least two networks, such as two LANs or a private network connected to the internet through ISP. The connection of two or more networks with layer three devices is referred to as an internet-works ____ interconnect subnets of differing types. The three distinct types of inter-networks : ___, ____, and ____ Networking is the practice of ___ Designing, implementing, and managing a collection of computers and devices or a network Throughput Describes the amount of data that can travel from one network point to another within a specified time Network bridges Connect one or more network segments routers ---------------------------extranet, interanet and Internet Routers router switches

Switches

Work at Layer 2 of the OSI model and forward frames between ports based on MAC addresses

Routers

Responsible for forwarding packets between subnets, or networks with differing IP addressing schemes Use dynamic routing protocols and preconfigured static routes to deliver packets Always connected to at least two networks

Transmission Control Protocol (TCP)

Set of rules to exchange messages with other Internet points at the information packet level Guarantees the delivery of packets

Physical layer

Responsible for bit-level transmission between network nodes

Data Link layer

Responsible for communications between adjacent network nodes

Network layer

Responsible for establishing paths for data transfer through the network

Transport layer

Responsible for delivering messages between networked hosts

Session layer

Responsible for establishing process-to-process communications between networked hosts

Presentation layer

Responsible for defining the syntax that two network hosts use to communicate

Application layer IPv4

Responsible for providing user services Based on an addressing scheme that uses unique 32-bit (4-byte) addresses

What is the first Octet range for a Class A IP address?

1-126 (Note: Max Hosts = 16, 777, 214)

What is the first Octet range for a Class B IP address?

128 - 191 (Note: Max Hosts = 65, 534)

What is the first Octet range for a Class C IP address?

192 - 223 (Note: Max Hosts = 254)

Subnetting

The process of creating multiple smaller networks, or subnets, from an IP network address

Subnet Mask

Can determine the network and host ID portions of an IP address

Classless Interdomain Routing (CIDR)

Uses variable length subnet masks to provide individualized network addressing

Supernetting

Allows you to combine two or more subnetworks into a larger supernetwork

Public addresses

Issued IP addresses that are available from the Internet

Private IP addresses

Not available or routable on the Internet Used by administrators deploying internal networks

IPv6

The future of IP on the Internet and on public and private networks Advantages: Improved security Improved autoconfiguration Simplified routing Addressing with IPv6

Addressing with ___ uses source and destination addresses that are 128 bits, or 16 bytes, in length Link-local addresses

IPv6

intended only for communications within the local subnetwork (IP4 Equivalent APIPA 169.254.1.0) fe80::

Unique local addresses

IPv6 counterpart of the IP4 local address but is not routable in the global IPv6 Internet fd00::

Global addresses DHCP

global addresses are globally routable Automates the allocation of IP addresses through a server-based role

APIPA addresses

Allow clients on the same subnet to communicate without DHCP or manual configuration. (Note: The IP address range is 169.254.0.1 through 169.254.255.254. The client also configures itself with a default class B subnet mask of 255.255.0.0. A client uses the selfconfigured IP address until a DHCP server becomes available. )

Alternate configuration

Used to set a static IP address in your IP

configuration that will be used if DHCP is not available Manually configuring IP addresses Often referred to as static configuration or a static IP addresses Static IP addresses Commonly used on servers where a dynamic IP address would affect network resources Configuring Clients for IPv4 and IPv6 Configuration methods DHCPv6 -------------Neighbor Discovery Stateless generates own and stateful gets from a DHCP server Main function is to provide clients with secondary network configuration information ---------------Protocol used by IPv6 clients for router discovery on a network Netsh Can be used to manually configure your Windows Server 2008 server with a static IP address (Note: Syntax to add an IPv6 address netsh interface ipv6 add address "interface" address.) Dual-Layer IP stack TCP/IP stack in Windows Server 2008 uses duallayer architecture IPv6 over IPv4 Tunnels that can be created Router-to-router Host-to-router and router-to-host Host-to-host Automatic Tunnel Addressing Protocol (ISATAP) Allows IPv6 routers and hosts to communicate across IPv4 networks Requires a router that supports ISATAP Interface ID is separated into two parts First 32 bits are either 0:5efe for a private address or 200:5efe for a public address Last 32 bits are the IPv4 address 6to4 Uses tunneling of IPv6 packets over an IPv4 network Stores the IPv4 address of the ISATAP router in bits 17 to 48 Encapsulates only the IPv4 router's IP address, not the destination client Teredo Allows IPv6 hosts to communicate over IPv4 networks that use NAT

Works only with NAT implementations that support UDP port translation Should always be implemented with a client-based stateful firewall To determine the current state of ISATAP (using netsh). To enable ISATAP (using netsh) If ISATAP is enabled and needs to be disabled (using netsh) enabling Teredo with netsh commands To determine the current state of Teredo netsh interface ipv6 show teredo -----------To enable Teredo for workgroup clients netsh interface ipv6 set teredo client ------------To enable Teredo for Active Directory clients netsh interface ipv6 set teredo enterpriseclient --------------To view the Teredo status after enabling Teredo netsh interface teredo show state Ping Utility that determines whether a target host is on and responding to communication Works by sending an ICMP echo request packet to the target By default, sends a 32-byte packet four times before exiting Pathping Used to map the hops a packet must make to reach a target Tracert Command-line tool for tracing the route between two nodes Netstat Command-line tool for displaying network connection information such as routing tables netsh interface isatap set state enabled netsh interface isatap set state disabled netsh interface isatap show state

Vous aimerez peut-être aussi