Term
| To configure TCP/IP, you need to modify three parameters: |
|
Definition
| • IP address • a subnet mask, and • the default gateway |
|
|
Term
| You need to specify ______ ___ _____ a for every host and router on the network. |
|
Definition
|
|
Term
| What is the lowest IP address? |
|
Definition
|
|
Term
| What is the highest IP address? |
|
Definition
|
|
Term
| All _____ addresses are 32-bits long and are divided into four octets, with eight bits each. |
|
Definition
|
|
Term
| Network addresses are written in _______ _______ ______ with each of the eight bits written in decimal form. |
|
Definition
|
|
Term
| IPv4 is different from IPv6 in what way? |
|
Definition
| IPv4 is 32-bit and IPv6 is 128-bit |
|
|
Term
| What is a subnet mask and how is it used? |
|
Definition
| A subnet mask is used to determine which subnetwork, or subnet, an IP address belongs to. A subnet mask also helps to determine whether the source and destination machines are located in the same or in different networks. It does this by comparing the network addresses of both machines. |
|
|
Term
| If the number 255 occurs in a ______ ______, the corresponding octet in the IP address is part of the network address. |
|
Definition
|
|
Term
| An IP address of 209.62.20.241 with the subnet mask 255.255.255.0 uses what host number? |
|
Definition
| 241 on the subnet 209.62.20.0 |
|
|
Term
| How would you know whether or not a source and destination machine are located in the same or in different networks? |
|
Definition
| A subnet mask will determine whether the source and destination machines are located in the same or in different networks. It does this by comparing the network addresses of both machines. |
|
|
Term
| What has to happen if the network addresses of two machines are different? |
|
Definition
| Data has to be passed to a router for the forwarding to the destination machine's router. |
|
|
Term
| What can you determine from this information? Host A's IP address is 209.62.20.242 and its subnet mask is 255.255.255.0. Host B's IP address is 209.62.20.244 and its subnet mask is 255.255.255.0. |
|
Definition
| The network address for both the machines is the same, which means that both the machines are on the same network. |
|
|
Term
|
Definition
| The gateway is a router that allows access from a local subnet to the rest of the intranet or the Internet. |
|
|
Term
| Why was a gateway given its name? |
|
Definition
| It's named the gateway because it's the point where data enters and exits the network. |
|
|
Term
|
Definition
| Users normally access network resources using friendly text strings rather than IP addresses. These strings are known as domain names. |
|
|
Term
|
Definition
| FQDNs, or Fully Qualified Domain Names, are often used instead of IP addresses. |
|
|
Term
| What do users use to access the internet instead of IP addresses? |
|
Definition
| FQDNs, or Fully Qualified Domain Names, are often used instead of IP addresses. |
|
|
Term
(T/F)
With thousands of workstations connected to the Internet, it's easy to maintain this string-to-IP address mapping while ensuring host name and conflict resolution. |
|
Definition
|
|
Term
| What is used to translate network resource FQDNs to IP addresses? |
|
Definition
|
|
Term
|
Definition
| DNS is a group of protocols and services widely used over the Internet and TCP/IP based networks. It's an application-layer protocol that uses a hierarchical, domain-based naming scheme. The naming scheme is implemented by means of a distributed database system. |
|
|
Term
| DNS is a _____ of protocols and services widely used over the Internet and TCP/IP based networks |
|
Definition
|
|
Term
| ____ is an application-layer protocol that uses a hierarchical, domain-based naming scheme. |
|
Definition
|
|
Term
| By what means is DNS implemented? |
|
Definition
| The naming scheme is implemented by means of a distributed database system. |
|
|
Term
| How is an IP address assigned statically? |
|
Definition
| For static assignment, you need to manually configure a computer's IP address. |
|
|
Term
| What happens when you choose not to use DHCP? |
|
Definition
| When you enter a specific IP address and choose not to use DHCP, the computer uses a static IP address, which doesn't change upon reboot. |
|
|
Term
| How does private addressing work? |
|
Definition
| Network Address Translation maps private IP addresses in the network to an external IP address that is valid on the Internet. |
|
|
Term
|
Definition
| Network Address Translation |
|
|
Term
|
Definition
| It uses a single public IP address to access the Internet for all hosts on the network that use private IP addresses. |
|
|
Term
| In order to use private addressing, what must be installed? |
|
Definition
| When NAT is used, a networked computer that tries to access the Internet needs to go through a NAT device. This can be a server, router, or other device that substitutes the private IP address of the host for a public IP address that is valid on the Internet. |
|
|
Term
|
Definition
| A NAT device that stands between the network and the Internet will have two NICs installed. One card connects to the LAN and the other card connects to the Internet via an ISP. |
|
|
Term
(T/F)
A proxy server can serve as a firewall. |
|
Definition
|
|
Term
|
Definition
| A firewall is a piece of hardware or software that prevents illegal and unwanted data from entering the network. |
|
|
Term
| You want to adjust a computer’s Windows Firewall settings so that the Problem Reports and Solutions application has permission to connect to the computer. You’ve already opened the control panel and clicked on Security. What do you do next (5)? |
|
Definition
| 1. Click Allow a program through Windows Firewall 2. Change Settings 3. Select continue through the User Account Control pop-up 4. In the Windows Firewall Settings choose the Exceptions tab 5. Click Add programs and press OK |
|
|
Term
As the IT technician of Hortalez Holdings, a commercial shipping company, you need to ensure that the network is safely and accurately connected to the internet. Identify the characteristics of an IPv4 address:
a. The lowest IP address is 1.1.1.1 and the highest is 255.255.255.255
b. IP addresses are 32 bits long and are divided onto four octets of eight bits each
c. Every host and router is provided with the same IP address |
|
Definition
|
|
Term
Match each net command with its associated function: Used to display help on how to use net commands
a. Netstat
b. net /?
c. Net use |
|
Definition
|
|
Term
Match each net command with its associated function: Used to check the functioning of TCP/IP connections
a. Netstat
b. net /?
c. Net use |
|
Definition
|
|
Term
Match each net command with its associated function: Used to map network drives
a. Netstat
b. net /?
c. Net use |
|
Definition
|
|
Term
Your computer can’t transfer files and you want to troubleshoot FTP to find the cause of the problem. Identify the methods you can use to troubleshoot FTP? (choose all that apply)
a. Ensure that the correct connection port is used
b. Verify the server permissions and the directory structures
c. Ensure that you’re using an APIPA address
d. Ensure port 80 is open |
|
Definition
|
|
Term
As the IT technician of Imagenie, a graphics design company, you need to troubleshoot a problem regarding the e-mail process. Several users have trouble sending e-mail messages. Which setting do you verify to troubleshoot the problem?
a. NAT settings
b. SMTP settings
c. IMAP settings
d. DNS settings |
|
Definition
|
|
Term
SSL is used to secure and encrypt http data transfers and enable https. What does SSL use to encrypt http?
a. 128-bit encryption keys
b. TLS
c. TCP port 40
d. Cleartext |
|
Definition
|
|
Term
| As the IT technician of the Central-West Bank, you want to add an exception to bypass the proxy to ensure access for internal users to the docu-sentry.com domain. You’ve already opened the Connections tab in the Internet Options dialog box. Perform the steps to complete the task. |
|
Definition
1. Click on the LAN settings button
2. Click on the button for ‘Use a proxy server for you LAN (These settings will not apply to dial-up or VPN connections).
3. Click Advanced button
4. Type *docu-sentry.com in the Exceptions text box and click ok
5. Click ok twice |
|
|
Term
| What is fouund between a LAN and the internet? |
|
Definition
| Even a small LAN typically has a device, such as a router, between the LAN and the Internet. |
|
|
Term
| What functions does a router provide? |
|
Definition
| This device serves as a proxy server, DHCP server, and firewall. |
|
|
Term
|
Definition
| DHCP is an abbreviation of Dynamic Host Configuration Protocol. |
|
|
Term
| Performing the function of a firewall, the device filters out any ______ ______ from the Internet. |
|
Definition
|
|
Term
|
Definition
| APIPA is an acronym for Automatic Private IP Addressing. |
|
|
Term
| What is the first thing to do when troubleshooting IP configurations? |
|
Definition
| To troubleshoot protocol configuration issues, you first need to ensure that you're not using an APIPA address on a large network. |
|
|
Term
| APIPA automatically assigns IP addresses to a small network if it has a single subnet and doesn't use a ______ ______ or _____ ____ ______. |
|
Definition
DHCP server
static IP addressing |
|
|
Term
| A client computer that uses ______ can communicate only with other clients on the same subnet that also use this feature. |
|
Definition
|
|
Term
| How do you figure out whether or not your computer has an APIPA address? |
|
Definition
| To determine whether a computer has an APIPA address, you use the ipconfig or ipconfig /all command. If the resulting output is Autoconfiguration Enabled and the computer uses an IP address in the highlighted range, the system is using APIPA. |
|
|
Term
You're the technician of a new company with a large network. You need to connect the network to the Internet by configuring TCP/IP. Which parameter settings do you modify to configure this suite? Options: 1. Router 2. IP address 3. Subnet mask 4. APIPA addresses 5. Gateway 6. Firewall |
|
Definition
2. IP address 3. Subnet mask 5. Gateway |
|
|
Term
| When you need to enable an e-mail account, you configure ____ _____ _____ _____. |
|
Definition
| Simple Mail Transfer Protocol |
|
|
Term
|
Definition
| E-mail uses SMTP to travel from the Sender machine to the Sender's mail server and, from there, to the Receiver's mail server. It then downloads to the receiver's machine using POP or IMAP. |
|
|
Term
| What two ways can email be downloaded from a receivers mail server? |
|
Definition
| • Post Office Protocol or • Internet Message Access Protocol |
|
|
Term
|
Definition
|
|
Term
|
Definition
| Internet Message Access Protocol |
|
|
Term
| What is the first point of troubleshooting email problems? |
|
Definition
| If a problem occurs with a new e-mail account, you use the SMTP and POP or IMAP settings as the first points of troubleshooting. |
|
|
Term
| What's the first thing you do is incoming messages aren't coming through? |
|
Definition
| For example, when incoming messages aren't coming through, you can troubleshoot the problem by verifying the POP or IMAP settings. |
|
|
Term
| What is the preferred standard for email transmission? |
|
Definition
| SMTP is the preferred standard for e-mail transmissions over the Internet. |
|
|
Term
|
Definition
| It's a text-based protocol where the sender specifies one or more recipients of a message. |
|
|
Term
| What should you do when there's a problem sending email messages? |
|
Definition
| When there's a problem with the sending of e-mail messages, you troubleshoot by checking that the SMTP settings are correct. |
|
|
Term
|
Definition
| The e-mail server that manages the sending of e-mail messages is usually identified as the SMTP server because it uses the SMTP protocol. The SMTP at the client end first verifies whether the recipient e-mail IDs exist on the mail server |
|
|
Term
|
Definition
|
|
Term
| When does the email server send messages? |
|
Definition
| only after it verifies whether the recipient e-mail IDs exist on the mail server |
|
|
Term
|
Definition
| SMTP AUTH is an improved version of SMTP, and is short for SMTP Authentication. |
|
|
Term
| When a message arrives at your e-mail server, it remains there until you request delivery what protocol is being used? |
|
Definition
| The e-mail server then uses either POP or IMAP to deliver the message. |
|
|
Term
| How do you access your email over the internet? |
|
Definition
| You can use IMAP to access incoming e-mail messages on a remote server or on the Internet-based e-mail. |
|
|
Term
| What are the two most common internet standard protocols used to retrieve email? |
|
Definition
| IMAP and POP are the two most common Internet standard protocols used to retrieve e-mail messages. |
|
|
Term
| When is IMAP typically used? |
|
Definition
| IMAP is mostly used in large networks and in networks where users need to download several messages or large-sized messages. |
|
|
Term
| What is advantage of IMAP? |
|
Definition
| The user interface in IMAP remains active as long as the user is connected. This enables faster access and message downloads than most other protocols. |
|
|
Term
(T/F) IMAP allows only single users to connect to a mailbox at a time. |
|
Definition
False IMAP enables multiple users to connect to the mailbox simultaneously. It also provides mechanisms for users to detect changes to the mailbox made by other clients who are connected at the same time. |
|
|
Term
| IMAP also supports _____-______ _____ for messages that meet particular criteria, without requiring the user to download all the messages before performing the search. |
|
Definition
|
|
Term
| The software saves these addresses, and the other configuration information, in an initialization file, the ______ _____ , or another location. |
|
Definition
|
|
Term
| To troubleshoot the e-mail process, you confirm the server information which includes (5): |
|
Definition
• incoming server name
• incoming & outgoing mail servers
• account name
• password authentication settings |
|
|
Term
You're the IT technician of a new company, Gleeson Associates, which specializes in executive job searches. You need to enable an e-mail account on a new employee's laptop. Which two settings specifically relate only to email?
Options:
1. SMTP and IMAP settings
2. DNS and FQDN settings
3. SMTP and DNS settings
4. IMAP and FQDN settings |
|
Definition
| 1. SMTP and IMAP settings |
|
|
Term
| ____ is often used to upload modified files when updating a web site. |
|
Definition
|
|
Term
| What is Port 20 used for? |
|
Definition
| port 20 is used for data transmission by FTP |
|
|
Term
| What two ports does FTP use? |
|
Definition
|
|
Term
| What does FTP use port 21 for? |
|
Definition
| Port 21 is used for control |
|
|
Term
| A standard network protocol used to transfer files between computers on TCP/IP networks or the Internet |
|
Definition
|
|
Term
(T/F)
All firewalls allow you to make exceptions to blocked ports and programs. |
|
Definition
|
|
Term
| When troubleshooting FTP where should you start? |
|
Definition
| The built-in Windows Firewall is a good place to start when you're troubleshooting FTP issues. |
|
|
Term
| You can troubleshoot FTP issues by (5): |
|
Definition
• ensuring that you're using the correct login, password, and IP address
• verifying the server permissions and the directory structures
• ensuring that the correct connection port is open and being used
• confirming that the problem is not caused by the network router or firewall
• ensuring that the subnet mask is correctly configured |
|
|
Term
| What command line can you use to troubleshoot FTP? |
|
Definition
| To troubleshoot FTP problems, you can use the ping command to test the FTP server's response |
|
|
Term
| You can also disable the ______ and _______ programs to determine whether they're stopping FTP from gaining access |
|
Definition
|
|
Term
| You can check your firewall's _______ to ensure FTP ports are open. |
|
Definition
|
|
Term
You're unable to upload files to the web server and you suspect that the problem might be with the FTP. Which methods can you use to troubleshoot it? Options:
1. Confirm that the problem isn't caused by the network router or firewall program
2. Configure SMTP and either POP or IMAP
3. Ping the FTP server to test its response Ensure that you're not using NAT |
|
Definition
1. Confirm that the problem isn't caused by the network router or firewall program
3. Ping the FTP server to test its response |
|
|
Term
| A ______ ______ is flanked by a client and an origin server. |
|
Definition
|
|
Term
| How does a proxy server work? |
|
Definition
| It acts as the go-between by accepting requests from clients, transmitting these to the origin server, and returning the response to the client. |
|
|
Term
| How can you reduce client wait time? |
|
Definition
| Several clients sometimes request the same content. When this occurs, the proxy can deliver the content from its cache instead of requesting it from the origin server each time. This reduces the time a client needs to wait |
|
|
Term
| How can you disallow internet connections? |
|
Definition
| By specifying certain proxy settings, you can also allow or disallow Internet connections. |
|
|
Term
| How do you change proxyx settings? |
|
Definition
| To configure proxy settings on your Windows computer, you open a web browser – in this case Internet Explorer and click Tools - Internet Options. The Internet Options dialog box opens on the General tabbed page by default. The Internet Options dialog box contains the following tabs: General, Security, Privacy, Content, Connections, Programs, and Advanced. Then you access the Connections tabbed page and click the LAN settings button. In the LAN Settings dialog box, you can configure the connection settings for the LAN |
|
|
Term
| DHCP allocates ______ _______ to systems on a network during boot-up. |
|
Definition
|
|