True/False Indicate whether the
statement is true or false.
|
|
1.
|
On a network using TCP/IP, some nodes may use multiple IP addresses.
|
|
2.
|
In CIDR, conventional network class distinctions do not exist.
|
|
3.
|
The MIME standard replaces SMTP.
|
|
4.
|
POP3’s design makes it best suited to users who retrieve their mail from
the same workstation all the time.
|
|
5.
|
IMAP4 servers require less storage space and usually more processing resources
than POP servers do.
|
Multiple Choice Identify the
choice that best completes the statement or answers the question.
|
|
1.
|
A class ____ network class is reserved for special purposes.
|
|
2.
|
In ____ addressing, the network information portion of an IPv4 address is
limited to the first 8 bits in a Class A address.
a. | classful | c. | stateful | b. | subnet | d. | limited |
|
|
3.
|
In classful addressing, the Class B IPv4 address network ID is located in the
____.
a. | last 8 bits | c. | first 8 bits | b. | last 16 bits | d. | first 16 bits |
|
|
4.
|
In classful addressing, Class C IPv4 address host information is located in the
____.
a. | last 8 bits | c. | first 8 bits | b. | last 16 bits | d. | first 16 bits |
|
|
5.
|
Within a classful addressing subnet mask, the ____ bits indicate that
corresponding bits in an IPv4 address contain network information.
a. | 0 | c. | first eight | b. | 1 | d. | last eight |
|
|
6.
|
Within a classful addressing, ____ is the default subnet mask for a Class C
address.
a. | 255.255.255.255 | c. | 255.255.0.0 | b. | 255.255.255.0 | d. | 255.0.0.0 |
|
|
7.
|
The result from ANDing 11001111 with 10010001 is ____.
a. | 11001111 | c. | 10000001 | b. | 10010001 | d. | 00000001 |
|
|
8.
|
When using classful IPv4 addressing, a network ID always ends with an octet of
____.
|
|
9.
|
Because the octets equal to 0 and 255 are ____, only the numbers 1 through 254
can be used for host information in an IPv4 address.
a. | unobtainable | c. | reserved | b. | out-of-range | d. | open for general
use |
|
|
10.
|
CIDR notation takes the form of the network ID followed by a(n) ____, followed
by the number of bits that are used for the extended network prefix.
a. | dash ( - ) | c. | backward slash ( \ ) | b. | underscore ( _ ) | d. | forward slash ( /
) |
|
|
11.
|
The ____ gateway is the gateway that first interprets its outbound requests to
other subnets, and then interprets its inbound requests from other subnets.
a. | proxy | c. | Internet | b. | core | d. | default |
|
|
12.
|
The gateways that make up the Internet backbone are called ____ gateways.
a. | proxy | c. | Internet | b. | core | d. | default |
|
|
13.
|
The most popular mail server programs are Sendmail and ____.
a. | Eudora | c. | AOL mail | b. | Microsoft Outlook | d. | Microsoft Exchange
Server |
|
|
14.
|
An example of a popular client email software is ____.
a. | MIME | c. | Sendmail | b. | Microsoft Outlook | d. | Microsoft Exchange
Server |
|
|
15.
|
SMTP operates from port ____.
|
|
16.
|
The standard message format specified by SMTP allows for lines that contain no
more than ____ ASCII characters.
a. | 100 | c. | 10,000 | b. | 1000 | d. | 1,000,000 |
|
|
17.
|
POP3 (Post Office Protocol, version 3) relies on TCP and operates over port
____.
|
|
18.
|
IMAP (Internet Message Access Protocol) is a mail retrieval protocol that was
developed as a more sophisticated alternative to ____.
|
|
19.
|
An administrator can discover the host name assigned to a client by using the
____ utility.
a. | host | c. | hostname | b. | nbstat | d. | nslookup |
|
|
20.
|
A program similar to mtr, ____, is available as a command-line utility in
Windows operating systems.
a. | nbstat | c. | dig | b. | pathping | d. | route |
|
|
21.
|
The ____ utility allows you to view a host’s routing table.
a. | nbstat | c. | dig | b. | pathping | d. | route |
|
Completion Complete each
statement.
|
|
1.
|
____________________ separates a network into multiple logically defined
segments, or subnets.
|
|
2.
|
The combination of additional bits used for subnet information plus the existing
network ID is known as the ____________________.
|
|
3.
|
The.backbone are called ____________________ gateways.
|
|
4.
|
____________________ is the protocol responsible for moving messages from one
mail server to another over TCP/IP-based networks.
|
|
5.
|
____________________ is a standard for encoding and interpreting binary files,
images, video, and non-ASCII character sets within an e-mail message.
|
Matching
|
|
|
Match each item with a statement below: a. | ipconfig utility | f. | dig
utility | b. | ifconfig utility | g. | nslookup utility | c. | netstat utility | h. | route utility | d. | nbstat
utility | i. | traceroute
utility | e. | host utility |
|
|
1.
|
Displays TCP/IP statistics and details about TCP/IP components and connections
on a host.
|
|
2.
|
Allows an administrator to query the DNS database from any computer on the
network and find the host name of a device by specifying its IP address, or vice versa.
|
|
3.
|
Useful only on networks that run Windows-based operating systems and
NetBIOS.
|
|
4.
|
Allows an administrator to query a DNS database and find the host name
associated with a specific IP address or vice versa.
|
|
5.
|
The TCP/IP administration utility for use with Windows operating
systems.
|
|
6.
|
Allows you to view a host’s routing table.
|
|
7.
|
Used if an administrator already know a host’s name and wants to learn
its IP address.
|
|
8.
|
The TCP/IP configuration and management utility used on UNIX and Linux
systems.
|
|
9.
|
Uses ICMP ECHO requests to trace the path from one networked node to another,
identifying all intermediate hops between the two nodes.
|
Short Answer
|
|
1.
|
Explain how to calculate a host’s network ID given its IPv4 address and
subnet mask.
|
|
2.
|
Describe the formula determining how to modify a default subnet mask to create
subnets.
|
|
3.
|
If subnetting is used on a LAN, explain how devices interpret subnetting
information.
|
|
4.
|
Explain how hiding IP addresses on private networks allows network managers more
flexibility in assigning addresses.
|
|
5.
|
Explain why SNAT is considered static and describe why this is useful.
|
|
6.
|
Describe what PAT is and how it works.
|
|
7.
|
Describe four features of IMAP4.
|
|
8.
|
Explain how the traceroute utility uses ICMP ECHO requests to trace the path
from one networked node to another, identifying all intermediate hops between the two nodes.
|
|
9.
|
Explain what happens when an administrator issues the mtr command.
|
|
10.
|
Describe the function of the route utility and provide examples of how it is
entered on a UNIX or Linux system, a Windows-based system, and a Cisco-brand router.
|