Network Essentials: Peer-to-Peer Model Quiz
76 Questions
100 Views

Network Essentials: Peer-to-Peer Model Quiz

Created by
@AudibleFresno2256

Questions and Answers

What addressing information is recorded by a switch to build its MAC address table?

the source Layer 2 address of incoming frames

How many IP addresses in the pool are left to be assigned to other hosts?

247

Why might a network technician try to ping the default gateway from the employee laptop?

to verify connectivity with the device that provides access to remote networks

How many bits make up the single IPv6 hextet :10CD:?

<p>16</p> Signup and view all the answers

Which three pieces of information are identified by a URL?

<p>the protocol that is being used, the location of the resource, the domain name that is being accessed</p> Signup and view all the answers

Which type of applications are best suited to use UDP as the transport layer protocol?

<p>applications that require minimal transmission delay</p> Signup and view all the answers

What type of server would use IMAP?

<p>email</p> Signup and view all the answers

Which three types of nodes should be assigned static IP addresses on a network?

<p>gateways, servers, printers</p> Signup and view all the answers

Why is DHCP for IPv4 preferred for use on large networks?

<p>It is a more efficient way to manage IPv4 addresses than static address assignment is</p> Signup and view all the answers

Which message does an IPv4 host use to reply when it receives a DHCPOFFER message from a DHCP server?

<p>DHCPREQUEST</p> Signup and view all the answers

What message is sent by the server to let the client know it is able to use the provided IP information?

<p>DHCPACK</p> Signup and view all the answers

How is a DHCPDISCOVER transmitted on a network to reach a DHCP server?

<p>A DHCPDISCOVER message is sent with the broadcast IP address as the destination address.</p> Signup and view all the answers

What is the result if the default gateway address is misconfigured on a PC?

<p>The PC can communicate with devices in the same network but not with those in remote networks.</p> Signup and view all the answers

Which statement accurately describes dynamic NAT?

<p>It provides an automated mapping of inside local to inside global IP addresses.</p> Signup and view all the answers

What purpose does NAT64 serve in IPv6?

<p>It converts IPv6 packets into IPv4 packets.</p> Signup and view all the answers

Which type of IPv6 address is not routable and used only for communication on a single subnet?

<p>link-local address</p> Signup and view all the answers

What is the valid most compressed format possible of the IPv6 address 2001:0DB8:0000:AB00:0000:0000:0000:1234?

<p>2001:DB8:0:AB00::1234</p> Signup and view all the answers

What is an advantage of UDP over TCP?

<p>UDP communication requires less overhead.</p> Signup and view all the answers

What layer of the TCP/IP suite makes sure that all the data packets of a message arrive safely at the destination?

<p>transport</p> Signup and view all the answers

How does a client computer determine what source port number to assign to a UDP header?

<p>The port number is random within the range of dynamic port numbers.</p> Signup and view all the answers

What is a socket?

<p>the combination of a source IP address and port number or a destination IP address and port number</p> Signup and view all the answers

What is the purpose of using a source port number in a TCP communication?

<p>to keep track of multiple conversations between devices</p> Signup and view all the answers

Which two protocols are used in the process of sending and receiving emails?

<p>POP &amp; SMTP</p> Signup and view all the answers

What is a function of a DNS server?

<p>It determines the IP address that is associated with a specific host domain name.</p> Signup and view all the answers

Which two applications provide virtual terminal access to remote servers?

<p>SSH &amp; Telnet</p> Signup and view all the answers

What is the purpose of a DMZ?

<p>It allows external hosts to access specific company servers while maintaining the security restrictions for the internal network.</p> Signup and view all the answers

Which feature would the administrator configure to allow users on the outside network to establish HTTP connections to the internal website?

<p>port forwarding</p> Signup and view all the answers

What specialized network device is responsible for permitting or blocking traffic between networks?

<p>firewall</p> Signup and view all the answers

Why should WEP not be used in wireless networks today?

<p>easily crackable</p> Signup and view all the answers

What happens when a wireless access point is configured to stop broadcasting the SSID?

<p>The network is invisible to those who are unaware of the SSID.</p> Signup and view all the answers

What is a characteristic of a computer worm?

<p>exploits vulnerabilities with the intent of propagating itself across a network</p> Signup and view all the answers

Which type of attack involves an attacker using a powerful computer to try a large number of possible passwords in rapid succession to gain access to a system?

<p>brute force</p> Signup and view all the answers

Which three attacks exploit human behavior?

<p>vishing, pretexting, phishing</p> Signup and view all the answers

Which type of attack exploits human behavior to gain confidential information?

<p>social engineering</p> Signup and view all the answers

Which statement accurately characterizes the evolution of threats to network security?

<p>Internal threats can cause even greater damage than external threats.</p> Signup and view all the answers

Which three steps must be completed to manually connect an Android or iOS device to a secured wireless network?

<p>Input the authentication password, Enter the network SSID, Choose the correct security type</p> Signup and view all the answers

What is a disadvantage of deploying a peer-to-peer network model?

<p>Lack of centralized administration.</p> Signup and view all the answers

Which factor classifies a host as a server?

<p>The software installed.</p> Signup and view all the answers

Which term is used to describe a network device that relies on another device to obtain information?

<p>Client</p> Signup and view all the answers

How many unique values are possible using a single binary digit?

<p>2</p> Signup and view all the answers

Which network device is used to translate a domain name to the associated IP address?

<p>DNS server</p> Signup and view all the answers

A consumer places a smartphone close to a pay terminal at a store and the shopping charge is successfully paid. Which type of wireless technology was used?

<p>NFC</p> Signup and view all the answers

What should be done if customer mobile devices are not receiving network configuration information in a coffee shop?

<p>Make sure the DHCP server is functional.</p> Signup and view all the answers

What wireless technology would a user looking for wireless headphones likely use?

<p>Bluetooth</p> Signup and view all the answers

If you were drawing a physical topology of your school network, what type of information would you include?

<p>The location of devices in the building.</p> Signup and view all the answers

When authenticating within Packet Tracer, which two items could you use?

<p>An email address found in the NetAcad profile and a username associated with NetAcad.</p> Signup and view all the answers

What are two advantages of using fiber-optic cabling to interconnect devices?

<p>Fiber-optic cable is immune from EMI and RFI and they can extend several miles.</p> Signup and view all the answers

Which type of network cable is commonly used to connect office computers to the local network?

<p>Twisted-pair cable</p> Signup and view all the answers

What statement describes the use of the ping command?

<p>The ping command tests end-to-end connectivity between two devices.</p> Signup and view all the answers

Which type of network cable is used to connect the components that make up satellite communication systems?

<p>Coaxial</p> Signup and view all the answers

What are two sources of electromagnetic interference that can affect data transmissions?

<p>Fluorescent light fixture and microwave oven.</p> Signup and view all the answers

What terms represent the maximum and actual speed that can be utilized by a device to transfer data?

<p>Bandwidth and throughput.</p> Signup and view all the answers

Which type of network component can be used to share an attached printer to the network?

<p>Personal computer</p> Signup and view all the answers

Which criterion can be used to select the appropriate type of network media for a network?

<p>The environment where the selected medium is to be installed.</p> Signup and view all the answers

What action does the ARP process take when a host needs to build a frame, but the ARP cache does not contain an address mapping?

<p>The ARP process sends out an ARP request to the Ethernet broadcast address.</p> Signup and view all the answers

Which three layers of the OSI model map to the application layer of the TCP/IP model?

<p>Session, application, presentation.</p> Signup and view all the answers

What statement is true about MAC addresses?

<p>The first three bytes are used by the vendor assigned OUI.</p> Signup and view all the answers

What process is used to place one message inside another message for transfer from the source to the destination?

<p>Encapsulation.</p> Signup and view all the answers

What type of message is sent to a specific group of hosts?

<p>Multicast.</p> Signup and view all the answers

Name the three private IP ranges.

<p>10.0.0.0 - 10.255.255.255, 172.16.0.0 - 172.31.255.255, 192.168.0.0 - 192.168.255.255.</p> Signup and view all the answers

Which two OSI model layers have the same functionality as two layers of the TCP/IP model?

<p>Transport and network.</p> Signup and view all the answers

Which type of network model describes the functions that must be completed at a particular layer but does not specify exactly how each protocol should work?

<p>Reference model.</p> Signup and view all the answers

The Institute of Electrical and Electronics Engineers is responsible for standards in which two areas?

<p>Ethernet media access control and wireless LANs.</p> Signup and view all the answers

What does the 100 in the 100BASE-T standard indicate?

<p>Megabits per second.</p> Signup and view all the answers

What is the purpose of protocols in data communications?

<p>Providing the rules required for a specific type of communication to occur.</p> Signup and view all the answers

What will a Cisco LAN switch do if it receives an incoming frame and the destination MAC address is not listed in the MAC address table?

<p>Forward the frame out all ports except the port where the frame is received.</p> Signup and view all the answers

Which logical address is used for the delivery of data to a remote network?

<p>The destination IP address.</p> Signup and view all the answers

How can a network administrator reduce the number of devices that receive broadcast traffic?

<p>Segment the LAN into smaller LANs and route between them.</p> Signup and view all the answers

Which two functions are primary functions of a router?

<p>Path selection and packet forwarding.</p> Signup and view all the answers

What is the probable cause of a computer being able to access devices on the same network but not on other networks?

<p>The computer has an invalid default gateway address.</p> Signup and view all the answers

What will a router do to forward an incoming packet to a remote destination host?

<p>It encapsulates the frame with the destination MAC address by using the MAC address of the interface of the next-hop router.</p> Signup and view all the answers

What configuration can a network administrator issue in order to successfully forward incoming packets if a router does not contain a route to the remote destination network?

<p>Add a default route.</p> Signup and view all the answers

Which two parts are components of an IPv4 address?

<p>Host portion and network portion.</p> Signup and view all the answers

When a host sends a packet, how does it determine if the destination of the packet is on the same local network or on a remote network?

<p>It uses the subnet mask to compare the source and destination IP address.</p> Signup and view all the answers

What is the default subnet mask for an IP address of 198.133.219.4?

<p>255.255.255.0</p> Signup and view all the answers

What are the three layers of a hierarchical network design model?

<p>Core, distribution, access.</p> Signup and view all the answers

Study Notes

Network Models and Types

  • Peer-to-peer networks lack centralized administration, resulting in minimal security and limited scalability.
  • Servers are classified by having specific server software installed, impacting performance alongside CPU and memory.
  • Clients are devices that request services from servers, such as web browsers requesting pages from websites.

Data Transmission and Communication

  • A single binary digit can represent 2 unique values.
  • DNS servers translate domain names into IP addresses, enabling web browsing using familiar names.
  • NFC technology facilitates data exchange over short distances, ideal for contactless payments.
  • The DHCP server must be functional for devices to receive network configuration automatically.

Networking Hardware

  • Bluetooth technology is commonly used for short-range connections, suitable for devices like headphones, keyboards, and mice.
  • Twisted-pair cables connect office computers to local networks, while coaxial cables are used in satellite communication systems.
  • Fiber-optic cables are immune to EMI and RFI and can transmit data over long distances effectively.

Network Topology and Layout

  • Physical topology diagrams indicate the physical location of devices within a building.
  • A broadcast in a LAN reaching 200 devices can be minimized by segmenting the LAN into smaller broadcast domains.

IP Addressing and Networking Protocols

  • Private IP address ranges include:
    • 10.0.0.0 - 10.255.255.255
    • 172.16.0.0 - 172.31.255.255
    • 192.168.0.0 - 192.168.255.255
  • IPv4 addresses consist of a network portion, which identifies the specific network, and a host portion, which identifies individual hosts.
  • The default subnet mask for an IP address in the range of 198.133.219.4 is 255.255.255.0.

OSI and TCP/IP Models

  • The application layer of the TCP/IP model encompasses the session, presentation, and application layers of the OSI model.
  • Reference models like OSI provide an understanding of network functions without detailing the protocols.

Networking Commands and Processes

  • The ping command tests connectivity between devices, using round-trip time as an indicator.
  • ARP requests are sent for resolving MAC addresses when address mappings are absent in the ARP cache.

Device Communication and Routing

  • Routers perform path selection and packet forwarding, using routing tables to direct traffic based on destination addresses.
  • The MAC address table in switches is built from the source MAC addresses of incoming frames.

Troubleshooting and Connectivity

  • Connectivity issues are often diagnosed by pinging the default gateway, enabling checks of access to remote networks.
  • When a device cannot access external networks but can communicate locally, it often points to an invalid default gateway configuration.

Additional Network Components

  • Optical and electrical interference in data transmission can stem from devices like fluorescent lights and microwave ovens.
  • Encapsulation processes wrap data messages in protocol packets for transmission, allowing for structured data delivery.

Hierarchical Network Design

  • Cisco's hierarchical network design includes three layers: core, distribution, and access, each serving distinct roles in traffic management and connectivity efficiency.### IPv6 and Networking
  • A single IPv6 hextet is composed of 16 bits, formed by four hexadecimal characters.
  • URLs convey three crucial pieces of information: the protocol (like HTTP or FTP), the domain name, and the resource location.
  • UDP is optimal for applications requiring minimal transmission delay, benefiting from its lightweight, connectionless nature.

Email Protocols

  • IMAP (Internet Message Access Protocol) is used for email retrieval, while SMTP (Simple Mail Transfer Protocol) handles sending emails.
  • Static IP addresses are essential for servers, gateways, and printers to ensure consistent accessibility and management in networks.

DHCP and Address Management

  • DHCP (Dynamic Host Configuration Protocol) is preferred in large networks for its efficient IP address management compared to static assignment.
  • Upon receiving a DHCPOFFER from a DHCP server, a client responds with a DHCPREQUEST message to confirm address allocation.
  • The DHCPACK message is sent by the server to confirm that the client can utilize the provided IP address.

Network Configuration and IP Addressing

  • A DHCPDISCOVER message is broadcasted to locate DHCP servers, targeting a specific IP address and port for communication.
  • If a PC has a misconfigured default gateway, it can interact with local devices but cannot communicate with devices on remote networks.
  • Dynamic NAT allows for automated mapping between internal and external IP addresses, facilitating more efficient resource management.

Connectivity and Address Translation

  • NAT64 is used to convert IPv6 packets into IPv4 packets, supporting the transition from IPv4 to IPv6 networks.
  • Link-local addresses are non-routable and used solely for communication within a single subnet.
  • The most compressed format of an IPv6 address can omit leading zeros and utilize "::" to represent contiguous zero hextets.

Protocol Comparisons

  • UDP has less overhead than TCP, as it lacks reliability features like packet acknowledgment and independent packet sequencing.
  • The transport layer of the TCP/IP suite ensures data packet arrival and manages potential loss via retransmission requests.

Sockets and Ports

  • A socket is defined as the combination of a source IP address and port number, or a destination IP address and port number.
  • Source port numbers in TCP communications help track multiple conversations and maintain open response entries from servers.

Security Protocols

  • Firewalls regulate traffic between networks based on access policies, ensuring security within network communications.
  • Wireless security should avoid WEP due to its vulnerability; it can be easily compromised by attackers.

Wireless Networking

  • Configuring a wireless access point to stop broadcasting its SSID makes the network invisible to unauthorized users, though it remains accessible to those with the SSID.

Cybersecurity Threats

  • A computer worm propagates itself across a network by exploiting vulnerabilities, distinguishing it from a virus due to its self-sending characteristics.
  • Brute force attacks involve rapid attempts at guessing passwords to gain system access.
  • Social engineering, including tactics like phishing, pretexting, and vishing, exploits human behavior to breach security.

Network Security Evolution

  • Internal threats might inflict more damage than external ones due to direct access to corporate networks and sensitive data, making them a significant concern in network security.
  • Connecting mobile devices, like Android or iOS, to secured wireless networks requires inputs of the SSID, security type, and authentication password.

Studying That Suits You

Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

Quiz Team

Description

This quiz explores the disadvantages associated with peer-to-peer network models. Test your knowledge on the lack of centralized administration, security issues, and scalability limitations in such networks. Perfect for those studying networking fundamentals.

More Quizzes Like This

Use Quizgecko on...
Browser
Browser