Networking Concepts and Server Types Quiz

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to Lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

Which tool should you use to ensure that a fiber-optic cable is working properly before installation?

  • Multimeter
  • Tone generator and probe
  • Loopback plug
  • Cable tester (correct)

Which TCP/IP protocol, designed to download email, allows for multiple clients to be simultaneously connected to the same mailbox?

  • SMTP
  • POP3
  • SMB
  • IMAP (correct)

If your laptop can't open a website while your phone can using cellular data, but your laptop can access internal servers and print without issues, what is the most likely reason for the website access problem?

  • Duplicate IP address
  • DNS server problem (correct)
  • DHCP server problem
  • Missing subnet mask

Which of the following TCP/IP protocols was designed as a replacement for Telnet?

<p>SSH (D)</p> Signup and view all the answers

Which protocol is used for remote computer management?

<p>RDP (B)</p> Signup and view all the answers

Which Wi-Fi standard operates in both 2.4 and 5 GHz frequencies?

<p>802.11ac (A)</p> Signup and view all the answers

What may be the reason for inability to connect a 5 GHz device to a LAN?

<p>802.11n network (D)</p> Signup and view all the answers

Which protocol is used for shared access to files and printers?

<p>SMB (C)</p> Signup and view all the answers

Which protocol uses port 23?

<p>Telnet (B)</p> Signup and view all the answers

What is the tool designed to test the range of a wireless signal?

<p>Wi-Fi analyzer (D)</p> Signup and view all the answers

Are website addresses starting with HTTPS:// safe for submitting confidential information?

<p>Yes (B)</p> Signup and view all the answers

Which protocol is responsible for delivering error messages in case of communication failure?

<p>ICMP (B)</p> Signup and view all the answers

What does a unicast IPv6 address identify?

<p>A single node on the network (D)</p> Signup and view all the answers

What geographical areas does WAN cover?

<p>Large geographical areas (A)</p> Signup and view all the answers

Which protocol uses port 22?

<p>SSH (B)</p> Signup and view all the answers

Is a non-routable IP address on the Internet 10.1.1.1?

<p>Yes (D)</p> Signup and view all the answers

What is the correct port for accessing an FTP server?

<p>Port 21 (D)</p> Signup and view all the answers

What port is associated with the LDAP protocol?

<p>Port 389 (D)</p> Signup and view all the answers

What subnet mask should be used for a Class B network address?

<p>255.255.0.0 (C)</p> Signup and view all the answers

What is a punchdown tool used for in networking?

<p>Attaching network cables to a 110 block (D)</p> Signup and view all the answers

Which type of internet connection offers the fastest download speeds?

<p>Fiber-optic (B)</p> Signup and view all the answers

Which of the following are public IPv4 addresses?

<p>69.252.80.71 and 144.160.155.40 (D)</p> Signup and view all the answers

What protocol uses port 445 in TCP/IP?

<p>SMB (C)</p> Signup and view all the answers

What is the IPv6 equivalent to 127.0.0.1 in IPv4?

<p>::1 (C)</p> Signup and view all the answers

When is a router used in modern networks?

<p>To extend a network (A)</p> Signup and view all the answers

What is TFTP used for in networking?

<p>Connectionless file transfer used locally with little security (D)</p> Signup and view all the answers

What can a cable tester be used for in networking?

<p>Identifying unlabeled UTP cables in a patch panel (A)</p> Signup and view all the answers

Do IPv6 interfaces use broadcasts?

<p>No, they do not use broadcasts (A)</p> Signup and view all the answers

Which one of the following IP addresses is not a private address and is routable on the Internet?

<p>45.67.89.10 (D)</p> Signup and view all the answers

When connecting to a website that encrypts its connection using TLS, on which port does the traffic travel?

<p>443 (A)</p> Signup and view all the answers

What is the shorthand notation that corresponds to the CIDR subnet mask 255.255.224.0?

<p>/19 (B)</p> Signup and view all the answers

In a scenario involving a mix of 802.11b and 802.11g devices, what technology allows for an upgrade while maintaining backward compatibility?

<p>802.11n (B)</p> Signup and view all the answers

What type of network spans multiple buildings or offices, confined to a relatively small geographical area?

<p>MAN (D)</p> Signup and view all the answers

What elements are required for a computer to connect to a network running IPv4?

<p>IP address, subnet mask, default gateway (D)</p> Signup and view all the answers

In a scenario where a customer reports receiving an error message about a duplicate IP address, what is the likely reason for this message?

<p>Another device on the network has the same IP address (D)</p> Signup and view all the answers

When setting up a network using a DHCP server, which device would require a static IP address that does not change?

<p>Print server (D)</p> Signup and view all the answers

What is the obsolete Wi-Fi encryption standard that uses a static key, commonly 10, 26, or 58 characters long?

<p>WEP (B)</p> Signup and view all the answers

In the context of setting up a device to be monitored using an SNMP agent and manager, on which port will the SNMP manager typically poll the agent?

<p>161 (C)</p> Signup and view all the answers

In a scenario where specific ports on the external firewall have been shut down due to a security breach, what does the IT team need to do to enable Internet access via URLs?

<p>Open back up the ports for HTTP (port 80) and HTTPS (port 443) (B)</p> Signup and view all the answers

What technology allows for low-power, passive reading of small tags or patches on objects?

<p>RFID (C)</p> Signup and view all the answers

Which protocol uses port 137 and 139?

<p>SMB (C)</p> Signup and view all the answers

How can end-user devices in a small office/home office (SOHO) network obtain IP addresses?

<p>Via static address configuration, DHCP, or service location protocol (D)</p> Signup and view all the answers

What should be configured to restrict a wireless network to only five specific devices?

<p>MAC address filtering (B)</p> Signup and view all the answers

What type of server provides Internet access to company-provided information and services?

<p>Web server (A)</p> Signup and view all the answers

What type of device allows control of a thermostat at home from a cell phone?

<p>IoT device (B)</p> Signup and view all the answers

What technology is used when a customer places their phone next to a device to pay for a purchase in a fast-food restaurant?

<p>NFC (B)</p> Signup and view all the answers

What type of server functions as a central repository of documents and provides network shared file storage for internal users?

<p>File server (C)</p> Signup and view all the answers

In what way do homeowner's IoT devices connect to their wireless network?

<p>Using DHCP (B)</p> Signup and view all the answers

What should be configured by a school district to provide Internet access for students while protecting them from malicious traffic and inappropriate websites?

<p>Proxy server (B)</p> Signup and view all the answers

When configuring a phone to download and upload email, what type of server is used?

<p>Mail server (C)</p> Signup and view all the answers

What technology and Ethernet device on a 1000BaseT network can be at a maximum distance of 100 meters?

<p>Power over Ethernet injector and Ethernet device (C)</p> Signup and view all the answers

Flashcards

Cable tester

A tool that tests the functionality of a fiber-optic cable before installation.

IMAP

An email protocol that allows for multiple clients to download emails simultaneously from the same mailbox.

DNS Server problem

A problem with the DNS server, which is responsible for translating domain names into IP addresses, preventing access to websites.

SSH

A secure shell protocol designed as a secure alternative to Telnet for remote login and command execution.

Signup and view all the flashcards

RDP

A protocol used for remote desktop access, allowing users to control another computer remotely.

Signup and view all the flashcards

802.11ac

A Wi-Fi standard that operates on both 2.4 GHz and 5 GHz frequencies, providing faster speeds and better performance.

Signup and view all the flashcards

802.11n network

A network using the 802.11n standard, which may not support 5 GHz connectivity.

Signup and view all the flashcards

SMB

A protocol used for sharing files and printers across a network.

Signup and view all the flashcards

Telnet

A protocol that uses port 23 for remote access to a computer system, using plain text for communication.

Signup and view all the flashcards

Wi-Fi Analyzer

A tool that measures the signal strength and coverage of a Wi-Fi network.

Signup and view all the flashcards

HTTPS:// website security

Yes, websites using HTTPS encryption are generally safe for submitting confidential information.

Signup and view all the flashcards

ICMP

A protocol responsible for delivering error messages about network failures and communication issues.

Signup and view all the flashcards

Unicast IPv6 address

A unicast IPv6 address identifies a single node or device on a network.

Signup and view all the flashcards

WAN coverage

WANs cover large geographic areas, spanning cities, countries, or continents.

Signup and view all the flashcards

SSH port

SSH uses port 22 for secure remote access.

Signup and view all the flashcards

Non-routable IP address

10.1.1.1 is a non-routable IP address used in private networks.

Signup and view all the flashcards

FTP server port

Port 21 is used to access FTP servers, which are used for transferring files.

Signup and view all the flashcards

LDAP protocol port

LDAP uses port 389 for accessing directory services, managing user accounts and network resources.

Signup and view all the flashcards

Class B network subnet mask

A subnet mask of 255.255.0.0 is used for Class B networks, which have a range of addresses from 128.0.0.0 to 191.255.255.255.

Signup and view all the flashcards

Punchdown tool function

A punchdown tool is used to connect network cables to a 110 block, which is a common connection point for network wiring.

Signup and view all the flashcards

Fastest internet connection type

Fiber-optic connections offer the fastest download speeds due to their ability to transmit data at the speed of light.

Signup and view all the flashcards

Public IPv4 addresses

69.252.80.71 and 144.160.155.40 are public IPv4 addresses, routable on the internet, assigned to devices on external networks.

Signup and view all the flashcards

SMB TCP/IP port

SMB uses port 445 for sharing files and printers on a network.

Signup and view all the flashcards

IPv6 loopback address

The IPv6 equivalent of 127.0.0.1 in IPv4 is ::1, representing the loopback address on a computer.

Signup and view all the flashcards

Router function in networks

Routers are used to extend a network by connecting multiple network segments together, allowing devices on different networks to communicate with each other.

Signup and view all the flashcards

TFTP in networking

TFTP is used for transferring small files locally on a network, offering a simple connectionless approach without complex security.

Signup and view all the flashcards

Cable tester for UTP cables

A cable tester is used to identify unlabeled cables within a patch panel by analyzing signal patterns, making troubleshooting easier.

Signup and view all the flashcards

IPv6 broadcasts

IPv6 interfaces do not use broadcasts because each node has a unique address, making broadcasts unnecessary.

Signup and view all the flashcards

Routable IP address

45.67.89.10 is a public IP address and is routable on the internet.

Signup and view all the flashcards

TLS connection port

When you access a secure website (HTTPS), data is transmitted over port 443, providing encryption for secure communication.

Signup and view all the flashcards

CIDR subnet mask notation

The shorthand notation for subnet mask 255.255.224.0 is /19, which indicates the number of bits used for the network portion of an IP address.

Signup and view all the flashcards

802.11n backward compatibility

802.11n technology allows for backward compatibility with older 802.11b and 802.11g devices while providing faster speeds and increased range.

Signup and view all the flashcards

MAN coverage

MANs cover a specific geographical area, connecting multiple buildings or offices within a city or town.

Signup and view all the flashcards

IPv4 network requirements

To connect to a network running IPv4, a computer needs an IP address, a subnet mask, and a default gateway.

Signup and view all the flashcards

Duplicate IP address error

A duplicate IP address error message usually happens when another device on the network is mistakenly configured with the same IP address as another device.

Signup and view all the flashcards

Static IP for print server

A print server should have a static IP address to ensure consistent access to the printer for all users.

Signup and view all the flashcards

WEP encryption

WEP is an outdated Wi-Fi encryption standard using a static key, lacking in security compared to newer standards like WPA2 and WPA3.

Signup and view all the flashcards

SNMP management port

SNMP managers typically poll agents on port 161, gathering information about network devices for monitoring.

Signup and view all the flashcards

Firewall port opening for internet access

To enable internet access via URLs after specific ports are shut down on the external firewall, the IT team needs to open ports for HTTP (port 80) and HTTPS (port 443) again.

Signup and view all the flashcards

RFID technology

RFID involves low-power passive tags or patches attached to objects, allowing for wireless reading and identification.

Signup and view all the flashcards

SMB protocol ports

SMB uses ports 137 and 139, protocols responsible for networking and file sharing services.

Signup and view all the flashcards

SOHO network IP address configuration

End-user devices in a SOHO network can obtain IP addresses through static configuration, DHCP, or service location protocols.

Signup and view all the flashcards

MAC address filtering

MAC address filtering restricts network access to only specific devices by blocking any devices whose MAC addresses are not in the allowed list.

Signup and view all the flashcards

Web server function

A web server provides internet access to company-provided information and services, hosting websites and providing web content.

Signup and view all the flashcards

IoT device

IoT devices allow for remote control and automation of everyday objects using a network connection.

Signup and view all the flashcards

NFC technology

NFC is a short-range wireless communication technology used for mobile payments and data transfer between devices, like phones and payment terminals.

Signup and view all the flashcards

File server function

A file server functions as a central repository for shared files, offering network storage and access for internal users within an organization.

Signup and view all the flashcards

IoT device network connection

Homeowner's IoT devices connect to their wireless network using DHCP, which automatically assigns IP addresses to devices on the network.

Signup and view all the flashcards

School district network security

A school district typically sets up a proxy server to filter and monitor internet access for students, ensuring safety and appropriate content consumption.

Signup and view all the flashcards

Mail server role

When configuring a phone for email, you are configuring it to work with a mail server, which handles sending and receiving emails.

Signup and view all the flashcards

Study Notes

Networking Concepts and Server Types

  • Power over Ethernet injector and Ethernet device on 1000BaseT network can be at a maximum distance of 100 meters
  • The protocols using port 137 and 139 are SMB and NetBT
  • End-user devices in a small office/home office (SOHO) network obtain IP addresses through static address configuration, DHCP, or service location protocol
  • To restrict a wireless network to only five specific devices, MAC address filtering should be configured
  • Homeowner's IoT devices connect to their wireless network using DHCP
  • Communication technology used when a customer places their phone next to a device to pay for a purchase in a fast-food restaurant is NFC
  • RFID technology allows for low-power, passive reading of small tags or patches on objects
  • Web server provides Internet access to company-provided information and services
  • The device allowing control of a thermostat at home from a cell phone is an IoT device
  • A file server functions as a central repository of documents and provides network shared file storage for internal users
  • Proxy server needs to be configured by a school district to provide Internet access for students while protecting them from malicious traffic and inappropriate websites
  • Mail server is used when configuring a phone to download and upload email

Studying That Suits You

Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

Quiz Team

Related Documents

More Like This

Computer Networking Basics
10 questions
Introduction to Networks
81 questions
Networking Concepts
48 questions

Networking Concepts

FunnyPointOfView4880 avatar
FunnyPointOfView4880
Use Quizgecko on...
Browser
Browser