Deck 3: Networking With Windows Server 2008

Full screen (f)
exit full mode
Question
Switches work at Layer 3 of the OSI model and forward frames between ports based on MAC addresses.
Use Space or
up arrow
down arrow
to flip the card.
Question
____ is the practice of designing, implementing, and managing a collection of computers and devices or a network.

A)Networking
B)Subnetting
C)Routing
D)Linking
Question
The term ____ refers to how networks occupy geographic space.

A)logical layout
B)frame
C)network scale
D)Ethernet
Question
Manually configuring IP addresses is often referred to as a ____.

A)node
B)static IP address
C)packet
D)multilayer switch
Question
The Transport layer of the OSI model is responsible for defining the syntax that two network hosts use to communicate.
Question
A ____ is a group of protocols that work together to provide network services.

A)protocol suite
B)frame
C)bridge
D)switch
Question
Network bridges connect one or more network segments.
Question
____ is the process of creating multiple smaller networks, or subnets, from an IP network address.

A)CIDR
B)Autoconfguration
C)ISATAP
D)Subnetting
Question
____ is a set of rules to exchange messages with other Internet points at the information packet level, and guarantees the delivery of packets.

A)Multicast
B)DHCP
C)TCP
D)UDP
Question
____ addresses allow clients on the same subnet to communicate without DHCP or manual configuration.

A)DHCP
B)UDP
C)APIPA
D)TCP
Question
A(n)____ is a group of two or more nodes, such as computers, printers, and other hardware devices, linked together for sharing data.

A)packet
B)switch
C)network
D)NIC
Question
A ____ is a unit of data transferred between a sender and receiver on a network.

A)frame
B)hub
C)repeater
D)router
Question
A ____ is the most basic of the hardware devices that interconnect multiple nodes.

A)bridge
B)hub
C)repeater
D)router
Question
NICs can provide access to fiber-optic, wireless LAN, or Ethernet networks.
Question
The Application layer of the OSI model is responsible for establishing process-to-process communications between networked hosts.
Question
____ are hardware cards installed in computers so the computers can connect to a physical network.

A)Bridges
B)Switches
C)Network interface cards
D)Routers
Question
____ performs local and remote network configuration tasks.

A)CIDR
B)RIP
C)netsh
D)ipconfig
Question
A ____ can determine the network and host ID portions of an IP address.

A)subnet mask
B)mesh network
C)CIDR block
D)hub
Question
____ categorizes networks based on the physical and logical relationship among devices.

A)Network protocol
B)Network topology
C)Network layout
D)Network architecture
Question
A(n)____ is a private network that interconnects one or more subnets using high-speed network connections.

A)IP
B)LAN
C)NIC
D)MAC
Question
A(n)____________________ is a hardware device that receives a signal and then resends it at a higher level or power so that it can travel longer distances between the start and end points of communication.
Question
____ should always be implemented with a client-based stateful firewall such as the Windows Firewall in Windows Server 2008.

A)6to4
B)Teredo
C)NAT
D)ISATAP
Question
The term ____________________ describes the amount of data that can travel from one network point to another within a specified time.
Question
Provide a brief description of the tasks performed by Neighbor Discovery.
Question
____ allows IPv6 routers and hosts to communicate across IPv4 networks.

A)6to4
B)DHCP
C)ARPANET
D)ISATAP
Question
____ stores the IPv4 address of the ISATAP router in bits 17 to 48.

A)6to4
B)Teredo
C)NAT
D)ISATAP
Question
____________________ are responsible for forwarding packets between subnets, or networks with differing IP addressing schemes.
Question
____ is a mechanism used in IPv4 networks for hiding a private IP network behind a public IP address.

A)6to4
B)Teredo
C)NAT
D)ISATAP
Question
What is the difference between the Physical layer and the Data Link layer of the OSI model?
Question
A(n)_________________________ is a group of networks spread across different geographic areas.
Question
____ main function is to provide clients with secondary network configuration information such as DNS servers.

A)DHCP's
B)UDP's
C)TCP's
D)CIDR's
Question
What are the rules provided by IPv6 that allows you to shorten addresses?
Question
____ allows IPv6 hosts to communicate over IPv4 networks that use NAT.

A)6to4
B)Teredo
C)DHCP
D)ISATAP
Question
What is the difference between an intranet and an extranet?
Question
What is the difference between ipconfig and ping?
Question
What is the difference between stateless and stateful configuration?
Question
What is the difference between the following ICMPv6 messages: router solicitation and router advertisement?
Question
What is the difference between a local area network and metropolitan area network?
Question
_________________________ defines the type of hardware technology used for connecting network nodes.
Question
Briefly describe the three IPv6 over IPv4 tunnels that can be created.
Question
Match between columns
Uses source and destination addresses that are 128 bits, or 16 bytes, in length.
TCP/IP
Uses source and destination addresses that are 128 bits, or 16 bytes, in length.
Network bridges
Uses source and destination addresses that are 128 bits, or 16 bytes, in length.
RFC
Uses source and destination addresses that are 128 bits, or 16 bytes, in length.
Binary numbers
Uses source and destination addresses that are 128 bits, or 16 bytes, in length.
Classless Interdomain Routing
Uses source and destination addresses that are 128 bits, or 16 bytes, in length.
IPv6
Uses source and destination addresses that are 128 bits, or 16 bytes, in length.
Ethernet
Uses source and destination addresses that are 128 bits, or 16 bytes, in length.
Ping
Uses source and destination addresses that are 128 bits, or 16 bytes, in length.
Switches
Works by sending an ICMP echo request packet to the target.
TCP/IP
Works by sending an ICMP echo request packet to the target.
Network bridges
Works by sending an ICMP echo request packet to the target.
RFC
Works by sending an ICMP echo request packet to the target.
Binary numbers
Works by sending an ICMP echo request packet to the target.
Classless Interdomain Routing
Works by sending an ICMP echo request packet to the target.
IPv6
Works by sending an ICMP echo request packet to the target.
Ethernet
Works by sending an ICMP echo request packet to the target.
Ping
Works by sending an ICMP echo request packet to the target.
Switches
Uses physical cables to connect network devices.
TCP/IP
Uses physical cables to connect network devices.
Network bridges
Uses physical cables to connect network devices.
RFC
Uses physical cables to connect network devices.
Binary numbers
Uses physical cables to connect network devices.
Classless Interdomain Routing
Uses physical cables to connect network devices.
IPv6
Uses physical cables to connect network devices.
Ethernet
Uses physical cables to connect network devices.
Ping
Uses physical cables to connect network devices.
Switches
A document that describes the specifications for a recommended technology.
TCP/IP
A document that describes the specifications for a recommended technology.
Network bridges
A document that describes the specifications for a recommended technology.
RFC
A document that describes the specifications for a recommended technology.
Binary numbers
A document that describes the specifications for a recommended technology.
Classless Interdomain Routing
A document that describes the specifications for a recommended technology.
IPv6
A document that describes the specifications for a recommended technology.
Ethernet
A document that describes the specifications for a recommended technology.
Ping
A document that describes the specifications for a recommended technology.
Switches
Represented by either a 1 or a 0. 1
TCP/IP
Represented by either a 1 or a 0. 1
Network bridges
Represented by either a 1 or a 0. 1
RFC
Represented by either a 1 or a 0. 1
Binary numbers
Represented by either a 1 or a 0. 1
Classless Interdomain Routing
Represented by either a 1 or a 0. 1
IPv6
Represented by either a 1 or a 0. 1
Ethernet
Represented by either a 1 or a 0. 1
Ping
Represented by either a 1 or a 0. 1
Switches
The basis for the Internet, the World Wide Web, and almost all networks.
TCP/IP
The basis for the Internet, the World Wide Web, and almost all networks.
Network bridges
The basis for the Internet, the World Wide Web, and almost all networks.
RFC
The basis for the Internet, the World Wide Web, and almost all networks.
Binary numbers
The basis for the Internet, the World Wide Web, and almost all networks.
Classless Interdomain Routing
The basis for the Internet, the World Wide Web, and almost all networks.
IPv6
The basis for the Internet, the World Wide Web, and almost all networks.
Ethernet
The basis for the Internet, the World Wide Web, and almost all networks.
Ping
The basis for the Internet, the World Wide Web, and almost all networks.
Switches
Deals with the limitations of classful addressing by allowing the allocation of IP addresses based on need, not general classification.
TCP/IP
Deals with the limitations of classful addressing by allowing the allocation of IP addresses based on need, not general classification.
Network bridges
Deals with the limitations of classful addressing by allowing the allocation of IP addresses based on need, not general classification.
RFC
Deals with the limitations of classful addressing by allowing the allocation of IP addresses based on need, not general classification.
Binary numbers
Deals with the limitations of classful addressing by allowing the allocation of IP addresses based on need, not general classification.
Classless Interdomain Routing
Deals with the limitations of classful addressing by allowing the allocation of IP addresses based on need, not general classification.
IPv6
Deals with the limitations of classful addressing by allowing the allocation of IP addresses based on need, not general classification.
Ethernet
Deals with the limitations of classful addressing by allowing the allocation of IP addresses based on need, not general classification.
Ping
Deals with the limitations of classful addressing by allowing the allocation of IP addresses based on need, not general classification.
Switches
By design, cannot route traffic based on IP addresses.
TCP/IP
By design, cannot route traffic based on IP addresses.
Network bridges
By design, cannot route traffic based on IP addresses.
RFC
By design, cannot route traffic based on IP addresses.
Binary numbers
By design, cannot route traffic based on IP addresses.
Classless Interdomain Routing
By design, cannot route traffic based on IP addresses.
IPv6
By design, cannot route traffic based on IP addresses.
Ethernet
By design, cannot route traffic based on IP addresses.
Ping
By design, cannot route traffic based on IP addresses.
Switches
Connect one or more network segments.
TCP/IP
Connect one or more network segments.
Network bridges
Connect one or more network segments.
RFC
Connect one or more network segments.
Binary numbers
Connect one or more network segments.
Classless Interdomain Routing
Connect one or more network segments.
IPv6
Connect one or more network segments.
Ethernet
Connect one or more network segments.
Ping
Connect one or more network segments.
Switches
Question
What is the purpose of tracert?
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/42
auto play flashcards
Play
simple tutorial
Full screen (f)
exit full mode
Deck 3: Networking With Windows Server 2008
1
Switches work at Layer 3 of the OSI model and forward frames between ports based on MAC addresses.
False
2
____ is the practice of designing, implementing, and managing a collection of computers and devices or a network.

A)Networking
B)Subnetting
C)Routing
D)Linking
A
3
The term ____ refers to how networks occupy geographic space.

A)logical layout
B)frame
C)network scale
D)Ethernet
C
4
Manually configuring IP addresses is often referred to as a ____.

A)node
B)static IP address
C)packet
D)multilayer switch
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
5
The Transport layer of the OSI model is responsible for defining the syntax that two network hosts use to communicate.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
6
A ____ is a group of protocols that work together to provide network services.

A)protocol suite
B)frame
C)bridge
D)switch
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
7
Network bridges connect one or more network segments.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
8
____ is the process of creating multiple smaller networks, or subnets, from an IP network address.

A)CIDR
B)Autoconfguration
C)ISATAP
D)Subnetting
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
9
____ is a set of rules to exchange messages with other Internet points at the information packet level, and guarantees the delivery of packets.

A)Multicast
B)DHCP
C)TCP
D)UDP
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
10
____ addresses allow clients on the same subnet to communicate without DHCP or manual configuration.

A)DHCP
B)UDP
C)APIPA
D)TCP
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
11
A(n)____ is a group of two or more nodes, such as computers, printers, and other hardware devices, linked together for sharing data.

A)packet
B)switch
C)network
D)NIC
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
12
A ____ is a unit of data transferred between a sender and receiver on a network.

A)frame
B)hub
C)repeater
D)router
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
13
A ____ is the most basic of the hardware devices that interconnect multiple nodes.

A)bridge
B)hub
C)repeater
D)router
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
14
NICs can provide access to fiber-optic, wireless LAN, or Ethernet networks.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
15
The Application layer of the OSI model is responsible for establishing process-to-process communications between networked hosts.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
16
____ are hardware cards installed in computers so the computers can connect to a physical network.

A)Bridges
B)Switches
C)Network interface cards
D)Routers
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
17
____ performs local and remote network configuration tasks.

A)CIDR
B)RIP
C)netsh
D)ipconfig
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
18
A ____ can determine the network and host ID portions of an IP address.

A)subnet mask
B)mesh network
C)CIDR block
D)hub
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
19
____ categorizes networks based on the physical and logical relationship among devices.

A)Network protocol
B)Network topology
C)Network layout
D)Network architecture
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
20
A(n)____ is a private network that interconnects one or more subnets using high-speed network connections.

A)IP
B)LAN
C)NIC
D)MAC
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
21
A(n)____________________ is a hardware device that receives a signal and then resends it at a higher level or power so that it can travel longer distances between the start and end points of communication.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
22
____ should always be implemented with a client-based stateful firewall such as the Windows Firewall in Windows Server 2008.

A)6to4
B)Teredo
C)NAT
D)ISATAP
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
23
The term ____________________ describes the amount of data that can travel from one network point to another within a specified time.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
24
Provide a brief description of the tasks performed by Neighbor Discovery.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
25
____ allows IPv6 routers and hosts to communicate across IPv4 networks.

A)6to4
B)DHCP
C)ARPANET
D)ISATAP
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
26
____ stores the IPv4 address of the ISATAP router in bits 17 to 48.

A)6to4
B)Teredo
C)NAT
D)ISATAP
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
27
____________________ are responsible for forwarding packets between subnets, or networks with differing IP addressing schemes.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
28
____ is a mechanism used in IPv4 networks for hiding a private IP network behind a public IP address.

A)6to4
B)Teredo
C)NAT
D)ISATAP
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
29
What is the difference between the Physical layer and the Data Link layer of the OSI model?
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
30
A(n)_________________________ is a group of networks spread across different geographic areas.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
31
____ main function is to provide clients with secondary network configuration information such as DNS servers.

A)DHCP's
B)UDP's
C)TCP's
D)CIDR's
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
32
What are the rules provided by IPv6 that allows you to shorten addresses?
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
33
____ allows IPv6 hosts to communicate over IPv4 networks that use NAT.

A)6to4
B)Teredo
C)DHCP
D)ISATAP
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
34
What is the difference between an intranet and an extranet?
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
35
What is the difference between ipconfig and ping?
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
36
What is the difference between stateless and stateful configuration?
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
37
What is the difference between the following ICMPv6 messages: router solicitation and router advertisement?
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
38
What is the difference between a local area network and metropolitan area network?
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
39
_________________________ defines the type of hardware technology used for connecting network nodes.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
40
Briefly describe the three IPv6 over IPv4 tunnels that can be created.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
41
Match between columns
Uses source and destination addresses that are 128 bits, or 16 bytes, in length.
TCP/IP
Uses source and destination addresses that are 128 bits, or 16 bytes, in length.
Network bridges
Uses source and destination addresses that are 128 bits, or 16 bytes, in length.
RFC
Uses source and destination addresses that are 128 bits, or 16 bytes, in length.
Binary numbers
Uses source and destination addresses that are 128 bits, or 16 bytes, in length.
Classless Interdomain Routing
Uses source and destination addresses that are 128 bits, or 16 bytes, in length.
IPv6
Uses source and destination addresses that are 128 bits, or 16 bytes, in length.
Ethernet
Uses source and destination addresses that are 128 bits, or 16 bytes, in length.
Ping
Uses source and destination addresses that are 128 bits, or 16 bytes, in length.
Switches
Works by sending an ICMP echo request packet to the target.
TCP/IP
Works by sending an ICMP echo request packet to the target.
Network bridges
Works by sending an ICMP echo request packet to the target.
RFC
Works by sending an ICMP echo request packet to the target.
Binary numbers
Works by sending an ICMP echo request packet to the target.
Classless Interdomain Routing
Works by sending an ICMP echo request packet to the target.
IPv6
Works by sending an ICMP echo request packet to the target.
Ethernet
Works by sending an ICMP echo request packet to the target.
Ping
Works by sending an ICMP echo request packet to the target.
Switches
Uses physical cables to connect network devices.
TCP/IP
Uses physical cables to connect network devices.
Network bridges
Uses physical cables to connect network devices.
RFC
Uses physical cables to connect network devices.
Binary numbers
Uses physical cables to connect network devices.
Classless Interdomain Routing
Uses physical cables to connect network devices.
IPv6
Uses physical cables to connect network devices.
Ethernet
Uses physical cables to connect network devices.
Ping
Uses physical cables to connect network devices.
Switches
A document that describes the specifications for a recommended technology.
TCP/IP
A document that describes the specifications for a recommended technology.
Network bridges
A document that describes the specifications for a recommended technology.
RFC
A document that describes the specifications for a recommended technology.
Binary numbers
A document that describes the specifications for a recommended technology.
Classless Interdomain Routing
A document that describes the specifications for a recommended technology.
IPv6
A document that describes the specifications for a recommended technology.
Ethernet
A document that describes the specifications for a recommended technology.
Ping
A document that describes the specifications for a recommended technology.
Switches
Represented by either a 1 or a 0. 1
TCP/IP
Represented by either a 1 or a 0. 1
Network bridges
Represented by either a 1 or a 0. 1
RFC
Represented by either a 1 or a 0. 1
Binary numbers
Represented by either a 1 or a 0. 1
Classless Interdomain Routing
Represented by either a 1 or a 0. 1
IPv6
Represented by either a 1 or a 0. 1
Ethernet
Represented by either a 1 or a 0. 1
Ping
Represented by either a 1 or a 0. 1
Switches
The basis for the Internet, the World Wide Web, and almost all networks.
TCP/IP
The basis for the Internet, the World Wide Web, and almost all networks.
Network bridges
The basis for the Internet, the World Wide Web, and almost all networks.
RFC
The basis for the Internet, the World Wide Web, and almost all networks.
Binary numbers
The basis for the Internet, the World Wide Web, and almost all networks.
Classless Interdomain Routing
The basis for the Internet, the World Wide Web, and almost all networks.
IPv6
The basis for the Internet, the World Wide Web, and almost all networks.
Ethernet
The basis for the Internet, the World Wide Web, and almost all networks.
Ping
The basis for the Internet, the World Wide Web, and almost all networks.
Switches
Deals with the limitations of classful addressing by allowing the allocation of IP addresses based on need, not general classification.
TCP/IP
Deals with the limitations of classful addressing by allowing the allocation of IP addresses based on need, not general classification.
Network bridges
Deals with the limitations of classful addressing by allowing the allocation of IP addresses based on need, not general classification.
RFC
Deals with the limitations of classful addressing by allowing the allocation of IP addresses based on need, not general classification.
Binary numbers
Deals with the limitations of classful addressing by allowing the allocation of IP addresses based on need, not general classification.
Classless Interdomain Routing
Deals with the limitations of classful addressing by allowing the allocation of IP addresses based on need, not general classification.
IPv6
Deals with the limitations of classful addressing by allowing the allocation of IP addresses based on need, not general classification.
Ethernet
Deals with the limitations of classful addressing by allowing the allocation of IP addresses based on need, not general classification.
Ping
Deals with the limitations of classful addressing by allowing the allocation of IP addresses based on need, not general classification.
Switches
By design, cannot route traffic based on IP addresses.
TCP/IP
By design, cannot route traffic based on IP addresses.
Network bridges
By design, cannot route traffic based on IP addresses.
RFC
By design, cannot route traffic based on IP addresses.
Binary numbers
By design, cannot route traffic based on IP addresses.
Classless Interdomain Routing
By design, cannot route traffic based on IP addresses.
IPv6
By design, cannot route traffic based on IP addresses.
Ethernet
By design, cannot route traffic based on IP addresses.
Ping
By design, cannot route traffic based on IP addresses.
Switches
Connect one or more network segments.
TCP/IP
Connect one or more network segments.
Network bridges
Connect one or more network segments.
RFC
Connect one or more network segments.
Binary numbers
Connect one or more network segments.
Classless Interdomain Routing
Connect one or more network segments.
IPv6
Connect one or more network segments.
Ethernet
Connect one or more network segments.
Ping
Connect one or more network segments.
Switches
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
42
What is the purpose of tracert?
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
locked card icon
Unlock Deck
Unlock for access to all 42 flashcards in this deck.