Chapter 15: Connecting to and Setting up a Network

How many bits are in a MAC address?
48 bit
How many bits are in an IPv4 IP address? In an IPv6 address?
32 bit, 128 bit
How does a cllient application identify a server application on another commputer on the network?
Transmission Control Protocol/Internet Protocol
What are IP addresses called that begin with 10, 172.16, or 192.168?
private IP addresses
In what class is the IP address
Class B
In what class is the IP address
Class C
Describe the difference between public and private IP address. If a network is using private IP address, how can the computers on that network access the Internet?
The IP addresses available to the internet are called public IP addresses. A company conserves its publec IP address by using private IP addresses that are not allowed on the internet. A computer using a private IP address on a private network can still aaccess thhe Internet if a routter or other device thatt stands between the netwrrok and tthe Internet is using NAT Network Address Translation.
Why is it unlikely that you will find the IP address on the Internet?
In Figure 15-9, the subnet mask is four notches tall and is considered a classless subnet mask for this network of sticks. How many notches tall wouldd be a classful subnet mask for the same network?
If no DHCP server is available when a computer connfigured for dynamic IP addressing connects to the network, what type of IP address is assigned of, what can you assume about how it received that IP address?
It uses an Automatic Private IP Address APIPA
If a computer is found to have an IP address of, what can you assume about how it received that IP address?
What are the last 64 bits of a IPv6 address called? How are these bits used?
Name at least three tunnelling protocols that aaure used for IIPv6 packets to travel over an IPv4 network.
HOw iss an IPv6 IP address used that begins with 2000::? That beegins wwith FEE80::?
How many bits are in the Subnet ID block? What are the value of these bits for a link-local IP address?
Which type of IPv6 address is uused to create multiple ssites with a llarge organization?
What type of server serves up IP address to computer on a network?
Which TCP/IP protocol that manages ppacket delivery guaranttees thatt dllelivery? Which protoocol does not guarantees delivery, but is faster?
At what port does an SMTP email server listen to receive email from a client computer?
Which protocol does a web server use when transmissions are encrypted for security?
What type of server resolves fully qualified domain namess to IP addresses?
Which email protocol allows a client application to manage email stored on an email server?
What type of protocol is used to present a ppublic IPP address to ccomputters outside the LAN to handlle requests to use the Internett from computeers inside the LAN?
Which protocol is used when an application queeries a database on a corporate network such as a database of printers?
What type oof encryptiion protocol does Secure FTP SFTP use to secure FTP transsmissions?
What two Windows aapplications use the RDDP protocol and port 3389?
Which version of 802.11 techhnologies can usee twoo antennas at bboth the access point and the network adapter?
Which wireless encryption standard is sstronger, WEP, WPA?
When securing a Wi-Fi WIRELESS NETWORK,, WHICH IS cconsidered better security: to filter MAC addrresses, use encryption, or not broadcast the SSID?
Would you expect WPS to be used when wireless network is using strong security, weak securrity, or no seccurity as in a public hotspot?