Name: ___________________ Date: ________ Per: ____ ITEssentials 7.0 Chapter 6: Applied Networking – Online Study Questions 6.1 6.1.1 6.1.1.1 Device to Network Connection Network Addressing Video Explanation - MAC Addressing 1. What are the two main parts of the MAC address? 2. Which part of the MAC address is associated with the vendor (manufacturer) of the address? 3. How are MAC addresses represented? 4. How do devices on the LAN keep from sending frames to the wrong device? 5. What is the OUI for Linksys? Try Answer questions below: OUI and Vendor OUI or organizationally unique identifier First 24 bits By six hexadecimal digits Because the MAC addresses are unique 00:04:5A LinksysG The Linksys Group, Inc (https://www.wireshark.org/tool s/oui-lookup.html) 6.1.1.2 6. Where do PCs send messages when they want to reach devices on the same network? Video Explanation - IPv4 Addressing 7. How many bits are in an IPv4 address? 8. How does the hexadecimal system count past 9? 9. What is the slash notation? 10. What number in the mask represents the host portion of an IPv4 address? 11. What does the 1 in the mask represent? 12. All host devices in a LAN must share the same subnet mask. (T/F) 13. What part of the address is unique? To the MAC address of that device’s interface. Answer questions below: 32 By using the letters A - F Another way of representing the subnet mask of a IPv4 address. A zero 0 The network portion of the address. True The host portion. False 6.1.1.3 6.1.1.4 6.1.1.5 6.1.1.6 6.1.1.7 6.1.1.8 6.1.1.9 6.1.1.10 Документ1 14. A host device doesn’t change its IP Address or subnet mask if it moves to a different network. Video Explanation – Ipv6 Addressing 15. Which numbering system is used to represent IPv6 16. How many 16 bit segments are in one address? 17. How many total bits in IPv6? 18. What is the normal separator between the segments? 19. What does IPv6 have in common with IPv4? 20. Which address is hard coded onto the NIC? 21. Another name for physical address. 22. What information does the ipconfig /all command display? 23. What is each number in an IPv4 address called? 24. These two rules are used to compress IPv6 addresses. 25. What is another term for manual addressing? 26. Which setting on the PC must be checked to manually configure addresses? 27. This protocol is used to assign addresses to machines automatically. 28. Circle the default setting for most PCs: 29. Three most necessary IP Settings: 30. What is the primary difference between IPv4 & IPv6 link-local addresses? True False Answer questions below: Hexadecimal Eight 128 A colon “:” They both use the slash notation for subnets. MAC Address MAC Address IP configuration of the workstation An octet 1) Omit Leading Os 2) Omit All 0 Segments Static addressing Use the following (IPv6) address? DHCP Obtain an IP address automatically Use the following IP address IPv4 address Subnet mask Default gateway IPv4 uses them when it hasn’t been configured, but IPv6 always has them configured regardless. Page 2 of 1 31. What is the range of IPv4 addresses assigned by APIPA when the DHCP can’t be found? 32. What is the range of IPv6 addresses? 33. What does IPv6 primarily use the link-local address to do? 6.1.1.11 6.1.2 6.1.2.1 6.1.2.3 6.1.2.4 6.1.2.5 6.1.2.6 6.1.2.7 6.1.3 6.1.3.1 Документ1 Check Your Understanding Network Addressing Configure a NIC Packet Tracer - Add Computers to an Existing Network 34. Where are most desktop NICs found today? 35. What should a technician do before installing new drivers for a NIC? 36. Which control panel can be checked to ensure that installation went correctly? 37. What is the default state for IP Addressing? 38. Which protocol is used to send error and control messages? 39. What character is typed after the PING command to show the options? 40. What does PING show? Lab Configure a Wired and Wireless Network Video Explanation – Configure a Wired and Wireless Network 41. How do you know your router’s default IP address? 42. What was the setting for the WAN configuration? 43. What is the default IP address and subnet mask for the LAN? 44. What is the default range of host addresses for the DHCP? 169.254.0.0 to 169.254.255.255 fe80:: to febf:: Communicated with other devices on the same network variety of processes including network discovery protocols and routing protocols Complete and Submit Screen Capture to Activity Assignment Put your Name in the Profile, Complete Packet Tracer Activity and Submit to the Lab Assignment. Integrated into the motherboard disable virus protection software to ensure that the driver installs correctly Device Manager Dynamic or Automatic Internet Control Message Protocol (ICMP) ping ? Connections between computers Configure a NIC to Use DHCP in Windows Answer questions below: Look in the documentation Automatic Configuration - DHCP 192.168.1.1 255.255.255.0 192.168.1.100 - 149 Page 3 of 1 45. Why would you disable the DHCP on your integrated router? 46. What happens if you go to a different page without saving? 47. What modes does the wireless network mode have available? 6.1.3.3 6.1.3.4 6.1.3.5 6.1.3.6 6.1.3.7 6.1.3.8 6.1.3.9 6.1.4 6.1.4.1 Документ1 48. How many wireless channels are available in the 2.4 GHz band? 49. What does enabling the SSID broadcast do for the wireless network? 50. Which Encryption method is the default on this access point? 51. Which legacy encryption method is less secure? 52. How do you gain access to a wireless router’s GUI configuration page? 53. Why is it necessary to renew the IP address of the host you are using for configuration? 54. What does the passphrase secure? 55. What is the purpose of a Mesh network 56. What does NAT do? 57. Search for “What is my IP address” on google and record your public address. 58. What do QOS configurations accomplish? Packet Tracer - Connect to a Wireless Network Firewall Settings Video Explanation – Firewall Settings 59. What does a DMZ allow you to accomplish? 60. What section of the GUI contain the port forwarding settings? If you have a server running DHCP on your network. The settings will not be saved to the router. B/G/N Mixed B-Only G-only 11 N-Only B/G Mixed G/N Mixed Turns on the SSID so it can be seen by everyone. AES TKIP By using a web browser Because if you change the network IP address, your device will change as well. The wireless security. To provide wireless access to clients beyond the normal wireless range. Network Address Translation converts public IP addresses to private addresses on the network. 63.159.0.197 Ensures that priority traffic moves through the network more quickly. Put your Name in the Profile, Complete Packet Tracer Activity and Submit to the Lab Assignment. Answer questions below: A demilitarized zone is open to the public, but existing behind the firewall. The Firewall Page 4 of 1 61. What does port forwarding allow us to accomplish? 62. What advantage does port forwarding give? 63. Because setting up your router for remote access is so risky, what would be a way to mitigate the risk? 64. What sorts of items can be configured when your router has the ability to add access rules? 6.1.4.2 65. What is UPnP? 66. Why is UPnP dangerous 6.1.4.3 6.1.4.4 6.1.4.5 6.1.4.6 6.1.4.7 6.1.4 6.1.5.3 6.2 6.2.1 Документ1 67. Why servers are often placed in a DMZ? 68. Why do networks have port forwarding enabled? 69. What is the difference between port triggering and port forwarding? 70. What does MAC address filtering do? 71. What term used when IP addresses are allowed or denied on a network? Packet Tracer - Configure Firewall Settings Internet of Things 72. Because the industry hasn’t yet agreed on the configuration of IoT devices, what must a technician do? Packet Tracer - Control IoT Devices Basic Troubleshooting Process for Networks Applying the Troubleshooting Process to To redirect packets coming into the WAN port to a specific LAN IP address. Hosting services on end devices that need to be reached from outside the network. IP Cameras, Web servers, Storage devices (SAN), etc. Use a very strong passphrase or password Connection Type (WAN, LAN, etc.) Action Schedule Services or Traffic Type Source IP, including Start & Finish IP Destination IP, including Start & Finish Log It allows devices to dynamically add themselves to the network without user intervention. UPnP considers every device trustworthy – malware can use UPnP to redirect traffic. Because they allow external users to access them without risking the internal network. It allows specific ports to be opened for applications and programs to communicate with devices on different networks. Port triggering is only enabled when an outbound request in a certain port range has been requested. specifies exactly which device MAC addresses are allowed to or blocked from sending data on your network Blacklisting or Whitelisting Put your Name in the Profile, Complete Packet Tracer Activity and Submit to the Lab Assignment. Configure them device specifically by using the manufacturer’s guidelines Put your Name in the Profile, Complete Packet Tracer Activity and Submit to the Lab Assignment. Page 5 of 1 6.2.1.2 6.2.1.3 73. List some closed-ended questions you could use for networking. 74. List some common probably causes. 6.2.1.4 75. What are some quick procedures you can take to test your theory of cause? 6.2.1.5 76. Where are some locations to gather additional information about the issue if necessary? Answers may vary Answers may vary Answers may vary Loose cable connection NIC installed wrong ISP down Weak wireless signal Invalid IP address DNS Server issue DHCP Server Problem Check that all cables are connected Unseat and reconnect cables and connectors Reboot device Login with different account Repair or re-enable network connection Contact Network Admin Ping device default gateway Access remote web page Help desk repair logs Other Techs Manufacturer FAQ sites Technical Websites News groups Computer Manuals Device Manuals Online forums Internet search 6.2.1.6 Документ1 77. What steps should you take to verify full functionality to the system? Use ipconfig /all to verify address information Page 6 of 1 PING to check connectivity Check email Research other commands. 6.2.1.7 6.2.1.8 6.2.2 6.2.2.1 (Try opening the PDF for this section) 78. What should ALWAYS be done after system verification? Check Your Understanding Network Troubleshooting Process Network Problems and Solutions 79. What are some probable causes if the device can’t detect the wireless router? Document your findings thoroughly Complete the Activity, take a screen capture and submit to the activity assignment. The wireless router/access point is configured with a different 802.11 protocol. The SSID is not being broadcast. The wireless NIC in the laptop is disabled. 80. What are some possible solutions if your device shows an IPv4 address in the 169.254.x.x range? Reconnect network cable Check the router Release and renew IP Address Replace the NIC 6.2.2.2 (Try opening the PDF for this section) 81. What are some probable causes if the wireless device can’t connect to the network? 82. What are some probable causes if an IP address is working for a website, but not the domain name? 83. What are some possible solutions for a device that doesn’t obtain or renew an IP Address? Wireless is disabled Device is out of range There is wireless interference Incorrect host name Incorrect DNS settings. DNS server is not operational. Enable the computer to obtain an IP address automatically Change the firewall settings to allow DHCP traffic Restart the DHCP server Enable Wireless NIC 84. What are the probable causes when an IP address Документ1 The same IP address is assigned to two devices on the network. Page 7 of 1 6.2.2.3 (Try opening the PDF for this section) 6.2.2.4 (Try opening the PDF for this section) conflict message displays when connecting a new device to the network? 85. What is a probable cause for a device with network access but not Internet? 86. What are some possible solutions for a user unable to access FTP server? Another computer has been configured with a static IP address that was already assigned by the DHCP server. 87. What is a probable cause if a device can’t access a specific HTTPS site? 88. What is a possible solution if a device on one network cannot ping a device on another network? The site is not on that computer’s browser’s list of trusted sites. 89. What are the probable causes when The ipconfig /release or ipconfig /renew command results in the following message: “No operation can be performed on the adapter while the media is disconnected.”? 90. What is a possible solution when the ipconfig /release or ipconfig /renew command results in the following message: “The operation failed as no adapter is in the state permissible for this operation.” Документ1 The gateway IP address is incorrect. A router is configured incorrectly. DNS server is not operational. Ensure that ports 20 and 21 are allowed through the router’s outbound firewall. Use tracert to locate which link is down and fix the broken link. Configure the router to allow ICMP echo requests and echo replies. Configure Windows firewall to allow ICMP echo requests and echo replies Use tracert to locate which link is down and fix the broken link. Configure the router to allow ICMP echo requests and echo replies. The network cable is unplugged. The computer has been configured with a static IP address. Reconfigure the NIC to obtain IP addressing automatically. Page 8 of 1