IT Essentials 7.0: Сетевые вопросы для изучения

Name: ___________________ Date: ________ Per: ____
ITEssentials 7.0 Chapter 6: Applied Networking – Online Study Questions
6.1
6.1.1
6.1.1.1
Device to Network Connection
Network Addressing
Video Explanation - MAC
Addressing
1. What are the two main
parts of the MAC address?
2. Which part of the MAC
address is associated with
the vendor (manufacturer)
of the address?
3. How are MAC addresses
represented?
4. How do devices on the LAN
keep from sending frames
to the wrong device?
5. What is the OUI for
Linksys? Try
Answer questions below:
OUI and Vendor
OUI or organizationally unique identifier
First 24 bits
By six hexadecimal digits
Because the MAC addresses are unique
00:04:5A LinksysG The Linksys Group, Inc
(https://www.wireshark.org/tool
s/oui-lookup.html)
6.1.1.2
6. Where do PCs send
messages when they want
to reach devices on the
same network?
Video Explanation - IPv4
Addressing
7. How many bits are in an
IPv4 address?
8. How does the hexadecimal
system count past 9?
9. What is the slash notation?
10. What number in the mask
represents the host portion
of an IPv4 address?
11. What does the 1 in the
mask represent?
12. All host devices in a LAN
must share the same
subnet mask. (T/F)
13. What part of the address is
unique?
To the MAC address of that device’s interface.
Answer questions below:
32
By using the letters A - F
Another way of representing the subnet mask of a IPv4
address.
A zero 0
The network portion of the address.
True
The host portion.
False
6.1.1.3
6.1.1.4
6.1.1.5
6.1.1.6
6.1.1.7
6.1.1.8
6.1.1.9
6.1.1.10
Документ1
14. A host device doesn’t
change its IP Address or
subnet mask if it moves to
a different network.
Video Explanation – Ipv6
Addressing
15. Which numbering system is
used to represent IPv6
16. How many 16 bit segments
are in one address?
17. How many total bits in
IPv6?
18. What is the normal
separator between the
segments?
19. What does IPv6 have in
common with IPv4?
20. Which address is hard
coded onto the NIC?
21. Another name for physical
address.
22. What information does the
ipconfig /all
command display?
23. What is each number in an
IPv4 address called?
24. These two rules are used to
compress IPv6 addresses.
25. What is another term for
manual addressing?
26. Which setting on the PC
must be checked to
manually configure
addresses?
27. This protocol is used to
assign addresses to
machines automatically.
28. Circle the default setting
for most PCs:
29. Three most necessary IP
Settings:
30. What is the primary
difference between IPv4 &
IPv6 link-local addresses?
True
False
Answer questions below:
Hexadecimal
Eight
128
A colon “:”
They both use the slash notation for subnets.
MAC Address
MAC Address
IP configuration of the workstation
An octet
1) Omit Leading Os
2) Omit All 0 Segments
Static addressing
Use the following (IPv6) address?
DHCP
Obtain an IP address automatically
Use the following IP address
IPv4 address
Subnet mask
Default gateway
IPv4 uses them when it hasn’t been configured, but
IPv6 always has them configured regardless.
Page 2 of 1
31. What is the range of IPv4
addresses assigned by
APIPA when the DHCP can’t
be found?
32. What is the range of IPv6
addresses?
33. What does IPv6 primarily
use the link-local address
to do?
6.1.1.11
6.1.2
6.1.2.1
6.1.2.3
6.1.2.4
6.1.2.5
6.1.2.6
6.1.2.7
6.1.3
6.1.3.1
Документ1
Check Your Understanding Network Addressing
Configure a NIC
Packet Tracer - Add Computers
to an Existing Network
34. Where are most desktop
NICs found today?
35. What should a technician
do before installing new
drivers for a NIC?
36. Which control panel can be
checked to ensure that
installation went correctly?
37. What is the default state
for IP Addressing?
38. Which protocol is used to
send error and control
messages?
39. What character is typed
after the PING command to
show the options?
40. What does PING show?
Lab
Configure a Wired and
Wireless Network
Video Explanation – Configure
a Wired and Wireless Network
41. How do you know your
router’s default IP address?
42. What was the setting for
the WAN configuration?
43. What is the default IP
address and subnet mask
for the LAN?
44. What is the default range
of host addresses for the
DHCP?
169.254.0.0 to 169.254.255.255
fe80:: to febf::
Communicated with other devices on the same
network
variety of processes including network discovery
protocols and routing protocols
Complete and Submit Screen Capture to Activity
Assignment
Put your Name in the Profile, Complete Packet Tracer
Activity and Submit to the Lab Assignment.
Integrated into the motherboard
disable virus protection software to ensure that the
driver installs correctly
Device Manager
Dynamic or Automatic
Internet Control Message Protocol (ICMP)
ping ?
Connections between computers
Configure a NIC to Use DHCP in Windows
Answer questions below:
Look in the documentation
Automatic Configuration - DHCP
192.168.1.1
255.255.255.0
192.168.1.100 - 149
Page 3 of 1
45. Why would you disable the
DHCP on your integrated
router?
46. What happens if you go to
a different page without
saving?
47. What modes does the
wireless network mode
have available?
6.1.3.3
6.1.3.4
6.1.3.5
6.1.3.6
6.1.3.7
6.1.3.8
6.1.3.9
6.1.4
6.1.4.1
Документ1
48. How many wireless
channels are available in
the 2.4 GHz band?
49. What does enabling the
SSID broadcast do for the
wireless network?
50. Which Encryption method
is the default on this access
point?
51. Which legacy encryption
method is less secure?
52. How do you gain access to
a wireless router’s GUI
configuration page?
53. Why is it necessary to
renew the IP address of the
host you are using for
configuration?
54. What does the passphrase
secure?
55. What is the purpose of a
Mesh network
56. What does NAT do?
57. Search for “What is my IP
address” on google and
record your public address.
58. What do QOS
configurations accomplish?
Packet Tracer - Connect to a
Wireless Network
Firewall Settings
Video Explanation – Firewall
Settings
59. What does a DMZ allow
you to accomplish?
60. What section of the GUI
contain the port
forwarding settings?
If you have a server running DHCP on your network.
The settings will not be saved to the router.
B/G/N Mixed
B-Only
G-only
11
N-Only
B/G Mixed
G/N Mixed
Turns on the SSID so it can be seen by everyone.
AES
TKIP
By using a web browser
Because if you change the network IP address, your
device will change as well.
The wireless security.
To provide wireless access to clients beyond the normal
wireless range.
Network Address Translation converts public IP
addresses to private addresses on the network.
63.159.0.197
Ensures that priority traffic moves through the network
more quickly.
Put your Name in the Profile, Complete Packet Tracer
Activity and Submit to the Lab Assignment.
Answer questions below:
A demilitarized zone is open to the public, but existing
behind the firewall.
The Firewall
Page 4 of 1
61. What does port forwarding
allow us to accomplish?
62. What advantage does port
forwarding give?
63. Because setting up your
router for remote access is
so risky, what would be a
way to mitigate the risk?
64. What sorts of items can be
configured when your
router has the ability to
add access rules?
6.1.4.2
65. What is UPnP?
66. Why is UPnP dangerous
6.1.4.3
6.1.4.4
6.1.4.5
6.1.4.6
6.1.4.7
6.1.4
6.1.5.3
6.2
6.2.1
Документ1
67. Why servers are often
placed in a DMZ?
68. Why do networks have
port forwarding enabled?
69. What is the difference
between port triggering
and port forwarding?
70. What does MAC address
filtering do?
71. What term used when IP
addresses are allowed or
denied on a network?
Packet Tracer - Configure
Firewall Settings
Internet of Things
72. Because the industry hasn’t
yet agreed on the
configuration of IoT
devices, what must a
technician do?
Packet Tracer - Control IoT
Devices
Basic Troubleshooting Process
for Networks
Applying the Troubleshooting
Process to
To redirect packets coming into the WAN port to a
specific LAN IP address.
Hosting services on end devices that need to be
reached from outside the network. IP Cameras, Web
servers, Storage devices (SAN), etc.
Use a very strong passphrase or password
Connection Type (WAN, LAN, etc.)
Action
Schedule
Services or Traffic Type
Source IP, including Start & Finish IP
Destination IP, including Start & Finish
Log
It allows devices to dynamically add themselves to the
network without user intervention.
UPnP considers every device trustworthy – malware
can use UPnP to redirect traffic.
Because they allow external users to access them
without risking the internal network.
It allows specific ports to be opened for applications
and programs to communicate with devices on
different networks.
Port triggering is only enabled when an outbound
request in a certain port range has been requested.
specifies exactly which device MAC addresses are
allowed to or blocked from sending data on your
network
Blacklisting or Whitelisting
Put your Name in the Profile, Complete Packet Tracer
Activity and Submit to the Lab Assignment.
Configure them device specifically by using the
manufacturer’s guidelines
Put your Name in the Profile, Complete Packet Tracer
Activity and Submit to the Lab Assignment.
Page 5 of 1
6.2.1.2
6.2.1.3
73. List some closed-ended
questions you could use for
networking.
74. List some common
probably causes.
6.2.1.4
75. What are some quick
procedures you can take to
test your theory of cause?
6.2.1.5
76. Where are some locations
to gather additional
information about the
issue if necessary?
Answers may vary
Answers may vary
Answers may vary
Loose cable connection
NIC installed wrong
ISP down
Weak wireless signal
Invalid IP address
DNS Server issue
DHCP Server Problem
Check that all cables are connected
Unseat and reconnect cables and connectors
Reboot device
Login with different account
Repair or re-enable network connection
Contact Network Admin
Ping device default gateway
Access remote web page
Help desk repair logs
Other Techs
Manufacturer FAQ sites
Technical Websites
News groups
Computer Manuals
Device Manuals
Online forums
Internet search
6.2.1.6
Документ1
77. What steps should you take
to verify full functionality
to the system?
Use ipconfig /all to verify address information
Page 6 of 1
PING to check connectivity
Check email
Research other commands.
6.2.1.7
6.2.1.8
6.2.2
6.2.2.1
(Try opening
the PDF for
this section)
78. What should ALWAYS be
done after system
verification?
Check Your Understanding Network Troubleshooting Process
Network Problems and
Solutions
79. What are some probable
causes if the device can’t
detect the wireless router?
Document your findings thoroughly
Complete the Activity, take a screen capture and submit
to the activity assignment.
The wireless router/access point is configured with a
different 802.11 protocol.
The SSID is not being broadcast.
The wireless NIC in the laptop is disabled.
80. What are some possible
solutions if your device
shows an IPv4 address in
the 169.254.x.x range?
Reconnect network cable
Check the router
Release and renew IP Address
Replace the NIC
6.2.2.2
(Try opening
the PDF for
this section)
81. What are some probable
causes if the wireless
device can’t connect to the
network?
82. What are some probable
causes if an IP address is
working for a website, but
not the domain name?
83. What are some possible
solutions for a device that
doesn’t obtain or renew an
IP Address?
Wireless is disabled
Device is out of range
There is wireless interference
Incorrect host name
Incorrect DNS settings.
DNS server is not operational.
Enable the computer to obtain an IP address
automatically
Change the firewall settings to allow DHCP traffic
Restart the DHCP server
Enable Wireless NIC
84. What are the probable
causes when an IP address
Документ1
The same IP address is assigned to two devices on the
network.
Page 7 of 1
6.2.2.3
(Try opening
the PDF for
this section)
6.2.2.4
(Try opening
the PDF for
this section)
conflict message displays
when connecting a new
device to the network?
85. What is a probable cause
for a device with network
access but not Internet?
86. What are some possible
solutions for a user unable
to access FTP server?
Another computer has been configured with a static IP
address that was already assigned by the DHCP server.
87. What is a probable cause if
a device can’t access a
specific HTTPS site?
88. What is a possible solution
if a device on one network
cannot ping a device on
another network?
The site is not on that computer’s browser’s list of
trusted sites.
89. What are the probable causes
when The ipconfig /release or
ipconfig /renew command
results in the following
message: “No operation can
be performed on the adapter
while the media is
disconnected.”?
90. What is a possible solution
when the ipconfig /release or
ipconfig /renew command
results in the following
message: “The operation
failed as no adapter is in the
state permissible for this
operation.”
Документ1
The gateway IP address is incorrect.
A router is configured incorrectly.
DNS server is not operational.
Ensure that ports 20 and 21 are allowed through the
router’s outbound firewall.
Use tracert to locate which link is down and fix the
broken link. Configure the router to allow ICMP echo
requests and echo replies.
Configure Windows firewall to allow ICMP echo
requests and echo replies
Use tracert to locate which link is down and fix the
broken link. Configure the router to allow ICMP echo
requests and echo replies.
The network cable is unplugged.
The computer has been configured with a static IP
address.
Reconfigure the NIC to obtain IP addressing
automatically.
Page 8 of 1