NET 121- Essentials of Networking
Questions for Chapters 13 and 14 (and some firewall questions)
- What is the ARP protocol for?
- What information would you expect to find in an ARP table?
- What does the hostname command tell you?
- On what kind of computer would you use IPCONFIG?
What kind requires you to use WINIPCFG?
What kind of computer requires you to use IFCONFIG?
- What is PING used for?
What is the difference between PING and NSLOOKUP?
- What arguments will the PING command accept?
- What is the TRACERT command for?
- Why do we use the Telnet program?
- What is FTP used for?
Which of the two modes for FTP is preferred?
- Which version of Windows NT ran on client computers?
- Which version of NT was recommended for servers that run mission critical applications?
- Which version of Windows 2000 is meant for workstations?
- List the 3 versions of Windows 2000 Server, and note how many GB of RAM each supports.
- What is Microsoft Management Console?
- Which version of Windows Server 2003 is meant for workstations?
- List the versions of Windows Server 2003 and note how many GB of RAM each supports.
- Which version of Windows Server 2003 is meant for mission critical application servers?
- Which version of Windows was the first to use Active Directory?
- What company sells NetWare? What NetWare feature is the equivalent of Active Directory?
- What protocol suite was required on NetWare networks before NetWare 5?
- What is the default network administrator ID on a Windows network? What is it on a Novell network? What is it on a UNIX network?
- What unusual prejudice does UNIX have about cases?
- What operating system is like an open source version of UNIX? Who created it?
- You can successfully ping another computer by IP address but not by its computer name. Which utility can you use to check for possible problems with WINS name resolution?
- Which TCP/IP utility is used to determine whether a remote computer is reachable by sending it multiple ICMP echo requests?
- What is the primary purpose of a proxy server? (Pick two)
A. It protects the Internet from internal network traffic.
B. It acts as a file on a router that lists which addresses go where.
C. It acts as an intermediary that recreates the packets of the communication that is trying to get through.
D. It acts as a type of firewall that manages packet sequence and origin to reduce the chance of hackers hijacking communication sessions.
- Your network has a connection to the Internet. Your network includes a Web server and an SMTP server. You are concerned about Internet hackers. You set up filtering on your Internet router. Your users can no longer access their external POP3 accounts. What is the most likely cause of the problem?
A. Your DHCP server is down.
B. Your Internet router is blocking port 25.
C. Your Internet router is blocking port 110.
D. Your Web server is filtering mail requests.