Computer Networking > QUESTIONS & ANSWERS > The Bits and Bytes of Computer Networking Week 4: Network Services Already Passed (All)

The Bits and Bytes of Computer Networking Week 4: Network Services Already Passed

Document Content and Description Below

The Bits and Bytes of Computer Networking. Week 4: Network Services Already Passed What transport layer protocol does DNS normally use? ✔✔UDP; While DNS over TCP does exist, UDP is the most co... mmon protocol. A DNS TTL determines what? ✔✔How long a DNS entry is allowed to be cached; TTL stands for Time to Live and determines how long a DNS entry can be cached How many root servers are there? ✔✔13; There are 13 root servers. An A Record contains what? ✔✔IPv4 address; An A record contains an IPv4 address Select all that are true. ✔✔One domain name can point to one IP; This is a valid DNS setup One domain name can point to many IPs; this is a valid DNS setup. Many domain names can point to the same IP; This is a valid DNS setup. MX stands for ________. ✔✔Mail exchange; An MX record stores a mail server's IP. A fully qualified domain name can contain how many characters? ✔✔255; An FQDN is limited to a total length of 255 characters. What are the four things that all computers need configured in order to operate on a modern network? Check all that apply. ✔✔An IP address; All computers need these four things configured in order to operate on a modern computer network. a name server; Computers need a name server in order to operate on a network. a subnet mask; All computers need these four things configured in order to operate on a modern computer network. a default gateway; All computers need these four things configured in order to operate on a modern computer network. When using Fixed Allocation DHCP, what's used to determine a computer's IP? ✔✔a MAC address; Fixed Allocation DHCP ensures that computers receive an IP address reserved for it via its MAC address. The process by which a client configured to use DHCP attempts to get network configuration information is known as _________________. ✔✔DHCP Discovery; DHCP Discovery is how a client determines configuration information. NAT addresses concerns over the dwindling IPv4 address space by ___________________. ✔✔allowing computers using non-routable address space to communicate with the Internet; NAT allows networks to use non-routable address space for their internal devices. What technique allows for inbound traffic through a NAT? ✔✔Port forwarding ; Port forwarding is a technique that allows for inbound traffic through a router configured to NAT. The total number of IPv4 addresses is approximately: ✔✔4.2 billion; There are approximately 4.2 billion IPv4 addresses. Two-factor authentication is_________________________. ✔✔a method where you need more than a username and a password; Two-factor authentication requires a username/password and something extra VPNs are known as a _____ protocol. ✔✔tunneling; VPNs are tunneling protocols. A proxy is something that _______________________. ✔✔communicates on behalf of something else; While proxies are many things, they primarily communicate on behalf of something else. A technique that's used to route traffic to different destinations, depending on factors like location, congestion, or link health, is known as _____. ✔✔anycast; Anycast lets you route traffic depending on many factors. A concept that involves iterating over a list of items one by one in an orderly fashion is known as _______. ✔✔Round robin; Round robin ensures a fairly equal distribution across its members. Administration and definition of TLDs are handled by a non-profit organization known as _______. ✔✔ICANN is responsible for maintaining the global domain name system. When a range of IP addresses is set aside for client devices, and one of these IPs is issued to these devices when they request one, this is known as _______ allocation. ✔✔dynamic; Dynamic Allocation DHCP will assign a random IP from a pool of IPs to a device that needs one. VPN stands for _______ ✔✔Virtual Private Network; A VPN allows a device to establish an encrypted tunnel to another network. A company moves a popular website to a new web host. Which of the following will change as a result? ✔✔Internet Protocol address; The IP address will certainly change. However, with DNS in place the name stays the same and users will never know that the website moved. The "www" portion of a domain is known by which of the given options? Check all that apply. Top Level Domain (TLD) name subdomain Host name Fully Qualified Domain Name (FQDN) ✔✔subdomain; A subdomain like "www" precedes the domain name and is used to further identify a system and its purpose. You didn't select all the correct answers Which of the following allows computers on a network to automatically receive address assignment information? ✔✔Dynamic Host Protocol; DHCP is used to automatically assign IP addresses to devices on a network. Network Address Translation (NAT) technology provides a major benefit for which of these network problems? Port Preservation, Address exhaustion, Assigning Internet Protocol address blocks, Routable addresses ✔✔Routable address; Incorrect Not quite. Please review the videos in the "Network Address Translation" module for a refresher. Which technology uses a tunneling protocol? ✔✔Virtual Private Network; A VPN uses a tunnel to maintain private and secure communications. What port on a name server is used for User Datagram Protocol (UDP) name request packets? ✔✔53; DNS uses port 53 over UDP for name resolution communications. A complete Fully Qualified Domain Name (FQDN) is limited to how many characters? ✔✔255; A complete FQDN can be up to 255 characters. Which of the following is NOT configured by a Dynamic Host Protocol (DHCP) server? ✔✔Media Access Control address; A MAC address is a hardware address assigned to a device by the manufacturer. A Virtual Private Network (VPN) uses a particular layer from the OSI reference model to carry an encrypted payload that actually contains an entire second set of packets. Which layer is used? ✔✔Transport; The payload section of the transport layer is used to contain an entire second set of packets. What service acts on behalf of a client in order to access another service? ✔✔Proxy Server; Proxies sit between clients and other servers to facilitate connections. During the name resolution process, which technique is used to avoid congestion when querying a server? ✔✔Anycast; Anycast allows a request to be sent to an appropriate server based on factors, like location. This helps relieve severe congestion. [Show More]

Last updated: 1 year ago

Preview 1 out of 8 pages

Also available in bundle (1)

The Bits and Bytes of Computer Networking Bundled Exams (Week 1-6) Questions and Answers Already Passed

The Bits and Bytes of Computer Networking Bundled Exams (Week 1-6) Questions and Answers Already Passed

By Nutmegs 1 year ago

$20

9  

Reviews( 0 )

Recommended For You

 Information Technology> QUESTIONS & ANSWERS > The Bits and Bytes of Computer Networking. Week 1: Networking Basics_ Answered 2023 (All)

preview
The Bits and Bytes of Computer Networking. Week 1: Networking Basics_ Answered 2023

The Bits and Bytes of Computer Networking. Week 1: Networking Basics_ Answered 2023 Which of the following is an example of a network layer (layer 3) protocol? IP, TCP, UDP, Ethernet ✔✔ IP, or Inte...

By Crescent , Uploaded: Jan 12, 2023

$5

 Computer Networking> QUESTIONS & ANSWERS > The Bits and Bytes of Computer Networking. Week 2: The Network Layer_ Spring 22/23. (All)

preview
The Bits and Bytes of Computer Networking. Week 2: The Network Layer_ Spring 22/23.

The Bits and Bytes of Computer Networking. Week 2: The Network Layer_ Spring 22/23. Please select all of the valid IP addresses. Check all that apply. 8.8.8.8, 123.456.123.456, 192.168.1.1, 257....

By Crescent , Uploaded: Jan 12, 2023

$5

 Computer Networking> QUESTIONS & ANSWERS > The Bits and Bytes of Computer Networking Week 6: Troubleshooting and the Future of Networking Already Passed (All)

preview
The Bits and Bytes of Computer Networking Week 6: Troubleshooting and the Future of Networking Already Passed

The protocol used to communicate network errors is known as __________. ✔✔ICMP, ICMP is used to communicate errors back to the client. The ping utility sends what message type? ✔✔echo request; By d...

By M_Gathiru , Uploaded: Apr 19, 2023

$6.5

 Computer Networking> QUESTIONS & ANSWERS > The Bits and Bytes of Computer Networking Questions and Answers Already Passed (All)

preview
The Bits and Bytes of Computer Networking Questions and Answers Already Passed

The Bits and Bytes of Computer Networking Questions and Answers Already Passed What are the 5 Networking Layers in order? ✔✔5. Application layer 4. Transport layer 3. Network layer 2. data link...

By Nutmegs , Uploaded: Feb 07, 2023

$10.5

 Computer Networking> QUESTIONS & ANSWERS > The Bits and Bytes of Computer Networking Questions and Answers Rated A (All)

preview
The Bits and Bytes of Computer Networking Questions and Answers Rated A

The Bits and Bytes of Computer Networking Questions and Answers Rated A TCP/IP Five Layer Model ✔✔Physical layer , Data link Layer, network Layer, Transport Layer, Application Layer OSI Model (7...

By Nutmegs , Uploaded: Feb 07, 2023

$11

 Computer Networking> QUESTIONS & ANSWERS > The Bits and Bytes of Computer Networking. Week 1: Networking Basics Already Passed (All)

preview
The Bits and Bytes of Computer Networking. Week 1: Networking Basics Already Passed

The Bits and Bytes of Computer Networking. Week 1: Networking Basics Already Passed Which of the following is an example of a network layer (layer 3) protocol? IP, TCP, UDP, Ethernet ✔✔IP, or Inte...

By Nutmegs , Uploaded: Feb 07, 2023

$9

 Computer Networking> QUESTIONS & ANSWERS > The Bits and Bytes of Computer Networking. Week 6: Troubleshooting and the Future of Networking, Quiz Latest 2022-23 (All)

preview
The Bits and Bytes of Computer Networking. Week 6: Troubleshooting and the Future of Networking, Quiz Latest 2022-23

The Bits and Bytes of Computer Networking. Week 6: Troubleshooting and the Future of Networking, Quiz Latest 2022-23. The protocol used to communicate network errors is known as __________. ✔✔ ICM...

By Crescent , Uploaded: Jan 13, 2023

$5

 Computer Networking> QUESTIONS & ANSWERS > The Bits and Bytes of Computer Networking. Week 2: The Network Layer Already Passed (All)

preview
The Bits and Bytes of Computer Networking. Week 2: The Network Layer Already Passed

The Bits and Bytes of Computer Networking. Week 2: The Network Layer Already Passed Please select all of the valid IP addresses. Check all that apply. 8.8.8.8, 123.456.123.456, 192.168.1.1, 257.70...

By Nutmegs , Uploaded: Feb 07, 2023

$8

 Computer Networking> QUESTIONS & ANSWERS > The Bits and Bytes of Computer Networking Week 6: Troubleshooting and the Future of Networking Already Passed (All)

preview
The Bits and Bytes of Computer Networking Week 6: Troubleshooting and the Future of Networking Already Passed

The Bits and Bytes of Computer Networking Week 6: Troubleshooting and the Future of Networking Already Passed The protocol used to communicate network errors is known as __________. ✔✔ICMP, ICMP i...

By Nutmegs , Uploaded: Feb 07, 2023

$9

 Computer Networking> QUESTIONS & ANSWERS > The Bits and Bytes of Computer Networking Week 4 Already Passed (All)

preview
The Bits and Bytes of Computer Networking Week 4 Already Passed

The Bits and Bytes of Computer Networking Week 4 Already Passed What transport layer protocol does DNS normally use? UDP IP TCP ICMP ✔✔Great job! While DNS over TCP does exist, UDP is the most c...

By Nutmegs , Uploaded: Feb 07, 2023

$7

$10.00

Add to cart

Instant download

Can't find what you want? Try our AI powered Search

OR

GET ASSIGNMENT HELP
73
0

Document information


Connected school, study & course



About the document


Uploaded On

Feb 07, 2023

Number of pages

8

Written in

Seller


seller-icon
Nutmegs

Member since 2 years

569 Documents Sold


Additional information

This document has been written for:

Uploaded

Feb 07, 2023

Downloads

 0

Views

 73

Document Keyword Tags

THE BEST STUDY GUIDES

Avoid resits and achieve higher grades with the best study guides, textbook notes, and class notes written by your fellow students

custom preview

Avoid examination resits

Your fellow students know the appropriate material to use to deliver high quality content. With this great service and assistance from fellow students, you can become well prepared and avoid having to resits exams.

custom preview

Get the best grades

Your fellow student knows the best materials to research on and use. This guarantee you the best grades in your examination. Your fellow students use high quality materials, textbooks and notes to ensure high quality

custom preview

Earn from your notes

Get paid by selling your notes and study materials to other students. Earn alot of cash and help other students in study by providing them with appropriate and high quality study materials.


$10.00

WHAT STUDENTS SAY ABOUT US


What is Browsegrades

In Browsegrades, a student can earn by offering help to other student. Students can help other students with materials by upploading their notes and earn money.

We are here to help

We're available through e-mail, Twitter, Facebook, and live chat.
 FAQ
 Questions? Leave a message!

Follow us on
 Twitter

Copyright © Browsegrades · High quality services·