| Question 4 | What is the name of the computer you are working from? SEA-SVR2 | Question 5 | What IP addressing settings are currently configured?10.10.0.12 | Question 6 | Is the computer currently configured for DHCP? How can you tell? Yes, DHCP enabled and it received an ip address of 10.10.0.20 | Question 7 | What is the IP address of the DHCP server from which W2K8yy has obtained its IP address? DHCP Server 10.10.0.11 | Question 8 | If the answer to #7 was not the IP address of the SEA-SVR1 computer, why might this have happened?
Table for Individual Question FeedbackPoints Earned:1.0/1.0Correct Answer(s):C 3. __________ is the process of confirming a user’s identity, usually by requiring the user to supply some sort of token, such as a password or certificate. Table for Individual Question FeedbackPoints Earned:0.0/1.0Correct Answer(s):Authentication 4. SMTP server is essentially the Windows counterpart to the __________ program used by most UNIX Web servers. Table for Individual Question FeedbackPoints Earned:0.0/1.0Correct Answer(s):sendmail; Sendmail 5.
Which of the following is a Windows command-line utility for seeing NetBIOS shares on a network? * c. Net view 29. To view eDirectory information on a NetWare 5.1 server, which of the following tools should you use? * d. Novell Client 30. The Nbtstat command is used to enumerate *nix systems.
Suppose the university has the 128.100.xxx.xxx address range on the Internet. How would you assign the IP addresses to the various subnets? How would you control the process by which IP addresses are assigned to individual computers? You will have to make some assumptions to answer both questions, so be sure to state your assumptions. As a network manager, I would assign the IP addresses to various subnets by associating a subnet base address with each physical network.
This password is stored in _______. BIOS CMOS RAM* DDR RAM the CPU 8. (TCO 3) The term form factor in regards to a motherboard refers to the ______ layout of the components on the board physical logical proposed inverted 9. (TCO 9) When you first purchase a notebook, make sure you have a ____ CD containing the installed OS so you can recover from a failed hard drive development management diagnostic recovery 10. (TCO 9) ____ let you specify which devices are to be loaded on startup for a particular user or set of circumstances Hardware profiles* Folder redirections Briefcase profiles Startup profiles 11.
She asks you to verify which servers hold all of the FSMO roles. You want to use DCDiag to output the FSMO role holders to a file named FSMO.txt on the C:\ drive. | Outcomes | After completing this exercise, you will know how to: Use DCDiag to list the FSMO role holders. | Completion time | 10 minutes | Precautions | N/A | Locate the domain controllers that hold the FSMO roles in the enterprise by using the DCDiag tool, which is used to perform diagnostic tests on Windows Server 2008 computers. Use the command dcdiag /?
Identify the port numbers for the following applications. a. Telnet – 23 b. HTTP – 80 (Hypertext Transfer Protocol) c. FTP – 20, 21 (File Transfer Protocol) d. DNS – 53 (Domain Name Server) e. DHCP – 67, 68 (Dynamic Host Control Protocol) Common Applications and Their Port Numbers Port Number Application Description 20, 21 FTP - (File Transfer Protocol) 22 SSH - (Secure Shell) 23 Telnet - (Virtual Terminal Connection) 25 SMTP -
In telecom closet 2, from the punch down block, to the switches, to the wall plates, and on to the offices workstation, plus one shared printer, cabling will change to Cat 5e UTP, using 1000 Base-T technology, achieving a throughput of 1000Mbps. A safety feature on Ethernet Lans, is its access method, CSMA/CD. CSMA/CD, means that your NIC checks the network to make sure it is not busy before transmitting, if two nodes do transmit at the same time having a collision, it will send out packets to inform other nodes of a data collision, then the NIC waits for the network to be inactive before retransmitting. On the
Michael Vulcano IT-130 Chapter 5 Assessment 2/6/13 Fill in the Blank 1) firewall 2) network and sharing center 3) router 4) osi model, 7 5) connectionless protocols 6) ping 7) nslookup.exe 8) dhcp 9) tracert.exe 10) application, physical True/False 1) F 2) T 3) T 4) T 5) T 6) T 7) F 8) F 9) F 10) F Review Questions 1) A hardware address or MAC address Short for Media Access Control address, is an address that uniquely identifies each node of a network and an ipv4 address is an IP address is a binary number that uniquely identifies computers and other devices on a TCP/IP network 2) On a TCP/IP network, an application sends function calls to an application level protocol, which then packages the application data to be transmitted over the network and then passes it down through the levels of the networking levels. At the transport level, the TCP or UDP protocol encapsulates the application level data by adding a header containing the port number and then passes the packet down to the network level. At the network layer, the IP adds its own header which contains the destination address for the packet, and passes it down to the data-link level. At the data-link level, ethernet completes the encapsulation process by applying a frame containing the address of a router on the local network.
Suppose the university has the 128.100.xxx.xxx address range on the Internet. How would you assign the IP addresses to the various subnets? How would you control the process by which IP addresses are assigned to individual computers? You will have to make some assumptions to answer both questions, so be sure to state your assumptions. Answer After I study the case, I will control the users IP addresses validating them by a Domain Controller.