Knowledge Assessment
Fill in the Blank
Complete the following sentences by writing the correct word or words in the blanks provided. 1. A software routine, which also acts as a filter that blocks certain type of incoming and outgoing traffic, while enabling other types is called a . 2. The _ tool provides a central access point for all of the network controls and connections on a computer running Windows 7. 3. A device that connects one network to another is called a . 4. The most common method for illustrating the operations of a networking stack is the , which consists of layers. 5. Protocols that do not guarantee delivery of their data, but do operate with a very low overhead that conserve network bandwidth are called . 6. The Windows 7 command-line utility that can tell you if the TCP/IP stack of another system on the network is functioning normally is called . 7. The Windows 7 command-line utility that enables you to generate DNS request messages and then transmit them to specific DNS servers on the network is called . 8. Most networks use to dynamically assign addresses and configure computers to use them.
9. The Windows 7 utility that displays a list of the routers currently forwarding packets to a particular destination is called .
10. The top and bottom layers of the OSI model are called the and layers.
True / False
Circle T if the statement is true or F if the statement is false.
F 1. The purpose of Network Diagnostics is to display error messages only.
F 2. Transport layer protocols are not concerned with addressing packets to the correct system.
F 3. The Network Map utility uses a new protocol called Link Layer Topology Discovery (LLTD) to discover information about the network and the devices attached to it.
F 4. The protocols that Windows uses by default at the network and transport layers are collectively called TCP/IP.
F 5. Home and work computers have Network Discovery turned on, and public com-puters have it turned off.
F 6. There are two basic types of port numbers: ephemeral port numbers and well-known port numbers.
F 7. A Windows 7 computer that is connected to a LAN has a hardware address and a computer that is connected to the Internet has an IP address.
F 8. The only two layers of the OSI reference model that do not have individual proto-cols associated with them are the transport layer and the session layer.
F 9. Because the configuration of the Internet is constantly changing, the only way you can know for certain what route packets are taking to a specific destination is to use Tracert.exe.
F10. The IPv6 addresses Windows 7 computers use at die network layer are six-byte hexa-decimal sequences, hard coded into each network interface adapter by the manufacturer.
You May Also Find These Documents Helpful
-
Tcptrack is a sniffer which displays information about TCP connections it sees on a network interface.…
- 1518 Words
- 5 Pages
Powerful Essays -
Tcptrack is a sniffer which displays information about TCP connections it sees on a network interface.…
- 1518 Words
- 5 Pages
Powerful Essays -
4. Which of the following protocols is a connection-oriented protocol that operates at the transport layer of the OSI model and supports reliable connections?…
- 700 Words
- 4 Pages
Satisfactory Essays -
Combines layers 5, 6 and 7: provides network services such as email, file transfers, exchanges of data, support connections between sessions and inner host communications…
- 324 Words
- 2 Pages
Satisfactory Essays -
9. Historically, which of the following models were the earliest models used in corporate networks? TCP/IP…
- 1038 Words
- 4 Pages
Good Essays -
4. Which of the following protocols is a connection-oriented protocol that operates at the transport layer of the OSI model and supports reliable connections?…
- 1161 Words
- 8 Pages
Powerful Essays -
Overview|On a Windows 7 computer, the Network and Sharing Center provides access to most of the operating system’s networking tools and configuration parameters. In Exercise 7.1, you examine the current Sharing and Discovery settings on one of the computers that will become part of the lab network.|…
- 740 Words
- 3 Pages
Satisfactory Essays -
Nmap "Network Mapper" is a free and open source utility for network discovery and security auditing. Many systems and network administrators also find it useful for tasks such as network inventory, managing service upgrade schedules, and monitoring host or service uptime. Nmap uses raw IP packets to determine what hosts are available on the network, what services those hosts are offering, what operating systems they are running, what type of packet filters/firewalls are in use, and dozens of other characteristics.…
- 281 Words
- 1 Page
Satisfactory Essays -
Wireshark provides detailed information about network traffic down to the packet level. However, many are…
- 424 Words
- 2 Pages
Good Essays -
TCP / IP Model - provides end-to-end connectivity specifying how data should be formatted, addressed, transmitted, routed and received at the destination. This functionality has been organized into four abstraction layers which are used to sort all related protocols according to the scope of networking involved.[1][2] From lowest to highest, the layers are the link layer, containing communication technologies for a single network segment (link), the internet layer, connecting hosts across independent networks, thus establishing internetworking.…
- 559 Words
- 3 Pages
Powerful Essays -
5. Which of the following are true about the commonly used version of the TCP/IP model as shown in this chapter? (Choose two answers.)…
- 1335 Words
- 5 Pages
Satisfactory Essays -
Nmap ("Network Mapper") is a free and open source utility for network discovery and security auditing. Many systems and network administrators also find it useful for tasks such as network inventory, managing service upgrade schedules, and monitoring host or service uptime. Nmap uses raw IP packets to determine what hosts are available on the network, what services those hosts are offering, what operating systems they are running, what type of packet filters/firewalls are in use, and dozens of other characteristics. It was designed to rapidly scan large networks, and also works against single hosts. Nmap runs on all major computer operating systems, Linux, Windows, and Mac OS…
- 414 Words
- 2 Pages
Satisfactory Essays -
2. What is seen in each of the three panes that display the packets seen on a local area network?…
- 320 Words
- 2 Pages
Satisfactory Essays -
| What protocol is used when an application requires acknowledgment that a message is delivered?…
- 1099 Words
- 5 Pages
Satisfactory Essays -
The above command lists out all "listening" "tcp" connections. The n option disables hostname resolution of the ip addresses giving the output faster.…
- 732 Words
- 4 Pages
Satisfactory Essays