Computer Networking > QUESTIONS & ANSWERS > The Bits and Bytes of Computer Networking. Week 6: Troubleshooting and the Future of Networking, Qui (All)
The Bits and Bytes of Computer Networking. Week 6: Troubleshooting and the Future of Networking, Quiz Latest 2022-23. The protocol used to communicate network errors is known as __________. ✔✔... ICMP, ICMP is used to communicate errors back to the client. The ping utility sends what message type? ✔✔ echo request; By default, the ping utility sends an Echo Request ICMP message type. On Windows, one of the tools you can use to verify connectivity to a specific port is ________. ✔✔ Test-NetConnection ; Test-NetConnection lets you test many things, including connectivity to a specific port on a remote host. One of Level 3's public DNS servers is ____________. ✔✔ 4.2.2.3; Level 3's public DNS servers are 4.2.2.1 through 4.2.2.6 .Question 2 A DNS resolver tool available on all major desktop operating systems is __________. ✔✔ nslookup; nslookup is available by default on Windows, macOS, and Linux. The organization responsible for DNS at a global level is ________. ✔✔ ICANN; ICANN is responsible for DNS at a global level. A piece of software that runs and manages virtual machines is known as a __________. ✔✔ hypervisor; A hypervisor manages many virtual instances running on a single host. Office 365 Outlook is an example of _______. ✔✔ SaaS; Office 365 Outlook is an example of Software as a Service (SaaS). A hybrid cloud is ________________. ✔✔ a combination of a public cloud and a private cloud; A hybrid cloud runs some services on a cloud provider and some services in-house. An IPv6 address is how many bits long? ✔✔ 128; An IPv6 address is 128 bits long The very first field in an IPv6 header is the _______. ✔✔ version field; This field is used to indicate what version of IP is being used. The IPv6 header field that indicates how many routers can forward a packet before it's discarded is called the ________. ✔✔ hop limit field ; The hop limit field configures how many routers can try to forward a packet before it's discarded. The ability for a protocol or program to determine that something went wrong is known as ________. ✔✔ Error detection; Error detection is determining that an error occurred; error recovery is attempting to fix this error automatically. The Linux and macOS program traceroute is known by a slightly different name on Windows. It's referred to as ______. ✔✔ tracert; These programs operate slightly differently and have slightly different names. The IPv6 loopback address is _____. ✔✔ 0000:0000:0000:0000:0000:0000:0000:0001; The IPv6 loopback address is a great example of how IPv6 address compaction works. Following rules of compaction, the IPv6 address 2001:0db8:0000:0000:0000:ff00:0012:3456 could also be written as _______. ✔✔ 2002:db8::ff00:12:3456; IPv6 address compaction is a great way to shorten IPv6 addresses. For all IPv6 addresses, the network ID is always the first ______ bits. ✔✔ 64; For all IPv6 addresses, the first 64 bits are the network ID and the last 64 bits are the host ID. A support technician uses the ping utility on a system that is online, yet no response is received. What should be allowed through a firewall, for ping to operate correctly? echo reply, echo request, ICMP, TTL ✔✔ echo request; Incorrect [Show More]
Last updated: 1 year ago
Preview 1 out of 4 pages
Instant download
Buy this document to get the full access instantly
Instant Download Access after purchase
Add to cartInstant download
Connected school, study & course
About the document
Uploaded On
Jan 12, 2023
Number of pages
4
Written in
This document has been written for:
Uploaded
Jan 12, 2023
Downloads
0
Views
87
In Browsegrades, a student can earn by offering help to other student. Students can help other students with materials by upploading their notes and earn money.
We're available through e-mail, Twitter, Facebook, and live chat.
FAQ
Questions? Leave a message!
Copyright © Browsegrades · High quality services·