Advertisement Upgrade to remove ads


T/F: On a network using TCP/IP, some nodes may use multiple IP addresses.


T/F: In CIDR, conventional network class distinctions do not exist.


T/F: The MIME standard replaces SMTP.


T/F: POP3's design makes it best suited to users who retrieve their mail from the same workstation all the time.


T/F: IMAP4 servers require less storage space and usually more processing resources than POP servers do.


A class ____ network class is reserved for special purposes.


In ____ addressing, only Class A, Class B, and Class C addresses are recognized.

first 16 bits

In classful addressing, the Class B IPv4 address network ID is located in the ____.

last 8 bits

In classful addressing, Class C IPv4 address host information is located in the ____.


Within a classful addressing subnet mask, the ____ bits indicate that corresponding bits in an IPv4 address contain network information.

Within a classful addressing, ____ is the default subnet mask for a Class C address.


The result from ANDing 11001111 with 10010001 is ____.


When using classful IPv4 addressing, a network ID always ends with an octet of ____.


Because the octets equal to 0 and 255 are ____, only the numbers 1 through 254 can be used for host information in an IPv4 address.

forward slash

CIDR notation takes the form of the network ID followed by a(n) ____, followed by the number of bits that are used for the extended network prefix.


The ____ gateway is the gateway that first interprets its outbound requests to other subnets, and then interprets its inbound requests from other subnets.


The gateways that make up the Internet backbone are called ____ gateways.

Microsoft Exchange Server

An example of a popular mail server is ____.

Microsoft Outlook

An example of a popular client email software is ____.


SMTP operates from port ____.


The standard message format specified by SMTP allows for lines that contain no more than ____ ASCII


POP3 (Post Office Protocol, version 3) relies on TCP and operates over port ____.


IMAP (Internet Message Access Protocol) is a mail retrieval protocol that was developed as a more sophisticated alternative to ____.


An administrator can discover the host name assigned to a client by using the ____ utility.


A program similar to mtr, ____, is available as a command-line utility in Windows XP, Vista, Server 2003, and Server 2008.


The ____ utility allows you to view a host's routing table.


________ separates a network into multiple logically defined segments, or subnets.

core gateways

The gateways that make up the Internet backbone are called __________

extended network prefix

The combination of additional bits used for subnet information plus the existing network ID is known as the _________


______________ is the protocol responsible for moving messages from one mail server to another over TCP/IP-based networks.


_________ is a standard for encoding and interpreting binary files, images, video, and non-ASCII character sets within an e-mail message.

host utility

Used if an administrator already know a host's name and wants to learn its IP address.

traceroute utility

Uses ICMP ECHO requests to trace the path from one networked node to another, identifying all intermediate hops between the two nodes.

nbstat utility

Useful only on networks that run Windows-based operating systems and NetBIOS.

dig utility

Allows an administrator to query a DNS database and find the host name associated with a specific IP address or vice versa.

nslookup utility

Allows an administrator to query the DNS database from any computer on the network and find the host name of a device by specifying its IP address, or vice versa.

ipconfig utility

The TCP/IP administration utility for use with Windows NT, 2000, XP, Vista, Server 2003, and Server 2008 operating systems.

whois utility

Queries a DNS registration database and obtain information about a domain.

netstat utility

Displays TCP/IP statistics and details about TCP/IP components and connections on a host.

ifconfig utility

The TCP/IP configuration and management utility used on UNIX and Linux systems.

Please allow access to your computer’s microphone to use Voice Recording.

Having trouble? Click here for help.

We can’t access your microphone!

Click the icon above to update your browser permissions above and try again


Reload the page to try again!


Press Cmd-0 to reset your zoom

Press Ctrl-0 to reset your zoom

It looks like your browser might be zoomed in or out. Your browser needs to be zoomed to a normal size to record audio.

Please upgrade Flash or install Chrome
to use Voice Recording.

For more help, see our troubleshooting page.

Your microphone is muted

For help fixing this issue, see this FAQ.

Star this term

You can study starred terms together

NEW! Voice Recording