Filters
Question type

Study Flashcards

What type of IP address is configured by a server when a device first initiates a connection to the network?


A) default
B) dynamic
C) static
D) configured

E) A) and D)
F) B) and D)

Correct Answer

verifed

verified

Describe how a computer with a Private IP address accesses the Internet.

Correct Answer

verifed

verified

A computer using a private IP address on...

View Answer

Describe the Lightweight Directory Access Protocol.

Correct Answer

verifed

verified

Lightweight Directory Access Protocol (L...

View Answer

The solution for securing private data traveling over a public network, such as the Internet, is the use of what type of network?


A) public encrypted network
B) virtual private network
C) private encrypted network
D) virtual prevention network

E) A) and B)
F) C) and D)

Correct Answer

verifed

verified

The ability to send and receive transmissions at the same time on an Ethernet cable is referred to by what term?


A) simplex mode
B) half duplex
C) auto transmit
D) full duplex

E) A) and D)
F) None of the above

Correct Answer

verifed

verified

Packets are delivered to a single node on a network when using what type of IPv6 address?


A) anycast address
B) default gateway address
C) multicast address
D) unicast address

E) A) and B)
F) None of the above

Correct Answer

verifed

verified

What is DNS and how does it work?

Correct Answer

verifed

verified

On the Internet, a fully qualified domai...

View Answer

A problem with virtual networks is that data transmitting through them cannot be encrypted and therefore is not secure.

A) True
B) False

Correct Answer

verifed

verified

What device handles access to another network for a client computer if it does not have a better option?


A) firewall
B) default gateway
C) network switch
D) network hub

E) C) and D)
F) A) and B)

Correct Answer

verifed

verified

B

What are the two mail protocols used for delivery of messages, and how do they function?

Correct Answer

verifed

verified

After an email message arrives at the de...

View Answer

What is the name of the 32-bit or 128-bit number that is used to identify a device on a network?


A) port number
B) protocol number
C) IP address
D) IP version

E) B) and D)
F) B) and C)

Correct Answer

verifed

verified

C

The User Datagram Protocol (UDP) guarantees delivery of data to its destination.

A) True
B) False

Correct Answer

verifed

verified

What type of device can be used to block unwanted traffic initiated from the Internet and can also restrict Internet access from an internal network?


A) hub
B) switch
C) firewall
D) VPN

E) C) and D)
F) B) and D)

Correct Answer

verifed

verified

What TCP port is utilized by an SSH server listening for connections?


A) 20
B) 21
C) 22
D) 23

E) All of the above
F) A) and B)

Correct Answer

verifed

verified

C

If a device does not receive an IP address from a DHCP server, the device may resort to what kind of IP address?


A) APIPA
B) random IP address
C) public IP address
D) dynamic IP address

E) B) and D)
F) A) and C)

Correct Answer

verifed

verified

Originally developed by IBM, what protocol is used by Windows to share files and printers on a network?


A) Server Message Block (SMB)
B) Lightweight Directory Access Protocol (LDAP)
C) File Transfer Protocol (FTP)
D) Hypertext Transfer Protocol (HTTP)

E) C) and D)
F) All of the above

Correct Answer

verifed

verified

The Remote Desktop and Remote Assistance applications utilize what port for remote access?


A) 22
B) 23
C) 110
D) 3389

E) B) and C)
F) All of the above

Correct Answer

verifed

verified

Describe TCP and how it provides reliability of packet delivery.

Correct Answer

verifed

verified

In TCP/IP, the protocol that guarantees ...

View Answer

Match each item with a statement below.

Premises
assigns an IP address to a computer when it first attempts to initiate a connection to the network
designed to make it easier for users to connect their computers to a wireless network when a hard-to-remember SSID and security key are used
identifies a computer and the network to which it belongs, such as www.cengage.com
a technique designed to conserve the number of public IP addresses needed by a network
Used by a computer or other device to determine if an IP address of another computer is on its network or another network
A group of computers on a peer-to-peer network that are sharing resources
commonly used by Linux to pass sign-in information to a remote computer and control that computer over a network
protects data by encrypting it from the time it leaves a remote computer until it reaches a server on a corporate network, using a technique called tunneling.
a command that can be used to display the TCP/IP configuration
a protocol used by various client applications when the application needs to query a database
Responses
Secure Shell (SSH)
Lightweight Directory Access Protocol (LDAP)
DHCP server
Network Address Translation (NAT)
subnet mask
ipconfig
virtual private network
Wi-Fi Protected Setup (WPS)
Fully Qualified Domain Name (FQDN)
workgroup

Correct Answer

assigns an IP address to a computer when it first attempts to initiate a connection to the network
designed to make it easier for users to connect their computers to a wireless network when a hard-to-remember SSID and security key are used
identifies a computer and the network to which it belongs, such as www.cengage.com
a technique designed to conserve the number of public IP addresses needed by a network
Used by a computer or other device to determine if an IP address of another computer is on its network or another network
A group of computers on a peer-to-peer network that are sharing resources
commonly used by Linux to pass sign-in information to a remote computer and control that computer over a network
protects data by encrypting it from the time it leaves a remote computer until it reaches a server on a corporate network, using a technique called tunneling.
a command that can be used to display the TCP/IP configuration
a protocol used by various client applications when the application needs to query a database

Describe the contents and purpose of a subnet mask.

Correct Answer

verifed

verified

The subnet mask identifies which part of...

View Answer

Showing 1 - 20 of 36

Related Exams

Show Answer