MCQExams
0:0:1
CBSE
JEE
NTSE
NEET
Practice
Homework
×
practice
Chapter 14 Practice - It Found. Quiz
Originally developed by IBM, what protocol is used by Windows to share files and printers on a network?
Report Question
0%
answer = subnet mask
0%
answer = virtual private network (vpn)
0%
answer = telnet and SSH
0%
answer = Server Message Block (SMB)
Unicast addresses include what types of addresses? (Choose all that apply).
Report Question
0%
answer = unicast address
0%
answer = firewall & wireless access point
0%
answer = connectionless protocol and best effort protocol
0%
answer = Global address & link-local address
What type of device can be used to block unwanted traffic initiated from the Internet and can also restrict Internet access from an internal network?
Report Question
0%
answer = ipconfig
0%
answer = dynamic
0%
answer = firewall
0%
answer = firewall & wireless access point
True or False: The current release of SMB is CIFS, also called SMB2.
Report Question
0%
answer = True
0%
answer = SSID
0%
answer = 3389
0%
answer = False
When using static IP addressing, software automatically configures the network connection on each device.
Report Question
0%
answer = 5 GHz
0%
answer = APIPA
0%
answer = telnet and SSH
0%
answer = false
True or False: When using static IP addressing, software automatically configures the network connection on each device.
Report Question
0%
answer = 3389
0%
answer = False
0%
answer = True
0%
answer = APIPA
The ability to send and receive transmissions at the same time on an Ethernet cable is referred to by what term?
Report Question
0%
answer = IP Adress
0%
answer = false
0%
answer = subnet mask
0%
answer = full duplex
What command can be used to flush the local DNS cache on a Windows computer?
Report Question
0%
answer = ipconfig
0%
answer = IMAP4 and POP3
0%
answer ipconfig /flushdns
0%
answer = unicast address
What two terms are used to describe the User Datagram Protocol (UDP)?
Report Question
0%
answer = telnet and SSH
0%
answer ipconfig /flushdns
0%
answer = connectionless protocol and best effort protocol
0%
answer = subnet mask
If the computer you are using is a laptop that moves from one network to another, what tab can be used to configure a secondary configuration, such as a static IP if a DHCP server cannot be reached?
Report Question
0%
answer = Alternate Configuration
0%
answer = firewall & wireless access point
0%
answer = virtual private network (vpn)
0%
answer = telnet and SSH
Match each item1)assigns an IP address to a computer when it first attempts to initiate a connection to the network2)a command that can be used to display the TCP/IP configuration3)a technique designed to conserve the number of public IP addresses needed by a network4)commonly used by Linux to pass sign-in information to a remote computer and control that computer over a network5)a protocol used by various client applications when the application needs to query a database6)designed to make it easier for users to connect their computers to a wireless network when a hard-to-remember SSID and security key are used7)identifies a computer and the network to which it belongs, such as www.cengage.com8)protects data by encrypting it from the time it leaves a remote computer until it reaches a server on a corporate network, using a technique called tunneling.9)A group of computers on a peer-to-peer network that are sharing resources10)Used by a computer or other device to determine if an IP address of another computer is on its network or another network
Report Question
0%
answer = Alternate Configuration
0%
answer = 1)DHCP server2)ipconfig3)Network Address Translation (NAT)4)Secure Shell (SSH)5)Lightweight Directory Access Protocol (LDAP)6)Wi-Fi Protected Setup (WPS)7)Fully Qualified Domain Name (FQDN)8)virtual private network9)workgroup10)subnet mask
0%
answer = CDMA
0%
answer = TCP
What functions as the name of a wireless network?
Report Question
0%
answer = TCP
0%
answer = true
0%
answer = 22
0%
answer = SSID
How are IP addresses available to the Internet classified?
Report Question
0%
answer = subnet mask
0%
answer = public
0%
answer = full duplex
0%
answer = false
True or False: The User Datagram Protocol (UDP) guarantees delivery of data to its destination.
Report Question
0%
answer = full duplex
0%
answer = True
0%
answer = 5 GHz
0%
answer = False
What is the name of the 32-bit or 128-bit number that is used to identify a device on a network?
Report Question
0%
answer = subnet mask
0%
answer = ipconfig
0%
answer = default gateway
0%
answer = IP Adress
The current release of SMB is CIFS, also called SMB2.
Report Question
0%
answer = CDMA
0%
answer = SSID
0%
answer = true
0%
answer = false
What TCP port is utilized by an SSH server listening for connections?
Report Question
0%
answer = TCP
0%
answer = CDMA
0%
answer = SSID
0%
answer = 22
The solution for securing private data traveling over a public network, such as the Internet, is the use of what type of network?
Report Question
0%
answer = virtual private network (vpn)
0%
answer = firewall
0%
answer = full duplex
0%
answer = firewall & wireless access point
What device handles access to another network for a client computer if it does not have a better option?
Report Question
0%
answer = dynamic
0%
answer = default gateway
0%
answer = telnet and SSH
0%
answer = IP Adress
If a device does not receive an IP address from a DHCP server, the device may resort to what kind of IP address?
Report Question
0%
answer = false
0%
answer = APIPA
0%
answer = CDMA
0%
answer = 3389
What two protocols are used to deliver mail messages?
Report Question
0%
answer = telnet and SSH
0%
answer = ipconfig
0%
answer = IMAP4 and POP3
0%
answer = 22
True or False: The Telnet protocol encrypts transmitted data, which therefore cannot be read by others on the network.
Report Question
0%
answer = True
0%
answer = 3389
0%
answer = full duplex
0%
answer = False
What cell phone technology is the most popular in the United States?
Report Question
0%
answer = 5 GHz
0%
answer = CDMA
0%
answer = 22
0%
answer = SSID
True or False: A problem with virtual networks is that data transmitting through them cannot be encrypted and therefore is not secure.
Report Question
0%
answer = 3389
0%
answer = False
0%
answer = True
0%
answer = full duplex
What command can be used to display IP addresses assigned to all network connections on a system?
Report Question
0%
answer = TCP
0%
answer ipconfig /flushdns
0%
answer = ipconfig
0%
answer = IP Adress
0:0:1
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
0
Answered
0
Not Answered
0
Not Visited
Correct : 0
Incorrect : 0
Report Question
×
What's an issue?
Question is wrong
Answer is wrong
Other Reason
Want to elaborate a bit more? (optional)
Support mcqexams.com by disabling your adblocker.
×
Please disable the adBlock and continue.
Thank you.
Reload page