Originally developed by IBM, what protocol is used by Windows to share files and printers on a network?
  • answer = subnet mask
  • answer = virtual private network (vpn)
  • answer = telnet and SSH
  • answer = Server Message Block (SMB)
Unicast addresses include what types of addresses? (Choose all that apply).
  • answer = unicast address
  • answer = firewall & wireless access point
  • answer = connectionless protocol and best effort protocol
  • answer = Global address & link-local address
What type of device can be used to block unwanted traffic initiated from the Internet and can also restrict Internet access from an internal network?
  • answer = ipconfig
  • answer = dynamic
  • answer = firewall
  • answer = firewall & wireless access point
True or False: The current release of SMB is CIFS, also called SMB2.
  • answer = True
  • answer = SSID
  • answer = 3389
  • answer = False
When using static IP addressing, software automatically configures the network connection on each device.
  • answer = 5 GHz
  • answer = APIPA
  • answer = telnet and SSH
  • answer = false
True or False: When using static IP addressing, software automatically configures the network connection on each device.
  • answer = 3389
  • answer = False
  • answer = True
  • answer = APIPA
The ability to send and receive transmissions at the same time on an Ethernet cable is referred to by what term?
  • answer = IP Adress
  • answer = false
  • answer = subnet mask
  • answer = full duplex
What command can be used to flush the local DNS cache on a Windows computer?
  • answer = ipconfig
  • answer = IMAP4 and POP3
  • answer ipconfig /flushdns
  • answer = unicast address
What two terms are used to describe the User Datagram Protocol (UDP)?
  • answer = telnet and SSH
  • answer ipconfig /flushdns
  • answer = connectionless protocol and best effort protocol
  • answer = subnet mask
If the computer you are using is a laptop that moves from one network to another, what tab can be used to configure a secondary configuration, such as a static IP if a DHCP server cannot be reached?
  • answer = Alternate Configuration
  • answer = firewall & wireless access point
  • answer = virtual private network (vpn)
  • answer = telnet and SSH
Match each item1)assigns an IP address to a computer when it first attempts to initiate a connection to the network2)a command that can be used to display the TCP/IP configuration3)a technique designed to conserve the number of public IP addresses needed by a network4)commonly used by Linux to pass sign-in information to a remote computer and control that computer over a network5)a protocol used by various client applications when the application needs to query a database6)designed to make it easier for users to connect their computers to a wireless network when a hard-to-remember SSID and security key are used7)identifies a computer and the network to which it belongs, such as www.cengage.com8)protects data by encrypting it from the time it leaves a remote computer until it reaches a server on a corporate network, using a technique called tunneling.9)A group of computers on a peer-to-peer network that are sharing resources10)Used by a computer or other device to determine if an IP address of another computer is on its network or another network
  • answer = Alternate Configuration
  • answer = 1)DHCP server2)ipconfig3)Network Address Translation (NAT)4)Secure Shell (SSH)5)Lightweight Directory Access Protocol (LDAP)6)Wi-Fi Protected Setup (WPS)7)Fully Qualified Domain Name (FQDN)8)virtual private network9)workgroup10)subnet mask
  • answer = CDMA
  • answer = TCP
What functions as the name of a wireless network?
  • answer = TCP
  • answer = true
  • answer = 22
  • answer = SSID
How are IP addresses available to the Internet classified?
  • answer = subnet mask
  • answer = public
  • answer = full duplex
  • answer = false
True or False: The User Datagram Protocol (UDP) guarantees delivery of data to its destination.
  • answer = full duplex
  • answer = True
  • answer = 5 GHz
  • answer = False
What is the name of the 32-bit or 128-bit number that is used to identify a device on a network?
  • answer = subnet mask
  • answer = ipconfig
  • answer = default gateway
  • answer = IP Adress
The current release of SMB is CIFS, also called SMB2.
  • answer = CDMA
  • answer = SSID
  • answer = true
  • answer = false
What TCP port is utilized by an SSH server listening for connections?
  • answer = TCP
  • answer = CDMA
  • answer = SSID
  • answer = 22
The solution for securing private data traveling over a public network, such as the Internet, is the use of what type of network?
  • answer = virtual private network (vpn)
  • answer = firewall
  • answer = full duplex
  • answer = firewall & wireless access point
What device handles access to another network for a client computer if it does not have a better option?
  • answer = dynamic
  • answer = default gateway
  • answer = telnet and SSH
  • answer = IP Adress
If a device does not receive an IP address from a DHCP server, the device may resort to what kind of IP address?
  • answer = false
  • answer = APIPA
  • answer = CDMA
  • answer = 3389
What two protocols are used to deliver mail messages?
  • answer = telnet and SSH
  • answer = ipconfig
  • answer = IMAP4 and POP3
  • answer = 22
True or False: The Telnet protocol encrypts transmitted data, which therefore cannot be read by others on the network.
  • answer = True
  • answer = 3389
  • answer = full duplex
  • answer = False
What cell phone technology is the most popular in the United States?
  • answer = 5 GHz
  • answer = CDMA
  • answer = 22
  • answer = SSID
True or False: A problem with virtual networks is that data transmitting through them cannot be encrypted and therefore is not secure.
  • answer = 3389
  • answer = False
  • answer = True
  • answer = full duplex
What command can be used to display IP addresses assigned to all network connections on a system?
  • answer = TCP
  • answer ipconfig /flushdns
  • answer = ipconfig
  • answer = IP Adress
0:0:1



Answered

Not Answered

Not Visited
Correct : 0
Incorrect : 0