Filters
Question type

Study Flashcards

Before data is transmitted on a network, it is first broken up into ____________________.

Correct Answer

verifed

verified

packets,segments

Describe the contents and purpose of a subnet mask.

Correct Answer

verifed

verified

The subnet mask used with IPv4 identifies which part of an IP address is the network portion and which part is the host portion. Using a subnet mask, a computer or other device can know if an IP address of another computer is on its network or another network. A subnet mask is a string of ones followed by a string of zeros. The ones in a subnet mask say, "On our network, this part of an IP address is the network part," and the group of zeros says, "On our network, this part of an IP address is the host part.",

What type of device can be used to block unwanted traffic initiated from the Internet and can also restrict Internet access from an internal network?


A) hub
B) switch
C) firewall
D) VPN

Correct Answer

verifed

verified

Which utility can be used to automatically diagnose a problem with a network connection?


A) My Network Places
B) Device Manger
C) Windows Network Diagnostics
D) Control Panel

Correct Answer

verifed

verified

Describe the Lightweight Directory Access Protocol.

Correct Answer

verifed

verified

Lightweight Directory Access Protocol (L...

View Answer

Describe TCP and how it provides reliability of packet delivery.

Correct Answer

verifed

verified

In TCP\IP, the protocol that guarantees ...

View Answer

What is used to identify a wireless access point?


A) secure key
B) MAC address
C) Network ID
D) SSID

Correct Answer

verifed

verified

How are IP addresses available to the Internet classified?


A) public
B) private
C) non-routable
D) standard

Correct Answer

verifed

verified

Which is used to identify the network portion and the host portion of an IP address?


A) dynamic address
B) DHCP address
C) default gateway
D) subnet mask

Correct Answer

verifed

verified

The first part of an IPv4 address identifies the network, and the last part identifies the ____________________.

Correct Answer

verifed

verified

When connecting to a private and secured wireless access point, you must provide the information that proves you have the right to use the network.

Correct Answer

verifed

verified

What type of IP address should be configured on a wireless access point so that it can always be located by the devices that it serves?


A) static IP address
B) dynamic IP address
C) private IP address
D) default IP address

Correct Answer

verifed

verified

A

What is the name of a 32-bit or 128-bit number that is used to identify a device?


A) port number
B) protocol number
C) IP address
D) IP version

Correct Answer

verifed

verified

Wireless networks are either public, unsecured hotspots or private, secured hotspots.

Correct Answer

verifed

verified

Match each term with the correct statement below.

Premises
A command that can be used to display the TCP\IP configuration
A security technique that uses encrypted data packets between a private network and a computer on the Internet
A protocol used by various client applications when the application needs to query a database
Designed to make it easier for users to connect their computers to a wireless network when a hard-to-remember SSID and security key are used
When a firewall opens a port because a computer behind the firewall initiates communication on another port
A protocol used to convert private IP addresses on a LAN to a public IP address before a data packet is sent over the Internet
Assigns an IP address to a computer when it first attempts to initiate a connection to the network
A group of computers on a peer-to-peer network that are sharing resources
Used by a computer or other device to determine if an IP address of another computer is on its network or another network
Protocol used to pass login information to a remote computer and control that computer over a network
Responses
subnet mask
port triggering
DHCP server
workgroup
Wi-Fi Protected Setup (WPS)
ipconfig
Secure Shell (SSH)
Lightweight Directory Access Protocol (LDAP)
virtual private network
Network Address Translation (NAT)

Correct Answer

A command that can be used to display the TCP\IP configuration
A security technique that uses encrypted data packets between a private network and a computer on the Internet
A protocol used by various client applications when the application needs to query a database
Designed to make it easier for users to connect their computers to a wireless network when a hard-to-remember SSID and security key are used
When a firewall opens a port because a computer behind the firewall initiates communication on another port
A protocol used to convert private IP addresses on a LAN to a public IP address before a data packet is sent over the Internet
Assigns an IP address to a computer when it first attempts to initiate a connection to the network
A group of computers on a peer-to-peer network that are sharing resources
Used by a computer or other device to determine if an IP address of another computer is on its network or another network
Protocol used to pass login information to a remote computer and control that computer over a network

Which wireless networking radio frequency yields faster speeds but offers shorter range?


A) 2.4 GHz
B) 5 GHz
C) 7 GHz
D) 11 GHz

Correct Answer

verifed

verified

If the computer you are using is a laptop that moves from one network to another, you can click the _____ tab and configure static IP address settings for a second network.


A) General Configuration
B) Alternate Configuration
C) Secondary Configuration
D) Fallback Configuration

Correct Answer

verifed

verified

When using static IP addressing, software automatically configures the network connection on each device.

Correct Answer

verifed

verified

What is DNS and how does it work?

Correct Answer

verifed

verified

This process of associating a character-...

View Answer

Communication between two computers happens at three levels (layers) and these levels include the application, operating system, and ____________________.

Correct Answer

verifed

verified

Showing 1 - 20 of 37

Related Exams

Show Answer