Chapter 14 Test

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

What wireless networking radio frequency yields faster speeds but offers shorter range? 2.4 GHz 5 GHz 7 GHz 11 GHz

5 GHz

Discuss how a VPN might be used and how it protects data.

A VPN will use the internet and connect to the corporate network. The data before its sent is encrypted, and the connection is virtual, meaning the connection is using existing connections. This kind of encryption is called tunneling. VPNs are used for people who might be traveling for work and need to have their data secure. They have to connect to the VPN and then the data will be encrypted, and secure.

Describe the contents and purpose of a subnet mask.

A subnet mask is used to identify what part of an IP address is the network and what part is the host. These two parts are separated by 1s and 0s in binary. The subnet is divided into three primary classes class A, B, and C. The subnet mask also determines how many hosts are on the network too.

If a device does not receive an IP address from a DHCP server, the device may resort to what kind of IP address? APIPA random IP address public IP address dynamic IP address

APIPA

If the computer you are using is a laptop that moves from one network to another, what tab can be used to configure a secondary configuration, such as a static IP if a DHCP server cannot be reached? General Configuration Alternate Configuration Secondary Configuration Fallback Configuration

Alternate Configuration

Describe a domain name and provide examples of domain names.

Domain names are used by the user to find a website, the computer, the router, the DNS server will do the hard part of finding the IP address. Some examples: microsoft.com tooeletech.edu wikipedia.com webmd.com

The User Datagram Protocol (UDP) guarantees delivery of data to its destination. True or false

False

When using static IP addressing, software automatically configures the network connection on each device. True or false

False

What are the two mail protocols used for delivery of messages, and how do they function?

POP3 and IMAP. POP3 will download the email, but then it will be deleted on the actual computer. All downloads are stored onto the actual computer itself. IMAP will manage the email from the server, and give it to the user when needed.

Originally developed by IBM, what protocol is used by Windows to share files and printers on a network? Server Message Block (SMB) Lightweight Directory Access Protocol (LDAP) File Transfer Protocol (FTP) Hypertext Transfer Protocol (HTTP)

Server Message Block (SMB)

Describe the Lightweight Directory Access Protocol.

This protocol is used to query deeper into a server. For example if you found the server of printers but still need to find the specific printer. The LDAP protocol will go query into the server finding where the printer is. Also LDAP isn't encrypted.

Describe TCP and how it provides reliability of packet delivery.

Transmission Control Protocol will split, say a document into packets of information. It will send packet 1 then the other computer will send an acknowledgement back confirming that the last packet received was packet 1. Now the computer that is sending the info knows it can send more. Then it will send packets 2 and 3. The receiving computer sends an acknowledgment back. This continues on and on. The reliability of comes in by the acknowledgement. If a packet is missing, the acknowledgement will say that it is missing some packets. Then the source computer will know exactly which packets to send back. In other words all the packets should arrive at the receiving computer safely using the acknowledgement.

The current release of SMB is CIFS, also called SMB2. True or false

True

Describe how a computer with a Private IP address accesses the Internet.

Using NAT a computer won't need to use the IP address of the computer on the internet. Instead the IP will be masked underneath a gateway device. The gateway device takes on the responsibility of the IP address used on the internet. This is actually more secure because the IP address of the computer is hidden. Everything is then routed to the gateway device, then the gateway device then can decide which computer it should go to.

What two terms are used to describe the User Datagram Protocol (UDP)? connectionless protocol connection oriented protocol best effort protocol reliable protocol

connectionless protocol best effort protocol

What device handles access to another network for a client computer if it does not have a better option? firewall default gateway network switch network hub

default gateway

The ability to send and receive transmissions at the same time on an Ethernet cable is referred to by what term? simplex mode half duplex auto transmit full duplex

full duplex

Unicast addresses include what types of addresses? (Choose all that apply). global address anycast address multicast address link-local address

global address link-local address

What command can be used to display IP addresses assigned to all network connections on a system? msconfig netstat ipconfig netcfg32

ipconfig

What command can be used to flush the local DNS cache on a Windows computer? nslookup -f ipconfig /flushdns dns dump service dnscache restart

ipconfig /flushdns

How are IP addresses available to the Internet classified? public private non-routable standard

public

How is the network portion and the host portion of an IP address identified? dynamic address DHCP address default gateway subnet mask

subnet mask

The solution for securing private data traveling over a public network, such as the Internet, is the use of what type of network? public encrypted network virtual private network private encrypted network virtual prevention network

virtual private network


संबंधित स्टडी सेट्स

Anatomy and physiology two Del Río - the Blood

View Set

Week 7: Software Testing (Part 1) - CS 427

View Set

tools and technology (unit: structures of the universe)

View Set

AP Gov.: Civil Rights and Civil Liberties (test 1)

View Set

Chapter 56: Hematopoietic Agents

View Set

Topic 46 Types of Retirement Plans

View Set

40- 44 fill ins with formal commands

View Set