Chapter 2- Cybersecurity
Which of the following was one of the three universities involved in the original distributed network setup by a government agency?
Berkeley
What class would the IP address of 193.44.34.12 be?
C
A protocol that translates web addresses into IP addresses is called what?
DNS
Which layer of the OSI model is divided into two sublayers?
Data link
What protocol is used for web pages, and what port does it work on?
HTTP, port 80
The IP address of 127.0.0.1 always refers to your what?
Self
The connector used with network cables is called what?
RJ-45
A device used to connect two or more networks is a what?
Router
What protocol is used to send email, and on what port does it work?
SMTP, port 25
Vince Cerf invented what?
TCP
What protocol is used for remotely logging on to a computer?
Telnet
Tim Berners-Lee invented what?
The World Wide Web
How big is a TCP packet header?
The size is always 20 bytes.
The TCP protocol operates at what layer of the OSI model?
Transport
Internet addresses of the form www.chuckeasttom.com are called what?
Uniform resource locators
The cable used in networks is also referred to as what?
Unshielded twisted-pair
A T1 line sends data at what speed?
1.54Mbps
Which of the following is not a valid IP address?
295.253.254.01
A unique hexadecimal number that identifies your network card is called what?
A MAC address
Which U.S. government agency created the distributed network that formed the basis for the Internet?
Advanced Research Projects Agency
What type of cable do most networks use?
Category 5 cable
The simplest device for connecting computers is called what?
Hub
Which utility gives you information about your machine's network configuration?
IPConfig
The point where the backbones of the Internet connect is called what?
Network access points
What is a NIC?
Network interface card