3rd

Ace your homework & exams now with Quizwiz!

port address

A unique address given to each application layer software package using TCP/IP.

eight

At the bare minimum, use at least ___characters in the passphrase.

ipconfig /all

CLI command displays a network connection's configuration information, including the MAC address

alternate IP address

The computer will first attempt to gather network connection settings from a DHCP server. If a DHCP server is not available on the network, the computer will instead use the new static IP settings you just entered.

authentication

The process of validating a user. A user would enter their credentials and, if accurate, their credentials are accepted, and access is granted to them

MAC address

A ______ is the device's globally unique hardware number. Unlike the IP address, this address does not change

dial-up

A dial-on-demand service, which means that a telephone number must be dialed when connecting to an ISP (Internet service provider). This service is not affected by adverse atmospheric conditions such as clouds, rain, snow, and fog

Firewall

A host-based tool (host-based meaning it is installed and configured on the workstation itself) can most likely be configured to block traffic to websites by way of content filtering.

whitelists

A network-based Criteria for filtering can draw from lists of what can be accessed.

blacklists

A network-based Criteria for filtering can draw from lists of what cannot be accessed (restricted/blocked)

ADHOC

A wireless local area network (WLAN) covers a small local area, such as an office or a home. The devices in a WLAN are connected in either ____ mode (no wireless access point) or infrastructure mode (using an access point).

web browser

A wireless router provides a provision to connect remotely using a___. This is what you will use to first configure the wireless router.

extend

Adding an access point will not stop someone from gaining access to the company's wireless network. It will ___ the size of the wireless network.

mac filtering

Allows you to restrict access to your network to certain computers or devices. If a MAC address is not entered in the table of MAC addresses, the device is not allowed to connect to the network.

satellite

An always-on Internet technology that can be severely degraded (or impossible to use) under adverse weather and atmospheric conditions such as clouds, rain, snow, and fog

parental controls

App gives parents the ability to manage the kind of content allowed from the Internet. Parents can also monitor websites and the content accessed.

single factor

Authentication requires a user to provide one passphrase only. The entered passphrase is analyzed, and if it is found to be accurate, the user is then granted access to the system. Comparatively less secure than multi-factor authentication. Ideally, this authentication should not be used for securing sensitive information.

ipconfig /renew

CLI command leases a new IP address from a DHCP server. Make sure you release the IP address before you renew it.

coaxial

Cable connection using F-type connectors.

hotspot

Can be used to share the Internet connection on a mobile device with other mobile devices or computers using the device's Wi-Fi. This is a connect-as-needed technology.

network and sharing center

Cathy will find the computer's network connection settings in the____ (from the Control Panel). She will also see all the network connection types

Fourth Generation

Cellular technology uses LTE technology with speeds ranging from 100 Mbps to 1 Gbps.

True

Changing the radio power allows you to prevent the wireless network from going outside the walls of your company. True or Fals (if the answer is False, please input False)

ping

Command-line command that tests connectivity by sending an echo request to a remote computer. If the remote computer is online, detects the signal, and is configured to respond, it responds.

aes

Current encryption algorithm used today. Provides faster and more secure encryption than TKIP. Use the acronym

dsl

Filters use RJ-11 connections. Filters are used when simultaneous voice and data are desired. This filter is required for on each analog telephone connection when simultaneous voice and data are desired. Use the acronym.

UPNP

Helps computers on the local network automatically discover and communicate with services provided by other computers on the local network. Use the acronym.

ssid

If a user were connecting to the network using a wireless connection, these settings should be enabled: ____, authentication and encryption settings. Use the acronym.

cable

Internet connection that is always-on, wired technology and is not affected by atmospheric conditions such as clouds, rain, snow, and fog.

WPA2 ENTERPRISE

Is considered the most secure of the wireless choices settings given. However, it requires an authentication server and a considerable amount of technical configuration resulting in additional costs to the customer.

DMZ

Is enabled on a SOHO router to forward all protocols (ports) from the public untrusted network to a host on the private LAN. Use this setting carefully on a SOHO device as it can have serious security ramifications to all hosts on the private network. A computer or network that is not protected by a firewall or has limited protection. Use the acronym.

WAP

It enables wireless devices to connect to the network. These wireless connections can be secured using wireless security features. Use the acronym. Use the acronym

radius

It is a network protocol, which operates on port number 1812. It provides accounting, authorization, and authentication services to its users.

administrative

It's extremely important to change the ___ password on a router as soon as you install it.

NETSTAT

Lists statistics about the network connection, including the IP addresses of active connections.

wep

No longer considered secure because the key used for encryption doesn't change. Use the acronym.

Ethernet

Patch cable uses RJ-45 connectors.

latency

Performance of a network technology is measured in bandwidth and______

VPN

Protects data by encrypting it from the time it leaves the remote computer until it reaches a server on the corporate network, and vice versa. This application is for a remote employee to connect to his private corporate network via the public untrusted Internet. Windows 10 can be configured to require the connecting user to enter his/her user name and password at the time he/she connects. Use the acronym.

local computer

The IP address 127.0.0.1 always refers to the____. If there is not a response, you can assume there is a problem with the network connection's configuration.

PRIVATE

The IP addresses that are used within a network used the ___ network IP address ranges. These IP address ranges are considered to be non-routable and cannot be used on the Internet

GATEWAY

The ___ is the address on the router that allows your traffic to move from your local network to the Internet. You use this to route your requests for addresses outside your local network.

DHCP

The ___ server, which automatically assigns IP address information to network clients with either wired or wireless connections. The host device is configured to obtain IP address information automatically. Use the acronym.

subnet mask

The ____is used to identify the network that you are connected to and the node on that network.

DNS

The domain name address is used to connect to a _____ server that is used to resolve the address. This allows you to use a name like www.microsoft.com instead of trying to remember the IP address of the web server. Use the acronym.

username

The user must have a valid ____ and password configured on the Windows domain controller to authenticate on the network thru a wired connection.

static

There are two methods of guaranteeing that a network host receives the same IP address each time it is booted. First, a technician could configure a ____assigned IP address to the host. Second, a DHCP reservation could be configured on the DHCP server.

wpa2

This security standard also changes the encryption (typically uses AES for encryption) with every packet so that it would be difficult to brute-force the encryption. Use the acronym

TKIP

This wireless encryption is not as secure as AES. Generates a different key for every transmission. Use the acronym.

wpa

Typically uses TKIP for encryption. Use the acronym.

Port Forwarding

When the firewall receives a request for communication from the Internet to the specific computer and port, the request will be allowed and forwarded to that computer on the network.

APIPA

Without an alternate configuration, if the host cannot reach a DHCP server, the host will automatically assign itself an address in the address range 169.254.x.y. Use the acronym.

QOS

You notice that one application or device is not getting the best service, you can improve its network performance using this router's feature. A feature that prioritizes network traffic to guarantee delivery of data or improve the performance of a particular application or device. Use the acronym.

disabling

_____ SSID broadcast hides the SSID; it will not be seen by anyone. If they don't know the SSID, they can't get on the company's network

IPCONFIG

command can display network configuration information and refresh the TCP/IP assignments for a connection and used on UNIX, Linux, and macOS operating systems

REVERSE LOOKUP

nslookup 10.22.209.75

address

reservation When a DHCP server assigns a static IP address to a DHCP client. For example, a network printer might require a static IP address so that computers on the network can find the printer.

WPS

was created to allow users with little to no experience to set up wireless protection using a button and PIN to connect to a wireless router. Use the acronym


Related study sets

Accounting Exam 2: Chapters 4,5 Old exam Barrett

View Set

ITSY-1300 Chapter 8 - Cryptography

View Set

Intro to business chapters 6,7,8,9 exam

View Set

P.6 / 3. Key words ; Leading statements 64

View Set

ITE Exam 2 Modules 6,8,9, and 10

View Set

Intro to Ethics Unit 2: Divine Command, Conventionalism and Egoism

View Set

NSG 330 Ch 34- Management Hematologic Neoplasms

View Set

Micro Econ (dr. Yaber) module 10, 11

View Set

APES Chapter 19: Risk, Toxicology, and Human Health

View Set