Deck 15: Connecting to and Setting up a Network

ملء الشاشة (f)
exit full mode
سؤال
Using a ______________, packets are delivered to a single node on a network.

A) anycast address
B) default gateway address
C) multicast address
D) unicast address
استخدم زر المسافة أو
up arrow
down arrow
لقلب البطاقة.
سؤال
A problem with virtual networks is that data transmitting through them cannot be encrypted and therefore is not secure.
سؤال
Which utility can be used to automatically diagnose a problem with a network connection?

A) My Network Places
B) Device Manger
C) Windows Network Diagnostics
D) Control Panel
سؤال
The solution for securing private data traveling over a public network, such as the Internet, is a _________.

A) public encrypted network
B) virtual private network
C) private encrypted network
D) virtual prevention network
سؤال
Which is used to identify the network portion and the host portion of an IP address?

A) dynamic address
B) DHCP address
C) default gateway
D) subnet mask
سؤال
What is it called when a router is configured to open or close certain ports so they can or cannot be used.

A) port triggering
B) demilitarized zone (DMZ)
C) port filtering
D) port forwarding
سؤال
The Telnet protocol encrypts transmitted data, which therefore cannot be read by others on the network.
سؤال
If the computer you are using is a laptop that moves from one network to another, you can click the _____ tab and configure static IP address settings for a second network.

A) General Configuration
B) Alternate Configuration
C) Secondary Configuration
D) Fallback Configuration
سؤال
What type of IP address should be configured on a wireless access point so that it can always be located by the devices that it serves?

A) static IP address
B) dynamic IP address
C) private IP address
D) default IP address
سؤال
Which protocol makes a connection, checks whether the data is received, and resends it if it is not?

A) TCP
B) UDP
C) IP
D) DNS
سؤال
Which command can be used to display TCP\IP configuration information and refresh the IP address?

A) msconfig
B) netstat
C) ipconfig
D) netcfg32
سؤال
Which TCP\IP protocol is used by Windows to share files and printers on a network?

A) Server Message Block (SMB)
B) Lightweight Directory Access Protocol (LDAP)
C) File Transfer Protocol (FTP)
D) Hypertext Transfer Protocol (HTTP)
سؤال
What is the name of a 32-bit or 128-bit number that is used to identify a device?

A) port number
B) protocol number
C) IP address
D) IP version
سؤال
When connecting to a private and secured wireless access point, you must provide the information that proves you have the right to use the network.
سؤال
How are IP addresses available to the Internet classified?

A) public
B) private
C) non-routable
D) standard
سؤال
Which type of IP address is configured by a server when a device first initiates a connection to the network?

A) default
B) dynamic
C) static
D) configured
سؤال
Wireless networks are either public, unsecured hotspots or private, secured hotspots.
سؤال
What is used to identify a wireless access point?

A) secure key
B) MAC address
C) Network ID
D) SSID
سؤال
What type of device can be used to block unwanted traffic initiated from the Internet and can also restrict Internet access from an internal network?

A) hub
B) switch
C) firewall
D) VPN
سؤال
When using static IP addressing, software automatically configures the network connection on each device.
سؤال
Match between columns
الفرضيات:
الردود:
port triggering
ipconfig
Lightweight Directory Access Protocol (LDAP)
DHCP server
workgroup
Secure Shell (SSH)
Wi-Fi Protected Setup (WPS)
subnet mask
virtual private network
Network Address Translation (NAT)
port triggering
ipconfig
Lightweight Directory Access Protocol (LDAP)
DHCP server
workgroup
Secure Shell (SSH)
Wi-Fi Protected Setup (WPS)
subnet mask
virtual private network
Network Address Translation (NAT)
port triggering
ipconfig
Lightweight Directory Access Protocol (LDAP)
DHCP server
workgroup
Secure Shell (SSH)
Wi-Fi Protected Setup (WPS)
subnet mask
virtual private network
Network Address Translation (NAT)
port triggering
ipconfig
Lightweight Directory Access Protocol (LDAP)
DHCP server
workgroup
Secure Shell (SSH)
Wi-Fi Protected Setup (WPS)
subnet mask
virtual private network
Network Address Translation (NAT)
port triggering
ipconfig
Lightweight Directory Access Protocol (LDAP)
DHCP server
workgroup
Secure Shell (SSH)
Wi-Fi Protected Setup (WPS)
subnet mask
virtual private network
Network Address Translation (NAT)
port triggering
ipconfig
Lightweight Directory Access Protocol (LDAP)
DHCP server
workgroup
Secure Shell (SSH)
Wi-Fi Protected Setup (WPS)
subnet mask
virtual private network
Network Address Translation (NAT)
port triggering
ipconfig
Lightweight Directory Access Protocol (LDAP)
DHCP server
workgroup
Secure Shell (SSH)
Wi-Fi Protected Setup (WPS)
subnet mask
virtual private network
Network Address Translation (NAT)
port triggering
ipconfig
Lightweight Directory Access Protocol (LDAP)
DHCP server
workgroup
Secure Shell (SSH)
Wi-Fi Protected Setup (WPS)
subnet mask
virtual private network
Network Address Translation (NAT)
port triggering
ipconfig
Lightweight Directory Access Protocol (LDAP)
DHCP server
workgroup
Secure Shell (SSH)
Wi-Fi Protected Setup (WPS)
subnet mask
virtual private network
Network Address Translation (NAT)
port triggering
ipconfig
Lightweight Directory Access Protocol (LDAP)
DHCP server
workgroup
Secure Shell (SSH)
Wi-Fi Protected Setup (WPS)
subnet mask
virtual private network
Network Address Translation (NAT)
سؤال
Describe two methods that a wireless access point might use to secure a wireless network.
سؤال
Describe the contents and purpose of a subnet mask.
سؤال
Describe TCP and how it provides reliability of packet delivery.
سؤال
What is DNS and how does it work?
سؤال
Before data is transmitted on a network, it is first broken up into ____________________.
سؤال
Describe communications at the application level - give an example.
سؤال
The first part of an IPv4 address identifies the network, and the last part identifies the ____________________.
سؤال
Describe a domain name and provide examples of domain names.
سؤال
Which wireless networking radio frequency yields faster speeds but offers shorter range?

A) 2.4 GHz
B) 5 GHz
C) 7 GHz
D) 11 GHz
سؤال
Describe the Lightweight Directory Access Protocol.
سؤال
Describe how a computer with a Private IP address accesses the Internet.
سؤال
Discuss how a VPN might be used and how it protects data.
سؤال
Discuss User Datagram Protocol.
سؤال
Communication between two computers happens at three levels (layers) and these levels include the application, operating system, and ____________________.
سؤال
A ____________________ is the name of a computer and can be used in place of its IP address.
سؤال
Using __________________, when a firewall receives a request for communication from the Internet to a specific computer and port, the request will be allowed and forwarded to that computer on the network.
فتح الحزمة
قم بالتسجيل لفتح البطاقات في هذه المجموعة!
Unlock Deck
Unlock Deck
1/37
auto play flashcards
العب
simple tutorial
ملء الشاشة (f)
exit full mode
Deck 15: Connecting to and Setting up a Network
1
Using a ______________, packets are delivered to a single node on a network.

A) anycast address
B) default gateway address
C) multicast address
D) unicast address
D
2
A problem with virtual networks is that data transmitting through them cannot be encrypted and therefore is not secure.
False
3
Which utility can be used to automatically diagnose a problem with a network connection?

A) My Network Places
B) Device Manger
C) Windows Network Diagnostics
D) Control Panel
C
4
The solution for securing private data traveling over a public network, such as the Internet, is a _________.

A) public encrypted network
B) virtual private network
C) private encrypted network
D) virtual prevention network
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 37 في هذه المجموعة.
فتح الحزمة
k this deck
5
Which is used to identify the network portion and the host portion of an IP address?

A) dynamic address
B) DHCP address
C) default gateway
D) subnet mask
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 37 في هذه المجموعة.
فتح الحزمة
k this deck
6
What is it called when a router is configured to open or close certain ports so they can or cannot be used.

A) port triggering
B) demilitarized zone (DMZ)
C) port filtering
D) port forwarding
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 37 في هذه المجموعة.
فتح الحزمة
k this deck
7
The Telnet protocol encrypts transmitted data, which therefore cannot be read by others on the network.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 37 في هذه المجموعة.
فتح الحزمة
k this deck
8
If the computer you are using is a laptop that moves from one network to another, you can click the _____ tab and configure static IP address settings for a second network.

A) General Configuration
B) Alternate Configuration
C) Secondary Configuration
D) Fallback Configuration
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 37 في هذه المجموعة.
فتح الحزمة
k this deck
9
What type of IP address should be configured on a wireless access point so that it can always be located by the devices that it serves?

A) static IP address
B) dynamic IP address
C) private IP address
D) default IP address
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 37 في هذه المجموعة.
فتح الحزمة
k this deck
10
Which protocol makes a connection, checks whether the data is received, and resends it if it is not?

A) TCP
B) UDP
C) IP
D) DNS
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 37 في هذه المجموعة.
فتح الحزمة
k this deck
11
Which command can be used to display TCP\IP configuration information and refresh the IP address?

A) msconfig
B) netstat
C) ipconfig
D) netcfg32
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 37 في هذه المجموعة.
فتح الحزمة
k this deck
12
Which TCP\IP protocol is used by Windows to share files and printers on a network?

A) Server Message Block (SMB)
B) Lightweight Directory Access Protocol (LDAP)
C) File Transfer Protocol (FTP)
D) Hypertext Transfer Protocol (HTTP)
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 37 في هذه المجموعة.
فتح الحزمة
k this deck
13
What is the name of a 32-bit or 128-bit number that is used to identify a device?

A) port number
B) protocol number
C) IP address
D) IP version
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 37 في هذه المجموعة.
فتح الحزمة
k this deck
14
When connecting to a private and secured wireless access point, you must provide the information that proves you have the right to use the network.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 37 في هذه المجموعة.
فتح الحزمة
k this deck
15
How are IP addresses available to the Internet classified?

A) public
B) private
C) non-routable
D) standard
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 37 في هذه المجموعة.
فتح الحزمة
k this deck
16
Which type of IP address is configured by a server when a device first initiates a connection to the network?

A) default
B) dynamic
C) static
D) configured
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 37 في هذه المجموعة.
فتح الحزمة
k this deck
17
Wireless networks are either public, unsecured hotspots or private, secured hotspots.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 37 في هذه المجموعة.
فتح الحزمة
k this deck
18
What is used to identify a wireless access point?

A) secure key
B) MAC address
C) Network ID
D) SSID
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 37 في هذه المجموعة.
فتح الحزمة
k this deck
19
What type of device can be used to block unwanted traffic initiated from the Internet and can also restrict Internet access from an internal network?

A) hub
B) switch
C) firewall
D) VPN
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 37 في هذه المجموعة.
فتح الحزمة
k this deck
20
When using static IP addressing, software automatically configures the network connection on each device.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 37 في هذه المجموعة.
فتح الحزمة
k this deck
21
Match between columns
الفرضيات:
الردود:
port triggering
ipconfig
Lightweight Directory Access Protocol (LDAP)
DHCP server
workgroup
Secure Shell (SSH)
Wi-Fi Protected Setup (WPS)
subnet mask
virtual private network
Network Address Translation (NAT)
port triggering
ipconfig
Lightweight Directory Access Protocol (LDAP)
DHCP server
workgroup
Secure Shell (SSH)
Wi-Fi Protected Setup (WPS)
subnet mask
virtual private network
Network Address Translation (NAT)
port triggering
ipconfig
Lightweight Directory Access Protocol (LDAP)
DHCP server
workgroup
Secure Shell (SSH)
Wi-Fi Protected Setup (WPS)
subnet mask
virtual private network
Network Address Translation (NAT)
port triggering
ipconfig
Lightweight Directory Access Protocol (LDAP)
DHCP server
workgroup
Secure Shell (SSH)
Wi-Fi Protected Setup (WPS)
subnet mask
virtual private network
Network Address Translation (NAT)
port triggering
ipconfig
Lightweight Directory Access Protocol (LDAP)
DHCP server
workgroup
Secure Shell (SSH)
Wi-Fi Protected Setup (WPS)
subnet mask
virtual private network
Network Address Translation (NAT)
port triggering
ipconfig
Lightweight Directory Access Protocol (LDAP)
DHCP server
workgroup
Secure Shell (SSH)
Wi-Fi Protected Setup (WPS)
subnet mask
virtual private network
Network Address Translation (NAT)
port triggering
ipconfig
Lightweight Directory Access Protocol (LDAP)
DHCP server
workgroup
Secure Shell (SSH)
Wi-Fi Protected Setup (WPS)
subnet mask
virtual private network
Network Address Translation (NAT)
port triggering
ipconfig
Lightweight Directory Access Protocol (LDAP)
DHCP server
workgroup
Secure Shell (SSH)
Wi-Fi Protected Setup (WPS)
subnet mask
virtual private network
Network Address Translation (NAT)
port triggering
ipconfig
Lightweight Directory Access Protocol (LDAP)
DHCP server
workgroup
Secure Shell (SSH)
Wi-Fi Protected Setup (WPS)
subnet mask
virtual private network
Network Address Translation (NAT)
port triggering
ipconfig
Lightweight Directory Access Protocol (LDAP)
DHCP server
workgroup
Secure Shell (SSH)
Wi-Fi Protected Setup (WPS)
subnet mask
virtual private network
Network Address Translation (NAT)
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 37 في هذه المجموعة.
فتح الحزمة
k this deck
22
Describe two methods that a wireless access point might use to secure a wireless network.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 37 في هذه المجموعة.
فتح الحزمة
k this deck
23
Describe the contents and purpose of a subnet mask.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 37 في هذه المجموعة.
فتح الحزمة
k this deck
24
Describe TCP and how it provides reliability of packet delivery.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 37 في هذه المجموعة.
فتح الحزمة
k this deck
25
What is DNS and how does it work?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 37 في هذه المجموعة.
فتح الحزمة
k this deck
26
Before data is transmitted on a network, it is first broken up into ____________________.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 37 في هذه المجموعة.
فتح الحزمة
k this deck
27
Describe communications at the application level - give an example.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 37 في هذه المجموعة.
فتح الحزمة
k this deck
28
The first part of an IPv4 address identifies the network, and the last part identifies the ____________________.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 37 في هذه المجموعة.
فتح الحزمة
k this deck
29
Describe a domain name and provide examples of domain names.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 37 في هذه المجموعة.
فتح الحزمة
k this deck
30
Which wireless networking radio frequency yields faster speeds but offers shorter range?

A) 2.4 GHz
B) 5 GHz
C) 7 GHz
D) 11 GHz
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 37 في هذه المجموعة.
فتح الحزمة
k this deck
31
Describe the Lightweight Directory Access Protocol.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 37 في هذه المجموعة.
فتح الحزمة
k this deck
32
Describe how a computer with a Private IP address accesses the Internet.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 37 في هذه المجموعة.
فتح الحزمة
k this deck
33
Discuss how a VPN might be used and how it protects data.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 37 في هذه المجموعة.
فتح الحزمة
k this deck
34
Discuss User Datagram Protocol.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 37 في هذه المجموعة.
فتح الحزمة
k this deck
35
Communication between two computers happens at three levels (layers) and these levels include the application, operating system, and ____________________.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 37 في هذه المجموعة.
فتح الحزمة
k this deck
36
A ____________________ is the name of a computer and can be used in place of its IP address.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 37 في هذه المجموعة.
فتح الحزمة
k this deck
37
Using __________________, when a firewall receives a request for communication from the Internet to a specific computer and port, the request will be allowed and forwarded to that computer on the network.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 37 في هذه المجموعة.
فتح الحزمة
k this deck
locked card icon
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 37 في هذه المجموعة.