Deck 7: Connecting to and Setting up a Network

ملء الشاشة (f)
exit full mode
سؤال
What type of IP address is configured by a server when a device first initiates a connection to the network?

A) default
B) dynamic
C) static
D) configured
استخدم زر المسافة أو
up arrow
down arrow
لقلب البطاقة.
سؤال
What is the name of the 32-bit or 128-bit number that is used to identify a device on a network?

A) port number
B) protocol number
C) IP address
D) IP version
سؤال
The current release of SMB is CIFS, also called SMB2.
سؤال
If the computer you are using is a laptop that moves from one network to another, what tab can be used to configure a secondary configuration, such as a static IP if a DHCP server cannot be reached?

A) General Configuration
B) Alternate Configuration
C) Secondary Configuration
D) Fallback Configuration
سؤال
What functions as the name of a wireless network?

A) secure key
B) MAC address
C) Network ID
D) SSID
سؤال
What type of device can be used to block unwanted traffic initiated from the Internet and can also restrict Internet access from an internal network?

A) hub
B) switch
C) firewall
D) VPN
سؤال
The Telnet protocol encrypts transmitted data, which therefore cannot be read by others on the network.
سؤال
What command can be used to flush the local DNS cache on a Windows computer?

A) nslookup -f
B) ipconfig /flushdns
C) dns dump
D) service dnscache restart
سؤال
What TCP port is utilized by an SSH server listening for connections?

A) 20
B) 21
C) 22
D) 23
سؤال
What wireless networking radio frequency yields faster speeds but offers shorter range?

A) 2.4 GHz
B) 5 GHz
C) 7 GHz
D) 11 GHz
سؤال
Packets are delivered to a single node on a network when using what type of IPv6 address?

A) anycast address
B) default gateway address
C) multicast address
D) unicast address
سؤال
What command can be used to display IP addresses assigned to all network connections on a system?

A) msconfig
B) netstat
C) ipconfig
D) netcfg32
سؤال
The solution for securing private data traveling over a public network, such as the Internet, is the use of what type of network?

A) public encrypted network
B) virtual private network
C) private encrypted network
D) virtual prevention network
سؤال
How are IP addresses available to the Internet classified?

A) public
B) private
C) non-routable
D) standard
سؤال
How is the network portion and the host portion of an IP address identified?

A) dynamic address
B) DHCP address
C) default gateway
D) subnet mask
سؤال
The User Datagram Protocol (UDP) guarantees delivery of data to its destination.
سؤال
A problem with virtual networks is that data transmitting through them cannot be encrypted and therefore is not secure.
سؤال
Originally developed by IBM, what protocol is used by Windows to share files and printers on a network?

A) Server Message Block (SMB)
B) Lightweight Directory Access Protocol (LDAP)
C) File Transfer Protocol (FTP)
D) Hypertext Transfer Protocol (HTTP)
سؤال
What protocol makes a connection, checks whether the data is received, and resends it if it is not?

A) TCP
B) UDP
C) IP
D) DNS
سؤال
When using static IP addressing, software automatically configures the network connection on each device.
سؤال
Describe a domain name and provide examples of domain names.
سؤال
The ability to send and receive transmissions at the same time on an Ethernet cable is referred to by what term?

A) simplex mode
B) half duplex
C) auto transmit
D) full duplex
سؤال
The Remote Desktop and Remote Assistance applications utilize what port for remote access?

A) 22
B) 23
C) 110
D) 3389
سؤال
Match between columns
assigns an IP address to a computer when it first attempts to initiate a connection to the network
DHCP server
assigns an IP address to a computer when it first attempts to initiate a connection to the network
ipconfig
assigns an IP address to a computer when it first attempts to initiate a connection to the network
Network Address Translation (NAT)
assigns an IP address to a computer when it first attempts to initiate a connection to the network
Secure Shell (SSH)
assigns an IP address to a computer when it first attempts to initiate a connection to the network
Lightweight Directory Access Protocol (LDAP)
assigns an IP address to a computer when it first attempts to initiate a connection to the network
Wi-Fi Protected Setup (WPS)
assigns an IP address to a computer when it first attempts to initiate a connection to the network
Fully Qualified Domain Name (FQDN)
assigns an IP address to a computer when it first attempts to initiate a connection to the network
virtual private network
assigns an IP address to a computer when it first attempts to initiate a connection to the network
workgroup
assigns an IP address to a computer when it first attempts to initiate a connection to the network
subnet mask
designed to make it easier for users to connect their computers to a wireless network when a hard-to-remember SSID and security key are used
DHCP server
designed to make it easier for users to connect their computers to a wireless network when a hard-to-remember SSID and security key are used
ipconfig
designed to make it easier for users to connect their computers to a wireless network when a hard-to-remember SSID and security key are used
Network Address Translation (NAT)
designed to make it easier for users to connect their computers to a wireless network when a hard-to-remember SSID and security key are used
Secure Shell (SSH)
designed to make it easier for users to connect their computers to a wireless network when a hard-to-remember SSID and security key are used
Lightweight Directory Access Protocol (LDAP)
designed to make it easier for users to connect their computers to a wireless network when a hard-to-remember SSID and security key are used
Wi-Fi Protected Setup (WPS)
designed to make it easier for users to connect their computers to a wireless network when a hard-to-remember SSID and security key are used
Fully Qualified Domain Name (FQDN)
designed to make it easier for users to connect their computers to a wireless network when a hard-to-remember SSID and security key are used
virtual private network
designed to make it easier for users to connect their computers to a wireless network when a hard-to-remember SSID and security key are used
workgroup
designed to make it easier for users to connect their computers to a wireless network when a hard-to-remember SSID and security key are used
subnet mask
identifies a computer and the network to which it belongs, such as www.cengage.com
DHCP server
identifies a computer and the network to which it belongs, such as www.cengage.com
ipconfig
identifies a computer and the network to which it belongs, such as www.cengage.com
Network Address Translation (NAT)
identifies a computer and the network to which it belongs, such as www.cengage.com
Secure Shell (SSH)
identifies a computer and the network to which it belongs, such as www.cengage.com
Lightweight Directory Access Protocol (LDAP)
identifies a computer and the network to which it belongs, such as www.cengage.com
Wi-Fi Protected Setup (WPS)
identifies a computer and the network to which it belongs, such as www.cengage.com
Fully Qualified Domain Name (FQDN)
identifies a computer and the network to which it belongs, such as www.cengage.com
virtual private network
identifies a computer and the network to which it belongs, such as www.cengage.com
workgroup
identifies a computer and the network to which it belongs, such as www.cengage.com
subnet mask
a technique designed to conserve the number of public IP addresses needed by a network
DHCP server
a technique designed to conserve the number of public IP addresses needed by a network
ipconfig
a technique designed to conserve the number of public IP addresses needed by a network
Network Address Translation (NAT)
a technique designed to conserve the number of public IP addresses needed by a network
Secure Shell (SSH)
a technique designed to conserve the number of public IP addresses needed by a network
Lightweight Directory Access Protocol (LDAP)
a technique designed to conserve the number of public IP addresses needed by a network
Wi-Fi Protected Setup (WPS)
a technique designed to conserve the number of public IP addresses needed by a network
Fully Qualified Domain Name (FQDN)
a technique designed to conserve the number of public IP addresses needed by a network
virtual private network
a technique designed to conserve the number of public IP addresses needed by a network
workgroup
a technique designed to conserve the number of public IP addresses needed by a network
subnet mask
Used by a computer or other device to determine if an IP address of another computer is on its network or another network
DHCP server
Used by a computer or other device to determine if an IP address of another computer is on its network or another network
ipconfig
Used by a computer or other device to determine if an IP address of another computer is on its network or another network
Network Address Translation (NAT)
Used by a computer or other device to determine if an IP address of another computer is on its network or another network
Secure Shell (SSH)
Used by a computer or other device to determine if an IP address of another computer is on its network or another network
Lightweight Directory Access Protocol (LDAP)
Used by a computer or other device to determine if an IP address of another computer is on its network or another network
Wi-Fi Protected Setup (WPS)
Used by a computer or other device to determine if an IP address of another computer is on its network or another network
Fully Qualified Domain Name (FQDN)
Used by a computer or other device to determine if an IP address of another computer is on its network or another network
virtual private network
Used by a computer or other device to determine if an IP address of another computer is on its network or another network
workgroup
Used by a computer or other device to determine if an IP address of another computer is on its network or another network
subnet mask
A group of computers on a peer-to-peer network that are sharing resources
DHCP server
A group of computers on a peer-to-peer network that are sharing resources
ipconfig
A group of computers on a peer-to-peer network that are sharing resources
Network Address Translation (NAT)
A group of computers on a peer-to-peer network that are sharing resources
Secure Shell (SSH)
A group of computers on a peer-to-peer network that are sharing resources
Lightweight Directory Access Protocol (LDAP)
A group of computers on a peer-to-peer network that are sharing resources
Wi-Fi Protected Setup (WPS)
A group of computers on a peer-to-peer network that are sharing resources
Fully Qualified Domain Name (FQDN)
A group of computers on a peer-to-peer network that are sharing resources
virtual private network
A group of computers on a peer-to-peer network that are sharing resources
workgroup
A group of computers on a peer-to-peer network that are sharing resources
subnet mask
commonly used by Linux to pass sign-in information to a remote computer and control that computer over a network
DHCP server
commonly used by Linux to pass sign-in information to a remote computer and control that computer over a network
ipconfig
commonly used by Linux to pass sign-in information to a remote computer and control that computer over a network
Network Address Translation (NAT)
commonly used by Linux to pass sign-in information to a remote computer and control that computer over a network
Secure Shell (SSH)
commonly used by Linux to pass sign-in information to a remote computer and control that computer over a network
Lightweight Directory Access Protocol (LDAP)
commonly used by Linux to pass sign-in information to a remote computer and control that computer over a network
Wi-Fi Protected Setup (WPS)
commonly used by Linux to pass sign-in information to a remote computer and control that computer over a network
Fully Qualified Domain Name (FQDN)
commonly used by Linux to pass sign-in information to a remote computer and control that computer over a network
virtual private network
commonly used by Linux to pass sign-in information to a remote computer and control that computer over a network
workgroup
commonly used by Linux to pass sign-in information to a remote computer and control that computer over a network
subnet mask
protects data by encrypting it from the time it leaves a remote computer until it reaches a server on a corporate network, using a technique called tunneling.
DHCP server
protects data by encrypting it from the time it leaves a remote computer until it reaches a server on a corporate network, using a technique called tunneling.
ipconfig
protects data by encrypting it from the time it leaves a remote computer until it reaches a server on a corporate network, using a technique called tunneling.
Network Address Translation (NAT)
protects data by encrypting it from the time it leaves a remote computer until it reaches a server on a corporate network, using a technique called tunneling.
Secure Shell (SSH)
protects data by encrypting it from the time it leaves a remote computer until it reaches a server on a corporate network, using a technique called tunneling.
Lightweight Directory Access Protocol (LDAP)
protects data by encrypting it from the time it leaves a remote computer until it reaches a server on a corporate network, using a technique called tunneling.
Wi-Fi Protected Setup (WPS)
protects data by encrypting it from the time it leaves a remote computer until it reaches a server on a corporate network, using a technique called tunneling.
Fully Qualified Domain Name (FQDN)
protects data by encrypting it from the time it leaves a remote computer until it reaches a server on a corporate network, using a technique called tunneling.
virtual private network
protects data by encrypting it from the time it leaves a remote computer until it reaches a server on a corporate network, using a technique called tunneling.
workgroup
protects data by encrypting it from the time it leaves a remote computer until it reaches a server on a corporate network, using a technique called tunneling.
subnet mask
a command that can be used to display the TCP/IP configuration
DHCP server
a command that can be used to display the TCP/IP configuration
ipconfig
a command that can be used to display the TCP/IP configuration
Network Address Translation (NAT)
a command that can be used to display the TCP/IP configuration
Secure Shell (SSH)
a command that can be used to display the TCP/IP configuration
Lightweight Directory Access Protocol (LDAP)
a command that can be used to display the TCP/IP configuration
Wi-Fi Protected Setup (WPS)
a command that can be used to display the TCP/IP configuration
Fully Qualified Domain Name (FQDN)
a command that can be used to display the TCP/IP configuration
virtual private network
a command that can be used to display the TCP/IP configuration
workgroup
a command that can be used to display the TCP/IP configuration
subnet mask
a protocol used by various client applications when the application needs to query a database
DHCP server
a protocol used by various client applications when the application needs to query a database
ipconfig
a protocol used by various client applications when the application needs to query a database
Network Address Translation (NAT)
a protocol used by various client applications when the application needs to query a database
Secure Shell (SSH)
a protocol used by various client applications when the application needs to query a database
Lightweight Directory Access Protocol (LDAP)
a protocol used by various client applications when the application needs to query a database
Wi-Fi Protected Setup (WPS)
a protocol used by various client applications when the application needs to query a database
Fully Qualified Domain Name (FQDN)
a protocol used by various client applications when the application needs to query a database
virtual private network
a protocol used by various client applications when the application needs to query a database
workgroup
a protocol used by various client applications when the application needs to query a database
subnet mask
سؤال
Describe the User Datagram Protocol.
سؤال
Describe the Lightweight Directory Access Protocol.
سؤال
If a device does not receive an IP address from a DHCP server, the device may resort to what kind of IP address?

A) APIPA
B) random IP address
C) public IP address
D) dynamic IP address
سؤال
What are the two mail protocols used for delivery of messages, and how do they function?
سؤال
What cell phone technology is the most popular in the United States?

A) GSM
B) CDMA
C) EDGE
D) SIM
سؤال
What device handles access to another network for a client computer if it does not have a better option?

A) firewall
B) default gateway
C) network switch
D) network hub
سؤال
Discuss how a VPN might be used and how it protects data.
سؤال
What is DNS and how does it work?
سؤال
Describe TCP and how it provides reliability of packet delivery.
سؤال
Describe communications at the application level - give an example.
سؤال
Describe the contents and purpose of a subnet mask.
سؤال
Describe how a computer with a Private IP address accesses the Internet.
فتح الحزمة
قم بالتسجيل لفتح البطاقات في هذه المجموعة!
Unlock Deck
Unlock Deck
1/36
auto play flashcards
العب
simple tutorial
ملء الشاشة (f)
exit full mode
Deck 7: Connecting to and Setting up a Network
1
What type of IP address is configured by a server when a device first initiates a connection to the network?

A) default
B) dynamic
C) static
D) configured
B
2
What is the name of the 32-bit or 128-bit number that is used to identify a device on a network?

A) port number
B) protocol number
C) IP address
D) IP version
C
3
The current release of SMB is CIFS, also called SMB2.
True
4
If the computer you are using is a laptop that moves from one network to another, what tab can be used to configure a secondary configuration, such as a static IP if a DHCP server cannot be reached?

A) General Configuration
B) Alternate Configuration
C) Secondary Configuration
D) Fallback Configuration
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 36 في هذه المجموعة.
فتح الحزمة
k this deck
5
What functions as the name of a wireless network?

A) secure key
B) MAC address
C) Network ID
D) SSID
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 36 في هذه المجموعة.
فتح الحزمة
k this deck
6
What type of device can be used to block unwanted traffic initiated from the Internet and can also restrict Internet access from an internal network?

A) hub
B) switch
C) firewall
D) VPN
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 36 في هذه المجموعة.
فتح الحزمة
k this deck
7
The Telnet protocol encrypts transmitted data, which therefore cannot be read by others on the network.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 36 في هذه المجموعة.
فتح الحزمة
k this deck
8
What command can be used to flush the local DNS cache on a Windows computer?

A) nslookup -f
B) ipconfig /flushdns
C) dns dump
D) service dnscache restart
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 36 في هذه المجموعة.
فتح الحزمة
k this deck
9
What TCP port is utilized by an SSH server listening for connections?

A) 20
B) 21
C) 22
D) 23
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 36 في هذه المجموعة.
فتح الحزمة
k this deck
10
What wireless networking radio frequency yields faster speeds but offers shorter range?

A) 2.4 GHz
B) 5 GHz
C) 7 GHz
D) 11 GHz
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 36 في هذه المجموعة.
فتح الحزمة
k this deck
11
Packets are delivered to a single node on a network when using what type of IPv6 address?

A) anycast address
B) default gateway address
C) multicast address
D) unicast address
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 36 في هذه المجموعة.
فتح الحزمة
k this deck
12
What command can be used to display IP addresses assigned to all network connections on a system?

A) msconfig
B) netstat
C) ipconfig
D) netcfg32
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 36 في هذه المجموعة.
فتح الحزمة
k this deck
13
The solution for securing private data traveling over a public network, such as the Internet, is the use of what type of network?

A) public encrypted network
B) virtual private network
C) private encrypted network
D) virtual prevention network
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 36 في هذه المجموعة.
فتح الحزمة
k this deck
14
How are IP addresses available to the Internet classified?

A) public
B) private
C) non-routable
D) standard
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 36 في هذه المجموعة.
فتح الحزمة
k this deck
15
How is the network portion and the host portion of an IP address identified?

A) dynamic address
B) DHCP address
C) default gateway
D) subnet mask
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 36 في هذه المجموعة.
فتح الحزمة
k this deck
16
The User Datagram Protocol (UDP) guarantees delivery of data to its destination.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 36 في هذه المجموعة.
فتح الحزمة
k this deck
17
A problem with virtual networks is that data transmitting through them cannot be encrypted and therefore is not secure.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 36 في هذه المجموعة.
فتح الحزمة
k this deck
18
Originally developed by IBM, what protocol is used by Windows to share files and printers on a network?

A) Server Message Block (SMB)
B) Lightweight Directory Access Protocol (LDAP)
C) File Transfer Protocol (FTP)
D) Hypertext Transfer Protocol (HTTP)
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 36 في هذه المجموعة.
فتح الحزمة
k this deck
19
What protocol makes a connection, checks whether the data is received, and resends it if it is not?

A) TCP
B) UDP
C) IP
D) DNS
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 36 في هذه المجموعة.
فتح الحزمة
k this deck
20
When using static IP addressing, software automatically configures the network connection on each device.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 36 في هذه المجموعة.
فتح الحزمة
k this deck
21
Describe a domain name and provide examples of domain names.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 36 في هذه المجموعة.
فتح الحزمة
k this deck
22
The ability to send and receive transmissions at the same time on an Ethernet cable is referred to by what term?

A) simplex mode
B) half duplex
C) auto transmit
D) full duplex
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 36 في هذه المجموعة.
فتح الحزمة
k this deck
23
The Remote Desktop and Remote Assistance applications utilize what port for remote access?

A) 22
B) 23
C) 110
D) 3389
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 36 في هذه المجموعة.
فتح الحزمة
k this deck
24
Match between columns
assigns an IP address to a computer when it first attempts to initiate a connection to the network
DHCP server
assigns an IP address to a computer when it first attempts to initiate a connection to the network
ipconfig
assigns an IP address to a computer when it first attempts to initiate a connection to the network
Network Address Translation (NAT)
assigns an IP address to a computer when it first attempts to initiate a connection to the network
Secure Shell (SSH)
assigns an IP address to a computer when it first attempts to initiate a connection to the network
Lightweight Directory Access Protocol (LDAP)
assigns an IP address to a computer when it first attempts to initiate a connection to the network
Wi-Fi Protected Setup (WPS)
assigns an IP address to a computer when it first attempts to initiate a connection to the network
Fully Qualified Domain Name (FQDN)
assigns an IP address to a computer when it first attempts to initiate a connection to the network
virtual private network
assigns an IP address to a computer when it first attempts to initiate a connection to the network
workgroup
assigns an IP address to a computer when it first attempts to initiate a connection to the network
subnet mask
designed to make it easier for users to connect their computers to a wireless network when a hard-to-remember SSID and security key are used
DHCP server
designed to make it easier for users to connect their computers to a wireless network when a hard-to-remember SSID and security key are used
ipconfig
designed to make it easier for users to connect their computers to a wireless network when a hard-to-remember SSID and security key are used
Network Address Translation (NAT)
designed to make it easier for users to connect their computers to a wireless network when a hard-to-remember SSID and security key are used
Secure Shell (SSH)
designed to make it easier for users to connect their computers to a wireless network when a hard-to-remember SSID and security key are used
Lightweight Directory Access Protocol (LDAP)
designed to make it easier for users to connect their computers to a wireless network when a hard-to-remember SSID and security key are used
Wi-Fi Protected Setup (WPS)
designed to make it easier for users to connect their computers to a wireless network when a hard-to-remember SSID and security key are used
Fully Qualified Domain Name (FQDN)
designed to make it easier for users to connect their computers to a wireless network when a hard-to-remember SSID and security key are used
virtual private network
designed to make it easier for users to connect their computers to a wireless network when a hard-to-remember SSID and security key are used
workgroup
designed to make it easier for users to connect their computers to a wireless network when a hard-to-remember SSID and security key are used
subnet mask
identifies a computer and the network to which it belongs, such as www.cengage.com
DHCP server
identifies a computer and the network to which it belongs, such as www.cengage.com
ipconfig
identifies a computer and the network to which it belongs, such as www.cengage.com
Network Address Translation (NAT)
identifies a computer and the network to which it belongs, such as www.cengage.com
Secure Shell (SSH)
identifies a computer and the network to which it belongs, such as www.cengage.com
Lightweight Directory Access Protocol (LDAP)
identifies a computer and the network to which it belongs, such as www.cengage.com
Wi-Fi Protected Setup (WPS)
identifies a computer and the network to which it belongs, such as www.cengage.com
Fully Qualified Domain Name (FQDN)
identifies a computer and the network to which it belongs, such as www.cengage.com
virtual private network
identifies a computer and the network to which it belongs, such as www.cengage.com
workgroup
identifies a computer and the network to which it belongs, such as www.cengage.com
subnet mask
a technique designed to conserve the number of public IP addresses needed by a network
DHCP server
a technique designed to conserve the number of public IP addresses needed by a network
ipconfig
a technique designed to conserve the number of public IP addresses needed by a network
Network Address Translation (NAT)
a technique designed to conserve the number of public IP addresses needed by a network
Secure Shell (SSH)
a technique designed to conserve the number of public IP addresses needed by a network
Lightweight Directory Access Protocol (LDAP)
a technique designed to conserve the number of public IP addresses needed by a network
Wi-Fi Protected Setup (WPS)
a technique designed to conserve the number of public IP addresses needed by a network
Fully Qualified Domain Name (FQDN)
a technique designed to conserve the number of public IP addresses needed by a network
virtual private network
a technique designed to conserve the number of public IP addresses needed by a network
workgroup
a technique designed to conserve the number of public IP addresses needed by a network
subnet mask
Used by a computer or other device to determine if an IP address of another computer is on its network or another network
DHCP server
Used by a computer or other device to determine if an IP address of another computer is on its network or another network
ipconfig
Used by a computer or other device to determine if an IP address of another computer is on its network or another network
Network Address Translation (NAT)
Used by a computer or other device to determine if an IP address of another computer is on its network or another network
Secure Shell (SSH)
Used by a computer or other device to determine if an IP address of another computer is on its network or another network
Lightweight Directory Access Protocol (LDAP)
Used by a computer or other device to determine if an IP address of another computer is on its network or another network
Wi-Fi Protected Setup (WPS)
Used by a computer or other device to determine if an IP address of another computer is on its network or another network
Fully Qualified Domain Name (FQDN)
Used by a computer or other device to determine if an IP address of another computer is on its network or another network
virtual private network
Used by a computer or other device to determine if an IP address of another computer is on its network or another network
workgroup
Used by a computer or other device to determine if an IP address of another computer is on its network or another network
subnet mask
A group of computers on a peer-to-peer network that are sharing resources
DHCP server
A group of computers on a peer-to-peer network that are sharing resources
ipconfig
A group of computers on a peer-to-peer network that are sharing resources
Network Address Translation (NAT)
A group of computers on a peer-to-peer network that are sharing resources
Secure Shell (SSH)
A group of computers on a peer-to-peer network that are sharing resources
Lightweight Directory Access Protocol (LDAP)
A group of computers on a peer-to-peer network that are sharing resources
Wi-Fi Protected Setup (WPS)
A group of computers on a peer-to-peer network that are sharing resources
Fully Qualified Domain Name (FQDN)
A group of computers on a peer-to-peer network that are sharing resources
virtual private network
A group of computers on a peer-to-peer network that are sharing resources
workgroup
A group of computers on a peer-to-peer network that are sharing resources
subnet mask
commonly used by Linux to pass sign-in information to a remote computer and control that computer over a network
DHCP server
commonly used by Linux to pass sign-in information to a remote computer and control that computer over a network
ipconfig
commonly used by Linux to pass sign-in information to a remote computer and control that computer over a network
Network Address Translation (NAT)
commonly used by Linux to pass sign-in information to a remote computer and control that computer over a network
Secure Shell (SSH)
commonly used by Linux to pass sign-in information to a remote computer and control that computer over a network
Lightweight Directory Access Protocol (LDAP)
commonly used by Linux to pass sign-in information to a remote computer and control that computer over a network
Wi-Fi Protected Setup (WPS)
commonly used by Linux to pass sign-in information to a remote computer and control that computer over a network
Fully Qualified Domain Name (FQDN)
commonly used by Linux to pass sign-in information to a remote computer and control that computer over a network
virtual private network
commonly used by Linux to pass sign-in information to a remote computer and control that computer over a network
workgroup
commonly used by Linux to pass sign-in information to a remote computer and control that computer over a network
subnet mask
protects data by encrypting it from the time it leaves a remote computer until it reaches a server on a corporate network, using a technique called tunneling.
DHCP server
protects data by encrypting it from the time it leaves a remote computer until it reaches a server on a corporate network, using a technique called tunneling.
ipconfig
protects data by encrypting it from the time it leaves a remote computer until it reaches a server on a corporate network, using a technique called tunneling.
Network Address Translation (NAT)
protects data by encrypting it from the time it leaves a remote computer until it reaches a server on a corporate network, using a technique called tunneling.
Secure Shell (SSH)
protects data by encrypting it from the time it leaves a remote computer until it reaches a server on a corporate network, using a technique called tunneling.
Lightweight Directory Access Protocol (LDAP)
protects data by encrypting it from the time it leaves a remote computer until it reaches a server on a corporate network, using a technique called tunneling.
Wi-Fi Protected Setup (WPS)
protects data by encrypting it from the time it leaves a remote computer until it reaches a server on a corporate network, using a technique called tunneling.
Fully Qualified Domain Name (FQDN)
protects data by encrypting it from the time it leaves a remote computer until it reaches a server on a corporate network, using a technique called tunneling.
virtual private network
protects data by encrypting it from the time it leaves a remote computer until it reaches a server on a corporate network, using a technique called tunneling.
workgroup
protects data by encrypting it from the time it leaves a remote computer until it reaches a server on a corporate network, using a technique called tunneling.
subnet mask
a command that can be used to display the TCP/IP configuration
DHCP server
a command that can be used to display the TCP/IP configuration
ipconfig
a command that can be used to display the TCP/IP configuration
Network Address Translation (NAT)
a command that can be used to display the TCP/IP configuration
Secure Shell (SSH)
a command that can be used to display the TCP/IP configuration
Lightweight Directory Access Protocol (LDAP)
a command that can be used to display the TCP/IP configuration
Wi-Fi Protected Setup (WPS)
a command that can be used to display the TCP/IP configuration
Fully Qualified Domain Name (FQDN)
a command that can be used to display the TCP/IP configuration
virtual private network
a command that can be used to display the TCP/IP configuration
workgroup
a command that can be used to display the TCP/IP configuration
subnet mask
a protocol used by various client applications when the application needs to query a database
DHCP server
a protocol used by various client applications when the application needs to query a database
ipconfig
a protocol used by various client applications when the application needs to query a database
Network Address Translation (NAT)
a protocol used by various client applications when the application needs to query a database
Secure Shell (SSH)
a protocol used by various client applications when the application needs to query a database
Lightweight Directory Access Protocol (LDAP)
a protocol used by various client applications when the application needs to query a database
Wi-Fi Protected Setup (WPS)
a protocol used by various client applications when the application needs to query a database
Fully Qualified Domain Name (FQDN)
a protocol used by various client applications when the application needs to query a database
virtual private network
a protocol used by various client applications when the application needs to query a database
workgroup
a protocol used by various client applications when the application needs to query a database
subnet mask
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 36 في هذه المجموعة.
فتح الحزمة
k this deck
25
Describe the User Datagram Protocol.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 36 في هذه المجموعة.
فتح الحزمة
k this deck
26
Describe the Lightweight Directory Access Protocol.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 36 في هذه المجموعة.
فتح الحزمة
k this deck
27
If a device does not receive an IP address from a DHCP server, the device may resort to what kind of IP address?

A) APIPA
B) random IP address
C) public IP address
D) dynamic IP address
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 36 في هذه المجموعة.
فتح الحزمة
k this deck
28
What are the two mail protocols used for delivery of messages, and how do they function?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 36 في هذه المجموعة.
فتح الحزمة
k this deck
29
What cell phone technology is the most popular in the United States?

A) GSM
B) CDMA
C) EDGE
D) SIM
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 36 في هذه المجموعة.
فتح الحزمة
k this deck
30
What device handles access to another network for a client computer if it does not have a better option?

A) firewall
B) default gateway
C) network switch
D) network hub
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 36 في هذه المجموعة.
فتح الحزمة
k this deck
31
Discuss how a VPN might be used and how it protects data.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 36 في هذه المجموعة.
فتح الحزمة
k this deck
32
What is DNS and how does it work?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 36 في هذه المجموعة.
فتح الحزمة
k this deck
33
Describe TCP and how it provides reliability of packet delivery.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 36 في هذه المجموعة.
فتح الحزمة
k this deck
34
Describe communications at the application level - give an example.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 36 في هذه المجموعة.
فتح الحزمة
k this deck
35
Describe the contents and purpose of a subnet mask.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 36 في هذه المجموعة.
فتح الحزمة
k this deck
36
Describe how a computer with a Private IP address accesses the Internet.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 36 في هذه المجموعة.
فتح الحزمة
k this deck
locked card icon
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 36 في هذه المجموعة.