Exam 6: Understanding Internet Technologies and Security

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

A virtual conversation is a virtual meeting conducted using a browser and the web.

(True/False)
4.8/5
(39)

Network administrators and IT managers use network ____ to expose network vulnerabilities.

(Multiple Choice)
5.0/5
(37)

Modified Multiple Choice Which of the following are examples of services used in holding virtual conversations?

(Multiple Choice)
4.8/5
(32)

A hardware device or software connecting two or more networks or network segments that use different packet formatting, different communication protocols, and different access methods is called a ____.

(Multiple Choice)
4.9/5
(37)

A(n) ____ cannot determine how to direct a packet; it simply sends the same signal to all of its connected nodes or segments.

(Multiple Choice)
4.9/5
(38)

Each computer or other device on a LAN is called a(n) _________________________.

(Short Answer)
4.8/5
(27)

With a(n) _________________________ topology, a transmission moves from node to node around a circle in a clockwise direction.

(Short Answer)
4.8/5
(30)

An organization may outgrow a(n) _________________________ LAN quickly, as more computers and devices need to be added or file- and device-sharing becomes more complex.

(Short Answer)
4.8/5
(37)
Identify the letter of the choice that best matches the phrase or concept.
Enable users to share printers across a network
mail services
Manage the sending, receiving, routing, and storage of email messages
physical topology
Manage internal web-based services, external Internet access, and other Internet-based services
print services
Correct Answer:
Verified
Premises:
Responses:
Enable users to share printers across a network
mail services
Manage the sending, receiving, routing, and storage of email messages
physical topology
Manage internal web-based services, external Internet access, and other Internet-based services
print services
A network covering a very wide geographical area
communications services
Allow authorized users to connect to the network when out of the office
file services
A small number of computers and devices linked together
transceiver
A single component that both sends and receives transmissions
management services
Enable network administrators to manage the security and operation of a network
peer-to-peer LAN
The arrangement of computers and mobile devices, printers, and other devices
Internet services
Permit the centralized storage of files on a file server, which can be accessed by any authorized user on the network
WAN
(Matching)
5.0/5
(45)

At the top of the DNS hierarchy are the DNS authoritative servers that publish a directory of the root zone file.

(True/False)
4.8/5
(39)

LAN jacking is a process that encapsulates one protocol inside another protocol.

(True/False)
4.9/5
(36)

The process of resolving a domain name to an IP address begins with a(n) ____ server.

(Multiple Choice)
4.7/5
(37)

A smart card, a plastic card the size of a credit card, contains memory chips that can store special access codes or biometric information.

(True/False)
4.8/5
(27)

A(n) _________________________ is a specific type of IXP that provides a high-speed Ethernet connection within a metropolitan area.

(Short Answer)
4.8/5
(45)

An IPv6 address includes ____ 8-bit numbers.

(Multiple Choice)
4.8/5
(46)

_________________________ routing allows a router to determine the best route between two nodes automatically and then stores this information in a routing table.

(Short Answer)
4.8/5
(36)

A network ____ is a combination of hardware and software that filters traffic between private networks or between a private network and a public network, such as the Internet.

(Multiple Choice)
4.9/5
(41)

False warnings about viruses are called virus ____.

(Multiple Choice)
4.8/5
(37)

Businesses should test data storage procedures periodically to ensure that backed up data is correct and complete, and that the storage media or cloud-based storage service works properly.

(True/False)
4.9/5
(45)

The _________________________ topology connects all nodes on a peer-to-peer LAN to a single connection shared by all nodes and allows only one transmission at a time.

(Short Answer)
4.8/5
(35)
Showing 21 - 40 of 103
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)