Exam 15: Connecting to and Setting up a Network

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Before data is transmitted on a network, it is first broken up into ____________________.

Free
(Short Answer)
4.9/5
(36)
Correct Answer:
Verified

packets,segments

What type of IP address should be configured on a wireless access point so that it can always be located by the devices that it serves?

Free
(Multiple Choice)
4.8/5
(35)
Correct Answer:
Verified

A

Describe the contents and purpose of a subnet mask.

Free
(Essay)
4.8/5
(25)
Correct Answer:
Verified

The subnet mask used with IPv4 identifies which part of an IP address is the network portion and which part is the host portion. Using a subnet mask, a computer or other device can know if an IP address of another computer is on its network or another network. A subnet mask is a string of ones followed by a string of zeros. The ones in a subnet mask say, "On our network, this part of an IP address is the network part," and the group of zeros says, "On our network, this part of an IP address is the host part.",

How are IP addresses available to the Internet classified?

(Multiple Choice)
4.7/5
(25)

When using static IP addressing, software automatically configures the network connection on each device.

(True/False)
4.8/5
(35)

Which is used to identify the network portion and the host portion of an IP address?

(Multiple Choice)
4.9/5
(39)

Which wireless networking radio frequency yields faster speeds but offers shorter range?

(Multiple Choice)
4.9/5
(35)

Which utility can be used to automatically diagnose a problem with a network connection?

(Multiple Choice)
4.9/5
(36)

What type of device can be used to block unwanted traffic initiated from the Internet and can also restrict Internet access from an internal network?

(Multiple Choice)
4.9/5
(40)

Describe TCP and how it provides reliability of packet delivery.

(Essay)
4.9/5
(37)
Match each term with the correct statement below.
A command that can be used to display the TCP\IP configuration
subnet mask
A security technique that uses encrypted data packets between a private network and a computer on the Internet
port triggering
A protocol used by various client applications when the application needs to query a database
DHCP server
Correct Answer:
Verified
Premises:
Responses:
A command that can be used to display the TCP\IP configuration
subnet mask
A security technique that uses encrypted data packets between a private network and a computer on the Internet
port triggering
A protocol used by various client applications when the application needs to query a database
DHCP server
Designed to make it easier for users to connect their computers to a wireless network when a hard-to-remember SSID and security key are used
workgroup
When a firewall opens a port because a computer behind the firewall initiates communication on another port
Wi-Fi Protected Setup (WPS)
A protocol used to convert private IP addresses on a LAN to a public IP address before a data packet is sent over the Internet
ipconfig
Assigns an IP address to a computer when it first attempts to initiate a connection to the network
Secure Shell (SSH)
A group of computers on a peer-to-peer network that are sharing resources
Lightweight Directory Access Protocol (LDAP)
Used by a computer or other device to determine if an IP address of another computer is on its network or another network
virtual private network
Protocol used to pass login information to a remote computer and control that computer over a network
Network Address Translation (NAT)
(Matching)
4.7/5
(33)

What is used to identify a wireless access point?

(Multiple Choice)
4.9/5
(36)

Wireless networks are either public, unsecured hotspots or private, secured hotspots.

(True/False)
4.9/5
(32)

What is DNS and how does it work?

(Essay)
4.8/5
(39)

If the computer you are using is a laptop that moves from one network to another, you can click the _____ tab and configure static IP address settings for a second network.

(Multiple Choice)
4.8/5
(32)

When connecting to a private and secured wireless access point, you must provide the information that proves you have the right to use the network.

(True/False)
4.9/5
(49)

What is the name of a 32-bit or 128-bit number that is used to identify a device?

(Multiple Choice)
4.7/5
(29)

The first part of an IPv4 address identifies the network, and the last part identifies the ____________________.

(Short Answer)
4.9/5
(34)

Describe the Lightweight Directory Access Protocol.

(Essay)
4.8/5
(37)

Communication between two computers happens at three levels (layers) and these levels include the application, operating system, and ____________________.

(Short Answer)
4.9/5
(29)
Showing 1 - 20 of 37
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)