Exam 15: Connecting to and Setting up a Network
Exam 1: First Look at Computer Parts and Tools41 Questions
Exam 2: Working Inside a Computer41 Questions
Exam 3: Introducing Windows Operating Systems37 Questions
Exam 4: All About Motherboards41 Questions
Exam 5: Supporting Processors and Upgrading Memory41 Questions
Exam 6: Supporting Hard Drives41 Questions
Exam 7: Installing Windows37 Questions
Exam 8: Supporting Io and Storage Devices41 Questions
Exam 9: Satisfying Customer Needs41 Questions
Exam 10: Maintaining Windows37 Questions
Exam 11: Optimizing Windows37 Questions
Exam 12: Troubleshooting Windows and Applications37 Questions
Exam 13: Troubleshooting Hardware Problems41 Questions
Exam 14: Troubleshooting Windows Startup Problems37 Questions
Exam 15: Connecting to and Setting up a Network37 Questions
Exam 16: Networking Types, Devices, and Cabling41 Questions
Exam 17: Windows Resources on a Network37 Questions
Exam 18: Security Strategies37 Questions
Exam 19: Supporting Notebooks41 Questions
Exam 20: Mobile Devices and Client-Side Virtualization37 Questions
Exam 21: Supporting Printers41 Questions
Select questions type
Using a ______________, packets are delivered to a single node on a network.
(Multiple Choice)
4.9/5
(33)
The Telnet protocol encrypts transmitted data, which therefore cannot be read by others on the network.
(True/False)
4.7/5
(37)
Which type of IP address is configured by a server when a device first initiates a connection to the network?
(Multiple Choice)
4.7/5
(42)
What is it called when a router is configured to open or close certain ports so they can or cannot be used.
(Multiple Choice)
4.8/5
(38)
A problem with virtual networks is that data transmitting through them cannot be encrypted and therefore is not secure.
(True/False)
4.8/5
(43)
Which TCP\IP protocol is used by Windows to share files and printers on a network?
(Multiple Choice)
4.9/5
(38)
Describe two methods that a wireless access point might use to secure a wireless network.
(Essay)
4.7/5
(35)
Describe how a computer with a Private IP address accesses the Internet.
(Essay)
4.9/5
(21)
A ____________________ is the name of a computer and can be used in place of its IP address.
(Short Answer)
4.9/5
(34)
Using __________________, when a firewall receives a request for communication from the Internet to a specific computer and port, the request will be allowed and forwarded to that computer on the network.
(Short Answer)
4.8/5
(42)
Which protocol makes a connection, checks whether the data is received, and resends it if it is not?
(Multiple Choice)
4.8/5
(26)
Which command can be used to display TCP\IP configuration information and refresh the IP address?
(Multiple Choice)
4.8/5
(30)
The solution for securing private data traveling over a public network, such as the Internet, is a _________.
(Multiple Choice)
4.8/5
(37)
Showing 21 - 37 of 37
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)