Exam 8: The Tcpip Protocols
Exam 1: What Is a Computer Network26 Questions
Exam 2: Network Topology26 Questions
Exam 3: Networking Hardware26 Questions
Exam 4: Ethernet Technology26 Questions
Exam 5: Token-Ring, Fddi, and Other Lan Technologies26 Questions
Exam 6: Network Design and Troubleshooting Scenarios26 Questions
Exam 7: Low-Level Protocols26 Questions
Exam 8: The Tcpip Protocols26 Questions
Exam 9: Ipxspx, Appletalk, and Other Network Protocols26 Questions
Exam 10: Switching and Routing26 Questions
Exam 11: Network Management and Security26 Questions
Exam 12: Electronic Mail26 Questions
Exam 13: Ftp and Telnet26 Questions
Exam 14: Multimedia Networking26 Questions
Exam 15: The Internet26 Questions
Exam 16: Writing a Network Application26 Questions
Exam 17: An Introduction to Networking With Windows26 Questions
Exam 18: Windows Domains26 Questions
Exam 19: Unix and Linux26 Questions
Exam 20: Other Network Operating Systems26 Questions
Exam 21: Cryptography and Security26 Questions
Exam 22: Security Hardware26 Questions
Exam 23: Security Software26 Questions
Exam 24: Forensic Techniques26 Questions
Select questions type
____ is a TCP/IP application that determines the path through the network to a destination entered by the user.
Free
(Multiple Choice)
4.9/5
(38)
Correct Answer:
C
HTTPS can use ____________________ that contain the certificate holder's public key and digital signature.
Free
(Short Answer)
4.7/5
(34)
Correct Answer:
digital certificates
_____________________________________________ is a protocol for dynamically assigning IP addresses to devices on a network during the bootstrap process.
Free
(Short Answer)
4.8/5
(36)
Correct Answer:
Dynamic Host Configuration Protocol,DHCP (Dynamic Host Configuration Protocol),Dynamic Host Configuration Protocol (DHCP),DHCP
Many FTP sites allow you to log in as an anonymous user, which is an open account with limited privileges, but still capable of file transfers.
(True/False)
4.9/5
(30)
____ cover a wide range of topics in addition to Internet standards, from early discussion of new research concepts to status memos about the current state of the Internet.
(Multiple Choice)
4.8/5
(27)
Each piece of an IP datagram is routed on the network using a(n) ____________________.
(Short Answer)
4.8/5
(27)
The Internet Protocol is unreliable due to the fact there is no guarantee the datagram will reach its destination.
(True/False)
4.9/5
(29)
____ displays protocol statistics and current TCP/IP network connections.
(Multiple Choice)
4.9/5
(39)
The ____ provides the means to convert from a host name to an IP address and vice versa.
(Multiple Choice)
4.8/5
(32)
Describe what happens at each specific layer in the TCP/IP protocol after you click on a link to a Web site.
(Essay)
5.0/5
(32)
The ____ uses a directed broadcast message to obtain the MAC address for a given IP address.
(Multiple Choice)
5.0/5
(20)
The Network Interface layer performs the same functions as the Data-Link layer in the ISO/OSI model.
(True/False)
4.9/5
(30)
A standard way of assigning the 64 host bits is to use the 48-bit MAC address of the host together with a fixed 8-bit FFFE code.
(True/False)
4.8/5
(34)
The IP datagram is transmitted on a local network to a special purpose device called a(n) ____________________.
(Short Answer)
4.8/5
(43)
The ____________________ layer is responsible only for sending and receiving digital data, nothing else.
(Short Answer)
4.8/5
(24)
The ____, developed by David Mills of the University of Delaware, provides a simple way to synchronize the time of multiple computers on a network (even across the Internet).
(Multiple Choice)
4.8/5
(50)
Showing 1 - 20 of 26
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)