Exam 3: Using Network Communication Protocols
Exam 1: Networking: an Overview42 Questions
Exam 2: How Lan and Wan Communications Work42 Questions
Exam 3: Using Network Communication Protocols42 Questions
Exam 4: Connecting Through a Cabled Network42 Questions
Exam 5: Devices for Connecting Networks42 Questions
Exam 6: Connecting Through a Wireless Network42 Questions
Exam 7: Sharing Resources on a Network42 Questions
Exam 8: Using a Server42 Questions
Exam 9: Understanding Wan Connection Choices42 Questions
Exam 10: Basic Network Design42 Questions
Exam 11: Securing Your Network42 Questions
Exam 12: Maintaining and Troubleshooting Your Network42 Questions
Select questions type
You can assign a network number to a computer or any other host on the network.
Free
(True/False)
4.8/5
(29)
Correct Answer:
False
A ____ is a logical grouping of network resources such as computers, printers, and network devices.
Free
(Multiple Choice)
4.8/5
(30)
Correct Answer:
D
A ____ communication sends a message to all points on a specific network.
Free
(Multiple Choice)
4.9/5
(29)
Correct Answer:
D
TCP/IP consists of nearly ____ nonproprietary protocols that interconnect computer systems efficiently and reliably.
(Multiple Choice)
4.9/5
(42)
Today, ____ remains the LAN protocol of preference for NetWare 6 and above.
(Multiple Choice)
4.9/5
(43)
The ____ field in a TCP frame header consists of the number of bytes that can be transmitted before the sender receives an acknowledgment of receipt.
(Multiple Choice)
4.9/5
(39)
How are Ethernet and token ring access methods facilitated in AppleTalk Phase II networks?
(Essay)
4.8/5
(25)
____ enables a packet to reach different subnetworks on a LAN and different networks on a WAN.
(Multiple Choice)
4.8/5
(35)
The ____ protocol enables the sending node to obtain the MAC addresses of the intended recipient before packets are sent.
(Multiple Choice)
4.7/5
(40)
There are 13 ____ servers on the Internet that are used to find TLDs, for example, .com or .net.
(Multiple Choice)
4.7/5
(26)
The ____ protocol is used by network-monitoring applications that do not require the same level of reliability as offered by TCP.
(Multiple Choice)
4.9/5
(38)
________________________________________ enables remote communications to networks, intranets, virtual private networks, and extranets by way of the Internet.
(Short Answer)
4.9/5
(36)
When a TCP segment is formatted with additional IP header information, the entire unit is called a(n)____________________.
(Short Answer)
4.7/5
(30)
For two computers to fully communicate, they must use the same protocol.
(True/False)
4.9/5
(38)
The ____ protocol is connectionless and is intended for the transfer of small files when data transmission errors are not critical and there is no need for security.
(Multiple Choice)
4.8/5
(38)
The ____ protocol supports connection authentication and encryption for security.
(Multiple Choice)
4.9/5
(37)
Identify four capabilities included in the properties of a LAN protocol.
(Essay)
4.8/5
(36)
Showing 1 - 20 of 42
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)