Exam 6: Data Communication and the Cloud
For a printer or laptop to connect to a wireless LAN, it must have a(n)________.
C
What is a VPN? Explain how VPNs ensure the security of transmissions.
A virtual private network (VPN)uses the Internet to create the appearance of private point-to-point connections.The remote user, who is the VPN client, connects to the Internet after which the VPN software on the remote user's computer establishes a connection with the VPN server.The VPN client and VPN server then have a point-to-point connection.That connection, called a tunnel, is a virtual, private pathway over a public or shared network from the VPN client to the VPN server.
VPN communications are secure, even though they are transmitted over the public Internet.To ensure security, VPN client software encrypts, or codes the original message so that its contents are protected.Then the VPN client appends the Internet address of the VPN server to the message and sends that package over the Internet to the VPN server.When the VPN server receives the message, it strips its address off the front of the message, decrypts the coded message, and sends the plain text message to the original address on the LAN.In this way, secure private messages are delivered over the public Internet.
A computer network is a collection of computers that communicate with one another over transmission lines or wirelessly.
True
One of the advantages of cloud-based hosting is the in-depth visibility of security and disaster preparedness.
A packet is a piece of a message that is handled by programs that implement IP.
Which of the following protocols is concerned with the application layer of TCP/IP Protocol architecture?
When you visit the Web page of the luxury brand Bang & Olufsen, the address bar in your browser reads "http://www.bang-olufsen.com/", which is the ________ of the Web page.
The attribute for a hyperlink is ________, whose value indicates which Web page is to be displayed when a user clicks on a link.
Which of the following TCP/IP application-layer protocols is used to move files over the Internet and to maintain Web sites?
Computers that reside in different geographic locations are connected using a(n)________.
Which of the following protocols guarantees secure data transmission?
Which of the following statements is true about the IEEE 802.11 protocol?
Web servers run on a server-tier computer and manage HTTP traffic by sending and receiving Web pages to and from clients.
A switch is a special-purpose computer that receives and transmits wired traffic on a LAN.
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)