Exam 6: Data Communication and the Cloud

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

For a printer or laptop to connect to a wireless LAN, it must have a(n)________.

Free
(Multiple Choice)
4.7/5
(38)
Correct Answer:
Verified

C

What is a VPN? Explain how VPNs ensure the security of transmissions.

Free
(Essay)
4.9/5
(33)
Correct Answer:
Verified

A virtual private network (VPN)uses the Internet to create the appearance of private point-to-point connections.The remote user, who is the VPN client, connects to the Internet after which the VPN software on the remote user's computer establishes a connection with the VPN server.The VPN client and VPN server then have a point-to-point connection.That connection, called a tunnel, is a virtual, private pathway over a public or shared network from the VPN client to the VPN server.
VPN communications are secure, even though they are transmitted over the public Internet.To ensure security, VPN client software encrypts, or codes the original message so that its contents are protected.Then the VPN client appends the Internet address of the VPN server to the message and sends that package over the Internet to the VPN server.When the VPN server receives the message, it strips its address off the front of the message, decrypts the coded message, and sends the plain text message to the original address on the LAN.In this way, secure private messages are delivered over the public Internet.

A computer network is a collection of computers that communicate with one another over transmission lines or wirelessly.

Free
(True/False)
4.9/5
(34)
Correct Answer:
Verified

True

Which of the following statements is true about IEEE 802.3?

(Multiple Choice)
4.9/5
(26)

Which of the following is true about cable modems?

(Multiple Choice)
4.8/5
(40)

One of the advantages of cloud-based hosting is the in-depth visibility of security and disaster preparedness.

(True/False)
4.8/5
(37)

List the functions of a LAN device.

(Essay)
4.9/5
(42)

A packet is a piece of a message that is handled by programs that implement IP.

(True/False)
4.8/5
(36)

Which of the following protocols is concerned with the application layer of TCP/IP Protocol architecture?

(Multiple Choice)
4.9/5
(29)

When you visit the Web page of the luxury brand Bang & Olufsen, the address bar in your browser reads "http://www.bang-olufsen.com/", which is the ________ of the Web page.

(Multiple Choice)
4.8/5
(28)

Explain the purpose of XML, Flash, Silverlight, and HTML 5.

(Essay)
4.8/5
(33)

The attribute for a hyperlink is ________, whose value indicates which Web page is to be displayed when a user clicks on a link.

(Multiple Choice)
4.9/5
(43)

What are packets and routers?

(Essay)
4.7/5
(39)

Which of the following TCP/IP application-layer protocols is used to move files over the Internet and to maintain Web sites?

(Multiple Choice)
5.0/5
(37)

Computers that reside in different geographic locations are connected using a(n)________.

(Multiple Choice)
4.7/5
(35)

Which of the following protocols guarantees secure data transmission?

(Multiple Choice)
4.9/5
(33)

Which of the following statements is true about the IEEE 802.11 protocol?

(Multiple Choice)
4.9/5
(41)

Web servers run on a server-tier computer and manage HTTP traffic by sending and receiving Web pages to and from clients.

(True/False)
4.9/5
(33)

Unlike HTTP, FTP does not have a secure version.

(True/False)
4.8/5
(42)

A switch is a special-purpose computer that receives and transmits wired traffic on a LAN.

(True/False)
4.8/5
(36)
Showing 1 - 20 of 130
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)