Exam 8: The Tcpip Protocols
Exam 1: What Is a Computer Network30 Questions
Exam 2: Network Topology30 Questions
Exam 3: Networking Hardware30 Questions
Exam 4: Ethernet Technology30 Questions
Exam 5: Token-Ring, fddi, and Other LAN Technologies30 Questions
Exam 6: Network Design and Troubleshooting Scenarios30 Questions
Exam 7: Low-Level Protocols30 Questions
Exam 8: The Tcpip Protocols30 Questions
Exam 9: Ipxspx, Appletalk, and Other Network Protocols30 Questions
Exam 10: Switching and Routing30 Questions
Exam 11: Network Management and Security30 Questions
Exam 12: Electronic Mail30 Questions
Exam 13: FTP and Telnet30 Questions
Exam 14: Multimedia Networking30 Questions
Exam 15: The Internet30 Questions
Exam 16: Writing a Network Application30 Questions
Exam 17: An Introduction to Networking With Windows30 Questions
Exam 18: Windows Domains30 Questions
Exam 19: Unix and Linux30 Questions
Exam 20: Other Network Operating Systems30 Questions
Exam 21: Cryptography and Security30 Questions
Exam 22: Security Hardware30 Questions
Exam 23: Security Software30 Questions
Exam 24: Forensic Techniques30 Questions
Select questions type
____ defines the format and meaning of messages exchanged by the manager and agents.
Free
(Multiple Choice)
5.0/5
(39)
Correct Answer:
A
____ displays protocol statistics and current TCP/IP network connections.
Free
(Multiple Choice)
5.0/5
(34)
Correct Answer:
A
Each piece of an IP datagram is routed on the network using a(n)____________________.
Free
(Short Answer)
4.9/5
(39)
Correct Answer:
IP address
The Internet Protocol is unreliable due to the fact there is no guarantee the datagram will reach its destination.
(True/False)
4.7/5
(31)
Many FTP sites allow you to log in as an anonymous user,which is an open account with limited privileges,but still capable of file transfers.
(True/False)
4.8/5
(35)
Match each item with a statement below.
-Allows a user to establish a terminal emulation connection on a remote computer
(Multiple Choice)
4.8/5
(31)
A typical value for an MTU on an Ethernet network is ____ bytes.
(Multiple Choice)
4.8/5
(34)
____ is a TCP/IP application that determines the path through the network to a destination entered by the user.
(Multiple Choice)
4.8/5
(31)
The IP datagram is transmitted on a local network to a special purpose device called a(n)____________________.
(Short Answer)
5.0/5
(35)
DHCP is used when your system has been allocated a fixed IP address by your network administrator.
(True/False)
4.8/5
(38)
The ____ uses a directed broadcast message to obtain the MAC address for a given IP address.
(Multiple Choice)
4.8/5
(34)
The ____________________ layer is responsible only for sending and receiving digital data,nothing else.
(Short Answer)
4.9/5
(31)
____ provides information on the state of NetBIOS-over-TCP/IP connections that exist within a Windows computer.
(Multiple Choice)
4.8/5
(28)
Match each item with a statement below.
-Used to exchange encrypted Web pages between a client/server connection
(Multiple Choice)
4.8/5
(31)
HTTPS can use ____________________ that contain the certificate holder's public key and digital signature.
(Short Answer)
4.8/5
(32)
The ____ provides the means to convert from a host name to an IP address and vice versa.
(Multiple Choice)
4.9/5
(34)
Match each item with a statement below.
-Official standards for the Internet that are published as electronic documents
(Multiple Choice)
4.8/5
(37)
Match each item with a statement below.
-Allows a user to log in to a remote computer and transfer files back and forth through simple commands
(Multiple Choice)
4.9/5
(44)
_____________________________________________ is a protocol for dynamically assigning IP addresses to devices on a network during the bootstrap process.
(Essay)
4.9/5
(44)
Showing 1 - 20 of 30
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)