Exam 10: The Internet

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

An e-mail program creates a(n) ____ document and attaches it to the e-mail message.

(Multiple Choice)
4.9/5
(33)

The Time to Live field indicates how long a particular datagram is allowed to live.

(True/False)
4.8/5
(33)

A(n) ____________________ is the command set that allows an organization to create secure connections using public resources such as the Internet.

(Short Answer)
4.8/5
(41)

Real-Time Streaming Protocol (RTSP) is a(n) ____ layer protocol.

(Multiple Choice)
4.9/5
(31)

Types of listserv software include mailserv, majordomo, and almanac.

(True/False)
4.9/5
(42)

The UDP header contains only four fields-Source Port, Destination Port, Length, and Checksum.

(True/False)
4.7/5
(34)

IP ____________________ is essentially another name for a data packet.

(Short Answer)
4.8/5
(40)

The IPv6 address 6A3E:BA99:0:0:0:87BA:0123:FFEF can be abbreviated as:

(Multiple Choice)
4.8/5
(40)

The ____________________ is a vast collection of electronic documents that are located on many different Web servers and contain text and images that can be accessed by simply clicking links within a browser's Web page.

(Short Answer)
4.9/5
(27)

One of the biggest changes to affect the Internet will be the continuing adoption of a new version of the Internet Protocol, version ____.

(Multiple Choice)
4.8/5
(29)

The ____________________ provides a connectionless data transfer service over heterogeneous networks by passing and routing IP datagrams.

(Short Answer)
4.8/5
(40)

____ are used to select unique documents from anywhere in the world.

(Multiple Choice)
4.9/5
(37)

The Point-to-Point Tunneling Protocol (PPTP) is an extension of the Internet's ____.

(Multiple Choice)
4.7/5
(47)

IP is a connection-oriented protocol.

(True/False)
4.9/5
(42)

In the older classful addressing scheme of IP addresses, how many class A addresses existed?

(Multiple Choice)
4.8/5
(31)

A ____ is a data network connection that makes use of the public telecommunications infrastructure but maintains privacy through the use of a tunneling protocol and security procedures.

(Multiple Choice)
4.8/5
(35)

POP3 is not useful if you do not have a permanent connection to a network and must dial in using a temporary Internet connection.

(True/False)
4.8/5
(41)

What are the disadvantages of Voice over IP (VoIP)?

(Essay)
4.9/5
(41)

The Internet recognizes URLs directly.

(True/False)
4.9/5
(40)

____ is a set of protocols developed by the Internet Engineering Task Force to support the secure exchange of data packets at the IP layer.

(Multiple Choice)
4.8/5
(28)
Showing 81 - 100 of 100
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)