Exam 14: Connecting To and Setting Up a Network

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

 Describe the Lightweight Directory Access Protocol.

Free
(Essay)
4.8/5
(32)
Correct Answer:
Verified

Lightweight Directory Access Protocol (LDAP) is used by various client applications when the application needs to query a database. For example, an email client on a corporate network might query a database that contains the email addresses for all employees. Another example is when an application looks for a printer by querying a database of printers supported by an organization on the corporate network or Internet. Data sent and received using the LDAP protocol is not encrypted; therefore, an encryption layer is sometimes added to LDAP transmissions.

 How is the network portion and the host portion of an IP address identified?

Free
(Multiple Choice)
5.0/5
(38)
Correct Answer:
Verified

D

 If a device does not receive an IP address from a DHCP server, the device may resort to what kind of IP address?

Free
(Multiple Choice)
4.8/5
(26)
Correct Answer:
Verified

A

 What command can be used to flush the local DNS cache on a Windows computer?

(Multiple Choice)
4.8/5
(45)

 The solution for securing private data traveling over a public network, such as the Internet, is the use of what type of network?

(Multiple Choice)
4.9/5
(36)

Matching Match each item with a statement below. - designed to make it easier for users to connect their computers to a wireless network when a hard-to-remember SSID and security key are used

(Multiple Choice)
4.9/5
(39)

 Describe the User Datagram Protocol.

(Essay)
4.8/5
(37)

 Discuss how a VPN might be used and how it protects data.

(Essay)
4.8/5
(26)

 What functions might be provided by a SOHO router besides the normal duty of routing packets between networks? (Choose all that apply).

(Multiple Choice)
4.8/5
(43)

 The current release of SMB is CIFS, also called SMB2.

(True/False)
4.9/5
(35)

 Describe TCP and how it provides reliability of packet delivery.

(Essay)
4.8/5
(35)

 What type of device can be used to block unwanted traffic initiated from the Internet and can also restrict Internet access from an internal network?

(Multiple Choice)
4.7/5
(28)

 What two protocols are used for remote access to a server, using unencrypted and encrypted transmissions respectively?

(Multiple Choice)
4.8/5
(31)

 What TCP port is utilized by an SSH server listening for connections?

(Multiple Choice)
4.9/5
(43)

 Describe a domain name and provide examples of domain names.

(Essay)
4.8/5
(42)

 A problem with virtual networks is that data transmitting through them cannot be encrypted and therefore is not secure.

(True/False)
4.8/5
(30)

 Packets are delivered to a single node on a network when using what type of IPv6 address?

(Multiple Choice)
4.9/5
(28)

 What device handles access to another network for a client computer if it does not have a better option?

(Multiple Choice)
4.9/5
(35)

 What protocol makes a connection, checks whether the data is received, and resends it if it is not?

(Multiple Choice)
4.8/5
(40)

 What are the two mail protocols used for delivery of messages, and how do they function?

(Essay)
4.8/5
(26)
Showing 1 - 20 of 50
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)