Exam 14: Connecting To and Setting Up a Network

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

 The Telnet protocol encrypts transmitted data, which therefore cannot be read by others on the network.

(True/False)
4.8/5
(35)

 What wireless networking radio frequency yields faster speeds but offers shorter range?

(Multiple Choice)
4.8/5
(36)

 Describe communications at the application level - give an example.

(Essay)
4.7/5
(31)

 What is the name of the 32-bit or 128-bit number that is used to identify a device on a network?

(Multiple Choice)
4.9/5
(35)

 What two protocols are used to deliver mail messages?

(Multiple Choice)
4.7/5
(32)

 The Remote Desktop and Remote Assistance applications utilize what port for remote access?

(Multiple Choice)
4.9/5
(38)

 How are IP addresses available to the Internet classified?

(Multiple Choice)
4.7/5
(41)

 Describe the contents and purpose of a subnet mask.

(Essay)
4.7/5
(35)

Matching Match each item with a statement below. - a protocol used by various client applications when the application needs to query a database

(Multiple Choice)
4.9/5
(26)

 Describe how a computer with a Private IP address accesses the Internet.

(Essay)
4.7/5
(44)

 What functions as the name of a wireless network?

(Multiple Choice)
4.9/5
(44)

Matching Match each item with a statement below. - A group of computers on a peer-to-peer network that are sharing resources

(Multiple Choice)
4.9/5
(36)

 What is DNS and how does it work?

(Essay)
4.8/5
(30)

 When using static IP addressing, software automatically configures the network connection on each device.

(True/False)
4.8/5
(37)

 If the computer you are using is a laptop that moves from one network to another, what tab can be used to configure a secondary configuration, such as a static IP if a DHCP server cannot be reached?

(Multiple Choice)
4.8/5
(32)

 What cell phone technology is the most popular in the United States?

(Multiple Choice)
4.9/5
(39)

Matching Match each item with a statement below. - protects data by encrypting it from the time it leaves a remote computer until it reaches a server on a corporate network, using a technique called tunneling.

(Multiple Choice)
4.9/5
(41)

Matching Match each item with a statement below. - a technique designed to conserve the number of public IP addresses needed by a network

(Multiple Choice)
4.9/5
(42)

 What two terms are used to describe the User Datagram Protocol (UDP)?

(Multiple Choice)
4.8/5
(38)

Matching Match each item with a statement below. - Used by a computer or other device to determine if an IP address of another computer is on its network or another network

(Multiple Choice)
4.8/5
(32)
Showing 21 - 40 of 50
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)