Exam 17: Networking Essentials
Exam 1: Introducing Hardware50 Questions
Exam 2: Introducing Operating Systems50 Questions
Exam 3: Working With People in a Technical World50 Questions
Exam 4: Form Factors, power Supplies, and Working Inside a Computer50 Questions
Exam 5: All About Motherboards50 Questions
Exam 6: Supporting Processors50 Questions
Exam 7: Upgrading Memory50 Questions
Exam 8: Supporting Hard Drives50 Questions
Exam 9: Installing and Supporting Io Devices50 Questions
Exam 10: Multimedia Devices and Mass Storage50 Questions
Exam 11: PC Maintenance and Troubleshooting Strategies50 Questions
Exam 12: Installing Windows50 Questions
Exam 13: Maintaining Windows49 Questions
Exam 14: Optimizing Windows50 Questions
Exam 15: Tools for Solving Windows Problems50 Questions
Exam 16: Fixing Windows Problems50 Questions
Exam 17: Networking Essentials50 Questions
Exam 18: Networking Practices50 Questions
Exam 19: Security Essentials50 Questions
Exam 20: Security Practices50 Questions
Exam 21: Supporting Notebooks50 Questions
Exam 22: Supporting Printers50 Questions
Select questions type
A____ application means one computer (the remote computer)is running the Telnet server and another computer (the local computer)runs the Telnet client.
(Multiple Choice)
4.7/5
(39)
Match each term with the correct statement below.
-The theoretical number of bits that can be transmitted over a network at one time
(Multiple Choice)
4.9/5
(34)
Match each term with the correct statement below.
-The actual speed of a network
(Multiple Choice)
4.8/5
(29)
When connecting to a network,by default Windows assumes static IP addressing and automatically configures the network connection.
(True/False)
4.8/5
(34)
To use ____,you can create user accounts using the Control Panel.
(Multiple Choice)
4.9/5
(35)
The solution for securing private data traveling over a public network is a ____.
(Multiple Choice)
4.9/5
(36)
A(n)____ is a group of four dotted decimal numbers such as 255.255.0.0 that tells TCP/IP if a computer's IP address is on the same or a different network.
(Multiple Choice)
4.8/5
(43)
The three main protocols for encryption for 802.11 wireless networks are ____.
(Multiple Choice)
4.8/5
(33)
The Telnet protocol encrypts transmitted data,which therefore cannot be read by others on the network.
(True/False)
4.7/5
(37)
Showing 41 - 50 of 50
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)