Deck 15: Connecting to and Setting up a Network

Full screen (f)
exit full mode
Question
Using a ______________, packets are delivered to a single node on a network.

A) anycast address
B) default gateway address
C) multicast address
D) unicast address
Use Space or
up arrow
down arrow
to flip the card.
Question
A problem with virtual networks is that data transmitting through them cannot be encrypted and therefore is not secure.
Question
Which utility can be used to automatically diagnose a problem with a network connection?

A) My Network Places
B) Device Manger
C) Windows Network Diagnostics
D) Control Panel
Question
The solution for securing private data traveling over a public network, such as the Internet, is a _________.

A) public encrypted network
B) virtual private network
C) private encrypted network
D) virtual prevention network
Question
Which is used to identify the network portion and the host portion of an IP address?

A) dynamic address
B) DHCP address
C) default gateway
D) subnet mask
Question
What is it called when a router is configured to open or close certain ports so they can or cannot be used.

A) port triggering
B) demilitarized zone (DMZ)
C) port filtering
D) port forwarding
Question
The Telnet protocol encrypts transmitted data, which therefore cannot be read by others on the network.
Question
If the computer you are using is a laptop that moves from one network to another, you can click the _____ tab and configure static IP address settings for a second network.

A) General Configuration
B) Alternate Configuration
C) Secondary Configuration
D) Fallback Configuration
Question
What type of IP address should be configured on a wireless access point so that it can always be located by the devices that it serves?

A) static IP address
B) dynamic IP address
C) private IP address
D) default IP address
Question
Which protocol makes a connection, checks whether the data is received, and resends it if it is not?

A) TCP
B) UDP
C) IP
D) DNS
Question
Which command can be used to display TCP\IP configuration information and refresh the IP address?

A) msconfig
B) netstat
C) ipconfig
D) netcfg32
Question
Which TCP\IP protocol is used by Windows to share files and printers on a network?

A) Server Message Block (SMB)
B) Lightweight Directory Access Protocol (LDAP)
C) File Transfer Protocol (FTP)
D) Hypertext Transfer Protocol (HTTP)
Question
What is the name of a 32-bit or 128-bit number that is used to identify a device?

A) port number
B) protocol number
C) IP address
D) IP version
Question
When connecting to a private and secured wireless access point, you must provide the information that proves you have the right to use the network.
Question
How are IP addresses available to the Internet classified?

A) public
B) private
C) non-routable
D) standard
Question
Which type of IP address is configured by a server when a device first initiates a connection to the network?

A) default
B) dynamic
C) static
D) configured
Question
Wireless networks are either public, unsecured hotspots or private, secured hotspots.
Question
What is used to identify a wireless access point?

A) secure key
B) MAC address
C) Network ID
D) SSID
Question
What type of device can be used to block unwanted traffic initiated from the Internet and can also restrict Internet access from an internal network?

A) hub
B) switch
C) firewall
D) VPN
Question
When using static IP addressing, software automatically configures the network connection on each device.
Question
Match between columns
Premises:
Responses:
port triggering
ipconfig
Lightweight Directory Access Protocol (LDAP)
DHCP server
workgroup
Secure Shell (SSH)
Wi-Fi Protected Setup (WPS)
subnet mask
virtual private network
Network Address Translation (NAT)
port triggering
ipconfig
Lightweight Directory Access Protocol (LDAP)
DHCP server
workgroup
Secure Shell (SSH)
Wi-Fi Protected Setup (WPS)
subnet mask
virtual private network
Network Address Translation (NAT)
port triggering
ipconfig
Lightweight Directory Access Protocol (LDAP)
DHCP server
workgroup
Secure Shell (SSH)
Wi-Fi Protected Setup (WPS)
subnet mask
virtual private network
Network Address Translation (NAT)
port triggering
ipconfig
Lightweight Directory Access Protocol (LDAP)
DHCP server
workgroup
Secure Shell (SSH)
Wi-Fi Protected Setup (WPS)
subnet mask
virtual private network
Network Address Translation (NAT)
port triggering
ipconfig
Lightweight Directory Access Protocol (LDAP)
DHCP server
workgroup
Secure Shell (SSH)
Wi-Fi Protected Setup (WPS)
subnet mask
virtual private network
Network Address Translation (NAT)
port triggering
ipconfig
Lightweight Directory Access Protocol (LDAP)
DHCP server
workgroup
Secure Shell (SSH)
Wi-Fi Protected Setup (WPS)
subnet mask
virtual private network
Network Address Translation (NAT)
port triggering
ipconfig
Lightweight Directory Access Protocol (LDAP)
DHCP server
workgroup
Secure Shell (SSH)
Wi-Fi Protected Setup (WPS)
subnet mask
virtual private network
Network Address Translation (NAT)
port triggering
ipconfig
Lightweight Directory Access Protocol (LDAP)
DHCP server
workgroup
Secure Shell (SSH)
Wi-Fi Protected Setup (WPS)
subnet mask
virtual private network
Network Address Translation (NAT)
port triggering
ipconfig
Lightweight Directory Access Protocol (LDAP)
DHCP server
workgroup
Secure Shell (SSH)
Wi-Fi Protected Setup (WPS)
subnet mask
virtual private network
Network Address Translation (NAT)
port triggering
ipconfig
Lightweight Directory Access Protocol (LDAP)
DHCP server
workgroup
Secure Shell (SSH)
Wi-Fi Protected Setup (WPS)
subnet mask
virtual private network
Network Address Translation (NAT)
Question
Describe two methods that a wireless access point might use to secure a wireless network.
Question
Describe the contents and purpose of a subnet mask.
Question
Describe TCP and how it provides reliability of packet delivery.
Question
What is DNS and how does it work?
Question
Before data is transmitted on a network, it is first broken up into ____________________.
Question
Describe communications at the application level - give an example.
Question
The first part of an IPv4 address identifies the network, and the last part identifies the ____________________.
Question
Describe a domain name and provide examples of domain names.
Question
Which wireless networking radio frequency yields faster speeds but offers shorter range?

A) 2.4 GHz
B) 5 GHz
C) 7 GHz
D) 11 GHz
Question
Describe the Lightweight Directory Access Protocol.
Question
Describe how a computer with a Private IP address accesses the Internet.
Question
Discuss how a VPN might be used and how it protects data.
Question
Discuss User Datagram Protocol.
Question
Communication between two computers happens at three levels (layers) and these levels include the application, operating system, and ____________________.
Question
A ____________________ is the name of a computer and can be used in place of its IP address.
Question
Using __________________, when a firewall receives a request for communication from the Internet to a specific computer and port, the request will be allowed and forwarded to that computer on the network.
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/37
auto play flashcards
Play
simple tutorial
Full screen (f)
exit full mode
Deck 15: Connecting to and Setting up a Network
1
Using a ______________, packets are delivered to a single node on a network.

A) anycast address
B) default gateway address
C) multicast address
D) unicast address
D
2
A problem with virtual networks is that data transmitting through them cannot be encrypted and therefore is not secure.
False
3
Which utility can be used to automatically diagnose a problem with a network connection?

A) My Network Places
B) Device Manger
C) Windows Network Diagnostics
D) Control Panel
C
4
The solution for securing private data traveling over a public network, such as the Internet, is a _________.

A) public encrypted network
B) virtual private network
C) private encrypted network
D) virtual prevention network
Unlock Deck
Unlock for access to all 37 flashcards in this deck.
Unlock Deck
k this deck
5
Which is used to identify the network portion and the host portion of an IP address?

A) dynamic address
B) DHCP address
C) default gateway
D) subnet mask
Unlock Deck
Unlock for access to all 37 flashcards in this deck.
Unlock Deck
k this deck
6
What is it called when a router is configured to open or close certain ports so they can or cannot be used.

A) port triggering
B) demilitarized zone (DMZ)
C) port filtering
D) port forwarding
Unlock Deck
Unlock for access to all 37 flashcards in this deck.
Unlock Deck
k this deck
7
The Telnet protocol encrypts transmitted data, which therefore cannot be read by others on the network.
Unlock Deck
Unlock for access to all 37 flashcards in this deck.
Unlock Deck
k this deck
8
If the computer you are using is a laptop that moves from one network to another, you can click the _____ tab and configure static IP address settings for a second network.

A) General Configuration
B) Alternate Configuration
C) Secondary Configuration
D) Fallback Configuration
Unlock Deck
Unlock for access to all 37 flashcards in this deck.
Unlock Deck
k this deck
9
What type of IP address should be configured on a wireless access point so that it can always be located by the devices that it serves?

A) static IP address
B) dynamic IP address
C) private IP address
D) default IP address
Unlock Deck
Unlock for access to all 37 flashcards in this deck.
Unlock Deck
k this deck
10
Which protocol makes a connection, checks whether the data is received, and resends it if it is not?

A) TCP
B) UDP
C) IP
D) DNS
Unlock Deck
Unlock for access to all 37 flashcards in this deck.
Unlock Deck
k this deck
11
Which command can be used to display TCP\IP configuration information and refresh the IP address?

A) msconfig
B) netstat
C) ipconfig
D) netcfg32
Unlock Deck
Unlock for access to all 37 flashcards in this deck.
Unlock Deck
k this deck
12
Which TCP\IP protocol is used by Windows to share files and printers on a network?

A) Server Message Block (SMB)
B) Lightweight Directory Access Protocol (LDAP)
C) File Transfer Protocol (FTP)
D) Hypertext Transfer Protocol (HTTP)
Unlock Deck
Unlock for access to all 37 flashcards in this deck.
Unlock Deck
k this deck
13
What is the name of a 32-bit or 128-bit number that is used to identify a device?

A) port number
B) protocol number
C) IP address
D) IP version
Unlock Deck
Unlock for access to all 37 flashcards in this deck.
Unlock Deck
k this deck
14
When connecting to a private and secured wireless access point, you must provide the information that proves you have the right to use the network.
Unlock Deck
Unlock for access to all 37 flashcards in this deck.
Unlock Deck
k this deck
15
How are IP addresses available to the Internet classified?

A) public
B) private
C) non-routable
D) standard
Unlock Deck
Unlock for access to all 37 flashcards in this deck.
Unlock Deck
k this deck
16
Which type of IP address is configured by a server when a device first initiates a connection to the network?

A) default
B) dynamic
C) static
D) configured
Unlock Deck
Unlock for access to all 37 flashcards in this deck.
Unlock Deck
k this deck
17
Wireless networks are either public, unsecured hotspots or private, secured hotspots.
Unlock Deck
Unlock for access to all 37 flashcards in this deck.
Unlock Deck
k this deck
18
What is used to identify a wireless access point?

A) secure key
B) MAC address
C) Network ID
D) SSID
Unlock Deck
Unlock for access to all 37 flashcards in this deck.
Unlock Deck
k this deck
19
What type of device can be used to block unwanted traffic initiated from the Internet and can also restrict Internet access from an internal network?

A) hub
B) switch
C) firewall
D) VPN
Unlock Deck
Unlock for access to all 37 flashcards in this deck.
Unlock Deck
k this deck
20
When using static IP addressing, software automatically configures the network connection on each device.
Unlock Deck
Unlock for access to all 37 flashcards in this deck.
Unlock Deck
k this deck
21
Match between columns
Premises:
Responses:
port triggering
ipconfig
Lightweight Directory Access Protocol (LDAP)
DHCP server
workgroup
Secure Shell (SSH)
Wi-Fi Protected Setup (WPS)
subnet mask
virtual private network
Network Address Translation (NAT)
port triggering
ipconfig
Lightweight Directory Access Protocol (LDAP)
DHCP server
workgroup
Secure Shell (SSH)
Wi-Fi Protected Setup (WPS)
subnet mask
virtual private network
Network Address Translation (NAT)
port triggering
ipconfig
Lightweight Directory Access Protocol (LDAP)
DHCP server
workgroup
Secure Shell (SSH)
Wi-Fi Protected Setup (WPS)
subnet mask
virtual private network
Network Address Translation (NAT)
port triggering
ipconfig
Lightweight Directory Access Protocol (LDAP)
DHCP server
workgroup
Secure Shell (SSH)
Wi-Fi Protected Setup (WPS)
subnet mask
virtual private network
Network Address Translation (NAT)
port triggering
ipconfig
Lightweight Directory Access Protocol (LDAP)
DHCP server
workgroup
Secure Shell (SSH)
Wi-Fi Protected Setup (WPS)
subnet mask
virtual private network
Network Address Translation (NAT)
port triggering
ipconfig
Lightweight Directory Access Protocol (LDAP)
DHCP server
workgroup
Secure Shell (SSH)
Wi-Fi Protected Setup (WPS)
subnet mask
virtual private network
Network Address Translation (NAT)
port triggering
ipconfig
Lightweight Directory Access Protocol (LDAP)
DHCP server
workgroup
Secure Shell (SSH)
Wi-Fi Protected Setup (WPS)
subnet mask
virtual private network
Network Address Translation (NAT)
port triggering
ipconfig
Lightweight Directory Access Protocol (LDAP)
DHCP server
workgroup
Secure Shell (SSH)
Wi-Fi Protected Setup (WPS)
subnet mask
virtual private network
Network Address Translation (NAT)
port triggering
ipconfig
Lightweight Directory Access Protocol (LDAP)
DHCP server
workgroup
Secure Shell (SSH)
Wi-Fi Protected Setup (WPS)
subnet mask
virtual private network
Network Address Translation (NAT)
port triggering
ipconfig
Lightweight Directory Access Protocol (LDAP)
DHCP server
workgroup
Secure Shell (SSH)
Wi-Fi Protected Setup (WPS)
subnet mask
virtual private network
Network Address Translation (NAT)
Unlock Deck
Unlock for access to all 37 flashcards in this deck.
Unlock Deck
k this deck
22
Describe two methods that a wireless access point might use to secure a wireless network.
Unlock Deck
Unlock for access to all 37 flashcards in this deck.
Unlock Deck
k this deck
23
Describe the contents and purpose of a subnet mask.
Unlock Deck
Unlock for access to all 37 flashcards in this deck.
Unlock Deck
k this deck
24
Describe TCP and how it provides reliability of packet delivery.
Unlock Deck
Unlock for access to all 37 flashcards in this deck.
Unlock Deck
k this deck
25
What is DNS and how does it work?
Unlock Deck
Unlock for access to all 37 flashcards in this deck.
Unlock Deck
k this deck
26
Before data is transmitted on a network, it is first broken up into ____________________.
Unlock Deck
Unlock for access to all 37 flashcards in this deck.
Unlock Deck
k this deck
27
Describe communications at the application level - give an example.
Unlock Deck
Unlock for access to all 37 flashcards in this deck.
Unlock Deck
k this deck
28
The first part of an IPv4 address identifies the network, and the last part identifies the ____________________.
Unlock Deck
Unlock for access to all 37 flashcards in this deck.
Unlock Deck
k this deck
29
Describe a domain name and provide examples of domain names.
Unlock Deck
Unlock for access to all 37 flashcards in this deck.
Unlock Deck
k this deck
30
Which wireless networking radio frequency yields faster speeds but offers shorter range?

A) 2.4 GHz
B) 5 GHz
C) 7 GHz
D) 11 GHz
Unlock Deck
Unlock for access to all 37 flashcards in this deck.
Unlock Deck
k this deck
31
Describe the Lightweight Directory Access Protocol.
Unlock Deck
Unlock for access to all 37 flashcards in this deck.
Unlock Deck
k this deck
32
Describe how a computer with a Private IP address accesses the Internet.
Unlock Deck
Unlock for access to all 37 flashcards in this deck.
Unlock Deck
k this deck
33
Discuss how a VPN might be used and how it protects data.
Unlock Deck
Unlock for access to all 37 flashcards in this deck.
Unlock Deck
k this deck
34
Discuss User Datagram Protocol.
Unlock Deck
Unlock for access to all 37 flashcards in this deck.
Unlock Deck
k this deck
35
Communication between two computers happens at three levels (layers) and these levels include the application, operating system, and ____________________.
Unlock Deck
Unlock for access to all 37 flashcards in this deck.
Unlock Deck
k this deck
36
A ____________________ is the name of a computer and can be used in place of its IP address.
Unlock Deck
Unlock for access to all 37 flashcards in this deck.
Unlock Deck
k this deck
37
Using __________________, when a firewall receives a request for communication from the Internet to a specific computer and port, the request will be allowed and forwarded to that computer on the network.
Unlock Deck
Unlock for access to all 37 flashcards in this deck.
Unlock Deck
k this deck
locked card icon
Unlock Deck
Unlock for access to all 37 flashcards in this deck.