Deck 7: Data Networking Fundamentals

Full screen (f)
exit full mode
Question
The third layer in the OSI model is the data link layer.
Use Space or
up arrow
down arrow
to flip the card.
Question
Block ID is the first of six characters that make up the MAC address.
Question
A computer connected to a network that has a unique address is called a hub.
Question
A computer on the network that requests resources or services from another computer on a network is referred to as a client.
Question
The functions of a network that allow remote users to connect to the network is referred to as communication services.
Question
The process of using an algorithm to decode a transmission and reveal encrypted data is reassembly.
Question
A feature of some protocols that allows them to service a request without requiring a verified session and without guaranteeing data delivery is referred to as connectionless.
Question
The piece of hardware in which a cable terminates is referred to as a connectivity device.
Question
The symbolic name that resolves to a group of IP addresses is the MAC address.
Question
The device ID is the second set of six characters that make up a network's MAC address. _________________________
Question
The symbolic name that resolves to a group of IP addresses is the domain name. _________________________
Question
The use of an algorithm to scramble data so that it can only be read by reversing the formula is known as decryption. _________________________
Question
A specialized server that enables clients to share applications and data across the network is known as a(n) file server. _________________________
Question
A specialized device that selectively filters or blocks traffic between networks is called a(n) router. _________________________
Question
A package for data that includes not only the raw data, but also the sender's and receiver's network addresses and control information is referred to as a(n) hub. _________________________
Question
Frame check sequence refers to the field in a frame that is responsible for ensuring that data carried by the frame arrives in tact. _________________________
Question
In TCP/IP addressing, a(n) fully qualified host name is the combination of a host and domain name that together uniquely identify a device. _________________________
Question
A computer connected to a network that has a unique address is known as a(n) hub. _________________________
Question
A set of instructions that allows a program to interact with the operating system is referred to as:

A) Broadcast
B) Application program interface
C) Authentication
D) Flow of control
Question
The process of verifying that a client's logon ID and password are valid and then allowing the client to log on to the network and access defined resources is referred to as:

A) Broadcasting
B) Authentication
C) Encryption
D) Hosting
Question
Which of the following is also known as vendor ID?

A) Device ID
B) Subnet
C) Token
D) Block ID
Question
Which of the following refers to the transmission to all nodes on a network?

A) Broadcast
B) Peering
C) Sequencing
D) Encryption
Question
A computer on the network that requests resources or services from another computer on the network is known as:

A) Host
B) Client
C) Router
D) Gateway
Question
A network in which clients use a central server to share data, data storage space, programs, and other devices is known as:

A) Client software
B) Internet
C) Internetwork
D) Client-server network
Question
Which of the following is a feature of some protocols that allows them to service a request without requiring a verified session and without guaranteeing data delivery?

A) Connectionless
B) Internetwork
C) Connection-oriented
D) Segmentation
Question
Which of the following is a device that connects and exchanges data between two separate networks or separate parts of a single network?

A) Connector
B) Connectivity device
C) Hub
D) Network interface card
Question
Which of the following is the second layer of the OSI model?

A) Presentation layer
B) Application layer
C) Session layer
D) Data link layer
Question
The process of using an algorithm to decode a transmission and reveal encrypted data is known as:

A) Decryption
B) Segmentation
C) Authentication
D) Peering
Question
The second of six characters that make up a network device's MAC address is known as:

A) Block ID
B) NIC ID
C) Device ID
D) None of the above
Question
Which of the following is the symbolic name that make up a network device's MAC address?

A) Host
B) Fully qualified host name
C) Frame
D) Domain name
Question
An application layer protocol in the TCP/IP suite that manages the dynamic distribution of IP address on a network is known as:

A) FTP
B) DHCP
C) HTTP
D) FCS
Question
Which of the following uses an algorithm to scramble data so that it can only be read by reversing the formula?

A) Encryption
B) Segmentation
C) Sequencing
D) None of the above
Question
A specialized device that selectively filters or blocks traffic between networks is called:

A) Flow control
B) Router
C) Gateway
D) Firewall
Question
Which of the following is a method of gauging the appropriate rate of data transmission based on how fast the recipient can accept data?

A) Frame
B) Flow of control
C) API
D) Internet
Question
A package for data that includes not only the raw data, but also the sender's and receiver's network address and control information is known as:

A) Flow of control
B) Frame
C) Frame check sequence
D) Packet
Question
The field in a frame responsible for ensuring that data carried by the frame arrives in tact is called:

A) Fully qualified host name
B) Flow of control
C) Frame check sequence
D) Device ID
Question
In TCP/IP addressing, the combination of a host and domain name that together uniquely identify a device is known as:

A) IP address
B) Logical address
C) Fully qualified host name
D) MAC address
Question
Which of the following represents a computer connected to a network that has a unique address?

A) Host
B) Hub
C) Router
D) Gateway
Question
A connectivity device that operates at the Physical layer of the OSI Model and repeats digital signals over a network segment is called:

A) Host
B) Hub
C) Frame
D) Router
Question
Which of the following belongs to the Internet layer of the TCP/IP model and provides information about how and where data should be delivered?

A) HTTP
B) Internet protocol
C) Transmission control protocol
D) DHCP
Question
Which of the following refers to the traversal of more than one LAN segment and more than one type of network through a router?

A) ISP
B) IPX
C) Internetwork
D) IP datagram
Question
Which of the following represents a logical address that is used in TCP/IP networking?

A) Logical address
B) MAC address
C) Loopback address
D) IP address
Question
Which of the following is the IP portion of a TCP/IP frame that holds information necessary for routers to transfer data between subnets?

A) IP address
B) IP datagram
C) Logical address
D) MAC address
Question
An IP address reserved for communicating from a node to itself is called:

A) Loopback address
B) Logical
C) IP address
D) MAC address
Question
A number that uniquely identifies a network node is referred to as:

A) MAC address
B) Loopback address
C) IP address
D) Logical address
Question
A specialized server that manages mail services is called:

A) Mail services
B) File server
C) Mail server
D) Print server
Question
Which of the following is the network services that manage the storage and transfer of e-mail between users on a network?

A) Internet services
B) Mail services
C) Management services
D) Print services
Question
Which of the following is the device that enables a workstation to connect to the network and communicate with other computers?

A) MAC
B) MAE
C) NAP
D) NIC
Question
The process of reconstructing data units that have been segmented is known as:

A) Redundancy
B) Reassembly
C) Peering
D) Segmentation
Question
The practice of using more than one component to guard against outages is known as:

A) Reassembly
B) Peering
C) Segmentation
D) Redundancy
Question
Does the term client refer to a computer on the network that requests resources from another computer on a network?
Question
Does the term authentication refer to a piece of hardware in which a cable terminates?
Question
Does the term connector describes the piece of hardware in which a cable terminates?
Question
Does the term decryption refer to the process of using an algorithm to decode a transmission?
Question
Does the term hub refer to a computer connected to a network that has a unique address?
Question
Does a file server allow clients to share data files, applications, and storage areas?
Question
Does the term loopback address refer to the addresses that reside at the Network level of the OSI model?
Question
Does a frame contain the sender's and receiver's network addresses and control and control information?
Question
Does the term host refer to a connectivity device that operates at the Physical layer of the OSI Model?
Question
Does the term logical address refer to a number that uniquely identifies a network node?
Question
The seventh layer of the OSI model is the ____________________.
Question
A computer on the network that requests resources or services from another computer on a network is referred to as a(n) ____________________.
Question
A network in which clients use a central server to share data, data storage, and other devices is known as a(n) ____________________.
Question
The piece of hardware in which a cable terminates is called a(n) ____________________.
Question
____________________ is the second set of six characters that make up a network device's MAC address.
Question
The symbolic name that resolves to a group of IP addresses is referred to as a(n) ____________________.
Question
The use of an algorithm to scramble data so that it can only be read by reversing the formula is known as ____________________.
Question
A specialized server that enables clients to share applications and data across the network is called a(n) ____________________.
Question
A(n) ____________________ not only includes raw data, but also the sender's and receiver's network addresses and control information.
Question
A(n) ____________________ is a connectivity device that operates at the Physical layer of the OSI Model and repeats digital signals over a network segment.
Question
Match each statement below with the correct item

-The use of an algorithm to scramble data so that it can only be read by reversing the formula.

A)Domain name
B)Loopback address
C)Client
D)Encryption
E)File server
F)Hub
G)Internetwork
H)IP address
I)Decryption
J)Firewall
Question
Match each statement below with the correct item

-A specialized server that enables clients to share applications and data across the network.

A)Domain name
B)Loopback address
C)Client
D)Encryption
E)File server
F)Hub
G)Internetwork
H)IP address
I)Decryption
J)Firewall
Question
Match each statement below with the correct item

-A specialized device that selectively filters or blocks traffic between networks.

A)Domain name
B)Loopback address
C)Client
D)Encryption
E)File server
F)Hub
G)Internetwork
H)IP address
I)Decryption
J)Firewall
Question
Match each statement below with the correct item

-A connectivity device that operates at the Physical layer of the OSI Model and repeats digital signals over a network.

A)Domain name
B)Loopback address
C)Client
D)Encryption
E)File server
F)Hub
G)Internetwork
H)IP address
I)Decryption
J)Firewall
Question
Match each statement below with the correct item

-The second set of six characters that make up a network device's MAC address.

A)Domain name
B)Loopback address
C)Client
D)Encryption
E)File server
F)Hub
G)Internetwork
H)IP address
I)Decryption
J)Firewall
Question
Match each statement below with the correct item

-To traverse more than one LAN segment and more than one type of network through a router.

A)Domain name
B)Loopback address
C)Client
D)Encryption
E)File server
F)Hub
G)Internetwork
H)IP address
I)Decryption
J)Firewall
Question
Match each statement below with the correct item

-A logical address used in TCP/IP networking.

A)Domain name
B)Loopback address
C)Client
D)Encryption
E)File server
F)Hub
G)Internetwork
H)IP address
I)Decryption
J)Firewall
Question
Match each statement below with the correct item

-An IP address reserved for communicating from a node to itself.

A)Domain name
B)Loopback address
C)Client
D)Encryption
E)File server
F)Hub
G)Internetwork
H)IP address
I)Decryption
J)Firewall
Question
Match each statement below with the correct item

-A computer on the network.

A)Domain name
B)Loopback address
C)Client
D)Encryption
E)File server
F)Hub
G)Internetwork
H)IP address
I)Decryption
J)Firewall
Question
Match each statement below with the correct item

-The process of using an algorithm to decode a transmission and reveal encrypted data.

A)Domain name
B)Loopback address
C)Client
D)Encryption
E)File server
F)Hub
G)Internetwork
H)IP address
I)Decryption
J)Firewall
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/89
auto play flashcards
Play
simple tutorial
Full screen (f)
exit full mode
Deck 7: Data Networking Fundamentals
1
The third layer in the OSI model is the data link layer.
False
2
Block ID is the first of six characters that make up the MAC address.
True
3
A computer connected to a network that has a unique address is called a hub.
False
4
A computer on the network that requests resources or services from another computer on a network is referred to as a client.
Unlock Deck
Unlock for access to all 89 flashcards in this deck.
Unlock Deck
k this deck
5
The functions of a network that allow remote users to connect to the network is referred to as communication services.
Unlock Deck
Unlock for access to all 89 flashcards in this deck.
Unlock Deck
k this deck
6
The process of using an algorithm to decode a transmission and reveal encrypted data is reassembly.
Unlock Deck
Unlock for access to all 89 flashcards in this deck.
Unlock Deck
k this deck
7
A feature of some protocols that allows them to service a request without requiring a verified session and without guaranteeing data delivery is referred to as connectionless.
Unlock Deck
Unlock for access to all 89 flashcards in this deck.
Unlock Deck
k this deck
8
The piece of hardware in which a cable terminates is referred to as a connectivity device.
Unlock Deck
Unlock for access to all 89 flashcards in this deck.
Unlock Deck
k this deck
9
The symbolic name that resolves to a group of IP addresses is the MAC address.
Unlock Deck
Unlock for access to all 89 flashcards in this deck.
Unlock Deck
k this deck
10
The device ID is the second set of six characters that make up a network's MAC address. _________________________
Unlock Deck
Unlock for access to all 89 flashcards in this deck.
Unlock Deck
k this deck
11
The symbolic name that resolves to a group of IP addresses is the domain name. _________________________
Unlock Deck
Unlock for access to all 89 flashcards in this deck.
Unlock Deck
k this deck
12
The use of an algorithm to scramble data so that it can only be read by reversing the formula is known as decryption. _________________________
Unlock Deck
Unlock for access to all 89 flashcards in this deck.
Unlock Deck
k this deck
13
A specialized server that enables clients to share applications and data across the network is known as a(n) file server. _________________________
Unlock Deck
Unlock for access to all 89 flashcards in this deck.
Unlock Deck
k this deck
14
A specialized device that selectively filters or blocks traffic between networks is called a(n) router. _________________________
Unlock Deck
Unlock for access to all 89 flashcards in this deck.
Unlock Deck
k this deck
15
A package for data that includes not only the raw data, but also the sender's and receiver's network addresses and control information is referred to as a(n) hub. _________________________
Unlock Deck
Unlock for access to all 89 flashcards in this deck.
Unlock Deck
k this deck
16
Frame check sequence refers to the field in a frame that is responsible for ensuring that data carried by the frame arrives in tact. _________________________
Unlock Deck
Unlock for access to all 89 flashcards in this deck.
Unlock Deck
k this deck
17
In TCP/IP addressing, a(n) fully qualified host name is the combination of a host and domain name that together uniquely identify a device. _________________________
Unlock Deck
Unlock for access to all 89 flashcards in this deck.
Unlock Deck
k this deck
18
A computer connected to a network that has a unique address is known as a(n) hub. _________________________
Unlock Deck
Unlock for access to all 89 flashcards in this deck.
Unlock Deck
k this deck
19
A set of instructions that allows a program to interact with the operating system is referred to as:

A) Broadcast
B) Application program interface
C) Authentication
D) Flow of control
Unlock Deck
Unlock for access to all 89 flashcards in this deck.
Unlock Deck
k this deck
20
The process of verifying that a client's logon ID and password are valid and then allowing the client to log on to the network and access defined resources is referred to as:

A) Broadcasting
B) Authentication
C) Encryption
D) Hosting
Unlock Deck
Unlock for access to all 89 flashcards in this deck.
Unlock Deck
k this deck
21
Which of the following is also known as vendor ID?

A) Device ID
B) Subnet
C) Token
D) Block ID
Unlock Deck
Unlock for access to all 89 flashcards in this deck.
Unlock Deck
k this deck
22
Which of the following refers to the transmission to all nodes on a network?

A) Broadcast
B) Peering
C) Sequencing
D) Encryption
Unlock Deck
Unlock for access to all 89 flashcards in this deck.
Unlock Deck
k this deck
23
A computer on the network that requests resources or services from another computer on the network is known as:

A) Host
B) Client
C) Router
D) Gateway
Unlock Deck
Unlock for access to all 89 flashcards in this deck.
Unlock Deck
k this deck
24
A network in which clients use a central server to share data, data storage space, programs, and other devices is known as:

A) Client software
B) Internet
C) Internetwork
D) Client-server network
Unlock Deck
Unlock for access to all 89 flashcards in this deck.
Unlock Deck
k this deck
25
Which of the following is a feature of some protocols that allows them to service a request without requiring a verified session and without guaranteeing data delivery?

A) Connectionless
B) Internetwork
C) Connection-oriented
D) Segmentation
Unlock Deck
Unlock for access to all 89 flashcards in this deck.
Unlock Deck
k this deck
26
Which of the following is a device that connects and exchanges data between two separate networks or separate parts of a single network?

A) Connector
B) Connectivity device
C) Hub
D) Network interface card
Unlock Deck
Unlock for access to all 89 flashcards in this deck.
Unlock Deck
k this deck
27
Which of the following is the second layer of the OSI model?

A) Presentation layer
B) Application layer
C) Session layer
D) Data link layer
Unlock Deck
Unlock for access to all 89 flashcards in this deck.
Unlock Deck
k this deck
28
The process of using an algorithm to decode a transmission and reveal encrypted data is known as:

A) Decryption
B) Segmentation
C) Authentication
D) Peering
Unlock Deck
Unlock for access to all 89 flashcards in this deck.
Unlock Deck
k this deck
29
The second of six characters that make up a network device's MAC address is known as:

A) Block ID
B) NIC ID
C) Device ID
D) None of the above
Unlock Deck
Unlock for access to all 89 flashcards in this deck.
Unlock Deck
k this deck
30
Which of the following is the symbolic name that make up a network device's MAC address?

A) Host
B) Fully qualified host name
C) Frame
D) Domain name
Unlock Deck
Unlock for access to all 89 flashcards in this deck.
Unlock Deck
k this deck
31
An application layer protocol in the TCP/IP suite that manages the dynamic distribution of IP address on a network is known as:

A) FTP
B) DHCP
C) HTTP
D) FCS
Unlock Deck
Unlock for access to all 89 flashcards in this deck.
Unlock Deck
k this deck
32
Which of the following uses an algorithm to scramble data so that it can only be read by reversing the formula?

A) Encryption
B) Segmentation
C) Sequencing
D) None of the above
Unlock Deck
Unlock for access to all 89 flashcards in this deck.
Unlock Deck
k this deck
33
A specialized device that selectively filters or blocks traffic between networks is called:

A) Flow control
B) Router
C) Gateway
D) Firewall
Unlock Deck
Unlock for access to all 89 flashcards in this deck.
Unlock Deck
k this deck
34
Which of the following is a method of gauging the appropriate rate of data transmission based on how fast the recipient can accept data?

A) Frame
B) Flow of control
C) API
D) Internet
Unlock Deck
Unlock for access to all 89 flashcards in this deck.
Unlock Deck
k this deck
35
A package for data that includes not only the raw data, but also the sender's and receiver's network address and control information is known as:

A) Flow of control
B) Frame
C) Frame check sequence
D) Packet
Unlock Deck
Unlock for access to all 89 flashcards in this deck.
Unlock Deck
k this deck
36
The field in a frame responsible for ensuring that data carried by the frame arrives in tact is called:

A) Fully qualified host name
B) Flow of control
C) Frame check sequence
D) Device ID
Unlock Deck
Unlock for access to all 89 flashcards in this deck.
Unlock Deck
k this deck
37
In TCP/IP addressing, the combination of a host and domain name that together uniquely identify a device is known as:

A) IP address
B) Logical address
C) Fully qualified host name
D) MAC address
Unlock Deck
Unlock for access to all 89 flashcards in this deck.
Unlock Deck
k this deck
38
Which of the following represents a computer connected to a network that has a unique address?

A) Host
B) Hub
C) Router
D) Gateway
Unlock Deck
Unlock for access to all 89 flashcards in this deck.
Unlock Deck
k this deck
39
A connectivity device that operates at the Physical layer of the OSI Model and repeats digital signals over a network segment is called:

A) Host
B) Hub
C) Frame
D) Router
Unlock Deck
Unlock for access to all 89 flashcards in this deck.
Unlock Deck
k this deck
40
Which of the following belongs to the Internet layer of the TCP/IP model and provides information about how and where data should be delivered?

A) HTTP
B) Internet protocol
C) Transmission control protocol
D) DHCP
Unlock Deck
Unlock for access to all 89 flashcards in this deck.
Unlock Deck
k this deck
41
Which of the following refers to the traversal of more than one LAN segment and more than one type of network through a router?

A) ISP
B) IPX
C) Internetwork
D) IP datagram
Unlock Deck
Unlock for access to all 89 flashcards in this deck.
Unlock Deck
k this deck
42
Which of the following represents a logical address that is used in TCP/IP networking?

A) Logical address
B) MAC address
C) Loopback address
D) IP address
Unlock Deck
Unlock for access to all 89 flashcards in this deck.
Unlock Deck
k this deck
43
Which of the following is the IP portion of a TCP/IP frame that holds information necessary for routers to transfer data between subnets?

A) IP address
B) IP datagram
C) Logical address
D) MAC address
Unlock Deck
Unlock for access to all 89 flashcards in this deck.
Unlock Deck
k this deck
44
An IP address reserved for communicating from a node to itself is called:

A) Loopback address
B) Logical
C) IP address
D) MAC address
Unlock Deck
Unlock for access to all 89 flashcards in this deck.
Unlock Deck
k this deck
45
A number that uniquely identifies a network node is referred to as:

A) MAC address
B) Loopback address
C) IP address
D) Logical address
Unlock Deck
Unlock for access to all 89 flashcards in this deck.
Unlock Deck
k this deck
46
A specialized server that manages mail services is called:

A) Mail services
B) File server
C) Mail server
D) Print server
Unlock Deck
Unlock for access to all 89 flashcards in this deck.
Unlock Deck
k this deck
47
Which of the following is the network services that manage the storage and transfer of e-mail between users on a network?

A) Internet services
B) Mail services
C) Management services
D) Print services
Unlock Deck
Unlock for access to all 89 flashcards in this deck.
Unlock Deck
k this deck
48
Which of the following is the device that enables a workstation to connect to the network and communicate with other computers?

A) MAC
B) MAE
C) NAP
D) NIC
Unlock Deck
Unlock for access to all 89 flashcards in this deck.
Unlock Deck
k this deck
49
The process of reconstructing data units that have been segmented is known as:

A) Redundancy
B) Reassembly
C) Peering
D) Segmentation
Unlock Deck
Unlock for access to all 89 flashcards in this deck.
Unlock Deck
k this deck
50
The practice of using more than one component to guard against outages is known as:

A) Reassembly
B) Peering
C) Segmentation
D) Redundancy
Unlock Deck
Unlock for access to all 89 flashcards in this deck.
Unlock Deck
k this deck
51
Does the term client refer to a computer on the network that requests resources from another computer on a network?
Unlock Deck
Unlock for access to all 89 flashcards in this deck.
Unlock Deck
k this deck
52
Does the term authentication refer to a piece of hardware in which a cable terminates?
Unlock Deck
Unlock for access to all 89 flashcards in this deck.
Unlock Deck
k this deck
53
Does the term connector describes the piece of hardware in which a cable terminates?
Unlock Deck
Unlock for access to all 89 flashcards in this deck.
Unlock Deck
k this deck
54
Does the term decryption refer to the process of using an algorithm to decode a transmission?
Unlock Deck
Unlock for access to all 89 flashcards in this deck.
Unlock Deck
k this deck
55
Does the term hub refer to a computer connected to a network that has a unique address?
Unlock Deck
Unlock for access to all 89 flashcards in this deck.
Unlock Deck
k this deck
56
Does a file server allow clients to share data files, applications, and storage areas?
Unlock Deck
Unlock for access to all 89 flashcards in this deck.
Unlock Deck
k this deck
57
Does the term loopback address refer to the addresses that reside at the Network level of the OSI model?
Unlock Deck
Unlock for access to all 89 flashcards in this deck.
Unlock Deck
k this deck
58
Does a frame contain the sender's and receiver's network addresses and control and control information?
Unlock Deck
Unlock for access to all 89 flashcards in this deck.
Unlock Deck
k this deck
59
Does the term host refer to a connectivity device that operates at the Physical layer of the OSI Model?
Unlock Deck
Unlock for access to all 89 flashcards in this deck.
Unlock Deck
k this deck
60
Does the term logical address refer to a number that uniquely identifies a network node?
Unlock Deck
Unlock for access to all 89 flashcards in this deck.
Unlock Deck
k this deck
61
The seventh layer of the OSI model is the ____________________.
Unlock Deck
Unlock for access to all 89 flashcards in this deck.
Unlock Deck
k this deck
62
A computer on the network that requests resources or services from another computer on a network is referred to as a(n) ____________________.
Unlock Deck
Unlock for access to all 89 flashcards in this deck.
Unlock Deck
k this deck
63
A network in which clients use a central server to share data, data storage, and other devices is known as a(n) ____________________.
Unlock Deck
Unlock for access to all 89 flashcards in this deck.
Unlock Deck
k this deck
64
The piece of hardware in which a cable terminates is called a(n) ____________________.
Unlock Deck
Unlock for access to all 89 flashcards in this deck.
Unlock Deck
k this deck
65
____________________ is the second set of six characters that make up a network device's MAC address.
Unlock Deck
Unlock for access to all 89 flashcards in this deck.
Unlock Deck
k this deck
66
The symbolic name that resolves to a group of IP addresses is referred to as a(n) ____________________.
Unlock Deck
Unlock for access to all 89 flashcards in this deck.
Unlock Deck
k this deck
67
The use of an algorithm to scramble data so that it can only be read by reversing the formula is known as ____________________.
Unlock Deck
Unlock for access to all 89 flashcards in this deck.
Unlock Deck
k this deck
68
A specialized server that enables clients to share applications and data across the network is called a(n) ____________________.
Unlock Deck
Unlock for access to all 89 flashcards in this deck.
Unlock Deck
k this deck
69
A(n) ____________________ not only includes raw data, but also the sender's and receiver's network addresses and control information.
Unlock Deck
Unlock for access to all 89 flashcards in this deck.
Unlock Deck
k this deck
70
A(n) ____________________ is a connectivity device that operates at the Physical layer of the OSI Model and repeats digital signals over a network segment.
Unlock Deck
Unlock for access to all 89 flashcards in this deck.
Unlock Deck
k this deck
71
Match each statement below with the correct item

-The use of an algorithm to scramble data so that it can only be read by reversing the formula.

A)Domain name
B)Loopback address
C)Client
D)Encryption
E)File server
F)Hub
G)Internetwork
H)IP address
I)Decryption
J)Firewall
Unlock Deck
Unlock for access to all 89 flashcards in this deck.
Unlock Deck
k this deck
72
Match each statement below with the correct item

-A specialized server that enables clients to share applications and data across the network.

A)Domain name
B)Loopback address
C)Client
D)Encryption
E)File server
F)Hub
G)Internetwork
H)IP address
I)Decryption
J)Firewall
Unlock Deck
Unlock for access to all 89 flashcards in this deck.
Unlock Deck
k this deck
73
Match each statement below with the correct item

-A specialized device that selectively filters or blocks traffic between networks.

A)Domain name
B)Loopback address
C)Client
D)Encryption
E)File server
F)Hub
G)Internetwork
H)IP address
I)Decryption
J)Firewall
Unlock Deck
Unlock for access to all 89 flashcards in this deck.
Unlock Deck
k this deck
74
Match each statement below with the correct item

-A connectivity device that operates at the Physical layer of the OSI Model and repeats digital signals over a network.

A)Domain name
B)Loopback address
C)Client
D)Encryption
E)File server
F)Hub
G)Internetwork
H)IP address
I)Decryption
J)Firewall
Unlock Deck
Unlock for access to all 89 flashcards in this deck.
Unlock Deck
k this deck
75
Match each statement below with the correct item

-The second set of six characters that make up a network device's MAC address.

A)Domain name
B)Loopback address
C)Client
D)Encryption
E)File server
F)Hub
G)Internetwork
H)IP address
I)Decryption
J)Firewall
Unlock Deck
Unlock for access to all 89 flashcards in this deck.
Unlock Deck
k this deck
76
Match each statement below with the correct item

-To traverse more than one LAN segment and more than one type of network through a router.

A)Domain name
B)Loopback address
C)Client
D)Encryption
E)File server
F)Hub
G)Internetwork
H)IP address
I)Decryption
J)Firewall
Unlock Deck
Unlock for access to all 89 flashcards in this deck.
Unlock Deck
k this deck
77
Match each statement below with the correct item

-A logical address used in TCP/IP networking.

A)Domain name
B)Loopback address
C)Client
D)Encryption
E)File server
F)Hub
G)Internetwork
H)IP address
I)Decryption
J)Firewall
Unlock Deck
Unlock for access to all 89 flashcards in this deck.
Unlock Deck
k this deck
78
Match each statement below with the correct item

-An IP address reserved for communicating from a node to itself.

A)Domain name
B)Loopback address
C)Client
D)Encryption
E)File server
F)Hub
G)Internetwork
H)IP address
I)Decryption
J)Firewall
Unlock Deck
Unlock for access to all 89 flashcards in this deck.
Unlock Deck
k this deck
79
Match each statement below with the correct item

-A computer on the network.

A)Domain name
B)Loopback address
C)Client
D)Encryption
E)File server
F)Hub
G)Internetwork
H)IP address
I)Decryption
J)Firewall
Unlock Deck
Unlock for access to all 89 flashcards in this deck.
Unlock Deck
k this deck
80
Match each statement below with the correct item

-The process of using an algorithm to decode a transmission and reveal encrypted data.

A)Domain name
B)Loopback address
C)Client
D)Encryption
E)File server
F)Hub
G)Internetwork
H)IP address
I)Decryption
J)Firewall
Unlock Deck
Unlock for access to all 89 flashcards in this deck.
Unlock Deck
k this deck
locked card icon
Unlock Deck
Unlock for access to all 89 flashcards in this deck.