Matching
Match each item with a statement below.
Premises:
assigns an IP address to a computer when it first attempts to initiate a connection to the network
designed to make it easier for users to connect their computers to a wireless network when a hard-to-remember SSID and security key are used
identifies a computer and the network to which it belongs, such as www.cengage.com
a technique designed to conserve the number of public IP addresses needed by a network
Used by a computer or other device to determine if an IP address of another computer is on its network or another network
A group of computers on a peer-to-peer network that are sharing resources
commonly used by Linux to pass sign-in information to a remote computer and control that computer over a network
protects data by encrypting it from the time it leaves a remote computer until it reaches a server on a corporate network, using a technique called tunneling.
a command that can be used to display the TCP/IP configuration
a protocol used by various client applications when the application needs to query a database
Responses:
Secure Shell (SSH)
Lightweight Directory Access Protocol (LDAP)
DHCP server
Network Address Translation (NAT)
subnet mask
ipconfig
virtual private network
Wi-Fi Protected Setup (WPS)
Fully Qualified Domain Name (FQDN)
workgroup
Correct Answer:
Premises:
Responses:
assigns an IP address to a computer when it first attempts to initiate a connection to the network
designed to make it easier for users to connect their computers to a wireless network when a hard-to-remember SSID and security key are used
identifies a computer and the network to which it belongs, such as www.cengage.com
a technique designed to conserve the number of public IP addresses needed by a network
Used by a computer or other device to determine if an IP address of another computer is on its network or another network
A group of computers on a peer-to-peer network that are sharing resources
commonly used by Linux to pass sign-in information to a remote computer and control that computer over a network
protects data by encrypting it from the time it leaves a remote computer until it reaches a server on a corporate network, using a technique called tunneling.
a command that can be used to display the TCP/IP configuration
a protocol used by various client applications when the application needs to query a database
Premises:
assigns an IP address to a computer when it first attempts to initiate a connection to the network
designed to make it easier for users to connect their computers to a wireless network when a hard-to-remember SSID and security key are used
identifies a computer and the network to which it belongs, such as www.cengage.com
a technique designed to conserve the number of public IP addresses needed by a network
Used by a computer or other device to determine if an IP address of another computer is on its network or another network
A group of computers on a peer-to-peer network that are sharing resources
commonly used by Linux to pass sign-in information to a remote computer and control that computer over a network
protects data by encrypting it from the time it leaves a remote computer until it reaches a server on a corporate network, using a technique called tunneling.
a command that can be used to display the TCP/IP configuration
a protocol used by various client applications when the application needs to query a database
Responses:
Related Questions
Q3: If a device does not receive an
Q5: The solution for securing private data traveling
Q11: Describe TCP and how it provides reliability
Q12: What type of device can be used
Q14: What TCP port is utilized by an
Q20: What are the two mail protocols used
Q28: Describe the contents and purpose of a
Q30: Describe how a computer with a Private
Q44: What type of IP address is configured
Q49: Originally developed by IBM, what protocol is