Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
35 Cards in this Set
- Front
- Back
The Telnet protocol encrypts transmitted data, which therefore cannot be read by others on the network. |
False |
|
When using static IP addressing, software automatically configures the network connection on each device. |
False |
|
Wireless networks are either public, unsecured hotspots or private, secured hotspots. |
True |
|
When connecting to a private and secured wireless access point, you must provide the information that proves you have the right to use the network. |
True |
|
A problem with virtual networks is that data transmitting through them cannot be encrypted and therefore is not secure. |
False |
|
What is the name of a 32-bit or 128-bit number that is used to identify a device? |
IP address |
|
How are IP addresses available to the Internet classified? |
public |
|
Which type of IP address is configured by a server when a device first initiates a connection to the network? |
dynamic |
|
Which is used to identify the network portion and the host portion of an IP address? |
subnet mask |
|
Which command can be used to display TCP/IP configuration information and refresh the IP address? |
ipconfig |
|
Using a ______________, packets are delivered to a single node on a network. |
unicast address |
|
Which protocol makes a connection, checks whether the data is received, and resends it if it is not? |
TCP |
|
The solution for securing private data traveling over a public network, such as the Internet, is a _________. |
virtual private network |
|
Which TCP/IP protocol is used by Windows to share files and printers on a network? |
Server Message Block (SMB) |
|
Which utility can be used to automatically diagnose a problem with a network connection? |
Windows Network Diagnostics |
|
If the computer you are using is a laptop that moves from one network to another, you can click the _____ tab and configure static IP address settings for a second network. |
Alternate Configuration |
|
What is used to identify a wireless access point? |
SSID |
|
What type of device can be used to block unwanted traffic initiated from the Internet and can also restrict Internet access from an internal network? |
firewall |
|
What type of IP address should be configured on a wireless access point so that it can always be located by the devices that it serves? |
static IP address |
|
What is it called when a router is configured to open or close certain ports so they can or cannot be used. |
port filtering |
|
Which wireless networking radio frequency yields faster speeds but offers shorter range? |
5 GHz |
|
Which of the following are types of unicast IPv6 addresses? (Choose all that apply). |
global address, link-local address |
|
Which of the following are levels of network communication discussed in this chapter? (Choose all that apply). |
Hardware, Application, Operating System |
|
Which of the following are functions that a SOHO router might perform besides the normal duty of routing packets between networks? (Choose all that apply). |
firewall, wireless access point |
|
Which of the following are some changes that might need to be made to a SOHO router’s initial configuration? (Choose all that apply). |
Change the router password, Change the SSID |
|
A group of computers on a peer-to-peer network that are sharing resources |
workgroup |
|
Designed to make it easier for users to connect their computers to a wireless network when a hard-to-remember SSID and security key are used |
Wi-Fi Protected Setup (WPS) |
|
Assigns an IP address to a computer when it first attempts to initiate a connection to the network |
DHCP server |
|
A command that can be used to display the TCP/IP configuration |
ipconfig |
|
A protocol used by various client applications when the application needs to query a database |
Lightweight Directory Access Protocol (LDAP) |
|
Used by a computer or other device to determine if an IP address of another computer is on its network or another network |
subnet mask |
|
A protocol used to convert private IP addresses on a LAN to a public IP address before a data packet is sent over the Internet |
Network Address Translation (NAT) |
|
A security technique that uses encrypted data packets between a private network and a computer on the Internet |
virtual private network |
|
Protocol used to pass login information to a remote computer and control that computer over a network |
Secure Shell (SSH) |
|
When a firewall opens a port because a computer behind the firewall initiates communication on another port |
port triggering |