Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
15 Cards in this Set
- Front
- Back
A _________________________ is a rule that governs how networks communicate.
1. protocol 2. port 3. namespace 4. subnet mask |
1. protocol
|
|
_________________________ is a Network layer protocol that obtains the MAC address of a host, or node, then creates a database that maps the MAC address to the host's IP address.
1. File Transfer Protocol 2. Address Resolution Protocol 3. Internet Control Message Protocol 4. Network Time Protocol |
2. Address Resolution Protocol
|
|
_________________ contain databases of associated names and IP addresses and provide this information to resolvers on request.
1. Subnets 2. Hosts 3. IP datagrams 4. Name servers |
4. Name servers
|
|
The ________________ provides a means of resolving NetBIOS names to IP addresses.
1. Windows Internet Naming Service 2. Internet Packet Exchange Protocol 3. Dynamic Host Configuration Protocol 4. Network News Transport Protocol |
1. Windows Internet Naming Service
|
|
________________ is the process of assigning one network component to work with another.
1. Multicasting 2. IP addressing 3. Binding 4. Subnetting |
3. Binding
|
|
True or false? All protocols are routable.
1. True 2. False |
2. False
|
|
True or false? TCP ensures reliable delivery through sequencing and checksums.
1. True 2. False |
1. True
|
|
True or false? TCP is a connectionless transport device.
1. True 2. False |
2. False
|
|
True or false? Every process on a machine is assigned a port number.
1. True 2. False |
1. True
|
|
True or false? IPv6 addresses are composed of eight 16-bit fields and total 32 bits.
1. True 2. False |
2. False
|
|
_____________________allows one device to send data to a specific group of devices.
|
Multicasting
|
|
A(n) ___________________ is a special 32-bit number that, when combined with a device's IP address, informs the rest of the network about the segment or network to which it is attached.
|
subnet mask
|
|
________________ are any hosts on the Internet that need to look up domain name information.
|
Resolvers
|
|
___________________ is a terminal emulation protocol used to log on to remote hosts using the TCP/IP protocol suite.
|
Telnet
|
|
The ___________________ is a simple Application layer protocol used to synchronize the clocks of computers on a network.
|
Network Time Protocol, NTP
|