IP Address |
What is the name of a 32-bit or 128-bit number that is used to identify a device? |
Public |
How are IP addresses available to the Internet classified. |
dynamic |
Which type of IP address is configured by a server when a device first initiates a connection to the network. |
subnet mask |
Which is used to identify the network portion and the host portion of an IP address. |
ipconfig |
Which command can be used to display TCP/IP configuration information and refresh the IP address. |
unicast address |
By using this type of address, packets are delivered to a single node on a network. |
TCP |
Which protocol make a connection, checks whether the data is received and resets it if its not? |
virtual private network |
The solution for securing private data traveling over a public network such as the internet is a? |
Server Message Block (SMB) |
Which TCP/IP protocol is used by Windows to share file and printers on a network? |
Windows Network Diagnostics |
Which utility can be used to automatically diagnose a problem with a network connection? |
Alternate Configuration |
If the computer you are using is a laptop that moves from one network to another, you can click this tab and configure a static IP address setting for a second network. |
SSID |
What is used to identify a wireless access point? |
firewall |
What type of device can be used to block unwanted traffic initiated from the internet and can also restrict Internet access from an internal network? |
static IP address |
What type of IP address should be configured on a wireless access point so that it can always be located by the devices that it serves? |
port filtering |
What is it called when a router is configured to open or close certain ports so they can or cannot be used? |
5 GHz |
Which wireless network radio frequency yields faster speeds but offers shorter range. |
packets |
Before data is transmitted on a network, it is broken into what? |
hardware |
Communication between two computers happens on what three levels (layers) and these levels include the application, operating system and what? |
Host Name |
What is another name for the name of a computer and can be used in place of a IP address? |
host |
The first part of an IPv4 address identifies the network, what does the last part identify? |
port forwarding |
Using this, when a firewall receives a request for communication from the Internet to a specific computer and port, the request will be allowed and forwarded to that computer on the network. |
port triggering |
When a firewall opens a port because a computer behind the firewall initiates communication on another port. |
ipconfig |
A command that can be used to display the TCP/IP configuration. |
Lightweight Directory Access Protocol (LDAP) |
A protocol used various client applications when the application needs to query a database. |
DHCP server |
Assigns an IP address to a computer when it first attempts to initiate a connection to the network. |
workgroup |
A group of computers on a peer-to-peer network that are sharing resources. |
Secure Shell (SSH) |
Protocol used to pass login information to a remote computer and control that computer over a network. |
Wi-Fi Protected Setup (WPS) |
Designed to make it easier for users to connect their computers to a wireless network when a hard-to-remember SSID and security key are used. |
subnet mask |
Used by a computer or other device to determine if an IP address of another computer is on its network or another network. |
virtual private network |
A security technique that uses encrypted data packets between a private network and a computer on the Internet. |
Network Address Translation |
A protocol used to convert private IP address on a LAN to a public IP address before a data packet is sent over the Internet. |
Hardware Chapter 15
Share This
Unfinished tasks keep piling up?
Let us complete them for you. Quickly and professionally.
Check Price