1,155
21
Essay, 3 pages (700 words)

Hard/software – chap 14

The Telnet protocol encrypts transmitted data, which therefore cannot be read by others on the network. FalseWhen using static IP addressing, software automatically configures the network connection on each device. FalseA problem with virtual networks is that data transmitting through them cannot be encrypted and therefore is not secure. FalseThe User Datagram Protocol (UDP) guarantees delivery of data to its destination. FalseThe current release of SMB is CIFS, also called SMB2. TrueWhat is the name of the 32-bit or 128-bit number that is used to identify a device on a network? IP addressHow are IP addresses available to the Internet classified? publicWhat type of IP address is configured by a server when a device first initiates a connection to the network? dynamicHow is the network portion and the host portion of an IP address identified? subnet maskWhat command can be used to display IP addresses assigned to all network connections on a system? ipconfigPackets are delivered to a single node on a network when using what type of IPv6 address? unicast addressWhat protocol makes a connection, checks whether the data is received, and resends it if it is not? TCPThe solution for securing private data traveling over a public network, such as the Internet, is the use of what type of network? virtual private networkOriginally developed by IBM, what protocol is used by Windows to share files and printers on a network? Server Message Block (SMB)If the computer you are using is a laptop that moves from one network to another, what tab can be used to configure a secondary configuration, such as a static IP if a DHCP server cannot be reached? Alternate ConfigurationWhat functions as the name of a wireless network? SSIDWhat type of device can be used to block unwanted traffic initiated from the Internet and can also restrict Internet access from an internal network? firewallWhat wireless networking radio frequency yields faster speeds but offers shorter range? 5 GHzWhat command can be used to flush the local DNS cache on a Windows computer? ipconfig /flushdnsWhat TCP port is utilized by an SSH server listening for connections? 22The Remote Desktop and Remote Assistance applications utilize what port for remote access? 3389What cell phone technology is the most popular in the United States? CDMAWhat device handles access to another network for a client computer if it does not have a better option? default gatewayIf a device does not receive an IP address from a DHCP server, the device may resort to what kind of IP address? APIPAThe ability to send and receive transmissions at the same time on an Ethernet cable is referred to by what term? full duplexUnicast addresses include what types of addresses? (Choose all that apply).

link-local address

global address

What functions might be provided by a SOHO router besides the normal duty of routing packets between networks? (Choose all that apply).

wireless access point

firewall

What two protocols are used to deliver mail messages?

IMAP4

POP3

What two terms are used to describe the User Datagram Protocol (UDP)?

best effort protocol

connectionless protocol

What two protocols are used for remote access to a server, using unencrypted and encrypted transmissions respectively?

Telnet

SSH

assigns an IP address to a computer when it first attempts to initiate a connection to the networkDHCP serverA group of computers on a peer-to-peer network that are sharing resourcesworkgroupcommonly used by Linux to pass sign-in information to a remote computer and control that computer over a networkSecure Shell (SSH)designed to make it easier for users to connect their computers to a wireless network when a hard-to-remember SSID and security key are usedWi-Fi Protected Setup (WPS)Used by a computer or other device to determine if an IP address of another computer is on its network or another networksubnet maskidentifies a computer and the network to which it belongs, such as www. cengage. comFully Qualified Domain Name (FQDN)a protocol used by various client applications when the application needs to query a databaseLightweight Directory Access Protocol (LDAP)a command that can be used to display the TCP/IP configurationipconfigprotects data by encrypting it from the time it leaves a remote computer until it reaches a server on a corporate network, using a technique called tunneling. virtual private networka technique designed to conserve the number of public IP addresses needed by a networkNetwork Address Translation (NAT) ONHARD/SOFTWARE – CHAP 14 SPECIFICALLY FOR YOUFOR ONLY$13. 90/PAGEOrder Now

Thank's for Your Vote!
Hard/software – chap 14. Page 1
Hard/software – chap 14. Page 2
Hard/software – chap 14. Page 3
Hard/software – chap 14. Page 4
Hard/software – chap 14. Page 5

This work, titled "Hard/software – chap 14" was written and willingly shared by a fellow student. This sample can be utilized as a research and reference resource to aid in the writing of your own work. Any use of the work that does not include an appropriate citation is banned.

If you are the owner of this work and don’t want it to be published on AssignBuster, request its removal.

Request Removal
Cite this Essay

References

AssignBuster. (2022) 'Hard/software – chap 14'. 22 August.

Reference

AssignBuster. (2022, August 22). Hard/software – chap 14. Retrieved from https://assignbuster.com/hardsoftware-chap-14/

References

AssignBuster. 2022. "Hard/software – chap 14." August 22, 2022. https://assignbuster.com/hardsoftware-chap-14/.

1. AssignBuster. "Hard/software – chap 14." August 22, 2022. https://assignbuster.com/hardsoftware-chap-14/.


Bibliography


AssignBuster. "Hard/software – chap 14." August 22, 2022. https://assignbuster.com/hardsoftware-chap-14/.

Work Cited

"Hard/software – chap 14." AssignBuster, 22 Aug. 2022, assignbuster.com/hardsoftware-chap-14/.

Get in Touch

Please, let us know if you have any ideas on improving Hard/software – chap 14, or our service. We will be happy to hear what you think: [email protected]