Hardware Chapter 15
What is the name of a 32-bit or 128-bit number that is used to identify a device?
How are IP addresses available to the Internet classified.
Which type of IP address is configured by a server when a device first initiates a connection to the network.
Which is used to identify the network portion and the host portion of an IP address.
Which command can be used to display TCP/IP configuration information and refresh the IP address.
By using this type of address, packets are delivered to a single node on a network.
Which protocol make a connection, checks whether the data is received and resets it if its not?
virtual private network
The solution for securing private data traveling over a public network such as the internet is a?
Server Message Block (SMB)
Which TCP/IP protocol is used by Windows to share file and printers on a network?
Windows Network Diagnostics
Which utility can be used to automatically diagnose a problem with a network connection?
If the computer you are using is a laptop that moves from one network to another, you can click this tab and configure a static IP address setting for a second network.
What is used to identify a wireless access point?
What type of device can be used to block unwanted traffic initiated from the internet and can also restrict Internet access from an internal network?
static IP address
What type of IP address should be configured on a wireless access point so that it can always be located by the devices that it serves?
What is it called when a router is configured to open or close certain ports so they can or cannot be used?
Which wireless network radio frequency yields faster speeds but offers shorter range.
Before data is transmitted on a network, it is broken into what?
Communication between two computers happens on what three levels (layers) and these levels include the application, operating system and what?
What is another name for the name of a computer and can be used in place of a IP address?
The first part of an IPv4 address identifies the network, what does the last part identify?
Using this, when a firewall receives a request for communication from the Internet to a specific computer and port, the request will be allowed and forwarded to that computer on the network.
When a firewall opens a port because a computer behind the firewall initiates communication on another port.
A command that can be used to display the TCP/IP configuration.
Lightweight Directory Access Protocol (LDAP)
A protocol used various client applications when the application needs to query a database.
Assigns an IP address to a computer when it first attempts to initiate a connection to the network.
A group of computers on a peer-to-peer network that are sharing resources.
Secure Shell (SSH)
Protocol used to pass login information to a remote computer and control that computer over a network.
Wi-Fi Protected Setup (WPS)
Designed to make it easier for users to connect their computers to a wireless network when a hard-to-remember SSID and security key are used.
Used by a computer or other device to determine if an IP address of another computer is on its network or another network.
virtual private network
A security technique that uses encrypted data packets between a private network and a computer on the Internet.
Network Address Translation
A protocol used to convert private IP address on a LAN to a public IP address before a data packet is sent over the Internet.