Chapter 14 Flashcards

(18 cards)

1
Q

is often used by employees when they work away from the corporate network to connect to that network by way of the internet

A

VPN

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is the most popular cell phone technology in the US?

A

CDMA

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Identifies a computer and the network to which it belongs

A

Fully Qualified Domain Name

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Internet Protocol Version (IPv4) uses a __ bit address to identify a network connection.

A

32

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

A domain ____ identifies a network. Examples of this are the names that appear before the period in Microsoft.com, etc. The letters after the period are called the __ domain and tell you something about the domain.

A
  1. name

2. top-level

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

When using static IP addressing, software does NOT automatically configure the network connection on each device.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

When a firewall opens a port because of a computer behind the firewall initiates communication on another port

A

Port Triggering

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

A command that can be used to display the TCP/IP configuration

A

ipconfig

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

A protocol used by various client applications when the application needs to query a database

A

Lightweight Directory Access Protocol (LDAP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Assigns an IP address to a computer when it first attempts to initiate a connection to the network

A

DHCP server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

A group of computers on a peer-to-peer network that are sharing resources

A

workgroup

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Protocol used to pass login information to a remote computer and control that computer over a network

A

Secure Shell (SSH)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Designed to make it easier for users to connect their computers to a wireless network when a hard-to-remember SSID and security key are used

A

Wi-Fi Protected Setup (WPS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Used by a computer or other device to determine if an IP address of another computer is on its network or another network

A

subnet mask

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

A security technique that uses encrypted data packets between a private network and a computer on the internet

A

Virtual Private Network (VPN)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

A protocol used to convert private IP addresses on a LAN to a public IP address before a data packet is sent over the internet.

A

Network Address Translation (NAT)

17
Q

Each client and server application installed on a computer listens at a predetermined address that uniquely identifies the application on the computer. This address is called a __ number

18
Q

A _ (also called a computer name) is the name of a computer and can be used in place of its IP address.