Filters
Question type

Study Flashcards

The ____ allows private companies to handle the registration of domain names.


A) Shared Registration System
B) Alternative Root System
C) IP Registration System
D) Accredited Registration System

Correct Answer

verifed

verified

  ____ involves using devices, such as the one shown in the accompanying figure, to measure biological data to identify a user. A)  Biometrics B)  Biographies C)  Biosystems D)  Bioexercises ____ involves using devices, such as the one shown in the accompanying figure, to measure biological data to identify a user.


A) Biometrics
B) Biographies
C) Biosystems
D) Bioexercises

Correct Answer

verifed

verified

A ____ topology connects each node to a central device, such as a hub or switch.


A) bus
B) triangle
C) star
D) ring

Correct Answer

verifed

verified

Critical Thinking Questions Case 6-1 You are the assistant to the manager of the IT department at an auto dealership. The manager asks you to verify some Internet-related information about an auto manufacturer. You decide to use operating system utilities to verify the information. Which operating system utility should you use to find the numeric IP address of the auto manufacturer's website when you know the domain name?


A) tracert
B) ipconfig /all
C) nslookup
D) spoof

Correct Answer

verifed

verified

Each octet in an IPv6 IP address is separated by a ____.


A) colon
B) comma
C) period
D) semicolon

Correct Answer

verifed

verified

A(n) ____ private network uses tunneling to hide encrypted data, IP addresses, and a tunneling protocol inside IP packets routed over the public network using the IP protocol.


A) tunneling
B) virtual
C) packet-filtering
D) IP

Correct Answer

verifed

verified

Critical Thinking Questions Case 6-1 You are the assistant to the manager of the IT department at an auto dealership. The manager asks you to verify some Internet-related information about an auto manufacturer. You decide to use operating system utilities to verify the information. Which operating system utility should you use to verify the number of hops it takes for data to go from a computer on your network to the auto manufacturer's network?


A) tracert
B) ipconfig /all
C) nslookup
D) spoof

Correct Answer

verifed

verified

Discuss wireless network security threats, including the following: LAN jacking (war driving), spoofing, and rogue WLANs.

Correct Answer

verifed

verified

Wireless networks require the same secur...

View Answer

   _________________________ cable, as shown in the accompanying figure, contains glass fibers surrounded by a layer of glass cladding and a protective outer jacket. _________________________ cable, as shown in the accompanying figure, contains glass fibers surrounded by a layer of glass cladding and a protective outer jacket.

Correct Answer

verifed

verified

A(n) ____ electronically authenticates an organization's or individual's identity.


A) HTTP server
B) digital certificate
C) encryption server
D) firewall

Correct Answer

verifed

verified

The DNS _________________________ consists of all of the information in the DNS databases, including the top-level domain, country code top-level domain, domain name, and IP address information.

Correct Answer

verifed

verified

How an organization deals with a natural or man-made disaster to ensure the organization's viability is covered by their disaster recovery plan.

Correct Answer

verifed

verified

____ involves security audit personnel trying to hack into a network.


A) Distributed denial of service
B) Private peering
C) Penetration testing
D) Tunneling

Correct Answer

verifed

verified

The tracert utility can test the path to a destination Internet site and see if any problems exist with making a connection at a particular point along the route.

Correct Answer

verifed

verified

Describe the process by which DNS servers resolve a domain name. Include in your response a discussion of the DNS hierarchy. Provide an example of how this works.

Correct Answer

verifed

verified

ICANN (Internet Corporation for Assigned...

View Answer

The _________________________ command is used to display your computer's IP address.

Correct Answer

verifed

verified

Most virus protection software programs perform automatic virus definition updates through downloads over the Internet.

Correct Answer

verifed

verified

The ability of a(n) _________________________ LAN to support shared data storage, provide network maintenance tools, and promote more efficient data backups offers advantages over a peer-to-peer LAN.

Correct Answer

verifed

verified

____ networks allow voice, data, and video to be delivered simultaneously across the same network using a combination of computers and devices, telephones, and television.


A) Imminent
B) Duplicate
C) Converged
D) Hosted

Correct Answer

verifed

verified

Modified Multiple Choice Which of the following are network classifications for the assignment of IP addresses under the original classful routing system?


A) A
B) E
C) F
D) G

Correct Answer

verifed

verified

Showing 41 - 60 of 103

Related Exams

Show Answer