Name: 
 

CMT - Chapter 18



True/False
Indicate whether the statement is true or false.
 

 1. 

In TCP/IP, the protocol that guarantees packet delivery is IP.
 

 2. 

A cable modem uses phone lines for transmission and is bundled with your local phone service.
 

 3. 

With DSL, a telephone filter must be installed on every phone jack in the house that is being used by a telephone, fax machine, or dial-up modem.
 

 4. 

After your router is configured as a DHCP server, you can configure each PC on your network to use dynamic IP addressing.
 

 5. 

A Web browser can serve as an FTP client.
 

Multiple Choice
Identify the choice that best completes the statement or answers the question.
 

 6. 

On the World Wide Web, the client is called a(n) ____.
a.
Web host
c.
cable modem
b.
Web browser
d.
application port
 

 7. 

On the World Wide Web, the server is called a(n) ____.
a.
Web host
c.
cable modem
b.
Web browser
d.
application port
 

 8. 

A(n) ____ number is assigned to each server application when it is started.
a.
IP
c.
URL
b.
Web
d.
port
 

 9. 

A Web server is normally assigned port ____.
a.
20
c.
80
b.
25
d.
143
 

 10. 

An e-mail server receiving mail is normally assigned port ____.
a.
20
c.
80
b.
25
d.
143
 

 11. 

____, which are communication links created between two software programs, are managed by the browser and Web server using HTTP.
a.
Protocols
c.
Ports
b.
Packets
d.
Sessions
 

 12. 

TCP and UDP pass requests to ____, which is responsible for breaking up and reassembling data into packets and routing them to their destination.
a.
IP
c.
FTP
b.
SMTP
d.
ARP
 

 13. 

____ is responsible for communicating problems with transmission.
a.
ARP
c.
RARP
b.
ICMP
d.
Getmac
 

 14. 

The ____ utility displays the NIC’s MAC address.
a.
ARP
c.
Ping
b.
Ipconfig
d.
Getmac
 

 15. 

____ provides system management tools for networks.
a.
SNMP
c.
ARP
b.
Telnet
d.
FTP
 

 16. 

Dial-up networking works by using ____ Protocol to send packets of data over phone lines.
a.
Simple Mail Transfer
c.
File Transfer
b.
Point-to-Point
d.
Integrated Services
 

 17. 

Port ____ is used to open or close certain ports so they can or cannot be used.
a.
caching
c.
forwarding
b.
filtering
d.
policing
 

 18. 

The strongest tunneling protocol is ____.
a.
L2TP
c.
L2TP over IPSec
b.
SSL
d.
PPTP
 

 19. 

One of the possible file extensions for a Web page is ____.
a.
.exe
c.
.bat
b.
.txt
d.
.htm
 

 20. 

A(n) ____ is an address for a Web page or other resource on the Internet.
a.
HTTP
c.
ARP
b.
URL
d.
FTP
 

 21. 

The ____ part of a URL specifies the rules the Web server should use when transmitting the page to the browser.
a.
protocol
c.
extension
b.
domain
d.
suffix
 

 22. 

The final segment of a domain name is called the ____ domain and tells you something about the organization or individual who owns the name.
a.
bottom-level
c.
top-level
b.
extension-level
d.
suffix-level
 

 23. 

____ is the de facto standard developed by Netscape and used by all browsers; it uses an encryption system that uses a digital certificate.
a.
HTTPS
c.
PPTS
b.
SSL
d.
FTP
 

 24. 

To know if a connection to a Web site is secured, look for ____ in the browser address box and a lock icon at the bottom of the browser window.
a.
ssl
c.
cert
b.
tls
d.
https
 

 25. 

An e-mail sender’s PC and e-mail server both use ____ to send an e-mail message to its destination.
a.
FTP
c.
ISDN
b.
VoIP
d.
SMTP
 

 26. 

The most popular way to transfer files over the Internet is to use the ____, which can transfer files between two computers using the same or different operating systems.
a.
SMTP
c.
NNTP
b.
FTP
d.
VoIP
 

Completion
Complete each statement.
 

 27. 

Most applications that use the Internet are ____________________ applications, which means that two computers and two applications are involved.
 

 

 28. 

Connecting to a network, such as the Internet, using a modem and regular phone line is called ____________________ networking.
 

 

 29. 

Windows XP and Windows 98 use ______________________________ to manage two or more networked computers that share a single Internet connection.
 

 

 30. 

On the client end, to configure a VPN using Windows XP, a VPN network connection is created using the Windows XP ____________________ window.
 

 

 31. 

A(n) ____________________ is a code assigned to you by a certificate authority such as VeriSign that uniquely identifies you on the Internet and includes a public key.
 

 

Matching
 
 
Identify the letter of the choice that best matches the phrase or definition.
a.
ARP
f.
VPN
b.
VoIP
g.
HTTP
c.
RARP
h.
NSLookup
d.
Ipconfig
i.
TCP
e.
UDP
 

 32. 

The protocol used for the World Wide Web and used by Web browsers and Web servers to communicate
 

 33. 

A connection-oriented protocol; used by applications such as Web browsers and e-mail
 

 34. 

A connectionless protocol; primarily used for broadcasting and other types of transmissions, such as streaming video or sound over the Web
 

 35. 

Responsible for locating a host on a local network
 

 36. 

Responsible for discovering the Internet address of a host on a local network
 

 37. 

Displays the IP address of the host and other configuration information
 

 38. 

Works by using encrypted data packets between a private network and a computer somewhere on the Internet
 

 39. 

A protocol that is used by Internet or intranet telephone networks to provide voice communication over a network
 

 40. 

Displays information about domain names and their IP addresses
 



 
Check Your Work     Start Over