True/False Indicate whether the
statement is true or false.
|
|
1.
|
In TCP/IP, the protocol that guarantees packet delivery is IP.
|
|
2.
|
A cable modem uses phone lines for transmission and is bundled with your local
phone service.
|
|
3.
|
With DSL, a telephone filter must be installed on every phone jack in the house
that is being used by a telephone, fax machine, or dial-up modem.
|
|
4.
|
After your router is configured as a DHCP server, you can configure each PC on
your network to use dynamic IP addressing.
|
|
5.
|
A Web browser can serve as an FTP client.
|
Multiple Choice Identify the
choice that best completes the statement or answers the question.
|
|
6.
|
On the World Wide Web, the client is called a(n) ____.
a. | Web host | c. | cable modem | b. | Web browser | d. | application
port |
|
|
7.
|
On the World Wide Web, the server is called a(n) ____.
a. | Web host | c. | cable modem | b. | Web browser | d. | application
port |
|
|
8.
|
A(n) ____ number is assigned to each server application when it is
started.
|
|
9.
|
A Web server is normally assigned port ____.
|
|
10.
|
An e-mail server receiving mail is normally assigned port ____.
|
|
11.
|
____, which are communication links created between two software programs, are
managed by the browser and Web server using HTTP.
a. | Protocols | c. | Ports | b. | Packets | d. | Sessions |
|
|
12.
|
TCP and UDP pass requests to ____, which is responsible for breaking up and
reassembling data into packets and routing them to their destination.
|
|
13.
|
____ is responsible for communicating problems with transmission.
a. | ARP | c. | RARP | b. | ICMP | d. | Getmac |
|
|
14.
|
The ____ utility displays the NIC’s MAC address.
a. | ARP | c. | Ping | b. | Ipconfig | d. | Getmac |
|
|
15.
|
____ provides system management tools for networks.
|
|
16.
|
Dial-up networking works by using ____ Protocol to send packets of data over
phone lines.
a. | Simple Mail Transfer | c. | File Transfer | b. | Point-to-Point | d. | Integrated
Services |
|
|
17.
|
Port ____ is used to open or close certain ports so they can or cannot be
used.
a. | caching | c. | forwarding | b. | filtering | d. | policing |
|
|
18.
|
The strongest tunneling protocol is ____.
a. | L2TP | c. | L2TP over IPSec | b. | SSL | d. | PPTP |
|
|
19.
|
One of the possible file extensions for a Web page is ____.
|
|
20.
|
A(n) ____ is an address for a Web page or other resource on the Internet.
|
|
21.
|
The ____ part of a URL specifies the rules the Web server should use when
transmitting the page to the browser.
a. | protocol | c. | extension | b. | domain | d. | suffix |
|
|
22.
|
The final segment of a domain name is called the ____ domain and tells you
something about the organization or individual who owns the name.
a. | bottom-level | c. | top-level | b. | extension-level | d. | suffix-level |
|
|
23.
|
____ is the de facto standard developed by Netscape and used by all browsers; it
uses an encryption system that uses a digital certificate.
|
|
24.
|
To know if a connection to a Web site is secured, look for ____ in the browser
address box and a lock icon at the bottom of the browser window.
|
|
25.
|
An e-mail sender’s PC and e-mail server both use ____ to send an e-mail
message to its destination.
|
|
26.
|
The most popular way to transfer files over the Internet is to use the ____,
which can transfer files between two computers using the same or different operating systems.
|
Completion Complete each
statement.
|
|
27.
|
Most applications that use the Internet are ____________________ applications,
which means that two computers and two applications are involved.
|
|
28.
|
Connecting to a network, such as the Internet, using a modem and regular phone
line is called ____________________ networking.
|
|
29.
|
Windows XP and Windows 98 use ______________________________ to manage two or
more networked computers that share a single Internet connection.
|
|
30.
|
On the client end, to configure a VPN using Windows XP, a VPN network connection
is created using the Windows XP ____________________ window.
|
|
31.
|
A(n) ____________________ is a code assigned to you by a certificate authority
such as VeriSign that uniquely identifies you on the Internet and includes a public key.
|
Matching
|
|
|
Identify the letter of the choice that best matches the phrase or
definition. a. | ARP | f. | VPN | b. | VoIP | g. | HTTP | c. | RARP | h. | NSLookup | d. | Ipconfig | i. | TCP | e. | UDP |
|
|
32.
|
The protocol used for the World Wide Web and used by Web browsers and Web
servers to communicate
|
|
33.
|
A connection-oriented protocol; used by applications such as Web browsers and
e-mail
|
|
34.
|
A connectionless protocol; primarily used for broadcasting and other types of
transmissions, such as streaming video or sound over the Web
|
|
35.
|
Responsible for locating a host on a local network
|
|
36.
|
Responsible for discovering the Internet address of a host on a local
network
|
|
37.
|
Displays the IP address of the host and other configuration information
|
|
38.
|
Works by using encrypted data packets between a private network and a computer
somewhere on the Internet
|
|
39.
|
A protocol that is used by Internet or intranet telephone networks to provide
voice communication over a network
|
|
40.
|
Displays information about domain names and their IP addresses
|