In each blank, try to type in the
word that is missing. If you've
typed in the correct word, the
blank will turn green.
If your not sure what answer should be entered, press the space bar and the next missing letter will be displayed. When you are all done, you should look back over all your answers and review the ones in red. These ones in red are the ones which you needed help on. Question: Port : FTPAnswer: 21 Control
20 Data (standard / passive mode) Question: Port : SSHAnswer: Question: Port Number: SSH Port Answer: Question: Port : TelnetAnswer: Question: Port Number: Answer: 25 Question: Port : DNSAnswer: 53 Question: Port : TFTPAnswer: 69 Question: Port : RDPAnswer: Question: Port Number: Answer: 80 Question: Port Number: Answer: Question: Port : IMAPAnswer: Question: Port : HTTPSAnswer: Question: Port Number: Answer: Question: Port Number: Answer: Question: Port : IMAPSAnswer: Question: Port : POP3SAnswer: Question: A first octet rangeAnswer: 1 to Question: Class B octet rangeAnswer: 128 to Question: Class C first rangeAnswer: 192 to Question: Private IP rangesAnswer: 10.0.0.0 - 10.255.255.255
172.16.0.1 - 172.31.255.255
192.168.0.0 - 192.168.255.255 Question: Port Number: Answer: 22 by (default port for SSH) Question: Well known port Answer: 0 to Question: Registered port Answer: 1024 to 49,151 Question: port rangeAnswer: 49,152 to 65,535 Question: Maximum Transmission Speed: Answer: 10 Mbps Question: Transmission Speed: CAT5Answer: 100 Question: Maximum Transmission : CAT5eAnswer: 1000 Question: Maximum Speed: CAT6Answer: 10 Question: This type of ISDN uses two 64-Kbps channels providing a maximum speed of 128 Kbps. Mainly used by and small businesses. It also has a 16-Kbps signal control channel.Answer: BRI (Basic Rate ) Question: This type of ISDN connection uses 23 64-kbps data channels and one 64-kbps channel. Answer: PRI (Primary Rate ) In the US, this is a T1 and provides approx. 1.5 Mbps. Question: Range of Bluetooth Class Answer: 100 (328 feet) Question: of Bluetooth Class 2Answer: 10 (33 feet) Question: Range of Bluetooth 3Answer: 5 (16 feet) Question: SCAnswer: Fiber optic cable connector. Short for connector Question: Answer: Fiber cable connector. SHort for Lucent Connector. It's a miniaturized SC connector and is popular in new installations. Question: STAnswer: Straight tip optic connector. Connector is round. Question: Originally used with cable TV connections and efficient when transmitting analog signals. It was used in some early networks but can transmit only a limited of data. Uses BNC connectorrs.Answer: RG-59 Question: Has a larger center conductor and additional shielding. Has become the standard used with cable/satellite TV because it is more efficient when transmitting digital signals. Networks on coaxial cable today would use this. F-type screw on connector.Answer: RG-6 Question: Type Identifier: 2, 5, C Answer: Indicates cable. Example: 10Base2 Question: Cable Type : TAnswer: Inidcates twisted pair Question: Network Topology: Multiple devices connected to a device (switch, hub).Answer: Star Question: Network Topology: Multiple devices connected to each other in a logical line. Ends must be terminated to prevent signals from bouncing endlessly. If one device becomes disconnected to is a break in the line, all devices will lose connectivity.Answer: Bus Question: Network Topology: All devices logically configured in a single circle or ring. Data travels around the rung to different . Answer: Question: A type of token ring topology that uses fiber optic cable and two rings. The ring provides a redundant path that can be used if the first path fails.Answer: Fiber Distributed Data (FDDI) Question: Many ring networks this device. Computers were still in a logical ring, however if a computer failed, this device sensed the failure did not allow the ring to be passed to the failed device.Answer: Multistation Unit (MAU) Question: Network Topology: Each device has a direct connections with all other computers in the network. Very redundant and rare due to high to implement.Answer: Question: Network Topology:A of any two or more topologies.Answer: Question: Protocol used a network to encrypt traffic. This protocol uses port 22.Answer: Shell (SSH) Question: Protocol commonly used to encrypt web traffic. Uses port 443 by default, but may use other ports depending on the protocol encrypted.Answer: Sockets Layer (SSL) Question: replacement for SSL. Can be used anywhere SSL is used.Answer: Transport Layer (TLS) Question: This protocol is used to send e-mail from a user's to the mail server.Answer: SMTP (Simple Mail Protocol) - Think of 'SM' for send mail. Question: This protocol is used to receive e-mail from a mail server. When this protocol is used, e-mail is generally deleted from the as it is downloaded.Answer: POP3 (Post Protocol) - Think of messages popping off the e-mail server. Question: This is used to receive e-mail from a mail server. Server retains messages as they are downloaded. Additional capabilities include organazing e-mail into folders and search.Answer: IMAP (Internet Message Access ) Question: Protocol used to transfer files over the network, primarily Windows . Uses NetBIOS over TCP with ports 137, 138 & 139 by default. If used directly over TCP port 445.Answer: Server Block (SMB) Question: address rangeAnswer: 224.0.0.1 - 255.255.255.254 Question: Used to identify the network ID with an IPv6 Answer: (ex. /48) Question: IPv6 addressAnswer: String of zeros, with a one at the end. as ::1 Question: Wireless Protocols: Max , Frequency and Range for 802.11aAnswer: 54 Mbps, 5.0 GHz, lowest range of all standards (30m / 100ft) Question: Wireless Protocols: Max , Frequency, and Range for 802.11bAnswer: 11 Mbps, 2.4 GHz, medium range (35m / ) Question: Wireless Protocols: Max Speed, Frequency, and for 802.11gAnswer: 54 Mbps, 2.4 GHz, range (38m / 125ft) Question: Protocols: Max Speed, Frequency and Range for 802.11nAnswer: 600 Mbps (300 Mbps ) 2.4 Ghz or 5.0 GHz, highest range (70m / 230ft) Question: Type of encryption used with WPA. Designed to make WPA more than WEP while using existing hardware (may require firmware update)Answer: Key Integrity Protocol (TKIP) Question: Type of encryption used with WPA2. Provides stronger security than WEP or WPA. This standard is also used in other IT for data encryption.Answer: Advanced Encryption (AES) Question: Command Line Tool: Shows network statistics, including a list of inbound and connections for a system.Answer: Netstat Question: Line Tool: Shows statistics for NetBIOS.Answer: Question: Command Line Tool: Used to map to remote shares.Answer: Net |
Embed Code - If you would like this activity on your web page, copy the script below and paste it into your web page.
Normal Size Small Size show me how
Normal Size Small Size show me how
Created by:
douros05
Popular Computers sets