click below
click below
Normal Size Small Size show me how
COMPTIA- NETWORKING
JORGE COMPTIA NETWORKING CHAPTER 18
Question | Answer |
---|---|
What is a URL? | Are the global addresses for websites all over the Internet |
What happens when you enter a URL into a web browser? | The domain name is combined with the protocol type to form the URL |
The first part of the URL identifies the ___________used and second part identifies the_______________ | The first part of the URL identifies the _protocol_ used and second part identifies the _domain name_. |
What is a subdomain? | Is a division of a group of networks |
Which email protocol does not typically retain the e-mail message on the server after it has been accessed by the e-mail client? | POP3 |
Which e-mail protocol is used to send an e-mail message to an e-mail server | IMAP Internet Message Access Protocol |
What is MAPI? | Messaging Application Programming Interface is Microsoft’s proprietary e-mail protocol and is very similar to IMAP |
What three components are required to digitally sign and encode an e-mail message? | Public key, private key, and the appropriate encoding software |
What is a digital signature? | the resulting data |
What type of addresses does an Ethernet packet contain? | Contains the MAC address of the source and destination device |
Which is described as a connectionless protocol, TCP or UDP | UDP |
What is the difference between the HTML and HTTP? | HTTP delivers webpage content written in HTML code |
What is the function of SNMP? | Collects information about network devices and configures network devices |
What protocol is a combination of HTTP and Secure Socket Layer (SSL) protocols? | HTTPS |
What are the five characteristics of cloud service that have been identified by NIST? | On-Demand Self-Service, Broad Network Access, Resource Pooling, Rapid Elasticity, Measured Service |
What are four classifications of cloud service to consumers? | Private Cloud, Community Cloud, Public Cloud, Hybrid Cloud |
What is hypervisor? | Is the technical term used to identify the software that creates the virtual machine on the client device |
What is another name for hypervisor? | Virtual machine monitor |
What hardware requirements are needed to support virtualization on a client machine? | Kernel-based Virtual Machine (KVM) |
Describe four factors that could affect network transfer | If a application is running in the background, when a computer is downloading something, when a person hasn’t uses their computer in a long time, and when a computer is shut down for a long period of time is will automatically connect to the inter net and start updating things |
How might a computer be assigned a duplicate IP address? | When the same IP address is assigned to more than one network device |
What two factors are commonly associated with weak RF signal? | Either caused by distance or position |