Save
Upgrade to remove ads
Busy. Please wait.
Log in with Clever
or

show password
Forgot Password?

Don't have an account?  Sign up 
Sign up using Clever
or

Username is available taken
show password


Make sure to remember your password. If you forget it there is no way for StudyStack to send you a reset link. You would need to create a new account.
Your email address is only used to allow you to reset your password. See our Privacy Policy and Terms of Service.


Already a StudyStack user? Log In

Reset Password
Enter the associated with your account, and we'll email you a link to reset your password.
focusNode
Didn't know it?
click below
 
Knew it?
click below
Don't Know
Remaining cards (0)
Know
0:00
Embed Code - If you would like this activity on your web page, copy the script below and paste it into your web page.

  Normal Size     Small Size show me how

ITC 190

Week 10 (11.0-11.04)

QuestionAnswer
Which of the following is network that uses internet technologies, but data and services are only available to the hosts connected to private network? Intranet
You've recently learned about IP addressing and run the ipconfig command on your local computer.IPv4 Address..... 192.168.0.52 Subnet Mask..255.255.255.0 Default Gateway..192.168.0.1 Which of the following is the host ID? 52
Local Area Network (LAN) Network in small geographic area that typically uses wires to connect systems together; Set of subnets connected to each other, typically by wires, using at least one router
Personal Area Network (PAN) Small network used for connecting devices, such as a notebook computer, wireless headset, wireless printer, and a smartphone
Metropolitan Area Network (MAN) Network that is typically owned and managed by a city as a public utility; Network that covers an area as small as a few city blocks to as large as en entire city
Wide Area Network Group of networks that are geographically isolated, but are connected to form large internetwork
Wireless Local Area Network (WLAN) Similar to standard LAN, but uses radio signals instead of wires to connect systems together
A group of workers in office space communicate with each other on their smartphones and tablet devices through an ad hoc network linked using Bluetooth technology protocols. Which of the following network types is in use? Personal Area Network (PAN)
Which of the following network components is responsible for converting digital data into a signal that can be transmitted? Network interface
Which of the following network types uses special hardware to provide high-speed access to storage across the network? Storage area network
Which of the following terms refers to a network resource sharing model that uses access to control lists saved on each computer? Peer-to-peer
Which of the following identifies both the host computer and the network to which it belongs? Subnet mask
You are a junior network technician for a small consulting firm. Your team recently split the network into smaller subnets, one for each department. One of your users, Jaclyn in HR, is trying to access shared files from Tom's computer in the sales depa Tom and Jaclyn are no longer on the same subnet
You are working as an installer for a small IT company. One of your residential clients has purchased some IoT devices and you have been tasked with installing them for the client. These IoT devices will be networked together in a small network. Each d Wireless mesh network
Order in three-way handshake process First host sends SYN packet asking to create a new session; Receiving host replies with SYN-ACK packet acknowledging that the session can be created; First host replies with the ACK packet, which then opens the session
Which of the following items of information does a packet header contain? Sender; receiver; data chunk order
A company has built a video streaming service that supplies training videos. Quickly transmitting video data to customers is more important than guaranteed elivery. Which of the following Transport layer IP suite protocols is MOST likely used for this ser User Datagram Protocol
A technician has configured a client computer's network interface to request an IP address. Which of the following TCP/IP suite protocols does the client computer use to perform the request and receive an IP address from a server? Dynamic Host COnfiguration Protocol (DCHP)
A technician has configured a client computer's network interface with server addresses to which the client will send requests for translating fully qualified domain names (FQDNs) to IP addresses and IP addresses to FQDNs. Which of the following TCP/IP su Domain Name System (DNS)
You want to allow users to download files from a server running IP protocol. You also want to protect access to files by requiring user authentication to access specific directories on the server. Which IP protocol should you implement to privude this cap FTP
Which of the following protocols is used by an email client to retrieve messages from an email server, giving users the option to keep mail messages on the server? IMAP
Secure Shell (SSH) Port 22
Apple Filing Protocol (AFP) Port 548
HyperText Transfer Protocol Secure (HTTPS) Port 80
Server Message Block (SMB/CIFS) directly over TCP Port 445
Service Location Protocol (SLP) Port 427
Internet Message Access Protocol (IMAP) Port 143
You've used your Windows workstation to map a drive to a shared folder on a Windows server. Which protocol was used to access the share? SMB
To assist a user, a help desk technician is able to take advantage of a Windows proprietary network protocol that allows the technician to open a graphical interface to connect with the user's Windows computer. Which of the following TCP/IP port number 3389
Your Windows workstation has Automatic Private IP Addressing (APIPA) implemented with default settings. Which of the following TCP/IP addresses could you automatically assign to the system, should your DHCP server go down or become inaccessible? 169.254.1.26
You are working as a junior technician for a small consulting firm. You have been tasked with installing a new computer on the network. You have performed this task and connected the computer to the network. To verify network connectivity, you decide t ARP
Which of the following IP addresses are Class B addresses? 132.12.0.0; 190.65.2.0; 120.0.0.0
You have a small home network that uses 192.168.1.0 with the default subnet mask for the network address. The default gateway address is 192.168.1.254, and the router is providing DHCP on the network. The Wrk2 computer has been assigned the IP address of 127.0.0.1
You are currently learning about networking devices and have just learned about MAC addresses. You look up your device's MAC address, and it comes back as 00-B0-D0-06-BC-AC. Which portion of this MAC address can tell you who the manufacturer is? 00-B0-D0
Which of the following mechanism would BEST allow you to resolve a hostname to its associated IP address? host file; DNS
Which of the following IP addresses have a default subnet mask of 255.255.0.0 191.168.2.15; 129.0.0.1; 168.16.5.1
Which of the following identifies the interface ID component of an IPV6 address? Last four quartets of an IPv6 address; Last 64 bits of an IPv6 address
Which of the following are valid IPV6 addresses? 6384:1319:7700:7631:446A:5511:8940:2552; 141:0:0:0:15:0:0:1
Which of the following correctly describes the most common format for expressing IPV6 addresses? 32 numbers, grouped using colons; Hexadecimal numbers
You are the network administrator for a small consulting firm. The firm has recently rolled out a new intranet site, and you are responsible for configuring the DNS. You are able to connect to the intranet site by using the IP address, but you cannot c Forward lookup zone
Which of the following DHCP scope options will assign a static IP configuration to a device using the device's MAC address? Reservation
Which of the following UTM appliances monitors all network traffic and blocks malicious traffic while notifying the network security team? IPS
You are working as a junior security technician for a consulting firm. One of your clients is upgrading their network infrastructure. The client needs a new firewall and intrusion prevention system installed. They also want to be able to block employees f Unified Threat Management
What are two major concerns regarding loT devices? Privacy; hacking
What are the two mesh protocols that are used most often with loT devices? Zigbee; Z-Wave
Which of the following are loT systems that work together to make communication between two endpoints possible? Gateway system; Data storage
Your employer wants a system that guarantees that all components will work together with minimal configuration and setup. Time is of the essence in getting this new system ready. Which of the following would BEST meet your employer's needs? DCS
Which of the following is an inherent vulnerability of embedded devices? Unknown environments
Created by: rparticka
 

 



Voices

Use these flashcards to help memorize information. Look at the large card and try to recall what is on the other side. Then click the card to flip it. If you knew the answer, click the green Know box. Otherwise, click the red Don't know box.

When you've placed seven or more cards in the Don't know box, click "retry" to try those cards again.

If you've accidentally put the card in the wrong box, just click on the card to take it out of the box.

You can also use your keyboard to move the cards as follows:

If you are logged in to your account, this website will remember which cards you know and don't know so that they are in the same box the next time you log in.

When you need a break, try one of the other activities listed below the flashcards like Matching, Snowman, or Hungry Bug. Although it may feel like you're playing a game, your brain is still making more connections with the information to help you out.

To see how well you know the information, try the Quiz or Test activity.

Pass complete!
"Know" box contains:
Time elapsed:
Retries:
restart all cards