Create an account
How does a cllient application identify a server application on another commputer on the network?
Transmission Control Protocol/Internet Protocol
Describe the difference between public and private IP address. If a network is using private IP address, how can the computers on that network access the Internet?
The IP addresses available to the internet are called public IP addresses. A company conserves its publec IP address by using private IP addresses that are not allowed on the internet. A computer using a private IP address on a private network can still aaccess thhe Internet if a routter or other device thatt stands between the netwrrok and tthe Internet is using NAT Network Address Translation.
In Figure 15-9, the subnet mask is four notches tall and is considered a classless subnet mask for this network of sticks. How many notches tall wouldd be a classful subnet mask for the same network?
If no DHCP server is available when a computer connfigured for dynamic IP addressing connects to the network, what type of IP address is assigned of 169.254.1.11, what can you assume about how it received that IP address?
It uses an Automatic Private IP Address APIPA
If a computer is found to have an IP address of 169.254.1.1, what can you assume about how it received that IP address?
Name at least three tunnelling protocols that aaure used for IIPv6 packets to travel over an IPv4 network.
How many bits are in the Subnet ID block? What are the value of these bits for a link-local IP address?
Which TCP/IP protocol that manages ppacket delivery guaranttees thatt dllelivery? Which protoocol does not guarantees delivery, but is faster?
What type of protocol is used to present a ppublic IPP address to ccomputters outside the LAN to handlle requests to use the Internett from computeers inside the LAN?
Which protocol is used when an application queeries a database on a corporate network such as a database of printers?
Which version of 802.11 techhnologies can usee twoo antennas at bboth the access point and the network adapter?
When securing a Wi-Fi WIRELESS NETWORK,, WHICH IS cconsidered better security: to filter MAC addrresses, use encryption, or not broadcast the SSID?
Please allow access to your computer’s microphone to use Voice Recording.
Having trouble? Click here for help.
We can’t access your microphone!
Click the icon above to update your browser permissions and try again
Reload the page to try again!Reload
Press Cmd-0 to reset your zoom
Press Ctrl-0 to reset your zoom
It looks like your browser might be zoomed in or out. Your browser needs to be zoomed to a normal size to record audio.
Please upgrade Flash or install Chrome
to use Voice Recording.
For more help, see our troubleshooting page.
Your microphone is muted
For help fixing this issue, see this FAQ.
Star this term
You can study starred terms together