Preview

Unit 3 problem set 1. Unit 3 problem

Good Essays
Open Document
Open Document
440 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Unit 3 problem set 1. Unit 3 problem
1. A software routine, which also acts as a filter that blocks certain type of incoming and outgoing traffic, while enabling other types is called a Firewall

2. The ________ tool provides a central access point for all of the network controls and connections on a computer running Windows 7. Network and Sharing Center

3. A device that connects one network to another is called a Router

4. The most common method for illustrating the operations of a network stack is the ________ , which consists of ________ layers.
Open Systems Interconnection (OSI) Reference model and 7 layers

5. Protocols that do not guarantee deliver of their data, but do operate with a very low overhead that conserve network bandwidth are called Connectionless-Oriented Protocol

6. The Windows 7 command line utility that can tell if the TCP/IP stack of another system on the network is functioning normally is called Ping.exe

7. The Windows 7 command line utility that enables you to generate DNS request messages and then transmit them to specific DNS servers on the network is called NSLookup.exe

8. Most networks use ________ to dynamically assign addresses and configure computers to use them. DHCP

9. The Windows 7 command line utility that displays a list of the routers currently forwarding packets to a particular destination is called TRACERT.EXE

10. The top and bottom layers of the OSI model are called the Application and Physical Layer

1. A software routine, which also acts as a filter that blocks certain type of incoming and outgoing traffic, while enabling other types is called a Firewall

2. The ________ tool provides a central access point for all of the network controls and connections on a computer running Windows 7. Network and Sharing Center

3. A device that connects one network to another is called a Router

4. The most common method for illustrating the operations of a network stack is the ________ , which consists of ________ layers.
Open

You May Also Find These Documents Helpful

  • Good Essays

    unit 7 lab 10

    • 595 Words
    • 3 Pages

    Software firewalls are installed on individual computers and they need sufficient configuration to be effective. Software firewalls contain a set of related programs, usually located at a network gateway server, that protect the resources of a private network from users on other networks or from internal users. Software firewalls allow application screening to verify the interaction between the requesting client and the requested resource.…

    • 595 Words
    • 3 Pages
    Good Essays
  • Good Essays

    nt1210 unit 1 lab1

    • 1325 Words
    • 5 Pages

    Answer: C. The physical layer sits just below the data link layer. D. The physical layer sits just below the data link layer.…

    • 1325 Words
    • 5 Pages
    Good Essays
  • Satisfactory Essays

    NT1110 Module5 Lab

    • 254 Words
    • 2 Pages

    Firewalls may be hardware devices or software programs. Hardware firewalls protect an entire network. Software firewalls protect a single computer. Research the Internet for an example of each of these types of firewalls and compare their features. Linksys and Cisco make firewall/routers for home use. The Zone labs are an example of a software firewall.…

    • 254 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    UNIT 2 Assignment 2

    • 1272 Words
    • 6 Pages

    1. Which of the following terms is the closest synonym to the term computer networking?…

    • 1272 Words
    • 6 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Question 1.1. (TCO 1) Which one of the following Windows NET commands options is not used to control services with the NET ????? ServiceName? (Points : 4)…

    • 566 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Chapter 2 Lab Manual

    • 1433 Words
    • 6 Pages

    2. Explain why you would want to limit the type of incoming connections that you allow on a computer. Use your textbook and Internet research to support your answer…

    • 1433 Words
    • 6 Pages
    Satisfactory Essays
  • Satisfactory Essays

    2. What is seen in each of the three panes that display the packets seen on a local area network? Hint: For full credit, you must talk about what is displayed in each pane in addition to the name of each pane. (1 point)…

    • 1389 Words
    • 6 Pages
    Satisfactory Essays
  • Better Essays

    Unit 8 eCommerce P1

    • 1328 Words
    • 6 Pages

    Firewall: A firewall is a software or hardware-based network security system that controls the incoming and outgoing network traffic by analysing the data packets and determining whether they should be allowed through or not, based on a rule set. A firewall establishes a barrier between a trusted, secure internal network and another network (e.g., the Internet) that is not assumed to be secure and trusted.…

    • 1328 Words
    • 6 Pages
    Better Essays
  • Good Essays

    With computers and IT exploding as it has over the past few years, so has the individuals that try to gain access to your machine. A firewall is a device that applies the security to your network. They come in all different sizes for different setups. Firewalls have two connections. One is to the computer/network and the other is connected to your Internet connection.…

    • 1097 Words
    • 5 Pages
    Good Essays
  • Good Essays

    Testbacksecurity

    • 2284 Words
    • 10 Pages

    A firewall is a mechanism that keeps certain kinds of network traffic out of a private network.…

    • 2284 Words
    • 10 Pages
    Good Essays
  • Good Essays

    W8 Comp

    • 898 Words
    • 4 Pages

    1) Which one of the following Windows NET commands options is NOT used to control services with the NET ????? ServiceName? (Points : 5)…

    • 898 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    It331 Unit 5 Essay

    • 593 Words
    • 3 Pages

    6) For the network that you have chosen to characterize for this class, identify the primary types of media employed. Be sure to include both how the computers individually connect into the network devices as well as how network devices interconnect and how the connection to the Internet is achieved. Briefly explain the purpose in the network of each type of media employed and identify at least one alternative media which could also fulfill this purpose.…

    • 593 Words
    • 3 Pages
    Satisfactory Essays
  • Powerful Essays

    ____ 7. When a client accesses the namespace domain controller, she receives a list of targets in a specified order. This is called a ____.…

    • 1328 Words
    • 6 Pages
    Powerful Essays
  • Good Essays

    Define or explain the meaning of the following basic computer networking terms, giving examples and graphic illustrations wherever applicable. 1. Computer network 2. switch 3. hub 4. router 5. server 6. NIC 7. Modem 8. Ethernet 9. straight-through cable 10. cross-over cable 11. roll-over cable 12. LAN 13. MAN 14. PAN 15. WAN 16. VPN 17. internetwork 18. intranet 19. peer-to-peer network 20. client-server network 21. physical topology 22. logical topology 23. mesh topology 24. network protocol 25. network operating system 26. MAC-address 27. IP-address 28. private IP-address 29. public IP-address 30. TCP/IP 31. OSI 32. reference model 33. collision domain 34. broadcast domain 35. network applications 36. broadcast 37. unicast 38. multicast 39. default gateway 40. half-duplex 41. full-duplex 42. network host 43. network node 44. Access point 45. Ad-hoc wireless network 46. FDDI 47.Token Ring 48. bandwidth 49. throughput 50. subnet…

    • 325 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    lesson11

    • 346 Words
    • 2 Pages

    3. Which of the following Windows 7 tool does not aid in the network troubleshooting process?…

    • 346 Words
    • 2 Pages
    Satisfactory Essays

Related Topics