Preview

nt1230 Unit 3 Problems Set1 Unit 3 Problems

Satisfactory Essays
Open Document
Open Document
210 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
nt1230 Unit 3 Problems Set1 Unit 3 Problems
Unit 3 Problems Set1 Unit 3 Problems

1. A software routine, which also acts as a filter that blocks certain types of incoming and outgoing traffic, while enabling other types is called firewall

2. The network tool provides a central access point for all of the network controls and connections on a computer running Windows 7

3. A device that one network to another is called router

4. The most common method for illustrating the operations of a network stack is the osi model which consists of 7

5. Protocols that do not guarantee delivery of their data, but do operate with a very low overhead that conserve network bandwidth are called connectionless protocols

6. The windows 7command-line utility that can tell you if the TCP/IP stack of another system on the network is functioning normally is called ping.exe

7. The windows 7 command line utility that enables you to generate DNS request messages and then transmit them to specific DNS servers on the network is called nslookup.exe

8. Most networks use DHCP to dynamically assign addresses and configure computers to use them

9. The Windows 7 utility that displays a list of the routers currently forwarding packets to a particular destination is called tracert.exe

10. The top and bottom layers of the OSI model are called the application and physical layers

You May Also Find These Documents Helpful

  • Satisfactory Essays

    Studying the seven layers of the OSI design, a decision to be taken is that the layer three, also referred to as the network layer is the one which WAN protocols operates on. The network layer carries out regular tasks as well as pinpoints end-to-end addressing and routing datagrams (Regan, 2004). There exists a unit known as brouter that some layers incorporate which works like a router and a bridge. Routers and switches work on layers 2-4 (data link layer, network layer as well as transport layer). As mentioned earlier, on layer two of the OSI model, network layer, is the place where the addressing and routing is carried out. On the transport layer of the OSI model is the place where the flow control and mistake handling works. Lastly, on layer four the synchronizations and assemblies are completed.…

    • 254 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    JG NT2640

    • 333 Words
    • 1 Page

    B. PC and switch. C. Router and hub D. Wireless access point (Ethernet port) and switch.…

    • 333 Words
    • 1 Page
    Satisfactory Essays
  • Powerful Essays

    Nt1330 Unit 4

    • 3225 Words
    • 13 Pages

    The value of layers in the OSI reference model is that it divides networking into a series of tasks, and then illustrates how those tasks relate to each other.…

    • 3225 Words
    • 13 Pages
    Powerful Essays
  • Satisfactory Essays

    There are two very important tools to use in Networking. They are Domain Name System (DNS) and Dynamic Host Configuration Protocol (DHCP). These help keep your Network organized while building it. A DNS is a system used to name computers and network services that is organized into a hierarchy of domains. It can help locate computers and services through user names. Dynamic Host Configuration Protocol allows a server to automatically assign IP addresses to a computer from a certain range of numbers configured for that network. These two tools work as the foundation for IT-Management.…

    • 370 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    NETW202 W1 Lab Report

    • 927 Words
    • 5 Pages

    Firewalls___ (i.e. client based) must allow access to ports specified for specific vLab type, allow use of our tunneling software if specified ports are blocked, or be disabled to gain access to the vLab. (2 points)…

    • 927 Words
    • 5 Pages
    Powerful Essays
  • Powerful Essays

    3220 final review

    • 655 Words
    • 4 Pages

    4. Name a connection-oriented protocol that operates at the transport layer of the OSI model and supports reliable connections?65, 69…

    • 655 Words
    • 4 Pages
    Powerful Essays
  • Satisfactory Essays

    Overview|On a Windows 7 computer, the Network and Sharing Center provides access to most of the operating system’s networking tools and configuration parameters. In Exercise 7.1, you examine the current Sharing and Discovery settings on one of the computers that will become part of the lab network.|…

    • 740 Words
    • 3 Pages
    Satisfactory Essays
  • Powerful Essays

    Nt1310 Unit 7

    • 2452 Words
    • 10 Pages

    5. What are the seven layers of the OSI model (in order)? What is the role of each layer?…

    • 2452 Words
    • 10 Pages
    Powerful Essays
  • Satisfactory Essays

    nt1210

    • 831 Words
    • 4 Pages

    Define each layer of the OSI model in your own words and state what each layer provides. Use your textbook or internet research to support your answer.…

    • 831 Words
    • 4 Pages
    Satisfactory Essays
  • Powerful Essays

    Unit 3 P3

    • 1666 Words
    • 7 Pages

    This means that the transmission of data can be sent or received to a device and never the other way around. Radio broadcasting and communicating with a printer is an example of such communication, where the communication medium is used for one-way communication.m…

    • 1666 Words
    • 7 Pages
    Powerful Essays
  • Satisfactory Essays

    unit 3 assignment 3

    • 854 Words
    • 3 Pages

    5. Which of the following are true about the commonly used version of the TCP/IP model as shown in this chapter? (Choose two answers.) C) The physical layer sits just below the data link layer. D). The network layer sits in the middle of the five layers.…

    • 854 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    Networking is everywhere one of the main benefits is that we can share devices such as printers, scanners, CD-ROM drives and many more. Also, we can connect to networks as Meyers (2003, p3) said “one network can be connected to another network and become a more powerful tool because of the great resources”.…

    • 442 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Nt1310 Unit 3

    • 541 Words
    • 3 Pages

    A firewall is a network security hardware and/or software program that is used to control the flow of traffic into and out of a network or computer. When a computer has firewall protection the flow of data is monitored and filtered. Also, firewalls are barriers to unauthorized access; for example, when a person or program requests access to a network it must first get authorization and verification from the firewall and user. Furthermore, firewalls help protect networks from hackers, viruses, and other malicious digital security risks. Finally, a firewall ensures that our computers are not sending dangerous data to outside networks.…

    • 541 Words
    • 3 Pages
    Good Essays
  • Good Essays

    4.A paradigm for electronic communications where a message is broken up into blocks of data of limited size which are then transmitted one by one across the network is called:…

    • 3425 Words
    • 14 Pages
    Good Essays
  • Satisfactory Essays

    Hacking2E Lab03 AW

    • 563 Words
    • 3 Pages

    This tool is used to identify the path that must be followed to reach one system from another. It…

    • 563 Words
    • 3 Pages
    Satisfactory Essays