The _________topology consists of two distinct and terminated ends, with each of its computers connecting to one unbroken cable running its entire length.
Blog
_____________ refers to a network that encompasses several b…
_____________ refers to a network that encompasses several buildings. It comprises the part of the network where data, services and connectivity to the outside world is provided to those who work in the corporate office or headquarters.
A_______________________ uses aspects of both distance vect…
A_______________________ uses aspects of both distance vector and link state, and formerly, EIGRP was the only one you needed to understand to meet the Network+ objectives.
The _________________ is responsible for setting up, managin…
The _________________ is responsible for setting up, managing, and then tearing down sessions between Presentation layer entities.
________________________________ (ping) Uses an Internet Co…
________________________________ (ping) Uses an Internet Control Message Protocol (ICMP) echo request and replies to test if a host IP stack is initialized and alive on the network.
A ____________________ is the designation used in routing t…
A ____________________ is the designation used in routing to send packets to a remote network—for example, 10.0.0.0, 172.16.0.0, and 192.168.10.0.
_______________________________ (CIDR). It’s basically the…
_______________________________ (CIDR). It’s basically the method that Internet service providers (ISPs) use to allocate a number of addresses to a company or a home connection.
Your network is connected to the Internet. As the network ad…
Your network is connected to the Internet. As the network administrator, you install packet filtering on the router that connects your network to the Internet. After you configure packet filtering, users on the network are no longer able to download files. What did you do to create this problem?
IP address _________________, allows you to take one large…
IP address _________________, allows you to take one larger network and break it into a bunch of smaller networks.
____________________ is the most common type of migration st…
____________________ is the most common type of migration strategy because, it allows our devices to communicate using either IPv4 or IPv6. It lets you upgrade your devices and applications on the network one at a time.