Network ______________ _______________ (NIC) is installed in your computer to connect, or interface, your computer to the network. It provides the physical, electrical, and electronic connections to the network.
Category: Uncategorized
What would happen if you wanted to take one network address…
What would happen if you wanted to take one network address range and create six networks from it? You would have to do something called ________________, because that’s what allows you to take one larger network and break it into a bunch of smaller networks.
Port numbers are used at the Transport layer to identify the…
Port numbers are used at the Transport layer to identify the local host in this example. If we had to use IP addresses to identify the source hosts, that would be called ____________ ____, and we would run out of addresses.
______________ _______________ Configuration Protocol (DHCP…
______________ _______________ Configuration Protocol (DHCP) assigns IP addresses to hosts with information provided by a server. It allows easier administration and works well in small to even very large network environments.
DNS is used to resolve a __________ _____________ domain na…
DNS is used to resolve a __________ _____________ domain name (FQDN)—for example, www.lammle.com or todd.lammle.com—to an IP address. An FQDN, or DNS namespace, is a hierarchy that can logically locate a system based on its domain identifier.
________________ ___________________ Protocol Secure (HTTPS…
________________ ___________________ Protocol Secure (HTTPS) is a secure version of HTTP that arms you with a whole bunch of security tools for keeping transactions secure between a web browser and a server.
If a network isn’t directly connected to the router, the rou…
If a network isn’t directly connected to the router, the router must use one of two ways to learn how to get to it. One way is called ____________ ______________ , which can be a ton of work because it requires someone to hand-type all network locations into the routing table.
___ ________ is the process of moving packets from one netwo…
___ ________ is the process of moving packets from one network to another network using routers. This process is a super-important subject to understand because it pertains to all routers and configurations that use IP.
For the subnet address scheme to work, every machine on the…
For the subnet address scheme to work, every machine on the network must know which part of the host address will be used as the subnet address. This is accomplished by assigning a ___________ _________ to each machine.
This is the diagnostic, or IPv4 loopback address, and if you…
This is the diagnostic, or IPv4 loopback address, and if you get a successful ping, your IP stack is considered to be initialized. If it fails, then you have an IP stack failure and need to reinstall TCP/IP on the host. Using CMD commands. Which command below is correct?