F8 There is no option for networking access when using Safe Mode. False
What Windows process is responsible for authenticating users? LSmss.exe In order to remove any partition or volume information from a selected disk, what diskpart command should be used? clean What command can be used to check for file system errors? chkdsk /r What is the file name given to the Windows kernel? Ntoskrnl.exe What program is used to start the part of the Win32 subsystem that displays graphics? Smss.exe CH14 How are IP addresses available to the Internet classified? public What two terms are used to describe the User Datagram Protocol (UDP)? connectionless protocol best effort protocol What wireless networking radio frequency yields faster speeds but offers shorter range? 5 GHz What two protocols are used for remote access to a server, using unencrypted and encrypted transmissions respectively? telnet SSH If a device does not receive an IP address from a DHCP server, the device may resort to what kind of IP address? APIPA What two protocols are used to deliver mail messages? POP3 IMAP4 What TCP port is utilized by an SSH server listening for connections?
22 If the computer you are using is a laptop that moves from one network to another, what tab can be used to configure a secondary configuration, such as a static IP if a DHCP server cannot be reached? Alternate Configuration What protocol makes a connection, checks whether the data is received, and resends it if it is not? TCP The Remote Desktop and Remote Assistance applications utilize what port for remote access? 3389 What device handles access to another network for a client computer if it does not have a better option ? default gateway What is the name of the 32-bit or 128-bit number that is used to identify a device on a network? IP address What functions might be provided by a SOHO router besides the normal duty of routing packets between networks? (Choose all that apply). firewall wireless access point What type of device can be used to block unwanted traffic initiated from the Internet and can also restrict Internet access from an internal network? firewall The ability to send and receive transmissions at the same time on an Ethernet cable is referred to by what term? full duplex Originally developed by IBM, what protocol is used by Windows to share files and printers on a network? Server Message Block (SMB) The Telnet protocol encrypts transmitted data, which therefore cannot be read by others on the network. False The solution for securing private data traveling over a public network, such as the Internet, is the use of what type of network?
virtual private network What cell phone technology is the most popular in the United States? CDMA The User Datagram Protocol (UDP) guarantees delivery of data to its destination.
You've reached the end of your free preview.
Want to read all 68 pages?
- Fall '19
- Personal computer, Windows Vista, Windows 2000, Hard disk drive, Solid-state drive