IP Address Flashcards

1
Q

(IP) An IP address is a _______ _______.

A

numeric address

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

(IP) It’s an _________ for a computer or device on a network.

A

identifier

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

(IP) Every device on a network needs to have an __ ________ to communicate.

A

IP address

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

(IP) The IP address consists of 2 parts: the first part is the _______ address and second part is the ____ address.

A

network, host

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

(IP) Two types of IP addresses: the first one is the most common one, ____, and the second type is ____.

A

IPv4, IPv6

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

(IPv4) IPv4 is the _______ version of IP addresses.

A

current

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

(IPv4) is a __-___ numeric address written as four numbers separated by _______.

A

32-bit, periods

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

(IPv4) Each group of numbers that are separated by periods is called an _____.

A

octet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

(IPv4) EX: 66.94.234.13 , any group of these numbers is an _____.

A

octet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

(IPv4) The number range in each octet is __-____.

A

0-255

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

(IPv4) This address version can produce over 4 billion (4,294,967,296) ______ _________.

A

unique addresses

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

(IPV4 Bi) IPv4 is made up of 4 sets of __ binary bits. And these sets are called ______.

A

8, octets

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

(IPV4 Bi) The bits in each octet are represented by a ______.

A

number

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

(IPV4 Bi) by manipulating the ones and the zeros in the octet, you can come up with a range from __ to ___.

A

0, 255

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

(IPv6) ____ is the next generation of IP addresses.

A

IPv6

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

(IPv6) The main difference between IPv4 and IPv6 is the ______ of the _______.

A

length, address

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

(IPv6) The IPv4 address is a __-___ numeric address.

A

32-bit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

(IPv6) IPv6 is a ___-___ hexadecimal address.

A

128-bit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

(IPv6) Hexadecimal uses both _______ and _________ in the address.

A

numbers, alphabets

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

(IPv6) So with this type of address, IPv6 can produce an unbelievable 340 ___________ __ _________.

A

undecillion, ip, addresses

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

(IPv6 Bi) It’s made up of eight sets of __ bits, with the eight sets separated by ______.

A

16, colons

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

(IPv6 Bi) In a similar way that we converted an IPv4 address to a binary number, this is how we convert a binary number to a ___________ _______.

A

hexadecimal, address

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

(IPv6 Bi) In an IPv6 ip address, each hexadecimal character represents ____ ____. So we have to convert four bits at a time, to get one ___________ character.

A

four bits, hexadecimal

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

(Subnet Mask) IP address consists of 2 parts: A _______ address and a ____ address.

A

network, host

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

(Subnet Mask) So the way to tell which portion belongs to either the network or the host, is where the ______ ____ comes in.

A

subnet, mask

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

(Subnet Mask) Subnet mask: a number that resembles an __ _______. It reveals how many bits in the IP address are used for the _______ by masking the network _______ of the IP address.

A

I.P address, network, portion

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

(IP C&R) IP addresses are assigned to different organizations and ______. And these blocks are divided into ____ _______. But for the exam you only need to know three of them.

A

blocks, five, classes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

(IP C&R) They are class __, __, and __. And you can tell by the number in the first octet, which class an I.P address belongs to.

A

A, B, C.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

(IP C&R) a class A I.P range is from __ to ___. This class supports 16 million hosts, on 126 networks. This class is mainly given to large _____________ because of a tremendous amount of I.P addresses it can give out.

A

1, 126, large, organizations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

(IP C&R) a class B I.P range is from ___ to ___, and this class supports 65,000 hosts on 16,000 networks. This class is given to ______-_____ organizations.

A

128, 191, medium-sized

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

(IP C&R) a class C I.P range is from ___ to ___. This class supports 254 hosts on 2 million networks. And this class is given to _____ _____________.

A

192, 223, small, organizations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

(IP C&R) You also going to need to memorize the _______ ______ _____ for each of these classes.

A

default, subnet, masks,

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

(IP C&R) Now if you notice we skipped over the “___” _____. And that’s because this number cannot be used for a network. Because the number 127 address is reserved for ________ ________ functions.

A

127, range, internal, loopback

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

(Private I.P) Public I.P addresses are ________ __________ on the internet. Which basically means that if you have a Public I.P address, you have access to the internet.

A

publicly, registered

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

(Private I.P) But Private I.P addresses are different. A private I.P is not ________ __________. So you cannot directly access the internet with a _______ I.P.

A

publicly, registered, private

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

(Private I.P) let’s say you have a small business and you need 10 public IP addresses so your employees can access the internet. Now, you could contact your ISP and ask them for these additional IP addresses, but that would be very _________ and unnecessary. So, that’s where _______ __ addressing comes in.

A

expensive, private, IP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

(Private I.P) In private IP addressing, you can create these 10 private IP addresses and just have one publicly registered IP address from your ISP. These 10 private IPs would then be translated into the one ______ __, so your employees can have access to the ________. This not only saves money but it also helps prevent having a shortage of public IP addresses.

A

public IP, internet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

(Private I.P) The RFC-1918 standard created private IP addressing to prevent a shortage of ______ __ ________ available to ISPs and subscribers.

A

public, IP, addresses

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

(Private I.P) Private IP addresses are typically used on _____ ________ such as homes, schools, and businesses.

A

local, networks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

(Private Ranges) These private IP ranges have three classes: Class A starts with the number __, Class B starts with the number ___, and Class C starts with the number ___.

A

10, 172, 192

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

(Subnetting) The word “subnet” is short for “__________,” which means a smaller network within a ______ one.

A

subnetwork, larger

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
42
Q

(Subnetting) Subnetting is basically breaking down a large network into _______ ________ or subnets. It’s mainly done to make your network more __________.

A

smaller networks, manageable

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
43
Q

(Subnetting) Subnetting is basically done by changing the _______ ______ ____, by borrowing some of the bits that were designated for hosts and using them to create subnets.

A

default, subnet, mask

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
44
Q

(Dyn IP AM) Every computer on the network has to have an IP address for _____________ purposes.

A

communication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
45
Q

(Dyn IP AM) There are two ways that a computer can be assigned an IP address. It can be done either by using a _______ IP or a ______ IP.

A

dynamic, static

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
46
Q

(Dyn IP AM) A dynamic IP is where a computer gets an IP address ______________ from a ____ server.

A

automatically, DHCP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
47
Q

(Dyn IP AM) DHCP stands for _______ ____ _____________.

A

Dynamic Host Configuration Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
48
Q

(Dyn IP AM) A DHCP server automatically assigns a computer with an IP address, and in addition to an IP address, it can also assign a ______ ____, _______ _______, and a ___ ______.

A

subnet mask, default gateway, DNS server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
49
Q

(Dyn IP AM) Dynamic IP addressing is the best choice because it makes _________ a ________ a lot easier.

A

managing, network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
50
Q

(Stat IP AM) You can also assign a computer with an IP address ________, and this is called a ______ __.

A

manually, static IP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
51
Q

(Stat IP AM) A static IP is where a user ________ assigns an __ _______ for the computer. So there is no need for a DHCP server, and this kind of IP addressing is also known as permanent because, unlike dynamic addressing where the IP address can change automatically, a static IP only changes if the user decides to.

A

manually, IP, address

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
52
Q

(Self-Assigned) self-assigned addressing is called APIPA, which stands for _________ _______ __ _______ _________.

A

Automatic, Private, IP, Address, Assignment

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
53
Q

(Self-Assigned) Computers running Microsoft Windows 98 or later do this so they can still be able to ___________ with other _________ on the same network that also have ____-_______ __ _________.

A

communicate, computers, self, assigned, IP, addresses.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
54
Q

(Self-Assigned) If a DHCP server later becomes available, the computer changes its IP address to one that’s obtained from a ____ ______.

A

DHCP, server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
55
Q

(Scope DHCP) A DHCP server assigns __ _________ to computers on a subnet from its _____.

A

IP, addresses, scope

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
56
Q

(Scope DHCP) a scope is a group and a range of ___________ __ _________ for computers that automatically get their IP address from a ____ server.

A

consecutive, IP addresses, DHCP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
57
Q

(Reserv DHCP) If you wanted a computer on your network to have a specific IP address all the time, you can create a ___________ on the DHCP server.

A

reservation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
58
Q

(Reserv DHCP) A reservation ensures that a specific computer or device, identified by its ___ _______, will always be given the same IP address when that computer accesses the DHCP server.

A

MAC, Address

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
59
Q

(Reserv DHCP) Reservations are not typically given to regular computers; they are typically given to _______ _______ or _________ such as network printers and servers that require using the same IP address constantly.

A

special, devices, computers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
60
Q

(Lease DHCP) Computers obtain an IP address from a ____ ______.

A

DHCP, server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
61
Q

(Lease DHCP) The DHCP server assigns the IP address as a _____. So the computer doesn’t actually own the __ _______; it’s actually a lease.

A

lease, IP, address

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
62
Q

(Lease DHCP) a lease is the amount of ____ an IP address is assigned to a ________.

A

time, computer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
63
Q

(Lease DHCP) The lease duration could be a ___ or more depending upon the lease ________ of a DHCP server.

A

day, settings

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
64
Q

(Lease DHCP) if I do an ipconfig /all in a command prompt on my computer, you can see that the DHCP service on my router has assigned my computer an IP address with a _____ of one ___.

A

lease, day

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
65
Q

(Lease DHCP) Typically, a DHCP server will _____________ _____ the IP address for you, so you won’t have to do anything or even notice that the IP address is being renewed.

A

automatically, renew

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
66
Q

(DHCP Relay) A DHCP relay or IP helper is a service that is enabled on a router that will relay a ____ broadcast it receives and ________ it.

A

DHCP, forwards

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
67
Q

(DHCP Relay) So now the computer will broadcast a request for an IP address, and once the DHCP relay on the router receives the broadcast, it will forward the broadcast to the DHCP server, and then the DHCP server will send the __ _______ back to the ________.

A

IP, address, computer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
68
Q

(TCP) Transmission Control Protocol is one of the ____ protocols used in a TCP/IP _______.

A

main, network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
69
Q

(TCP) Now, this is a __________-oriented protocol, which basically means that it must first acknowledge a session between the two computers that are _____________. And it does this by using a three-way handshake.

A

connection, communicating.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
70
Q

(TCP) The first step is that a computer will send a message called a ___ (S-S-Y-N). Then, the receiving computer will send back an acknowledgement message, telling the sender that it has received the _________. And finally, the sender computer sends another acknowledgement message back to the receiver. And once this has taken place, data can be _________.

A

SYN, message, delivered.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
71
Q

(TCP) Another important thing to remember about TCP is that it guarantees the delivery of the ____. So, if a data packet goes astray and doesn’t arrive, then TCP will ______ it.

A

data, resend

72
Q

(UDP) UDP is very similar to ___.

A

TCP

73
Q

(UDP) UDP is also for sending and receiving data, but the main difference is that UDP is _______________, which means that it does not establish a _______ and does not guarantee data ________. So, when a computer sends its data, it doesn’t really care if the data is received at the other end.

A

connectionless, session, delivery

74
Q

(UDP) UDP is known as a “____ ___ ______” protocol because it sends data and it doesn’t really care what happens to it.

A

fire, and, forget

75
Q

(UDP) because of the less overhead involved in not guaranteeing data delivery, ___ is faster than TCP.

A

UDP

76
Q

(FTP) FTP stands for ____ _______ ________, and this is the standard protocol that is used by web users to ______ and download files between computers through the _________.

A

File, Transfer, Protocol, upload, internet.

77
Q

(FTP) if a user wanted to make their files available to download to other users, all they would have to do is simply ______ their files to an ___ ______, and then a user can simply download them.

A

upload, FTP, server

78
Q

(FTP) There are a few ways to transfer files using ___.

A

FTP

79
Q

(FTP) You can use your standard ________ _______, or you can use special ___ ________.

A

internet, browser, FTP, software

80
Q

(FTP) FTP is a __________-oriented protocol that uses ___ for file transfer.

A

connection, TCP

81
Q

(SFTP) Secure FTP is just like FTP, except that it adds a layer of _______ to the data.

A

security

82
Q

(SFTP) Using Secure FTP, the data is actually encrypted using ______ _____ during data transfer. So, no sensitive data like passwords are sent in _____ ____.

A

Secure, Shell, clear, text

83
Q

(SMTP) SMTP stands for ______ ____ ________ ________.

A

Simple, Mail, Transfer, Protocol

84
Q

(SMTP) this is the protocol that is used to send _____.

A

email

85
Q

(SMTP) A good way to remember this is by looking at the acronym SMTP and translating that to “_______ ____ __ ______.”

A

sending, mail, to, people

86
Q

(SMTP) SMTP uses the ___ protocol, and as you know by now, it is __________-oriented. So, if an email you send does not reach its destination, you’ll get that familiar mail delivery error in your mailbox, informing that the email you sent ______.

A

TCP, connection, failed

87
Q

(POP3) Where SMTP is used for _______ email, POP3 is the protocol that is used for _________ email.

A

sending, receiving

88
Q

(POP3) Whenever an email arrives at your mail server, you can retrieve it using the ____ protocol and ________ it to your computer.

A

POP3, download

89
Q

(POP3) The main characteristic about POP3 is that all it does is grab the email from the mail server and ________ the email to your computer.

A

download

90
Q

(POP3) It does not sync any email or folders from the mail server and your computer like IMAP4 does, It strictly _________ the _____.

A

downloads, email

91
Q

(POP3) when your email application using POP3 retrieves the email from the mail server, the email is removed from the mail server unless you specify in your email application to keep a copy on the ____ ______.

A

mail server

92
Q

(POP3) POP3 is commonly used with email applications such as _________ _______.

A

Microsoft Outlook

93
Q

(IMAP4) IMAP4 is another protocol that is used for _________ _____.

A

receiving, email

94
Q

(IMAP4) IMAP4 is similar to POP3 because they are both used for retrieving email from a mail server, but _____ has better ________.

A

IMAP4, features

95
Q

(IMAP4) With IMAP4, you can access and manage your email on the server from your _____ _________. So, if you wanted to read your email and keep a copy of it on the server, IMAP4 will allow you to do just that.

A

local, computer

96
Q

(IMAP4) And unlike POP3, IMAP4 _____ your email and your email folders from the mail server with your computer.

A

syncs

97
Q

(IMAP4) IMAP4 is also commonly used with ________ _______.

A

Microsoft Outlook

98
Q

(HTTP) HTTP stands for __________ ________ ________

A

Hypertext, Transfer, Protocol

99
Q

(HTTP) this is probably the most widely ____ ________ in the world today.

A

used, protocol

100
Q

(HTTP) HTTP is the protocol that is used for _______ ___ _____ on the internet. So, when you type in a web address, for example, google.com, you’ll notice that HTTP is added at the beginning of the URL. And this indicates that you are now using HTTP to retrieve this web page.

A

viewing, web, pages

101
Q

(HTTP) In standard HTTP, all information is sent in _____ ____. Now, normally, this would be okay if you were just browsing regular websites. But if you were at a website where you had to enter _________ ____, such as passwords or credit card information, then this would be a problem as far as security.

A

clear, text, sensitive, data

102
Q

(HTTPS) HTTPS stands for ______ Hypertext Transfer Protocol.

A

Secure

103
Q

(HTTPS) this is HTTP with a ________ feature.

A

security

104
Q

(HTTPS) HTTPS encrypts the ____ that is being retrieved by _____.

A

data, HTTP

105
Q

(HTTPS) example, if you wanted to go to your bank’s website to check your account, you will notice that an “s” will be added to the HTTP in the web URL. And this indicates that you are now using HTTPS and have entered a ______ website where sensitive data is going to be passed. And that data needs to be protected.

A

secure

106
Q

(HTTPS) Some other examples where HTTPS is used would be like ______ servers or __-_________ websites.

A

email, e-commerce

107
Q

(Telnet) Telnet is a terminal emulation program that is used to ______ ______ ______.

A

access, remote, servers

108
Q

(Telnet) It’s a simple tool that runs on your computer, and it will allow you to ____ _________ ________.

A

send, commands, remotely

109
Q

(Telnet) because it only sends commands and not graphics, it’s very ____. But the drawback is that it’s ___ ______.

A

fast, not, secure

110
Q

(Telnet) All commands are sent in _____ ____.

A

clear, text

111
Q

(Telnet) So today, Telnet is mainly used to access _______ within a _____ _______ and not on the internet.

A

devices, local, network

112
Q

(SSH) SSH or ______ _____ is a better alternative to Telnet.

A

Secure Shell

113
Q

(SSH) Secure Shell protects the data from being ________ or stolen as it’s being transferred over a _______.

A

attacked, network

114
Q

(SSH) for example, if you were sending sensitive data like a login and password, a potential hacker could be listening and steal the data. And that’s the reason for ______ _____.

A

Secure, Shell

115
Q

(SSH) Secure Shell acts like a ______ ______ that forms around the data transfer and protects it from _________ _______.

A

secure, tunnel, potential, threats

116
Q

(ARP) ARP stands for _______ ___________ ________.

A

Address, Resolution, Protocol

117
Q

(ARP) this is a protocol that is used to resolve __ addresses to ___ addresses.

A

IP, MAC

118
Q

(ARP) Whenever a computer needs to communicate with another computer on the network, it needs the ___ _______ for that computer.

A

MAC address

119
Q

(ARP) let’s say a computer wants to communicate with another one. Now, it will first look at its internal list, called an ___ _____, to see if the targeted computer’s IP address already has a matching ____ address in its table. (PT.1)

A

ARP, cache, MAC

120
Q

(ARP) Now, if it doesn’t, it will send out a _________ _______ out on the network, asking which computer has the IP address. And the computer that has the matching IP address will respond back, informing that it has the IP it’s looking for. (PT.2)

A

broadcast, message

121
Q

(ARP) Then, the original computer will ask for their MAC address. And once it receives it, the ____________ will take place between the two. (PT.3)

A

communication

122
Q

(RARP) RARP, which stands for _______ _______ __________ ________.

A

Reverse, Address, Resolution, Protocol

123
Q

(RARP) this is just the ________ of ARP. It’s used to resolve MAC addresses to __ addresses.

A

opposite, IP

124
Q

(NTP) NTP stands for _______ ____ ________, and this is an internet standard that is used to ___________ the clocks of computers with the US Naval Observatory master clocks.

A

Network, Time, Protocol, synchronize

125
Q

(NTP) This protocol runs on each ________ and sends out periodic requests to the server to make sure the time is in ____.

A

computer, sync

126
Q

(SCP) SCP stands for ______ ____ ________

A

Secure, Copy, Protocol

127
Q

(SCP) this protocol simply uses Secure Shell to _________ data as it’s being transferred over a _______.

A

safeguard, network

128
Q

(SNMP) SNMP stands for ______ _______ ___________ ________.

A

Simple, Network, Management, Protocol

129
Q

(SNMP) this is a protocol used for _______ __________.

A

network, management

130
Q

(SNMP) It’s basically used for collecting data from various _______ _______, such as routers, printers, and servers.

A

network, devices

131
Q

(Ports) When data is sent over the internet to your computer, it needs to know how to accept it, and your computer accepts this data using _____.

A

ports

132
Q

(Ports) These ports are categorized by two protocols: ___ and ___.

A

TCP, UDP

133
Q

(Ports) Now, a port is a _______ __________ that is used by programs to exchange information, and these ports have a ______ ______ that identifies them.

A

logical, connection, unique, number

134
Q

(Ports) The number ranges from __ to __,___, but for the exam, you only need to know a few of them.

A

0-65k (65,535)

135
Q

(Ports) Some of these ports are very common and are used _____ ______ ___. For example, port 80 is used for bringing up web pages on the internet.

A

every, single, day

136
Q

(Ports) Another one is port 443, which is used for logging into ______ ___ _____ that require a login and password.

A

secure, web, pages

137
Q

(Ports) And another common one is port 25, which is used for _______ _____ from an _____ ____________ such as Microsoft Outlook.

A

sending, email, email application

138
Q

(DNS) DNS stands for ______ ____ ______.

A

Domain, Name, System

139
Q

(DNS) DNS resolves domain names to __ _________.

A

IP, addresses

140
Q

(DNS) In the world of networking, computers don’t go by names like humans do; they go by ________.

A

numbers

141
Q

(DNS) if you type in a web address in your web browser, DNS will transform the name to a ______ because all _________ know are numbers.

A

number, computers

142
Q

(DNS) demonstration, when you type in yahoo.com in your web browser, the DNS server will search through its database to find a matching IP address for that domain name. And when it finds it, it will transform that domain name to the __ _______ of the Yahoo web server.

A

IP, address

143
Q

(DNS) So, DNS basically works like a _____ ____. When you want to find a phone number, you don’t look up the number first; you look up the ____ first, then it will give you the number.

A

phone, book, name

144
Q

(WINS) WINS stands for _______ ________ ____ _______, and this is used on NetBIOS networks.

A

Windows, Internet, Name, Service

145
Q

(WINS) This service is similar to DNS, and as you recall, DNS resolves domain names to IP addresses. But WINS resolves _______ names or computer names to __ _________.

A

NetBIOS, IP, addresses

146
Q

(WINS) if you wanted to communicate with another computer on the same network, you would do so by using the __________ name, and then the WINS server will resolve the name to the __ _______ of that computer.

A

computer’s, IP, address

147
Q

(NAT) This is called _______ _______ ___________ or NAT, and this is a service that is typically used in routers.

A

Network, Address, Translation

148
Q

(NAT) It is used to ________ a set of IP addresses to another set of IP addresses.

A

translate

149
Q

(NAT) If a computer on the internet wants to communicate with a computer on this private network, then the public IP address needs to be _________ to the private IP address for that computer. (PT.2)

A

translated

150
Q

(PAT) Another version of Network Address Translation is called PAT, which stands for ____ _______ __________.

A

Port, Address, Translation

151
Q

(PAT) this translates IP addresses based on ____ ________.

A

port, numbers

152
Q

(PAT) Each computer in a private network is issued not only a unique IP address, but they are also issued a ______ ____ _______. (PT.1)

A

unique, port, number

153
Q

(PAT) This is done so that external data packets from the ________ know which computer on the _______ network it wants to talk to. (PT.2)

A

internet, private

154
Q

(PAT) example, if a device outside this network wanted to communicate with a computer on this private network, the IP address along with its port number will be translated by ___ to find the correct ________.

A

PAT, computer

155
Q

(SNAT) SNAT stands for ______ _______ _______ __________

A

Static, Network, Address, Translation

156
Q

(SNAT) NAT translates a private network’s IP addresses to a ______ __ _______.

A

public, IP, address

157
Q

(SNAT) So what SNAT does is that it can link a ______ IP address with a _______ IP address permanently, and this is useful when a computer or server needs to be accessed from outside the _______.

A

public, private, network

158
Q

(Proxy S) a proxy service is similar to your ___ ________.

A

web, browser

159
Q

(Proxy S) Whenever you look at a web page, your web browser will store that web page into _____. So, at a later time, if you were to look at that web page again, your browser retrieves it much faster because it doesn’t have to ________ the contents of that web page all over again since it’s already stored on your computer. And a _____ ______ does the same thing.

A

cache, download, proxy, server

160
Q

(Proxy S) example, if a company uses a proxy server, whenever a user wants to retrieve a web page, the proxy server will ________ the web page from the internet on behalf of the user. And then it will store that ___ page into a centralized cached ________. (PT.1)

A

retrieve, web, database

161
Q

(Proxy S) So, if another user on a different computer goes to a web page that has been stored in the proxy database, the proxy server does not have to go out on the internet to ________ the ___ ____. It can simply retrieve it from its database and send it to the user. (PT.2)

A

retrieve, web, page

162
Q

(Proxy S) a benefit of using a proxy service is ______ since web page retrieval is much faster.

A

speed

163
Q

(Proxy S) Proxy service saves _________ because a proxy server reduces the need to go out on the ________.

A

bandwidth, internet

164
Q

(Proxy S) it provides security because it reports what web pages are retrieved to the _______ _____________.

A

network, administrator

165
Q

(RDP) Remote Desktop Protocol is a technology from _________ to access a ______ __________ _______.

A

Microsoft, remote, computer’s, desktop

166
Q

(RDP) RDP is based on _________ _______ ________.

A

Microsoft, Terminal, Services

167
Q

(RDP) if a user wanted to access another computer, the user can simply type in an __ _______ along with the proper credentials. And then the user can have the ______ __________ _______ displayed on their own computer screen.

A

IP, address, remote, computer’s, desktop

168
Q

(CSMA/CD) When you have a lot of computers on a network, and they’re all sending data, the potential for collisions is present. And when you have __________, data communication is ____. So, that’s why they developed a protocol called CSMA/CD

A

collisions, lost

169
Q

(CSMA/CD) CSMA/CD, which stands for _______ _____ ________ ______/_________ _________.

A

Carrier, Sense, Multiple, Access/Collision Detection

170
Q

(CSMA/CD) this is the access method used on ________ ________. This method works by each computer first sensing if the wire is idle, and if it is, it sends its data, therefore ________ any __________.

A

ethernet, networks, avoiding, collisions

171
Q

(CSMA/CD) if you have two computers trying to send data at the same time, a _________ will ______. And if a collision happens, the computers will wait a random amount of time and _____ to send their data.

A

collision, happen, retry

172
Q

(CSMA/CA) CSMA/CA stands for ______ _____ ________ ______ with ________ __________, and this is the access method used for carrier transmission in ________ ________.

A

Carrier, Sense, Multiple, Access, Collision, Avoidance, wireless, networks

173
Q

(CSMA/CA) this method is similar to CSMA/CD, except that when a computer wants to send its data, it first sends out a _____ ____ ______ to make sure that the channel is _____ before sending out its main data. If the packet is successfully transmitted, then the computer is clear to send out its main data.

A

small, data, packet, clear

174
Q

(Broadcast) The term broadcast refers to when there is a single transmitter of ____, and that data is being received by ________ _________.

A

data, multiple, receivers

175
Q

(Broadcast) example, a wireless router can _________ its wireless signal and be picked up by ________ ___________ to access the internet.

A

broadcast, multiple, computers

176
Q

(Uni v. Mul) The difference between unicast and multicast is that with unicast, the data packets are sent to a ______ __________. And with multicast, the data packets are sent to ________ __________ at the same time.”

A

single , destination, multiple, destinations