Top-Rated Free Essay
Preview

Computer Knowledge Assessment Test

Satisfactory Essays
482 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Computer Knowledge Assessment Test
182 Lesson 5
Knowledge Assessment
Fill in the Blank
Complete the following sentences by writing the correct word or words in the blanks provided. 1. A software routine, which also acts as a filter that blocks certain type of incoming and outgoing traffic, while enabling other types is called a . 2. The _ tool provides a central access point for all of the network controls and connections on a computer running Windows 7. 3. A device that connects one network to another is called a . 4. The most common method for illustrating the operations of a networking stack is the , which consists of layers. 5. Protocols that do not guarantee delivery of their data, but do operate with a very low overhead that conserve network bandwidth are called . 6. The Windows 7 command-line utility that can tell you if the TCP/IP stack of another system on the network is functioning normally is called . 7. The Windows 7 command-line utility that enables you to generate DNS request messages and then transmit them to specific DNS servers on the network is called . 8. Most networks use to dynamically assign addresses and configure computers to use them.
9. The Windows 7 utility that displays a list of the routers currently forwarding packets to a particular destination is called .
10. The top and bottom layers of the OSI model are called the and layers.
True / False
Circle T if the statement is true or F if the statement is false.
F 1. The purpose of Network Diagnostics is to display error messages only.
F 2. Transport layer protocols are not concerned with addressing packets to the correct system.
F 3. The Network Map utility uses a new protocol called Link Layer Topology Discovery (LLTD) to discover information about the network and the devices attached to it.
F 4. The protocols that Windows uses by default at the network and transport layers are collectively called TCP/IP.
F 5. Home and work computers have Network Discovery turned on, and public com-puters have it turned off.
F 6. There are two basic types of port numbers: ephemeral port numbers and well-known port numbers.
F 7. A Windows 7 computer that is connected to a LAN has a hardware address and a computer that is connected to the Internet has an IP address.
F 8. The only two layers of the OSI reference model that do not have individual proto-cols associated with them are the transport layer and the session layer.
F 9. Because the configuration of the Internet is constantly changing, the only way you can know for certain what route packets are taking to a specific destination is to use Tracert.exe.
F10. The IPv6 addresses Windows 7 computers use at die network layer are six-byte hexa-decimal sequences, hard coded into each network interface adapter by the manufacturer.

You May Also Find These Documents Helpful

  • Powerful Essays

    Tcptrack is a sniffer which displays information about TCP connections it sees on a network interface.…

    • 1518 Words
    • 5 Pages
    Powerful Essays
  • Powerful Essays

    Tcptrack is a sniffer which displays information about TCP connections it sees on a network interface.…

    • 1518 Words
    • 5 Pages
    Powerful Essays
  • Satisfactory Essays

    IS3220 Final Exam

    • 700 Words
    • 4 Pages

    4. Which of the following protocols is a connection-oriented protocol that operates at the transport layer of the OSI model and supports reliable connections?…

    • 700 Words
    • 4 Pages
    Satisfactory Essays
  • Satisfactory Essays

    nt1210 lab3

    • 324 Words
    • 2 Pages

    Combines layers 5, 6 and 7: provides network services such as email, file transfers, exchanges of data, support connections between sessions and inner host communications…

    • 324 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    9. Historically, which of the following models were the earliest models used in corporate networks? TCP/IP…

    • 1038 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    IS3220

    • 1161 Words
    • 8 Pages

    4. Which of the following protocols is a connection-oriented protocol that operates at the transport layer of the OSI model and supports reliable connections?…

    • 1161 Words
    • 8 Pages
    Powerful Essays
  • Satisfactory Essays

    Overview|On a Windows 7 computer, the Network and Sharing Center provides access to most of the operating system’s networking tools and configuration parameters. In Exercise 7.1, you examine the current Sharing and Discovery settings on one of the computers that will become part of the lab network.|…

    • 740 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Nmap "Network Mapper" is a free and open source utility for network discovery and security auditing. Many systems and network administrators also find it useful for tasks such as network inventory, managing service upgrade schedules, and monitoring host or service uptime. Nmap uses raw IP packets to determine what hosts are available on the network, what services those hosts are offering, what operating systems they are running, what type of packet filters/firewalls are in use, and dozens of other characteristics.…

    • 281 Words
    • 1 Page
    Satisfactory Essays
  • Good Essays

    Lab 01

    • 424 Words
    • 2 Pages

    Wireshark provides detailed information about network traffic down to the packet level. However, many are…

    • 424 Words
    • 2 Pages
    Good Essays
  • Powerful Essays

    TCP / IP Model - provides end-to-end connectivity specifying how data should be formatted, addressed, transmitted, routed and received at the destination. This functionality has been organized into four abstraction layers which are used to sort all related protocols according to the scope of networking involved.[1][2] From lowest to highest, the layers are the link layer, containing communication technologies for a single network segment (link), the internet layer, connecting hosts across independent networks, thus establishing internetworking.…

    • 559 Words
    • 3 Pages
    Powerful Essays
  • Satisfactory Essays

    NT 1210, Unit 3 Homework

    • 1335 Words
    • 5 Pages

    5. Which of the following are true about the commonly used version of the TCP/IP model as shown in this chapter? (Choose two answers.)…

    • 1335 Words
    • 5 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Nmap ("Network Mapper") is a free and open source utility for network discovery and security auditing. Many systems and network administrators also find it useful for tasks such as network inventory, managing service upgrade schedules, and monitoring host or service uptime. Nmap uses raw IP packets to determine what hosts are available on the network, what services those hosts are offering, what operating systems they are running, what type of packet filters/firewalls are in use, and dozens of other characteristics. It was designed to rapidly scan large networks, and also works against single hosts. Nmap runs on all major computer operating systems, Linux, Windows, and Mac OS…

    • 414 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    2. What is seen in each of the three panes that display the packets seen on a local area network?…

    • 320 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Ch 6 Notes

    • 1099 Words
    • 5 Pages

    | What protocol is used when an application requires acknowledgment that a message is delivered?…

    • 1099 Words
    • 5 Pages
    Satisfactory Essays
  • Satisfactory Essays

    The above command lists out all "listening" "tcp" connections. The n option disables hostname resolution of the ip addresses giving the output faster.…

    • 732 Words
    • 4 Pages
    Satisfactory Essays