Preview

Unit 3 problem set 1. Unit 3 problem

Good Essays
Open Document
Open Document
440 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Unit 3 problem set 1. Unit 3 problem
1. A software routine, which also acts as a filter that blocks certain type of incoming and outgoing traffic, while enabling other types is called a Firewall

2. The ________ tool provides a central access point for all of the network controls and connections on a computer running Windows 7. Network and Sharing Center

3. A device that connects one network to another is called a Router

4. The most common method for illustrating the operations of a network stack is the ________ , which consists of ________ layers.
Open Systems Interconnection (OSI) Reference model and 7 layers

5. Protocols that do not guarantee deliver of their data, but do operate with a very low overhead that conserve network bandwidth are called Connectionless-Oriented Protocol

6. The Windows 7 command line utility that can tell if the TCP/IP stack of another system on the network is functioning normally is called Ping.exe

7. The Windows 7 command line utility that enables you to generate DNS request messages and then transmit them to specific DNS servers on the network is called NSLookup.exe

8. Most networks use ________ to dynamically assign addresses and configure computers to use them. DHCP

9. The Windows 7 command line utility that displays a list of the routers currently forwarding packets to a particular destination is called TRACERT.EXE

10. The top and bottom layers of the OSI model are called the Application and Physical Layer

1. A software routine, which also acts as a filter that blocks certain type of incoming and outgoing traffic, while enabling other types is called a Firewall

2. The ________ tool provides a central access point for all of the network controls and connections on a computer running Windows 7. Network and Sharing Center

3. A device that connects one network to another is called a Router

4. The most common method for illustrating the operations of a network stack is the ________ , which consists of ________ layers.
Open

You May Also Find These Documents Helpful

  • Satisfactory Essays

    JG NT2640

    • 333 Words
    • 1 Page

    B. PC and switch. C. Router and hub D. Wireless access point (Ethernet port) and switch.…

    • 333 Words
    • 1 Page
    Satisfactory Essays
  • Good Essays

    In order to provide speed and reliability, large and enterprise-level networks today are typically constructed in multiple layers. They are the access layer, also called the network edge layer, the aggregation or distribution layer; and the network core layer. The access layer is usually a mesh of network switches, linked to other switches in the aggregation layer, which in turn is linked to the core.…

    • 681 Words
    • 2 Pages
    Good Essays
  • Powerful Essays

    Packet switching b. Circuit switching c. Telephone switching d. Telex switching 9. Internet is a. a local computer network b. a world wide network of computers c. an interconnected network of computers d. a world wide interconnected network of computers which use a common protocol to communicate with one another 10. ____________ is a set of computer programs used on a computer to help perform tasks. A. An instruction B. Software C. Memory D. A processor 11. System software is the set of programs that enables your computer’s hardware devices and ____________ software to work together. A. management B. processing C. utility D. application…

    • 5339 Words
    • 22 Pages
    Powerful Essays
  • Powerful Essays

    Nt1330 Unit 4

    • 3225 Words
    • 13 Pages

    The value of layers in the OSI reference model is that it divides networking into a series of tasks, and then illustrates how those tasks relate to each other.…

    • 3225 Words
    • 13 Pages
    Powerful Essays
  • Powerful Essays

    The 7 layers can be split logically into two subgroups. Layers 7 thru 4 focus on the end to end communication of data source and destinations. Layers 3 thru 1 are provide consistent communication between the network devices. An easier way of looking at the OSI model is dividing the upper layers (7, 6, 5) from the lower layers (4, 3, 2, 1). The upper layers deal with application issues and are implemented only in software. The highest layer, the application layer, is the closest to the end user. The lower layers are responsible for the transportation of the data. The physical layer and the data link layer are implemented in hardware and software. The lowest layer, the physical layer, is closest to the physical network medium (the wires, for example) and is responsible for placing data on the medium.…

    • 1266 Words
    • 6 Pages
    Powerful Essays
  • Satisfactory Essays

    It331 Unit 5 Essay

    • 593 Words
    • 3 Pages

    6) For the network that you have chosen to characterize for this class, identify the primary types of media employed. Be sure to include both how the computers individually connect into the network devices as well as how network devices interconnect and how the connection to the Internet is achieved. Briefly explain the purpose in the network of each type of media employed and identify at least one alternative media which could also fulfill this purpose.…

    • 593 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    IS3220 Final Exam

    • 700 Words
    • 4 Pages

    4. Which of the following protocols is a connection-oriented protocol that operates at the transport layer of the OSI model and supports reliable connections?…

    • 700 Words
    • 4 Pages
    Satisfactory Essays
  • Satisfactory Essays

    1. Describe the three modes of communication available on a network. (Minimum word count: 60)…

    • 494 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    IS3220

    • 1161 Words
    • 8 Pages

    4. Which of the following protocols is a connection-oriented protocol that operates at the transport layer of the OSI model and supports reliable connections?…

    • 1161 Words
    • 8 Pages
    Powerful Essays
  • Satisfactory Essays

    Overview|On a Windows 7 computer, the Network and Sharing Center provides access to most of the operating system’s networking tools and configuration parameters. In Exercise 7.1, you examine the current Sharing and Discovery settings on one of the computers that will become part of the lab network.|…

    • 740 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    With computers and IT exploding as it has over the past few years, so has the individuals that try to gain access to your machine. A firewall is a device that applies the security to your network. They come in all different sizes for different setups. Firewalls have two connections. One is to the computer/network and the other is connected to your Internet connection.…

    • 1097 Words
    • 5 Pages
    Good Essays
  • Satisfactory Essays

    Nmap ("Network Mapper") is a free and open source utility for network discovery and security auditing. Many systems and network administrators also find it useful for tasks such as network inventory, managing service upgrade schedules, and monitoring host or service uptime. Nmap uses raw IP packets to determine what hosts are available on the network, what services those hosts are offering, what operating systems they are running, what type of packet filters/firewalls are in use, and dozens of other characteristics. It was designed to rapidly scan large networks, and also works against single hosts. Nmap runs on all major computer operating systems, Linux, Windows, and Mac OS…

    • 414 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    NETW202 W1 Lab Report

    • 927 Words
    • 5 Pages

    In your own words, summarize what you have learned concerning network commands available within the Windows operating system.…

    • 927 Words
    • 5 Pages
    Powerful Essays
  • Powerful Essays

    Nt1310 Unit 7

    • 2452 Words
    • 10 Pages

    5. What are the seven layers of the OSI model (in order)? What is the role of each layer?…

    • 2452 Words
    • 10 Pages
    Powerful Essays
  • Good Essays

    unit 7 lab 10

    • 595 Words
    • 3 Pages

    Software firewalls are installed on individual computers and they need sufficient configuration to be effective. Software firewalls contain a set of related programs, usually located at a network gateway server, that protect the resources of a private network from users on other networks or from internal users. Software firewalls allow application screening to verify the interaction between the requesting client and the requested resource.…

    • 595 Words
    • 3 Pages
    Good Essays

Related Topics