Mod 7 Connecting to and Securing a Network
Across
- 2. When using the nslookup command, what kind of query takes an IP address and returns a domain name?
- 5. Which router feature, when enabled, helps computers on the local network automatically discover and communicate with services provided by other computers on the local network? Use the acronym.
- 8. A network that consists of many wireless devices communicating directly with each other to extend the range of the network. Devices relay the messages they receive; in other words, they receive a signal and send out the same signal to other devices. Each additional device acts as another relay with no added infrastructure devices (such as access points). Use the acronym.
- 9. Ping lets a technician read information from the Internet name space by requesting information about domain name resolutions from the DNS server zone data. For the answer, type Fals1 or True1
- 12. Suzi is attempting to connect to the company’s Windows domain server on the local network with her new laptop through a wired connection. She must have a valid user name and password configured on the Windows domain controller to ___ on the network.
- 13. This allows you to use a name like www.microsoft.com instead of trying to remember the IP address of the web server. What type of server can find an IP address for a computer when the fully qualified domain name is known? Use the acronym.
- 16. A connect-as-needed technology. A cellular ___ can be used to share the Internet connection on a mobile device with other mobile devices or computers using the device’s Wi-Fi.
- 18. A __ IP address could be used for the VPN connection but would be configured at the time of the initial VPN configuration. The most common reason for using a __ IP address is that it remains the same over time.
- 19. Christopher is troubleshooting a network connection and wants to see if he can connect to the server on his network. This command allows Christopher to echo request a computer on the network to see whether a network connection can be established; the time the process takes is measured. Which Microsoft command-line command should Christopher use to check whether he can connect to the server?
- 21. A dial-on-demand service, which means that a telephone number must be dialed when connecting to an ISP (Internet service provider). This service is not affected by adverse atmospheric conditions such as clouds, rain, snow, and fog.
- 24. This filtering is used to allow or deny network hosts access to the private LAN based on the host’s MAC address.
- 25. Port __ is used to forward one (or a few) protocols (ports) from the public untrusted network to a host on the private LAN. It is not intended be used to forward all ports.
- 27. Command is used to determine the amount of traffic on the network as a performance measurement.
- 30. Which function of a SOHO router blocks unwanted traffic initiated from the Internet and can restrict Internet access for local computers? It protects the private LAN from the public untrusted network (Internet) by blocking unwanted traffic from the Internet. Use the acronym.
- 32. An address ___ can be configured on a DHCP server to always assign the same IP address to a network host. When the host queries the DHCP server, the server checks the MAC address of the host and assigns the appropriate preconfigured IP address.
- 34. The phone jack standard that is typically used with DSL connections, POTS and dial-up modems.
- 35. The Tracert (trace route) command can be useful when a technician is trying to resolve a problem reaching a destination host, such as an FTP site or Web site. For the answer, type Fals3 or True3
- 36. SSID broadcasting should be __which will require users to know the SSID in order to log in but will not limit a device. Software is available that allows users to find a hidden SSID, which means this option will not provide a strong security setting.
- 38. Danielle, a remote user, connects her Windows 10 laptop to the corporate network by way of the Internet using a VPN tunnel. Which of the following is often configured as a required step for a user each time she attempts to use the VPN connection? Windows 10 can be configured to require the connecting user (Danielle) to enter her __ and password at the time she connects to a VPN.
Down
- 1. A ___ tunnel is a technique in which the data transferred between two points is protected by encryption. One typical application for this tunnel is for a remote employee to connect to his private corporate network via the public untrusted Internet. Use the acronym.
- 3. The __ and authentication methods would be configured at the time of the initial VPN configuration. These settings are determined by the network administrator and should not be changed by the user.
- 4. The __ is used to identify the network that you are connected to and the host identifier on that network.
- 6. A network that consists of personal devices communicating with each other at close range. The devices can use wireless (such as Bluetooth or Wi-Fi) or wired connectivity (such as USB or Lightning) but do not act as a relay. Use the acronym.
- 7. The address on the router that allows your traffic to move from your local network to the Internet. You use the ___ to route your requests for addresses outside your local network.
- 10. An always-on Internet technology that can be severely degraded (or impossible to use) under adverse weather and atmospheric conditions such as clouds, rain, snow, and fog.
- 11. Common name given to a network adapter. Used to connect a network host device to the switch on the local area network (LAN). Can be integrated (embedded) into the motherboard, it can be an expansion card, or it can be an external device plugged into a USB port.
- 14. A feature that prioritizes network traffic to guarantee delivery of data or improve the performance of a particular application or device.
- 15. The ___ server is configured to automatically assign IP addressing information to a host each time the host is connected to the network. Use the acronym.
- 17. Where in the Windows Control Panel will Ava find her computer’s network connection settings?
- 20. Command is used to determine the computer’s current IP configuration.
- 21. Enabled on a SOHO router to forward all protocols (ports) from the public untrusted network to a host on the private LAN. Use this setting carefully on a SOHO device as it can have serious security ramifications to all hosts on the private network. Use the acronym.
- 22. All SOHO routers come preconfigured with a default settings. Changing these settings is extremely important to prevent unauthorized access to the router settings. After connecting to the router, and before configuring anything else, it is best to change the router ‘s _____ (and the default user name if possible).
- 23. The ___ contains restricted or blocked sites and can be configured on a SOHO router.
- 26. Created to allow users with little to no experience to set up wireless protection using a button and PIN to connect to a wireless router. Use the acronym.
- 28. Network latency is the amount of time it takes for network data to reach a destination and return to its source. For the answer, type Fals or True
- 29. A network that covers multiple buildings on a large campus or in a large area of a city. Network technologies include wireless (such as LTE) and wired (such as Ethernet over fiber cabling). Use the acronym.
- 31. The __ is the hardware device used to connect the local area network (LAN) to a Internet service provider (ISP). The broadband technology transported over a coaxial cable that can provide high-speed Internet, TV, and voice via a single cable connection.
- 33. Cellular devices that use GSM or LTE requires this card to be installed in the device. Use the acronym.
- 37. A network that covers a small local area, such as an office or a home. Use the acronym.