Chapter+18+study

// Identify the choice that best completes the statement or answers the question. // 1. On the World Wide Web, the client is called a(n). 2. On the World Wide Web, the server is called a(n). 3. A(n) number is assigned to each server application when it is started. 4. A Web server is normally assigned port. 5. An e-mail server receiving mail is normally assigned port. 6., which are communication links created between two software programs, are managed by the browser and Web server using HTTP. 7. TCP and UDP pass requests to, which is responsible for breaking up and reassembling data into packets and routing them to their destination. 8. is responsible for communicating problems with transmission. 9. The utility displays the NIC’s MAC address. 10. provides system management tools for networks. 11. Dial-up networking works by using Protocol to send packets of data over phone lines. 12. Port is used to open or close certain ports so they can or cannot be used. 13. The strongest tunneling protocol is. 14. One of the possible file extensions for a Web page is. 15. A(n) is an address for a Web page or other resource on the Internet. 16. The part of a URL specifies the rules the Web server should use when transmitting the page to the browser. 17. The final segment of a domain name is called the domain and tells you something about the organization or individual who owns the name. 18. is the de facto standard developed by Netscape and used by all browsers; it uses an encryption system that uses a digital certificate. 19. To know if a connection to a Web site is secured, look for in the browser address box and a lock icon at the bottom of the browser window. 20. An e-mail sender’s PC and e-mail server both use to send an e-mail message to its destination. 21. The most popular way to transfer files over the Internet is to use the, which can transfer files between two computers using the same or different operating systems. // Complete each statement. // 22. Most applications that use the Internet are ___________applications, which means that two computers and two applications are involved. 23. Connecting to a network, such as the Internet, using a modem and regular phone line is called __________networking. 24. Windows XP and Windows 98 use _____to manage two or more networked computers that share a single Internet connection. 25. On the client end, to configure a VPN using Windows XP, a VPN network connection is created using the Windows XP ______window. 26. A(n) ________is a code assigned to you by a certificate authority such as VeriSign that uniquely identifies you on the Internet and includes a public key. __ // Identify the letter of the choice that best matches the phrase or definition. //__ 27. The protocol used for the World Wide Web and used by Web browsers and Web servers to communicate 28. A connection-oriented protocol; used by applications such as Web browsers and e-mail 29. A connectionless protocol; primarily used for broadcasting and other types of transmissions, such as streaming video or sound over the Web 30. Responsible for locating a host on a local network 31. Responsible for discovering the Internet address of a host on a local network 32. Displays the IP address of the host and other configuration information 33. Works by using encrypted data packets between a private network and a computer somewhere on the Internet 34. A protocol that is used by Internet or intranet telephone networks to provide voice communication over a network 35. Displays information about domain names and their IP addresses 36. In a client/server environment, what is a server? 37. What does the term broadband refer to? 38. What are the three most important things you can do to protect a single computer or network?
 * Chapter 18 **
 * Multiple Choice **
 * a. || Web host || c. || cable modem ||
 * b. || Web browser || d. || application port ||
 * a. || Web host || c. || cable modem ||
 * b. || Web browser || d. || application port ||
 * a. || IP || c. || URL ||
 * b. || Web || d. || port ||
 * a. || 20 || c. || 80 ||
 * b. || 25 || d. || 143 ||
 * a. || 20 || c. || 80 ||
 * b. || 25 || d. || 143 ||
 * a. || Protocols || c. || Ports ||
 * b. || Packets || d. || Sessions ||
 * a. || IP || c. || FTP ||
 * b. || SMTP || d. || ARP ||
 * a. || ARP || c. || RARP ||
 * b. || ICMP || d. || Getmac ||
 * a. || ARP || c. || Ping ||
 * b. || Ipconfig || d. || Getmac ||
 * a. || SNMP || c. || ARP ||
 * b. || Telnet || d. || FTP ||
 * a. || Simple Mail Transfer || c. || File Transfer ||
 * b. || Point-to-Point || d. || Integrated Services ||
 * a. || caching || c. || forwarding ||
 * b. || filtering || d. || policing ||
 * a. || L2TP || c. || L2TP over IPSec ||
 * b. || SSL || d. || PPTP ||
 * a. || .exe || c. || .bat ||
 * b. || .txt || d. || .htm ||
 * a. || HTTP || c. || ARP ||
 * b. || URL || d. || FTP ||
 * a. || protocol || c. || extension ||
 * b. || domain || d. || suffix ||
 * a. || bottom-level || c. || top-level ||
 * b. || extension-level || d. || suffix-level ||
 * a. || HTTPS || c. || PPTS ||
 * b. || SSL || d. || FTP ||
 * a. || ssl || c. || cert ||
 * b. || tls || d. || https ||
 * a. || FTP || c. || ISDN ||
 * b. || VoIP || d. || SMTP ||
 * a. || SMTP || c. || NNTP ||
 * b. || FTP || d. || VoIP ||
 * Completion **
 * Matching **
 * a. || ARP || f. || VPN ||
 * b. || VoIP || g. || HTTP ||
 * c. || RARP || h. || NSLookup ||
 * d. || Ipconfig || i. || TCP ||
 * e. || UDP ||||  ||
 * Short Answer **