Filters
Question type

Study Flashcards

A(n) ________ protocol doesn't require any type of connection to be established or maintained between two computers.

Correct Answer

verifed

verified

The tag <i> informs a browser that the text that follows the tag should be italicized.

A) True
B) False

Correct Answer

verifed

verified

Packet switching is the communications methodology where data is broken into ________ that are sent over various routes at the same time.

Correct Answer

verifed

verified

packets; d...

View Answer

In ________ encryption, only the two parties involved in sending a message have the code to unlock the message.

Correct Answer

verifed

verified

private-ke...

View Answer

The OpenPgP encryption protocol stands for Open Pretty Good Privacy.

A) True
B) False

Correct Answer

verifed

verified

IPv6 uses six groups of 16-bit numbers.

A) True
B) False

Correct Answer

verifed

verified

________ addressing means that your ISP assigns your computer a temporary IP address from an available pool of IP addresses each time you log on to the Internet.


A) Dynamic
B) Static
C) Automatic
D) Manual

E) A) and B)
F) A) and C)

Correct Answer

verifed

verified

Transport Layer Security (TLS) and ________ are two protocols that provide data integrity and security for Internet transmission.

Correct Answer

verifed

verified

Secure Sockets Layer...

View Answer

Strong encryption now requires ________-bit keys.


A) 40
B) 128
C) 256
D) 512

E) B) and D)
F) A) and C)

Correct Answer

verifed

verified

________ is the communications methodology where data are broken into smaller chunks to be sent over various routes at the same time.

Correct Answer

verifed

verified

Match each of the following terms to its definition:

Premises
MIME
SMTP
VoIP
encryption
PGP
Responses
protocol responsible for sending e-mail along the Internet to its destination
protocol used for sending attachments with e-mail
public-key encryption package
technology used to transmit phone calls over the Internet
process of coding an e-mail so that only the recipient can read it

Correct Answer

MIME
SMTP
VoIP
encryption
PGP

If a packet which is being sent between two computers is damaged in transit, a(n) ________ acknowledgment is sent.

Correct Answer

verifed

verified

In the acronym HTTPS, the S stands for ________.

Correct Answer

verifed

verified

The JavaScript ________ defines items on a web page such as graphics, tables, and headers as objects.


A) SSL
B) MIME
C) JSON
D) DOM

E) A) and B)
F) A) and C)

Correct Answer

verifed

verified

A(n) ________ links a URL to an IP address when a web page is requested.

Correct Answer

verifed

verified

DNS server; Domain N...

View Answer

A communications server is a specialized computer whose sole function is to store, process, and send e-mail.

A) True
B) False

Correct Answer

verifed

verified

A secure website using SSL encryption will have ________ followed by ://www.websitename.com as the protocol in its URL.

Correct Answer

verifed

verified

When using ________ addressing, a computer is assigned a temporary address from a pool of available IP addresses.

Correct Answer

verifed

verified

dynamic; DHCP; Dynam...

View Answer

Which of the following is an example of an instant messaging service?


A) LinkedIn
B) Monster
C) WhatsApp
D) Flickr

E) A) and B)
F) A) and C)

Correct Answer

verifed

verified

________ uses a dedicated connection between two points with the connection remaining active for the duration of the transmission.


A) Packet switching
B) An open circuit
C) Circuit switching
D) A closed circuit

E) A) and B)
F) None of the above

Correct Answer

verifed

verified

Showing 21 - 40 of 124

Related Exams

Show Answer