answersLogoWhite

0

Computer Networking

User Avatar

Ryan Lindgren

Lvl 10
2y ago
5.0
1 Review
Add a rating

Rate this Study Guide:

Cards in this guide (10)
How do you connect to a secured wireless network

you must have the encryption key to connect to a secured wireless network.

What is NIC identifier

It is the 12 hexadecimal digit combination identifying the manufacturer and id of your NIC

the first 6 digits is the OUI(Organizationally unique Identifier), this identifies the company that made the NIC

the last 6 digits is the USI(Unique station identifier) this identifies your NIC

A NIC identifier can only contain letters from A to F and numbers from 0 to 5

a NIC identifier, more commonly known as data-link layer address or MAC address looks like this:

A6-D5-FF-5A-3D-6A

IP address 227.43.76.109 is an example of which classes of IP addresses

C

What network topology is each node connected to the next by a direct line so that a continuous line is formed

Bus Topology. See 10-BASE2

The built-in identifying address coded into the NIC by the manufacturers is called what

Mac address

What part of the electromagnetic spectrum is used in communication

radiation

What is the command to find out which path or route packets travel across a network

Use traceroute (tracert) or pathping

What is the dns ip address for Gmail

DNS is the domain name system for short .DNS is a system that maps a name to an address . Ip address for Gmail.com is 173.194.36.86 .

Which TCP IP architecture layer makes use of ports

Network

What is an SSL protocol

SSL stands for Secure Sockets Layer. SSL protocol connects your computer to secure servers on the internet. SSL protocol is used on websites that require secure connections such as those used for banking.

Related study guides

How do you connect to a secured wireless network

What service translates domain names computer hostnames to IP addresses

IP address 227.43.76.109 is an example of which classes of IP addresses

What network topology is each node connected to the next by a direct line so that a continuous line is formed

➡️
See all cards
1.0
1 Review

How do you connect to a secured wireless network

Which layer of TCPIP handles confidentiality

What service translates domain names computer hostnames to IP addresses

When was the first commercial computers sold

➡️
See all cards
2.33
3 Reviews

How do you connect to a secured wireless network

Which layer of TCPIP handles confidentiality

What service translates domain names computer hostnames to IP addresses

When was the first commercial computers sold

➡️
See all cards
3.5
14 Reviews

How do you connect to a secured wireless network

Which layer of TCPIP handles confidentiality

What is NIC identifier

What service translates domain names computer hostnames to IP addresses

➡️
See all cards
4.67
3 Reviews

What does the owner of a restaurant do

Is hulu free software

Which city was the Trojan Horse in

When was Your Future Our Clutter created

➡️
See all cards
4.0
3 Reviews