Solved

Match Each Item with a Statement Below

Question 24

Matching

Match each item with a statement below.

Premises:
assigns an IP address to a computer when it first attempts to initiate a connection to the network
designed to make it easier for users to connect their computers to a wireless network when a hard-to-remember SSID and security key are used
identifies a computer and the network to which it belongs, such as www.cengage.com
a technique designed to conserve the number of public IP addresses needed by a network
Used by a computer or other device to determine if an IP address of another computer is on its network or another network
A group of computers on a peer-to-peer network that are sharing resources
commonly used by Linux to pass sign-in information to a remote computer and control that computer over a network
protects data by encrypting it from the time it leaves a remote computer until it reaches a server on a corporate network, using a technique called tunneling.
a command that can be used to display the TCP/IP configuration
a protocol used by various client applications when the application needs to query a database
Responses:
Secure Shell (SSH)
Lightweight Directory Access Protocol (LDAP)
DHCP server
Network Address Translation (NAT)
subnet mask
ipconfig
virtual private network
Wi-Fi Protected Setup (WPS)
Fully Qualified Domain Name (FQDN)
workgroup

Correct Answer:

assigns an IP address to a computer when it first attempts to initiate a connection to the network
designed to make it easier for users to connect their computers to a wireless network when a hard-to-remember SSID and security key are used
identifies a computer and the network to which it belongs, such as www.cengage.com
a technique designed to conserve the number of public IP addresses needed by a network
Used by a computer or other device to determine if an IP address of another computer is on its network or another network
A group of computers on a peer-to-peer network that are sharing resources
commonly used by Linux to pass sign-in information to a remote computer and control that computer over a network
protects data by encrypting it from the time it leaves a remote computer until it reaches a server on a corporate network, using a technique called tunneling.
a command that can be used to display the TCP/IP configuration
a protocol used by various client applications when the application needs to query a database
Related Questions

Unlock this Answer For Free Now!

View this answer and more for free by performing one of the following actions

qr-code

Scan the QR code to install the App and get 2 free unlocks

upload documents

Unlock quizzes for free by uploading documents