Geschreven door studenten die geslaagd zijn Direct beschikbaar na je betaling Online lezen of als PDF Verkeerd document? Gratis ruilen 4,6 TrustPilot
logo-home
Tentamen (uitwerkingen)

CIS 260 TEST 2 QUESTIONS ANSWERED CORRECTLY LATEST UPDATE 2026

Beoordeling
-
Verkocht
-
Pagina's
3
Cijfer
A+
Geüpload op
16-05-2026
Geschreven in
2025/2026

CIS 260 TEST 2 QUESTIONS ANSWERED CORRECTLY LATEST UPDATE 2026 What do MacOS, Linux, and Windows all have in common - Answers They are all clients for p2p networking They are all clients for networking What is the standard set of internet protocols used today - Answers TCP/IP What is a connection-oriented protocol - Answers A protocol that requires an exchange of messages before data transfer begins This connection ensures all data makes it to its destination TCP What is a connectionless protocol - Answers No connection is made between the parties before data transfer begins There is no guarantee of packet delivery; packets may be lost UDP What is the purpose of connection-oriented protocols - Answers It is reliable, orderly, and error correcting; this is at the expense of speed What is the purpose of connectionless protocols - Answers Minimal setup, Used in real-time communication (VOIP), efficient for unreliable networks What are some examples of TCP protocols - Answers Telnet, SSH, FTP, HTTP (port 80), HTTPS, SSL, RDP, SMTP What are some examples of UDP protocols - Answers VoIP, DNS (actually uses both), DHCP, SNMP What is tunneling? - Answers protocol is a communication method that encapsulates one network protocol within another to ensure secure data transmission over a network. -used for vpn -used when encapsulating from IPv4 to IPv6 What is encapsulating packets - Answers packet encapsulation is a process used to transmit packets over a network with various devices and protocols You do this by wrapping a packet in the headers and info of a different protocol. When the packet reaches its destination, it is unwrapped, and the original packet is read What are logical ports - Answers Logical ports are virtual, not physical, communications gateways that allow a computer to organize requests for information from other networks or computers. Logical ports are numbered and assigned to specific services What is bandwidth - Answers The maximum rate of data transfer that can occur across a network (usually measured in Mbps or Gbps) What is a daemon - Answers a background process that runs without the need for user interaction -example: Apache, Nginx What is ICANN? - Answers Internet Corporation for Assigned Names and Numbers: Responsible for the coordination of maintenance and methodology of several databases of unique identifiers related to the namespaces of the Internet, and ensuring the network's stable and secure operation. Provide IP addresses Oversees IANA What is the purpose of an IP address - Answers It uniquely identifies the location of each computer or device connected to the Internet Used as a unique identifier (destination) for packets to go to What is a private network? What makes a network private? - Answers A private network is a network that is isolated and restricts access only to authorized users. The IP range of a network makes it easy to identify if it is private or not. 10.0.0.0 - 10.255.255.255 (10.0.0.0/8) 172.16.0.0 - 172.31.255.255 (172.16.0.0/12) 192.168.0.0 - 192.168.255.255 (192.168.0.0/16) What is the purpose of a subnet mask - Answers A subnet mask identifies which bits in an IP address are to be used to represent the network/subnet portion of an IP address.

Meer zien Lees minder
Instelling
CIS 260
Vak
CIS 260

Voorbeeld van de inhoud

CIS 260 TEST 2 QUESTIONS ANSWERED CORRECTLY LATEST UPDATE 2026

What do MacOS, Linux, and Windows all have in common - Answers They are all clients for p2p
networking
They are all clients for networking
What is the standard set of internet protocols used today - Answers TCP/IP
What is a connection-oriented protocol - Answers A protocol that requires an exchange of messages
before data transfer begins
This connection ensures all data makes it to its destination
TCP
What is a connectionless protocol - Answers No connection is made between the parties before data
transfer begins
There is no guarantee of packet delivery; packets may be lost
UDP
What is the purpose of connection-oriented protocols - Answers It is reliable, orderly, and error
correcting; this is at the expense of speed
What is the purpose of connectionless protocols - Answers Minimal setup, Used in real-time
communication (VOIP), efficient for unreliable networks
What are some examples of TCP protocols - Answers Telnet, SSH, FTP, HTTP (port 80), HTTPS, SSL,
RDP, SMTP
What are some examples of UDP protocols - Answers VoIP, DNS (actually uses both), DHCP, SNMP
What is tunneling? - Answers protocol is a communication method that encapsulates one network
protocol within another to ensure secure data transmission over a network.
-used for vpn
-used when encapsulating from IPv4 to IPv6
What is encapsulating packets - Answers packet encapsulation is a process used to transmit packets
over a network with various devices and protocols

You do this by wrapping a packet in the headers and info of a different protocol. When the packet
reaches its destination, it is unwrapped, and the original packet is read
What are logical ports - Answers Logical ports are virtual, not physical, communications gateways
that allow a computer to organize requests for information from other networks or computers.
Logical ports are numbered and assigned to specific services
What is bandwidth - Answers The maximum rate of data transfer that can occur across a network
(usually measured in Mbps or Gbps)
What is a daemon - Answers a background process that runs without the need for user interaction
-example: Apache, Nginx
What is ICANN? - Answers Internet Corporation for Assigned Names and Numbers:
Responsible for the coordination of maintenance and methodology of several databases of unique
identifiers related to the namespaces of the Internet, and ensuring the network's stable and secure
operation.
Provide IP addresses
Oversees IANA
What is the purpose of an IP address - Answers It uniquely identifies the location of each computer or
device connected to the Internet
Used as a unique identifier (destination) for packets to go to
What is a private network? What makes a network private? - Answers A private network is a network
that is isolated and restricts access only to authorized users. The IP range of a network makes it easy
to identify if it is private or not.

10.0.0.0 - 10.255.255.255 (10.0.0.0/8)
172.16.0.0 - 172.31.255.255 (172.16.0.0/12)
192.168.0.0 - 192.168.255.255 (192.168.0.0/16)
What is the purpose of a subnet mask - Answers A subnet mask identifies which bits in an IP address
are to be used to represent the network/subnet portion of an IP address.

Geschreven voor

Instelling
CIS 260
Vak
CIS 260

Documentinformatie

Geüpload op
16 mei 2026
Aantal pagina's
3
Geschreven in
2025/2026
Type
Tentamen (uitwerkingen)
Bevat
Vragen en antwoorden

Onderwerpen

€10,19
Krijg toegang tot het volledige document:

Verkeerd document? Gratis ruilen Binnen 14 dagen na aankoop en voor het downloaden kun je een ander document kiezen. Je kunt het bedrag gewoon opnieuw besteden.
Geschreven door studenten die geslaagd zijn
Direct beschikbaar na je betaling
Online lezen of als PDF


Ook beschikbaar in voordeelbundel

Maak kennis met de verkoper

Seller avatar
De reputatie van een verkoper is gebaseerd op het aantal documenten dat iemand tegen betaling verkocht heeft en de beoordelingen die voor die items ontvangen zijn. Er zijn drie niveau’s te onderscheiden: brons, zilver en goud. Hoe beter de reputatie, hoe meer de kwaliteit van zijn of haar werk te vertrouwen is.
joshuawesonga22 Liberty University
Volgen Je moet ingelogd zijn om studenten of vakken te kunnen volgen
Verkocht
97
Lid sinds
1 jaar
Aantal volgers
1
Documenten
14118
Laatst verkocht
3 dagen geleden
Tutor Wes

Hi there! I'm Tutor Wes, a dedicated tutor with a passion for sharing knowledge and helping others succeed academically. All my notes are carefully organized, detailed, and easy to understand. Whether you're preparing for exams, catching up on lectures, or looking for clear summaries, you'll find useful study materials here. Let’s succeed together!

3,9

9 beoordelingen

5
4
4
1
3
3
2
1
1
0

Recent door jou bekeken

Waarom studenten kiezen voor Stuvia

Gemaakt door medestudenten, geverifieerd door reviews

Kwaliteit die je kunt vertrouwen: geschreven door studenten die slaagden en beoordeeld door anderen die dit document gebruikten.

Niet tevreden? Kies een ander document

Geen zorgen! Je kunt voor hetzelfde geld direct een ander document kiezen dat beter past bij wat je zoekt.

Betaal zoals je wilt, start meteen met leren

Geen abonnement, geen verplichtingen. Betaal zoals je gewend bent via iDeal of creditcard en download je PDF-document meteen.

Student with book image

“Gekocht, gedownload en geslaagd. Zo makkelijk kan het dus zijn.”

Alisha Student

Bezig met je bronvermelding?

Maak nauwkeurige citaten in APA, MLA en Harvard met onze gratis bronnengenerator.

Bezig met je bronvermelding?

Veelgestelde vragen