MANAGE EXTENSIONS AND PLUG-INS, MANAGE PASSWORDS, POP-UP BLOCKERS, CLEARING THE CACHE, PRIVATE-BROWSING MODES, BROWSER DATA SYNCHRONIZATION, AND AD BLOCKERS ARE EXAMPLES OF:
What is Securing a Browser
THIS COMMAND TESTS CONNECTIVITY BY SENDING AN ECHO REQUEST TO A REMOTE COMPUTER.
WHAT IS PING
ALGORITHMS MD5, SHA-1, AND SHA-2. ALSO USED WHEN VERIFYING THAT A BROWSER DOWNLOAD WAS SUCCESSFUL.
WHAT ARE TYPES OF HASHING ALGORITHMS
THIS COMMAND CAN DISPLAY NETWORK CONFIGURATION INFORMATION AND REFRESH THE TCP/IP ASSIGNMENTS FOR A CONNECTION, INCLUDING ITS IP ADDRESS.
WHAT IS IPCONFIG
A TYPE OF CONNECTION IS OFTEN USED BY TELECOMMUTING EMPLOYEES TO CONNECT TO THE CORPORATE NETWORK BY WAY OF THE INTERNET. IT PROTECTS DATA BY ENCRYPTING IT FROM THE TIME IT LEAVES THE REMOTE COMPUTER UNTIL IT REACHES A SERVER ON THE CORPORATE NETWORK, AND VICE VERSA.
WHAT IS A VIRTUAL PRIVATE NETWORK (VPN)
THIS IS A TCP/IP COMMAND THAT LETS YOU READ INFORMATION FROM THE INTERNET NAMESPACE BY REQUESTING INFORMATION ABOUT DOMAIN NAME RESOLUTIONS FROM THE DNS SERVER’S ZONE DATA.
WHAT IS NSLOOKUP
A TYPE OF CONNECTION THAT REQUIRES A CONTRACT WITH A CELLULAR CARRIER AND A USB BROADBAND DEVICE OR A SIM SLOT ON A LAPTOP.
WHAT IS A WWAN (WIRELESS WIDE AREA NETWORK)
THIS COMMAND CAN BE USEFUL WHEN YOU’RE TRYING TO RESOLVE A PROBLEM REACHING A DESTINATION HOST SUCH AS AN FTP SITE OR WEBSITE.
WHAT IS TRACERT (TRACE ROUTE)
THREE POPULAR SECURITY PROTOCOLS THAT PROVIDE AUTHENTICATION SERVICES FOR LARGE NETWORKS.
WHAT IS RADIUS, TACACS+, AND KERBEROS
THIS COMMAND LISTS STATISTICS ABOUT THE NETWORK CONNECTION, INCLUDING THE IP ADDRESSES OF ACTIVE CONNECTIONS.
WHAT IS NETSTAT