4 Network + Final Study Guide (Completion) Flashcards
1
Q
- How the network resources are to be used should be clearly defined in a (an) __________ policy.
A
acceptable use
2
Q
- In Linux, passwords are stored in an encrypted format in the __________ file, which is located in the /etc directory.
A
shadow
3
Q
- __________ authentication uses keys that are generated by the OS instead of being manually entered by an administrator.
A
kerberos
4
Q
- __________ is a free open-source product that can be used to encrypt the contents of an entire drive.
A
TrueCrypt
5
Q
- A (an) __________ is a type of Trojan program that hides in the operating system files and is extremely difficult to detect.
A
rootkit
6
Q
- When a switch receives a broadcast frame, it __________ the frame out to all ports.
A
floods
7
Q
- A switch that is configured to use the Spanning Tree Protocol will place a port in __________ mode if sending traffic to it may cause a switching loop.
A
blocking
8
Q
- A router’s final task when handling a packet is to send the packets on to its next and possibly final destination this is referred to as packet __________.
A
forwarding
9
Q
- One type of security for wireless networks involves entering a list of the MAC addresses for the devices that are allowed to access the network and excluding all others. This is called MAC__________.
A
filtering
10
Q
- A __________ is used to make connections between the network interface card and the other vital components of the computer, such as the central processing unit.
A
bus
11
Q
- A __________ is a program that runs in the background and provides support for other processes.
A
service
12
Q
- In __________ multitasking, either the user or the OS can terminate a process that is monopolizing the CPC’s time.
A
pre-emptive
13
Q
- A __________ file is simply a text file that contains a list of commands that you would normally enter in a command prompt.
A
batch
14
Q
- When a user enters his username and password to log on to a machine, he is invoking the process of __________.
A
authentication
15
Q
- A device that has no directly attached user interfaces and comes with specialized software designed to perform a specific task is called a network __________.
A
appliance