4 Network + Final Study Guide (Completion) Flashcards

1
Q
  1. How the network resources are to be used should be clearly defined in a (an) __________ policy.
A

acceptable use

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q
  1. In Linux, passwords are stored in an encrypted format in the __________ file, which is located in the /etc directory.
A

shadow

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q
  1. __________ authentication uses keys that are generated by the OS instead of being manually entered by an administrator.
A

kerberos

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q
  1. __________ is a free open-source product that can be used to encrypt the contents of an entire drive.
A

TrueCrypt

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q
  1. A (an) __________ is a type of Trojan program that hides in the operating system files and is extremely difficult to detect.
A

rootkit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q
  1. When a switch receives a broadcast frame, it __________ the frame out to all ports.
A

floods

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q
  1. A switch that is configured to use the Spanning Tree Protocol will place a port in __________ mode if sending traffic to it may cause a switching loop.
A

blocking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q
  1. A router’s final task when handling a packet is to send the packets on to its next and possibly final destination this is referred to as packet __________.
A

forwarding

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q
  1. One type of security for wireless networks involves entering a list of the MAC addresses for the devices that are allowed to access the network and excluding all others. This is called MAC__________.
A

filtering

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q
  1. A __________ is used to make connections between the network interface card and the other vital components of the computer, such as the central processing unit.
A

bus

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q
  1. A __________ is a program that runs in the background and provides support for other processes.
A

service

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q
  1. In __________ multitasking, either the user or the OS can terminate a process that is monopolizing the CPC’s time.
A

pre-emptive

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q
  1. A __________ file is simply a text file that contains a list of commands that you would normally enter in a command prompt.
A

batch

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q
  1. When a user enters his username and password to log on to a machine, he is invoking the process of __________.
A

authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q
  1. A device that has no directly attached user interfaces and comes with specialized software designed to perform a specific task is called a network __________.
A

appliance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q
  1. When Windows is first installed, two user accounts are created by default. One is the Administrator account, and the other is the __________ account.
A

guest

17
Q
  1. A user logs on to the network from a different computer than they normally use, and they still have the same desktop as usual. This user’s profile is called a __________ profile.
A

roaming

18
Q
  1. The __________ file system supports a maximum file size of 2GB
A

FAT16

19
Q
  1. In Windows, the term for a compute that accepts job requests for a shared printer and sends then to the physical device is called a print __________.
A

server

20
Q
  1. As a network administrator, it is a good idea to have a performance __________, a collection of performance data from a time when the network is performing normally.
A

baseline

21
Q
  1. One of the first decisions that a small business must focus on is whether to create a peer-to-peer network or a __________ based network
A

server-

22
Q
  1. In Windows 7, you can use a (an) __________ to simplify the process of file and printer sharing and make it unnecessary to create individual user accounts on each computer.
A

HomeGroup

23
Q
  1. __________ products are those that are intended for the home user and therefore don’t come equipped with advanced features.
A

consumer

24
Q
  1. A router that is using __________ -to-gateway VPN mode allows users to connect to the network without having any specialized software installed on their computers.
A

gateway

25
Q
  1. __________ is a secure method of gaining command-line access to a computer or network device.
A

SSH

26
Q
  1. Most manufactures store their technical support problems and solutions in a database called a knowledge base or a __________ document
A

frequently asked questions

27
Q
  1. To eliminate the potential problems caused by power fluctuations, especially on servers, you can install __________.
A

uninterruptible power supplies

28
Q
  1. A __________ copies selected files to the selected media without marking files as backed up.
A

copy backup

29
Q
  1. The __________ Windows command is used to determine the network path between two devices.
A

tracert

30
Q
  1. Whether your problem and proposed solution affect an entire network or just a few uses, you must devise a __________ so that you can return things to their original state if the solution doesn’t work.
A

rollback plan

31
Q
  1. __________ is a PVC packet-switching technology that offers WAN communication over a fast, reliable, digital link. It was developed from X.25 and ISDN technology.
A

frame relay

32
Q
  1. If a portion of a T-Carrier line is used for one purpose and a different portion for another purpose, the line has been __________.
A

fractionalized

33
Q
  1. A __________ is a device that allows a computer, which works with digital information, to communicate over lines that use analog signals.
A

modem

34
Q
  1. The CPE must be able to send data in the correct format onto the connection that make up the __________ and receives data coming from that connection.
A

local loop

35
Q
  1. __________ is a cell-based packet-switching technology in which the cells are of a fixed length rather than typical packet-based systems that use variable length packets.
A

ATM