4 Network + Final Study Guide (Completion) Flashcards
1
Q
- How the network resources are to be used should be clearly defined in a (an) __________ policy.
A
acceptable use
2
Q
- In Linux, passwords are stored in an encrypted format in the __________ file, which is located in the /etc directory.
A
shadow
3
Q
- __________ authentication uses keys that are generated by the OS instead of being manually entered by an administrator.
A
kerberos
4
Q
- __________ is a free open-source product that can be used to encrypt the contents of an entire drive.
A
TrueCrypt
5
Q
- A (an) __________ is a type of Trojan program that hides in the operating system files and is extremely difficult to detect.
A
rootkit
6
Q
- When a switch receives a broadcast frame, it __________ the frame out to all ports.
A
floods
7
Q
- A switch that is configured to use the Spanning Tree Protocol will place a port in __________ mode if sending traffic to it may cause a switching loop.
A
blocking
8
Q
- A router’s final task when handling a packet is to send the packets on to its next and possibly final destination this is referred to as packet __________.
A
forwarding
9
Q
- One type of security for wireless networks involves entering a list of the MAC addresses for the devices that are allowed to access the network and excluding all others. This is called MAC__________.
A
filtering
10
Q
- A __________ is used to make connections between the network interface card and the other vital components of the computer, such as the central processing unit.
A
bus
11
Q
- A __________ is a program that runs in the background and provides support for other processes.
A
service
12
Q
- In __________ multitasking, either the user or the OS can terminate a process that is monopolizing the CPC’s time.
A
pre-emptive
13
Q
- A __________ file is simply a text file that contains a list of commands that you would normally enter in a command prompt.
A
batch
14
Q
- When a user enters his username and password to log on to a machine, he is invoking the process of __________.
A
authentication
15
Q
- A device that has no directly attached user interfaces and comes with specialized software designed to perform a specific task is called a network __________.
A
appliance
16
Q
- When Windows is first installed, two user accounts are created by default. One is the Administrator account, and the other is the __________ account.
A
guest
17
Q
- A user logs on to the network from a different computer than they normally use, and they still have the same desktop as usual. This user’s profile is called a __________ profile.
A
roaming
18
Q
- The __________ file system supports a maximum file size of 2GB
A
FAT16
19
Q
- In Windows, the term for a compute that accepts job requests for a shared printer and sends then to the physical device is called a print __________.
A
server
20
Q
- As a network administrator, it is a good idea to have a performance __________, a collection of performance data from a time when the network is performing normally.
A
baseline
21
Q
- One of the first decisions that a small business must focus on is whether to create a peer-to-peer network or a __________ based network
A
server-
22
Q
- In Windows 7, you can use a (an) __________ to simplify the process of file and printer sharing and make it unnecessary to create individual user accounts on each computer.
A
HomeGroup
23
Q
- __________ products are those that are intended for the home user and therefore don’t come equipped with advanced features.
A
consumer
24
Q
- A router that is using __________ -to-gateway VPN mode allows users to connect to the network without having any specialized software installed on their computers.
A
gateway
25
Q
- __________ is a secure method of gaining command-line access to a computer or network device.
A
SSH
26
Q
- Most manufactures store their technical support problems and solutions in a database called a knowledge base or a __________ document
A
frequently asked questions
27
Q
- To eliminate the potential problems caused by power fluctuations, especially on servers, you can install __________.
A
uninterruptible power supplies
28
Q
- A __________ copies selected files to the selected media without marking files as backed up.
A
copy backup
29
Q
- The __________ Windows command is used to determine the network path between two devices.
A
tracert
30
Q
- Whether your problem and proposed solution affect an entire network or just a few uses, you must devise a __________ so that you can return things to their original state if the solution doesn’t work.
A
rollback plan
31
Q
- __________ is a PVC packet-switching technology that offers WAN communication over a fast, reliable, digital link. It was developed from X.25 and ISDN technology.
A
frame relay
32
Q
- If a portion of a T-Carrier line is used for one purpose and a different portion for another purpose, the line has been __________.
A
fractionalized
33
Q
- A __________ is a device that allows a computer, which works with digital information, to communicate over lines that use analog signals.
A
modem
34
Q
- The CPE must be able to send data in the correct format onto the connection that make up the __________ and receives data coming from that connection.
A
local loop
35
Q
- __________ is a cell-based packet-switching technology in which the cells are of a fixed length rather than typical packet-based systems that use variable length packets.
A
ATM