Chapter Quiz 13-15 Flashcards
____ is one of the most important aspects to consider when looking at how a problem solution might affect users and network functionality.
a. Cost
b. Scope
c. Scalability
d. Security
b. Scope
A ____ is a document (preferably online) that lists every service and software package supported within an organization, plus the names of first- and second-level support contacts for those services or software packages.
a. call tracking list
b. help desk program list
c. supported services list
d. change management list
c. supported services list
When used on a copper-based cable, a continuity tester applies a small amount of ____ to each conductor at one end of the cable.
a. resistance
b. impedance
c. voltage
d. current
c. voltage
take advantage of network monitoring and analyzing tools, the network adapter installed in the machine running the software must support ____ mode.
a. open
b. static
c. promiscuous
d. continuous
c. promiscuous
A ____ usually results from a bad NIC.
a. jabber
b. ghost
c. giant
d. runt
a. jabber
The danger in using a ____ is that it could collect more information than you or the machine can reasonably process.
a. cable continuity tester
b. multimeter
c. protocol analyzer
d. wireless network tester
c. protocol analyzer
A ____ is a tool that can assess the quality of the wireless signal.
a. function analyzer
b. signal analyzer
c. quality analyzer
d. spectrum analyzer
d. spectrum analyzer
A(n) ____ is a graphical representation of a network’s wired infrastructure.
a. Multi Router Traffic Grapher
b. network diagram
c. wiring schematic
d. event viewer
c. wiring schematic
The process where one network management console collects data from multiple networked devices at regular intervals is known as ____.
a. base lining
b. interrogating
c. polling
d. pushing
c. polling
____ involves manipulating certain characteristics of packets, data streams, or connections to manage the type and amount of traffic traversing a network or interface at any moment.
a. Traffic monitoring
b. Traffic routing
c. Traffic polling
d. Traffic shaping
d. Traffic shaping
A ____ is a network device devoted to storage and delivery of frequently requested files.
a. cache engine
b. Web site host
c. server
d. database host
a. cache engine
A ____ is a correction, improvement, or enhancement to a software application.
a. revision
b. change
c. patch
d. software upgrade
c. patch
____ upgrades typically overwrite some system files on the workstation, so their installation may affect other applications adversely.
a. Principle
b. Application
c. Patch
d. Full
b. Application
The process of reverting to a previous version of software after attempting to upgrade it is known as ____.
a. backleveling
b. reverse engineering
c. downgrading
d. change back
a. backleveling
The most comprehensive and complex upgrade involving network hardware is a ____ upgrade.
a. cabling
b. printer
c. NOS
d. backbone
d. backbone