Introduction to Networking P2 Flashcards
In every NOS, groups form the basis for resource and account management.
True
A benefit to using an NTFS partition is that it can be read by older operating systems, such as Windows 95, Windows 2000 Professional, and early versions of UNIX.
False
The term domain model refers to a type of peer-to-peer network that relies on domains rather than on workgroups.
False
In UNIX, you combine commands using a pipe, which is entered as a forward slash ( / ).
False
____ is one of the most important functions an NOS provides.
Client support
A piece of software called ____ translates requests and responses between a client and a server.
middleware
A(n) ____ is a list that organizes resources and associates them with their characteristics.
directory
A(n) ____ is the record of a user that contains all of his properties, including rights to resources, password, name, and so on.
account
The printer queue is a ____ representation of the printer’s input and output.
logical
The term ____ memory refers to the RAM chips that are installed on the computer’s system board and whose sole function is to provide memory to that machine.
physical
____ memory may be logically carved out of space on the hard drive for temporary use.
Virtual
A(n) ____ is a routine of sequential instructions that runs until it has achieved its goal.
process
A(n) ____ is a self-contained, well-defined task within a process.
thread
The support and use of multiple processors to handle multiple threads is known as ____.
multiprocessing
A(n) ____ is a pictorial representation of computer functions that, in the case of NOSs, enables administrators to manage files, users, groups, security, printers, and so on.
GUI
A workgroup is a group of interconnected computers that share each other’s resources without relying on a central ____.
server
The directory containing information about objects in a domain resides on computers called ____ controllers.
domain
The process of copying directory data to multiple domain controllers is known as ____.
replication
Active Directory organizes multiple domains hierarchically in a domain ____.
tree
Naming (or addressing) conventions in Active Directory are based on the ____ naming conventions.
LDAP
A GUID (globally unique identifier) is a 128-bit number that ensures that no two objects have ____ names.
duplicate
The primary function of the UNIX ____ is to coordinate access to all your computer’s hardware, such as the disks, memory, keyboard, and monitor.
kernel
UNIX was one of the first operating systems to implement a ____ file system.
hierarchical
Solaris employs the file system called ____ for its native file system type.
UFS
Every UNIX and Linux system contains full documentation of UNIX commands in the ____ pages.
man
In CIDR, conventional network class distinctions do not exist.
True
The MIME standard replaces SMTP.
False
POP3’s design makes it best suited to users who retrieve their mail from the same workstation all the time.
True
IMAP4 servers require less storage space and usually more processing resources than POP servers do.
False
A class ____ network class is reserved for special purposes.
D
In ____ addressing, only Class A, Class B, and Class C addresses are recognized.
classful
In classful addressing, the Class B IPv4 address network ID is located in the ____.
first 16 bits
In classful addressing, Class C IPv4 address host information is located in the ____.
last 8 bits
Within a classful addressing subnet mask, the ____ bits indicate that corresponding bits in an IPv4 address contain network information.
1
Within a classful addressing, ____ is the default subnet mask for a Class C address.
255.255.255.0
The result from ANDing 11001111 with 10010001 is ____.
10000001
When using classful IPv4 addressing, a network ID always ends with an octet of ____.
0
Because the octets equal to 0 and 255 are ____, only the numbers 1 through 254 can be used for host information in an IPv4 address.
reserved
CIDR notation takes the form of the network ID followed by a(n) ____, followed by the number of bits that are used for the extended network prefix.
forward slash ( / )
The ____ gateway is the gateway that first interprets its outbound requests to other subnets, and then interprets its inbound requests from other subnets.
default
The gateways that make up the Internet backbone are called ____ gateways.
core
An example of a popular mail server is ____.
Microsoft Exchange Server
An example of a popular client email software is ____.
Microsoft Outlook
SMTP operates from port ____.
25
The standard message format specified by SMTP allows for lines that contain no more than ____ ASCII characters.
1000
POP3 (Post Office Protocol, version 3) relies on TCP and operates over port ____.
110
IMAP (Internet Message Access Protocol) is a mail retrieval protocol that was developed as a more sophisticated alternative to ____.
POP3
An administrator can discover the host name assigned to a client by using the ____ utility.
hostname
A program similar to mtr, ____, is available as a command-line utility in Windows XP, Vista, Server 2003, and Server 2008.
pathping
The ____ utility allows you to view a host’s routing table.
route
All VoIP calls are carried over the Internet.
False
An off-the-shelf workstation can be programmed to act like an IP telephone.
True
SIP and H.323 account for communication between media gateways.
False
It is more difficult to transmit VoIP and video over IP signals over a packet-switched network than it is to transmit data signals.
True
____ is the use of one network to simultaneously carry voice, video, and data communications.
Convergence
____ describes the use of any network to carry voice signals using the TCP/IP protocol.
IP telephony
When VoIP relies on the Internet, it is often called ____.
Internet telephony
IPTV, videoconferencing, streaming video, and IP multicasting belong to the range of services known as ____.
video over IP
____ messaging is a service that makes several forms of communication available from a single user interface.
Unified
Using VoIP over a WAN allows an organization to avoid paying long-distance telephone charges, a benefit known as ____.
toll bypass
When using an analog telephone, a VoIP adapter that performs analog-to-digital conversion is known as a(n) ____.
ATA (analog telephone adapter)
In general, a(n) ____ is a private switch that accepts and interprets both analog and digital voice signals.
IP-PBX
When a caller uses an IP telephone, his or her voice is immediately digitized and issued from the telephone to the network in ____ form.
packet
A computer programmed to act like an IP telephone is known as a(n) ____.
softphone
The popular Internet telephony software, Skype, is a type of ____.
softphone
Among all video-over-IP applications, ____ is perhaps the simplest.
streaming video
One drawback to ____ video is that content may not be edited before it’s distributed.
live streaming
Many streaming video services - and nearly all of those issued over a public network, such as the Internet - are examples of ____ transmissions.
unicast
When more than two people participate in a videoconference, for example, in a point-to-multipoint or multipoint-to-multipoint scenario, a video ____ is required.
bridge
____ signaling functions are more limited than those performed by the protocols in the H.323 group.
SIP