Introduction to Networking P2 Flashcards

1
Q

In every NOS, groups form the basis for resource and account management.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

A benefit to using an NTFS partition is that it can be read by older operating systems, such as Windows 95, Windows 2000 Professional, and early versions of UNIX.

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

The term domain model refers to a type of peer-to-peer network that relies on domains rather than on workgroups.

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

In UNIX, you combine commands using a pipe, which is entered as a forward slash ( / ).

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

____ is one of the most important functions an NOS provides.

A

Client support

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

A piece of software called ____ translates requests and responses between a client and a server.

A

middleware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

A(n) ____ is a list that organizes resources and associates them with their characteristics.

A

directory

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

A(n) ____ is the record of a user that contains all of his properties, including rights to resources, password, name, and so on.

A

account

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

The printer queue is a ____ representation of the printer’s input and output.

A

logical

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

The term ____ memory refers to the RAM chips that are installed on the computer’s system board and whose sole function is to provide memory to that machine.

A

physical

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

____ memory may be logically carved out of space on the hard drive for temporary use.

A

Virtual

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

A(n) ____ is a routine of sequential instructions that runs until it has achieved its goal.

A

process

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

A(n) ____ is a self-contained, well-defined task within a process.

A

thread

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

The support and use of multiple processors to handle multiple threads is known as ____.

A

multiprocessing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

A(n) ____ is a pictorial representation of computer functions that, in the case of NOSs, enables administrators to manage files, users, groups, security, printers, and so on.

A

GUI

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

A workgroup is a group of interconnected computers that share each other’s resources without relying on a central ____.

A

server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

The directory containing information about objects in a domain resides on computers called ____ controllers.

A

domain

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

The process of copying directory data to multiple domain controllers is known as ____.

A

replication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Active Directory organizes multiple domains hierarchically in a domain ____.

A

tree

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Naming (or addressing) conventions in Active Directory are based on the ____ naming conventions.

A

LDAP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

A GUID (globally unique identifier) is a 128-bit number that ensures that no two objects have ____ names.

A

duplicate

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

The primary function of the UNIX ____ is to coordinate access to all your computer’s hardware, such as the disks, memory, keyboard, and monitor.

A

kernel

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

UNIX was one of the first operating systems to implement a ____ file system.

A

hierarchical

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Solaris employs the file system called ____ for its native file system type.

A

UFS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Every UNIX and Linux system contains full documentation of UNIX commands in the ____ pages.
man
26
In CIDR, conventional network class distinctions do not exist.
True
27
The MIME standard replaces SMTP.
False
28
POP3’s design makes it best suited to users who retrieve their mail from the same workstation all the time.
True
29
IMAP4 servers require less storage space and usually more processing resources than POP servers do.
False
30
A class ____ network class is reserved for special purposes.
D
31
In ____ addressing, only Class A, Class B, and Class C addresses are recognized.
classful
32
In classful addressing, the Class B IPv4 address network ID is located in the \_\_\_\_.
first 16 bits
33
In classful addressing, Class C IPv4 address host information is located in the \_\_\_\_.
last 8 bits
34
Within a classful addressing subnet mask, the ____ bits indicate that corresponding bits in an IPv4 address contain network information.
1
35
Within a classful addressing, ____ is the default subnet mask for a Class C address.
255.255.255.0
36
The result from ANDing 11001111 with 10010001 is \_\_\_\_.
10000001
37
When using classful IPv4 addressing, a network ID always ends with an octet of \_\_\_\_.
0
38
Because the octets equal to 0 and 255 are \_\_\_\_, only the numbers 1 through 254 can be used for host information in an IPv4 address.
reserved
39
CIDR notation takes the form of the network ID followed by a(n) \_\_\_\_, followed by the number of bits that are used for the extended network prefix.
forward slash ( / )
40
The ____ gateway is the gateway that first interprets its outbound requests to other subnets, and then interprets its inbound requests from other subnets.
default
41
The gateways that make up the Internet backbone are called ____ gateways.
core
42
An example of a popular mail server is \_\_\_\_.
Microsoft Exchange Server
43
An example of a popular client email software is \_\_\_\_.
Microsoft Outlook
44
SMTP operates from port \_\_\_\_.
25
45
The standard message format specified by SMTP allows for lines that contain no more than ____ ASCII characters.
1000
46
POP3 (Post Office Protocol, version 3) relies on TCP and operates over port \_\_\_\_.
110
47
IMAP (Internet Message Access Protocol) is a mail retrieval protocol that was developed as a more sophisticated alternative to \_\_\_\_.
POP3
48
An administrator can discover the host name assigned to a client by using the ____ utility.
hostname
49
A program similar to mtr, \_\_\_\_, is available as a command-line utility in Windows XP, Vista, Server 2003, and Server 2008.
pathping
50
The ____ utility allows you to view a host’s routing table.
route
51
All VoIP calls are carried over the Internet.
False
52
An off-the-shelf workstation can be programmed to act like an IP telephone.
True
53
SIP and H.323 account for communication between media gateways.
False
54
It is more difficult to transmit VoIP and video over IP signals over a packet-switched network than it is to transmit data signals.
True
55
\_\_\_\_ is the use of one network to simultaneously carry voice, video, and data communications.
Convergence
56
\_\_\_\_ describes the use of any network to carry voice signals using the TCP/IP protocol.
IP telephony
57
When VoIP relies on the Internet, it is often called \_\_\_\_.
Internet telephony
58
IPTV, videoconferencing, streaming video, and IP multicasting belong to the range of services known as \_\_\_\_.
video over IP
59
\_\_\_\_ messaging is a service that makes several forms of communication available from a single user interface.
Unified
60
Using VoIP over a WAN allows an organization to avoid paying long-distance telephone charges, a benefit known as \_\_\_\_.
toll bypass
61
When using an analog telephone, a VoIP adapter that performs analog-to-digital conversion is known as a(n) \_\_\_\_.
ATA (analog telephone adapter)
62
In general, a(n) ____ is a private switch that accepts and interprets both analog and digital voice signals.
IP-PBX
63
When a caller uses an IP telephone, his or her voice is immediately digitized and issued from the telephone to the network in ____ form.
packet
64
A computer programmed to act like an IP telephone is known as a(n) \_\_\_\_.
softphone
65
The popular Internet telephony software, Skype, is a type of \_\_\_\_.
softphone
66
Among all video-over-IP applications, ____ is perhaps the simplest.
streaming video
67
One drawback to ____ video is that content may not be edited before it’s distributed.
live streaming
68
Many streaming video services - and nearly all of those issued over a public network, such as the Internet - are examples of ____ transmissions.
unicast
69
When more than two people participate in a videoconference, for example, in a point-to-multipoint or multipoint-to-multipoint scenario, a video ____ is required.
bridge
70
\_\_\_\_ signaling functions are more limited than those performed by the protocols in the H.323 group.
SIP
71
SIP and H.323 regulate ____ for VoIP or video-over-IP clients and servers.
call signaling and control
72
A(n) ____ is a computer that manages multiple media gateways.
MGC
73
Many network engineers consider ____ to be superior to MGCP.
MEGACO
74
\_\_\_\_ is preferred over TCP for real-time applications such as telephone conversations and videoconferencing.
UDP
75
\_\_\_\_ is a measure of how well a network service matches its expected performance.
QoS
76
Human errors, ignorance, and omissions cause more than half of all security breaches sustained by networks.
True
77
Network security is more often compromised “from the inside” than from external sources.
True
78
Encryption is the last means of defense against data theft.
True
79
By default, the 802.11 standard offers substantial security.
False
80
\_\_\_\_ is a social engineering practice in which a person attempts to glean access or authentication information by posing as someone who needs that information.
Phishing
81
In a ____ attack, a person redirects or captures secure transmissions as they occur.
man-in-the-middle
82
\_\_\_\_ software searches a node for open ports.
Port scanner
83
A router that is not configured to drop packets that match certain suspicious characteristics is an example of a risk associated with \_\_\_\_.
transmission and hardware
84
An NOS that contains a “back door”is an example of a risk associated with \_\_\_\_.
protocols and software
85
A ____ attack occurs when an Internet chat user sends commands to a victim’s machine that cause the screen to fill with garbage characters and requires the victim to terminate their chat sessions.
flashing
86
A ____ attack occurs when a system becomes unable to function because it has been deluged with data transmissions or otherwise disrupted.
denial-of-service
87
A ____ main function is to examine packets and determine where to direct them based on their Network layer addressing information.
router’s
88
A ____ firewall is a router (or a computer installed with software that enables it to act as a router) that examines the header of every packet of data it receives to determine whether that type of packet is authorized to continue to its destination.
packet-filtering
89
A ____ attack occurs when a hacker uses programs that try a combination of a user ID and every word in a dictionary to gain access to the network.
dictionary
90
A ____ attack occurs when a hacker tries numerous possible character combinations to find the key that will decrypt encrypted data.
brute force
91
The combination of a public key and a private key is known as a \_\_\_\_.
key pair
92
A(n) ____ is a password-protected and encrypted file that holds an individual’s identification information, including a public key.
digital certificate
93
The use of certificate authorities to associate public keys with certain users is known as \_\_\_\_.
PKI
94
\_\_\_\_ is a public key encryption system that can verify the authenticity of an e-mail sender and encrypt e-mail data in transmission.
PGP
95
\_\_\_\_ is a method of encrypting TCP/IP transmissions.
SSL
96
In ____ , a hacker forges name server records to falsify his host’s identity.
DNS spoofing
97
A VPN ____ authenticates VPN clients and establishes tunnels for VPN connections.
concentrator
98
\_\_\_\_ protocols are the rules that computers follow to accomplish authentication.
Authentication
99
RADIUS and TACACS belong to a category of protocols known as AAA (\_\_\_\_).
authentication, authorization, and accounting
100
In \_\_\_\_, both computers verify the credentials of the other.
mutual authentication
101
Some software errors point to a physical connectivity problem.
True
102
Logical connectivity problems often prove more difficult to isolate and resolve than physical connectivity problems.
True
103
Continuity testers can test only copper cable.
False
104
Most wireless testing tools contain more powerful antennas than a workstation NIC.
True
105
An administrator should take the time to troubleshoot all network problems correctly by asking specific questions designed to identify the problem \_\_\_\_.
scope
106
\_\_\_\_ are often considered first-level support.
Help desk analysts
107
\_\_\_\_ are often considered third-level support.
Help desk coordinators
108
\_\_\_\_ is one of the most important aspects to consider when looking at how a problem solution might affect users and network functionality.
Scope
109
A ____ is a document (preferably online) that lists every service and software package supported within an organization, plus the names of first- and second-level support contacts for those services or software packages.
supported services list
110
In a ____ cable, the transmit and receive wire pairs in one of the connectors are reversed.
crossover
111
A\_\_\_\_ is a small electronic device that issues a signal on a wire pair.
tone generator
112
\_\_\_\_ is a fundamental property of wire that depends on a wire’s molecular structure and size.
Resistance
113
Resistance is measured in \_\_\_\_.
ohms
114
\_\_\_\_ is the telltale factor for ascertaining where faults in a cable lie.
Impedance
115
When used on a copper-based cable, a continuity tester applies a small amount of ____ to each conductor at one end of the cable.
voltage
116
A ____ can be used to intercept a telephone conversation.
butt set
117
A ____ is a software-based tool that continually monitors network traffic from a server or workstation attached to the network.
network monitor
118
To take advantage of network monitoring and analyzing tools, the network adapter installed in the machine running the software must support ____ mode.
promiscuous
119
\_\_\_\_ packets exceed the medium’s maximum packet size.
Giant
120
\_\_\_\_ are frames that are not actually data frames, but aberrations caused by a device misinterpreting stray voltage on the wire.
Ghosts
121
A ____ usually results from a bad NIC.
jabber
122
A ____ can generate traffic in an attempt to reproduce a network problem and monitor multiple network segments simultaneously.
protocol analyzer
123
The danger in using a ____ is that it could collect more information than you or the machine can reasonably process.
protocol analyzer
124
Before using a network monitor or protocol analyzer on a network, it is important to know what ____ on your network normally looks like.
traffic
125
Viewing the status of the wireless connection on your workstation tells you ____ about your wireless environment.
a little
126
Protection against harmful code involves more than just installing anti-malware software.
True
127
When implementing anti-malware software on a network, one of your most important decisions is where to install the software.
True
128
An anti-malware policy is meant to protect the network from damage and downtime.
True
129
The goal of fault-tolerant systems is to prevent failures from progressing to faults.
False
130
\_\_\_\_ is intended to eliminate single points of failure.
Redundancy
131
A program that disguises itself as something useful but actually harms your system is called a \_\_\_\_.
Trojan horse
132
\_\_\_\_ are programs that run independently and travel between computers and across networks.
Worms
133
A ____ is a program that runs automatically, without requiring a person to start or stop it.
bot
134
A(n) ____ virus disguises itself as a legitimate program to prevent detection.
stealth
135
A(n) ____ virus changes its characteristics every time it is transferred to a new system.
polymorphic
136
\_\_\_\_ scanning detects malware by comparing a file’s content with known malware signatures in a signature database.
Signature
137
\_\_\_\_ detects malware by comparing current characteristics of files and disks against an archived version of these characteristics to discover any changes.
Integrity checking
138
\_\_\_\_ scanning techniques attempt to identify malware by discovering “malware-like” behavior.
Heuristic
139
A(n) ____ is a deviation from a specified level of system performance for a given period of time.
failure
140
Power that is free from noise is called “\_\_\_\_” power.
clean
141
A(n) ____ UPS uses the A/C power from the wall outlet to continuously charge its battery, while providing power to a network device through its battery.
online
142
Mesh topologies and ____ topologies are good choices for highly available enterprise networks.
SONET rings
143
\_\_\_\_ is an automatic distribution of traffic over multiple links or processors to optimize response.
Load balancing
144
\_\_\_\_ offers the best performance.
RAID Level 0
145
\_\_\_\_ provides redundancy through a process called disk mirroring.
RAID Level 1
146
In \_\_\_\_, parity error checking occurs when data is written across the disk array.
RAID Level 3
147
\_\_\_\_ is a specialized storage device or group of storage devices that provides centralized fault-tolerant data storage for a network.
NAS
148
\_\_\_\_ are distinct networks of storage devices that communicate directly with each other and with other networks.
SANs
149
\_\_\_\_ is a type of media capable of storing digitized data and that uses a laser to write data to it and read data from it.
Optical media
150
An archive ____ is a file attribute that can be checked or unchecked to indicate whether the file must be archived.
bit
151
Documenting and capturing an accurate picture of a network’s physical and logical elements are initial steps in understanding the network.
True
152
The more data you gather while establishing your network’s baseline, the less accurate your prediction will be.
False
153
The first step in configuration management is to take an inventory of each node on the network.
False
154
For a cabling upgrade, the best way to ensure that future upgrades go smoothly is to carefully document the existing cable after making any upgrades.
False
155
\_\_\_\_ management is the collection, storage, and assessment of information related to the versions of software installed on every network device and every device’s hardware configuration.
Configuration
156
A(n) ____ is a graphical representation of a network’s devices and connections
network diagram
157
A(n) ____ is a graphical representation of a network’s wired infrastructure.
wiring schematic
158
\_\_\_\_ management refers to monitoring how well links and devices are keeping up with the demands placed on them.
Performance
159
\_\_\_\_ management refers to the detection and signaling of device, link, or component faults
Fault
160
The process where one network management console collects data from multiple networked devices at regular intervals is known as \_\_\_\_.
polling
161
A network management agent is a ____ that collects information about a device’s operation and provides it to the network management application.
software routine
162
\_\_\_\_ involves manipulating certain characteristics of packets, data streams, or connections to manage the type and amount of traffic traversing a network or interface at any moment.
Traffic shaping
163
\_\_\_\_is the local storage of frequently needed files that would otherwise be obtained from an external source.
Caching
164
The most common type of caching is ____ caching.
Web
165
A ____ is a network device devoted to storage and delivery of frequently requested files.
cache engine
166
A key component in managing networks is identifying and tracking its hardware and software through ____ management.
asset
167
A ____ is a correction, improvement, or enhancement to a particular piece of a software application.
patch
168
A ____ is a major change to a software package’s existing code
software upgrade
169
\_\_\_\_ upgrades represent modifications to all or part of an application that are designed to enhance functionality or fix problems related to software.
Application
170
The most critical type of software upgrade you will perform is an upgrade to your \_\_\_\_.
NOS
171
The process of reverting to a previous version of software after attempting to upgrade it is known as \_\_\_\_.
backleveling
172
A networked ____ is perhaps the simplest device to add.
workstation
173
Above all, keep ____ in mind when you upgrade or install hardware on a network.
safety
174
The most comprehensive and complex upgrade involving network hardware is a(n) ____ upgrade.
backbone
175
Because backbone upgrades are expensive and time consuming, the first step in approaching such a project is to ____ it.
justify