Midterm Flashcards

1
Q

Name two popular implementation schemes of IP protocol and give examples

A

IPV4,IPV6

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Describe the three tier network architecture and give examples

A

The Access Layer is the one closer to the users. In fact, at this layer we find the users
themselves and the access-layer switches. The main purpose of this layer is to
physically connect users to the network. In other words, there is just a cable between
end-user PCs and access-layer switches.

The Distribution layer bridges users to the core layer. It serves as major spine for all
users in an area, so it connects several access switches. In most deployment, Default
Gateways for all the VLANs reside at the Distribution layer.

In the Three Tier Architecture, the Core Layer is the one coordinating everything. It has
only one, simple purpose: connecting all the distribution layers together. In large
enterprises, where you have several distribution switches, the core layer is also known
as Backbone.
•Access layer switches physically connects the users and enforce network-access policies
• Distribution switches connects multiple access switches to the core and enforce policies
such as firewalling or policy routing
• The Core layer switches just route traffic between distribution switches, the fastest possible.
You shouldn’t apply any policy there

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

List two (2) File permissions that Full Control provides and Read/Write permission does not provide.

A

Change Permissions / Take Ownership

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Explain the difference between Explicit permissions and inherited permissions and give examples.

A

Explicit permissions are those that are set by default on non-child objects when the object is created, or by user action on non-child, parent, or child objects.

Inherited permissions are those that are propagated to an object from a parent object. Inherited permissions ease the task of managing permissions and ensure consistency of permissions among all objects within a given container.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

The Five main process groups accomplished through Project management are:

A

Project management is accomplished through the appropriate application and integration of the 47 logically grouped project management processes
comprising the 5 Process Groups. These 5 Process Groups are:

  • Initiating
  • Planning
  • Executing
  • Monitoring and Controlling
  • Closing
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Define three responsibilities of a project manager during the initiation phase.

A

Assigning Roles and Responsibilities.
Determining the Scope of impact.
Determining appropriate Stakeholders.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Define Domain and Forest Structures in Windows

environment and how are they related

A

Domain and Forest Structure
A forest consists of a hierarchical structure of domain containers that are used to categorically store information about objects on the network. Domain
containers are considered the core functional units in the forest structure. This is because each domain container in a forest is used primarily to store and manage Active Directory objects, most of which have a physical representation (such as people, printers, or computers). Forests also provide the structure by which domain containers can be segregated into one or more unique Domain Name System (DNS) namespace hierarchies known as domain trees.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Define Trust relationship and give an example of Transitive Trust.

A

Two-way Trust:
When you create a new child domain, the child domain automatically trusts the parent domain, and vice versa. At the practical level, this means that authentication requests can be passed between the two domains in both directions.

Transitive Trust:
A transitive trust reaches beyond the two domains in the initial trust relationship. For example, if Domain A and Domain B (parent and child) trust each other, and if Domain B and Domain C (also parent and child) trust each other, Domain A and Domain C also trust each other (implicitly), even though no direct trust relationship between them exists.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

List two major File systems used by Windows OS. Compare the features.

A
FAT (File Allocation Table) is one of the simplest types of file systems. It consists of a file system descriptor sector (boot sector or superblock), a file system block
allocation table (referred as File Allocation Table) and plain storage space to store files and folders. Files on FAT are stored in directories. Each directory is an
array of 32-byte records, each defining file or file extended attributes (e.g. a long file name). File record attributes the first block of a file. Any next block can be
found through a block allocation table by using it as a linked list.

NTFS (New Technology File System) was introduced in Windows NT and currently it is a major file system for Windows. This is the default file system for disk partitions and the only file system that supports disk partitions over 32GB. The file system is quite extensible and supports many file properties, including
access control, encryption etc. Each file on NTFS is stored as a file descriptor in a Master File Table and file content. A Master file table contains all information
about the file: size, allocation, name etc. The first and the last sectors of the file system contain file system settings (boot record or superblock). This file system
uses 48 and 64 bit values to reference files, thus, supporting disk storages with high capacity.

ReFS:
ReFS (Resilient File System) is the latest development of Microsoft currently available for Windows 8 Servers. The file system architecture absolutely differs
from other Windows file systems and is mainly organized in a form of a B+-tree. ReFS has high tolerance to failures due to new features included into the system. And, namely, Copy-on-Write (CoW): no metadata is modified without being copied; data is not written over the existing data, but into new disk space. With any file modifications, a new copy of metadata is stored into free storage space, and then the system creates a link from older metadata to the newer one. Thus, the system stores significant quantity of older backups in different places providing easy file recovery unless this storage space is overwritten.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is Network RMA ? Explain the concept and give

examples

A
Reliability
• Probability that an engineering system will perform its intended
function satisfactorily (from the viewpoint of the customer) for its
intended life under specified environmental and operating conditions

Maintainability
• Probability that maintenance of the system will retain the system in, or
restore it to, a specified condition within a given time period
• A measure of the ease and rapidity with which a system or equipment
can be restored to operational status following a failure

Availability
• Availability is the probability that the system is operating satisfactorily
at any time, and it depends on the reliability and the maintainability
• Availability of end to end functionality for customers.
• Ability to experience failures or systematic attacks, without impacting customers or
operations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Define the purpose and importance of network analysis and give examples

A

Network analysis defines, determines, and
describes relationships between network
components for many conditions.

• The purpose of network analysis
• first, to listen to users and understand
their needs;
• second, to understand the system.
Entails learning what users, their applications,
and devices need from the network
• Also about understanding network behavior
under various situations
• Also defines, determines, and describes
relationships among users, applications, devices,
and networks. In the process,
• Network analysis provides the foundation for all
the architecture and design decisions to follow.
• Network requirements are requests for
capabilities in the network,
• performance and function, which are
necessary for the success of that network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Describe the meaning and use of Service-level agreements and give examples.

A

Informal or formal contract between a provider and user that defines the terms of the provider’s responsibility to the user and the type and extent of accountability if those responsibilities are not met

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Describe any two types of Network Topologies and

compare them

A

Network Topology is the schematic description of a network arrangement, connecting various nodes (sender and receiver) through lines of connection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

BUS Topology

A

Bus topology is a network type in which every computer and network device is connected to single
cable. When it has exactly two endpoints, then it is called Linear Bus topology. (Think of a christmas tree and how lights used to be, all in a row, one goes out, there goes your network)

Features of Bus Topology

  1. It transmits data only in one direction.
  2. Every device is connected to a single cable

Advantages of Bus Topology

  1. It is cost effective.
  2. Cable required is least compared to other network topology.
  3. Used in small networks.
  4. It is easy to understand.
  5. Easy to expand joining two cables together.

Disadvantages of Bus Topology

  1. Cables fails then whole network fails.
  2. If network traffic is heavy or nodes are more the performance of the network decreases.
  3. Cable has a limited length.
  4. It is slower than the ring topology.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

RING Topology

A

It is called ring topology because it forms a ring as each computer is connected to another computer, with the
last one connected to the first. Exactly two neighbors for each device.

Features of Ring Topology
1. A number of repeaters are used for Ring topology with large number of nodes, because if someone wants
to send some data to the last node in the ring topology with 100 nodes, then the data will have to pass
through 99 nodes to reach the 100th node. Hence to prevent data loss repeaters are used in the network.
2. The transmission is unidirectional, but it can be made bidirectional by having 2 connections between
each Network Node, it is called Dual Ring Topology.
3. In Dual Ring Topology, two ring networks are formed, and data flow is in opposite direction in them. Also,
if one ring fails, the second ring can act as a backup, to keep the network up.
4. Data is transferred in a sequential manner that is bit by bit. Data transmitted, has to pass through each
node of the network, till the destination node.

Advantages of Ring Topology
1. Transmitting network is not affected by high traffic or by adding more nodes, as only the nodes having
tokens can transmit data.
2. Cheap to install and expand

Disadvantages of Ring Topology

  1. Troubleshooting is difficult in ring topology.
  2. Adding or deleting the computers disturbs the network activity.
  3. Failure of one computer disturbs the whole network
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

STAR Topology

A

In this type of topology all the computers are connected to a single hub through a cable. This hub is the central node and all others nodes are connected to the central node.

Features of Star Topology
1.Every node has its own dedicated connection to the hub.
2.Hub acts as a repeater for data flow.
3.Can be used with twisted pair, Optical Fibre or coaxial cable.
Advantages of Star Topology
1.Fast performance with few nodes and low network traffic.
2.Hub can be upgraded easily.
3.Easy to troubleshoot.
4.Easy to setup and modify.
5.Only that node is affected which has failed, rest of the nodes can work smoothly.
Disadvantages of Star Topology
1.Cost of installation is high.
2.Expensive to use.
3.If the hub fails then the whole network is stopped because all the nodes depend
on the hub.
4.Performance is based on the hub that is it depends on its capacity

17
Q

TREE Topology

A

It has a root node and all other nodes are connected to it forming a hierarchy. It is also called hierarchical
topology. It should at least have three levels to the hierarchy.

Features of Tree Topology

  1. Ideal if workstations are located in groups.
  2. Used in Wide Area Network.

Advantages of Tree Topology

  1. Extension of bus and star topologies.
  2. Expansion of nodes is possible and easy.
  3. Easily managed and maintained.
  4. Error detection is easily done.

Disadvantages of Tree Topology

  1. Heavily cabled.
  2. Costly.
  3. If more nodes are added maintenance is difficult.
  4. Central hub fails, network fails.
18
Q

HYBRID Topology

A

It is two different types of topologies which is a mixture of two or more topologies. For example if in an
office in one department ring topology is used and in another star topology is used, connecting these
topologies will result in Hybrid Topology (ring topology and star topology).

Features of Hybrid Topology

  1. It is a combination of two or topologies
  2. Inherits the advantages and disadvantages of the topologies included

Advantages of Hybrid Topology

  1. Reliable as Error detecting and trouble shooting is easy.
  2. Effective.
  3. Scalable as size can be increased easily.
  4. Flexible.

Disadvantages of Hybrid Topology

  1. Complex in design.
  2. Costly.