4 Network + Final Study Guide (Completion) Flashcards

(35 cards)

1
Q
  1. How the network resources are to be used should be clearly defined in a (an) __________ policy.
A

acceptable use

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q
  1. In Linux, passwords are stored in an encrypted format in the __________ file, which is located in the /etc directory.
A

shadow

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q
  1. __________ authentication uses keys that are generated by the OS instead of being manually entered by an administrator.
A

kerberos

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q
  1. __________ is a free open-source product that can be used to encrypt the contents of an entire drive.
A

TrueCrypt

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q
  1. A (an) __________ is a type of Trojan program that hides in the operating system files and is extremely difficult to detect.
A

rootkit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q
  1. When a switch receives a broadcast frame, it __________ the frame out to all ports.
A

floods

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q
  1. A switch that is configured to use the Spanning Tree Protocol will place a port in __________ mode if sending traffic to it may cause a switching loop.
A

blocking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q
  1. A router’s final task when handling a packet is to send the packets on to its next and possibly final destination this is referred to as packet __________.
A

forwarding

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q
  1. One type of security for wireless networks involves entering a list of the MAC addresses for the devices that are allowed to access the network and excluding all others. This is called MAC__________.
A

filtering

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q
  1. A __________ is used to make connections between the network interface card and the other vital components of the computer, such as the central processing unit.
A

bus

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q
  1. A __________ is a program that runs in the background and provides support for other processes.
A

service

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q
  1. In __________ multitasking, either the user or the OS can terminate a process that is monopolizing the CPC’s time.
A

pre-emptive

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q
  1. A __________ file is simply a text file that contains a list of commands that you would normally enter in a command prompt.
A

batch

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q
  1. When a user enters his username and password to log on to a machine, he is invoking the process of __________.
A

authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q
  1. A device that has no directly attached user interfaces and comes with specialized software designed to perform a specific task is called a network __________.
A

appliance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q
  1. When Windows is first installed, two user accounts are created by default. One is the Administrator account, and the other is the __________ account.
17
Q
  1. A user logs on to the network from a different computer than they normally use, and they still have the same desktop as usual. This user’s profile is called a __________ profile.
18
Q
  1. The __________ file system supports a maximum file size of 2GB
19
Q
  1. In Windows, the term for a compute that accepts job requests for a shared printer and sends then to the physical device is called a print __________.
20
Q
  1. As a network administrator, it is a good idea to have a performance __________, a collection of performance data from a time when the network is performing normally.
21
Q
  1. One of the first decisions that a small business must focus on is whether to create a peer-to-peer network or a __________ based network
22
Q
  1. In Windows 7, you can use a (an) __________ to simplify the process of file and printer sharing and make it unnecessary to create individual user accounts on each computer.
23
Q
  1. __________ products are those that are intended for the home user and therefore don’t come equipped with advanced features.
24
Q
  1. A router that is using __________ -to-gateway VPN mode allows users to connect to the network without having any specialized software installed on their computers.
25
178. __________ is a secure method of gaining command-line access to a computer or network device.
SSH
26
179. Most manufactures store their technical support problems and solutions in a database called a knowledge base or a __________ document
frequently asked questions
27
180. To eliminate the potential problems caused by power fluctuations, especially on servers, you can install __________.
uninterruptible power supplies
28
181. A __________ copies selected files to the selected media without marking files as backed up.
copy backup
29
182. The __________ Windows command is used to determine the network path between two devices.
tracert
30
183. Whether your problem and proposed solution affect an entire network or just a few uses, you must devise a __________ so that you can return things to their original state if the solution doesn't work.
rollback plan
31
184. __________ is a PVC packet-switching technology that offers WAN communication over a fast, reliable, digital link. It was developed from X.25 and ISDN technology.
frame relay
32
185. If a portion of a T-Carrier line is used for one purpose and a different portion for another purpose, the line has been __________.
fractionalized
33
186. A __________ is a device that allows a computer, which works with digital information, to communicate over lines that use analog signals.
modem
34
187. The CPE must be able to send data in the correct format onto the connection that make up the __________ and receives data coming from that connection.
local loop
35
188. __________ is a cell-based packet-switching technology in which the cells are of a fixed length rather than typical packet-based systems that use variable length packets.
ATM