4 Network + Final Study Guide (Completion) Flashcards
(35 cards)
1
Q
- How the network resources are to be used should be clearly defined in a (an) __________ policy.
A
acceptable use
2
Q
- In Linux, passwords are stored in an encrypted format in the __________ file, which is located in the /etc directory.
A
shadow
3
Q
- __________ authentication uses keys that are generated by the OS instead of being manually entered by an administrator.
A
kerberos
4
Q
- __________ is a free open-source product that can be used to encrypt the contents of an entire drive.
A
TrueCrypt
5
Q
- A (an) __________ is a type of Trojan program that hides in the operating system files and is extremely difficult to detect.
A
rootkit
6
Q
- When a switch receives a broadcast frame, it __________ the frame out to all ports.
A
floods
7
Q
- A switch that is configured to use the Spanning Tree Protocol will place a port in __________ mode if sending traffic to it may cause a switching loop.
A
blocking
8
Q
- A router’s final task when handling a packet is to send the packets on to its next and possibly final destination this is referred to as packet __________.
A
forwarding
9
Q
- One type of security for wireless networks involves entering a list of the MAC addresses for the devices that are allowed to access the network and excluding all others. This is called MAC__________.
A
filtering
10
Q
- A __________ is used to make connections between the network interface card and the other vital components of the computer, such as the central processing unit.
A
bus
11
Q
- A __________ is a program that runs in the background and provides support for other processes.
A
service
12
Q
- In __________ multitasking, either the user or the OS can terminate a process that is monopolizing the CPC’s time.
A
pre-emptive
13
Q
- A __________ file is simply a text file that contains a list of commands that you would normally enter in a command prompt.
A
batch
14
Q
- When a user enters his username and password to log on to a machine, he is invoking the process of __________.
A
authentication
15
Q
- A device that has no directly attached user interfaces and comes with specialized software designed to perform a specific task is called a network __________.
A
appliance
16
Q
- When Windows is first installed, two user accounts are created by default. One is the Administrator account, and the other is the __________ account.
A
guest
17
Q
- A user logs on to the network from a different computer than they normally use, and they still have the same desktop as usual. This user’s profile is called a __________ profile.
A
roaming
18
Q
- The __________ file system supports a maximum file size of 2GB
A
FAT16
19
Q
- In Windows, the term for a compute that accepts job requests for a shared printer and sends then to the physical device is called a print __________.
A
server
20
Q
- As a network administrator, it is a good idea to have a performance __________, a collection of performance data from a time when the network is performing normally.
A
baseline
21
Q
- One of the first decisions that a small business must focus on is whether to create a peer-to-peer network or a __________ based network
A
server-
22
Q
- In Windows 7, you can use a (an) __________ to simplify the process of file and printer sharing and make it unnecessary to create individual user accounts on each computer.
A
HomeGroup
23
Q
- __________ products are those that are intended for the home user and therefore don’t come equipped with advanced features.
A
consumer
24
Q
- A router that is using __________ -to-gateway VPN mode allows users to connect to the network without having any specialized software installed on their computers.
A
gateway
25
178. __________ is a secure method of gaining command-line access to a computer or network device.
SSH
26
179. Most manufactures store their technical support problems and solutions in a database called a knowledge base or a __________ document
frequently asked questions
27
180. To eliminate the potential problems caused by power fluctuations, especially on servers, you can install __________.
uninterruptible power supplies
28
181. A __________ copies selected files to the selected media without marking files as backed up.
copy backup
29
182. The __________ Windows command is used to determine the network path between two devices.
tracert
30
183. Whether your problem and proposed solution affect an entire network or just a few uses, you must devise a __________ so that you can return things to their original state if the solution doesn't work.
rollback plan
31
184. __________ is a PVC packet-switching technology that offers WAN communication over a fast, reliable, digital link. It was developed from X.25 and ISDN technology.
frame relay
32
185. If a portion of a T-Carrier line is used for one purpose and a different portion for another purpose, the line has been __________.
fractionalized
33
186. A __________ is a device that allows a computer, which works with digital information, to communicate over lines that use analog signals.
modem
34
187. The CPE must be able to send data in the correct format onto the connection that make up the __________ and receives data coming from that connection.
local loop
35
188. __________ is a cell-based packet-switching technology in which the cells are of a fixed length rather than typical packet-based systems that use variable length packets.
ATM