Module 18 Flashcards

1
Q

What is one of the main uses of a network?

A

to share files

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

When a computer is on a network, any internal or external local drives can be shared with other computers on that network. True or False?

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

When the computer is on a network, any internal or external local drives can be shared with other computers. When a computer shares an attached hard drive, or folder on an attached drive, it can be referred to as what?

A

Direct Attached Storage

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What does NAS stand for?

A

Network Attached Storage

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What do you call an appliance that is one or more hard drives housed in an enclosure with basic server firmware?

A

NAS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

A NAS is usually running some sort of __________.

A

Linux

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

The NAS appliance provides access to its __________ using various file sharing protocols.

A

storage devices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

A NAS is accessed over the network using a wired __________ port.

A

Ethernet port

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

A NAS appliance may also support __________ networking.

A

wireless (Wi-Fi)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

In a SOHO network where would you plug in a NAS appliance?

A

the LAN port

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

The NAS appliance can be configured by connecting to it’s __________.

A

web management page

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Like a SOHO router, open a web browser then input the IP address assigned to the NAS device.

A

SOHO

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

There are two main options for sharing a printer on the network, what are they?

A

Windows ( this is how our printer is shared at work)

use a hardware print server.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

For Windows to connect to a network and share resources with other computers, the computers must have the appropriate __________ installed.

A

client software

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Information about the network the computer is joining is shown in the __________ properties, which you can open from __________ or by right-clicking the __________ object and selecting __________.

A

System
Control Panel
This PC
Properties

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

An administrator can change the network computer name and domain or workgroup membership by clicking __________.

A

Change settings

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

As long as the network location/__________ settings have been configured to allow it, any file or folder on a Windows computer can be shared with other computers.

A

Windows firewall

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

To share an object, right-click it and select __________.

A

Give access to

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

When configuring file sharing, it is important for users to have matching user accounts, with the same __________ and __________, on both the host and client computer.

A

user name
password

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

To allow unauthenticated access, you can enable the __________ account via the User Accounts applet.

A

Guest

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

You can disable password protected file sharing by opening the __________ from Control Panel and clicking __________.

A

Network and Sharing Center
Advanced sharing settings

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

If you want to make resources available over a wider network, such as the Internet, you likely need to make use of a __________ solution.

A

hosted storage

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

A powerful feature of HTTP is the capacity to provide _________ to other related documents.

A

hyperlinks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

As well as web pages, hyperlinks can point to __________.

A

any type of file

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
___________ is used to upload and download files between clients and servers.
FTP
26
What does FTP stand for?
File Transfer Protocol
27
FTP is more efficient compared to ______ file attachments or __________ file transfer.
email HTTP
28
Like plain HTTP, FTP has no ___________ mechanisms.
security
29
With FTP all authentication and data transfers are communicated as ___________,
plain text
30
An FTP session can be protected using __________ protocols.
encryption
31
__________ storage means leasing a web server from a service provider.
Hosted
32
Give an example of hosted storage
cloud computing
33
Cloud computing has lots of different definitions but generally refers to any sort of computing resource provided to the customer on a ___________ basis.
pay-per-use
34
Who is not responsible for configuring and provisioning the computing resource within the cloud?
the customer
35
Among other benefits, the cloud provides __________.
rapid elasticity
36
Rapid elasticity means that the cloud can scale do what?
scale quickly to meet peak demand
37
A cloud computing provider's ability to control a customer's use of resources through metering is referred to as __________.
measured service
38
In order to respond quickly to changing customer demands, cloud providers must be able to provision resources quickly. This is achieved through __________ and __________.
resource pooling virtualization
39
Tell me two things about a Peer-to-Peer network.
1. No central server. 2. Each client contributes resources to the network.
40
When considering storage solutions, backup is very important. What are the two most important things that must be backed up?
1. data files 2. system configuration
41
What do you call the process of setting up and customizing a computer system or software application to meet specific needs and requirements?
System configuration
42
What do you call a backup that's stored in the same place?
on-site
43
What do you call a backup that's stored in a different location than the computer?
off-site
44
Name the three backup storage types.
1. locally attached storage 2. network attached storage 3. offsite/cloud based storage
45
What type of storage is One Drive?
offsite/cloud
46
What type of backup storage uses hard disks or flash drives attached to the local PC or server?
locally attached storage
47
What type of backup storage uses a NAS appliance to allow multiple machines to back up to the same location.
network attached storage
48
What type of back up storage is backed up over the Internet to cloud-based storage?
offsite/cloud based storage
49
Offsite/cloud based storage requires a substantial amount of __________.
bandwidth
50
What does NAS stand for?
network attached storage
51
A __________ is an ordinary backup job.
file backup
52
Each change in the database is referred to as a __________.
transaction
53
What is one way of backing up a database?
replication.
54
A replica is a copy (or mirror of the database hosted __________.
On a separate server.
55
When a transaction is posted, it must typically be committed to both the __________ and the __________ before it can be considered complete.
master database replica
56
Does a replication protect you from errors such as accidently deleting a record?
No
57
How are read-only copies of a database supported?
snapshots
58
What two ways might snapshots be useful?
1. to view historical records. 2. recover from administrative mistakes.
59
An __________ or __________ makes a copy of the OS and installed application so that a workstation or server can be recovered without having to manually reinstall software and reconfigure settings.
OS system backup
60
A __________ backup is one that can be applied directly to a partitioned drive without the separate step of reinstalling the OS.
bare metal
61
Bare metal backups typically work by making an _________.
image
62
A bare metal backup software provides a __________ which enables the system to connect to the recovery media.
Recovery boot disk
63
What's the only drawback to bare metal backups?
System images require multi-gigabyte storage media
64
Name two ways of backing up your files in Windows.
1. backup and restore 2. file history
65
This Windows backup enables you to perform selective, scheduled, and ad-hoc backups.
backup and restore
66
This Windows backup enables automated backups. As files ae modified, the versions are tracked and backed up automatically.
file history
67
How do I access 'file backup' and 'backup and restore'?
Settings Update & Security Backup tab
68
The default for File History is to make copies how often?
Every hour
69
On a SOHO network, backup jobs are often scheduled to run __________.
overnight.
70
How often do most business make a backup?
daily
71
To keep multiple backups, ideally you will need multiple __________ or enough space on a single__________ to store multiple backups.
drives drive
72
Name three ways to test that your backups are working the way they're suppose to.
1. Error detection 2. Configuration 3. Test restore
73
Problems with the backup media or configuration can cause backup jobs to fail. Depending on the error, the whole job may be cancelled, or some data may not get backed up. Backup software usually has the facility to verify a backup. This makes the backup operation longer though. The software should also be able to report errors to a log file. What do you call this?
error detection
74
When setting up a new job (and periodically thereafter), it is wise to check to ensure that all the expected data has been backed up. What do you call this?
configuration
75
When you do a __________, you redirect the data to a different folder, to avoid overwriting live data.
test restore
76
__________ can refer either to operating a device by moving it around or using a camera in the device to recognize your hand movement.
Kenetics
77
Mobile devices use __________ and __________ to detect when the device is moved and change the screen orientation between portrait and landscape modes.
accelerometers gyroscopes
78
Access to a mobile device should always be protected by a __________.
screen lock
79
Screen lock can be configured with a __________ policy.
lockout
80
What's a lockout policy.
After so many wrong attempts the device can't be accessed for x amount of time.
81
What do you call a feature that sets a device to factory settings if stolen?
remote wipe
82
What's another name for remote wipe?
"kill switch"
83
__________ are installed programs that extend the functionality of the mobile device.
Apps
84
What does SDK stand for?
Software Development Kit
85