CNT 120 CH1

¡Supera tus tareas y exámenes ahora con Quizwiz!

Troubleshooting step 6

Verify the functionality and implement preventive measures

Class C

What class of fire extinguisher is necessary to put out electrical fires?

MSDS

What piece of information would you consult to know how to properly handle substances such as chemical solvents and how to dispose of them?

HTTPS

When HTTP is layered on top of an encryption protocol such as SSL or TLS .... the result is the ________ protocol.

domain

When a Windows Server controls network access to a group of computers, this logical group is called a Windows __________.

RING TOPOLOGY

configuration in which device connections create a circular data path. Each networked device is connected to two others, like points on a circle.

LAN

covers a relatively small area (room, floor, building)

WAN

covers a very large area (between cities and even continents)

MAN

covers usually a "city-wide" area

Mesh topology

type of networking where all nodes cooperate to distribute data amongst each other.

NETWORK

is a group of computers and other devices (printers, smart phones, tablet PC, Xbox, Wii, PS, IP Phone, etc...) that are connected by some type of transmission media (copper wire, fiber optic, or RF).

switch

receives incoming data frame from one of its ports, reads the MAC address and then directs the data frame to the correct port to to the destination node

Data Link

responsible for interfacing with physical hardware on the local network - responsible for getting data onto the network (NIC, MAC Address, Ethernet, Wi-Fi)

Network

responsible for moving messages from one node to another until reaches destination (IP, ICMP, ARP)

Presentation

responsible for reformatting, compressing, and/or encrypting data in a way that the receiving application can read (.txt, .png, .mp3, .html, etc....)

Transport

responsible for transporting Application layer payloads from one application to another (TCP ... and ... UDP)

Physical

simplest layer and is responsible for sending bits via a wired or wireless transmission (Twisted Pair Copper, Fiber Optic, Radio Frequency)

Star TOPOLOGY

topology for a Local Area Network (LAN) in which all nodes are individually connected to a central connection point, like a hub or a switch.

Bus TOPOLOGY

topology for a Local Area Network (LAN) in which all the nodes are connected to a single cable. The cable to which the nodes connect is called a "backbone". If the backbone is broken, the entire segment fails.

manage data and other resources for a number of clients;ensure that only authorized users access the network;control which type of files a user can open;restrict when and from where users can access the network;dictate which rules computers will use to communicate;supply applications and data files to clients

An NOS is a special type of software designed to:

Layer 7

Application Layer

Data

Application Layer;Presentation Layer;Session layer

Frames

Data Link Layer

Layer 2

Data Link Layer

Troubleshooting step 7

Document findings, actions and outcomes

OSHA

Electrical and tool safety in workplaces are is generally regulated by______.

Troubleshooting step 4

Establish a plan for resolving the problem

Troubleshooting step 2

Establish a theory of probable cause

Layer 3

Network Layer

Packets

Network Layer

Bits

Physical Layer

Layer 1

Physical Layer

Layer 6

Presentation Layer

Layer 5

Session Layer

Troubleshooting step 1

Identify the problems and its symptoms

ESD

If you are working on the sensitive electronic components of the computer, you should wear a(n) _______ strap to protect the sensitive electronic parts from damage.

Troubleshooting step 5

Implement the solution or escalate the problem

RDP

In the Windows Operating System, the ______ application is used to provide a secure, encrypted transmission that allows a technician to remote in to a machine to make configuration changes or troubleshoot that device.

Troubleshooting step 3

Test your theory to determine the cause

SSH

The _______ protocol is used at the command-line to allow an administrator to connect to remote systems (computer, server, router, switch) to make configuration changes to that device. The ______ protocol is encrypted (it creates a secure tunnel between the 2 systems), so it is secure and more commonly used that its predecessor.

Telnet

The _______ protocol is used at the command-line to allow an administrator to connect to remote systems (computer, server, router, switch) to make configuration changes to that device. The ______ protocol is not encrypted, so it has been replaced by a protocol that is more secure.

logical

The _________ topology has to do with software, how access to the network is controlled, including how users and programs initially gain access to the network, and how specific resources, such as applications and databases are shared on the network.

physical

The _________ topology refers to a network's hardware and how computers, other devices, and cables fit together to form the network.

Peer-to-Peer

The ____________ network model, the operating system of each computer on the network is responsible for controlling access to its resources without centralized control.

Client-Server

The ____________ network model, the resources are managed by the NOS via a centralized directory database.

NOS (Network Operating System)

The client-server network model requires a(n) ______ which controls access to the entire network. (Examples are: Windows 2016 Server, Ubuntu Server, Red Hat Enterprise Linux)

user accounts and passwords to the network are assigned in one place;access to multiple shared resources can be centrally granted to a single user or groups of users;problems on a network can be monitored, diagnosed, and often fixed from one location;network is scalable

The following are advantages of a Client-Server network:

simple to configure;less expensive than other network options

The following are advantages of a Peer-to-Peer network:

they are not scalable;they are not necessarily secure;not practical for connecting more than a few computers

The following are disadvantages of a Peer-to-Peer network:

protocols

The methods and rules for communication on a network are called _______________.

HTTP

The primary protocol used by Web servers and browsers (without a layer of security) is _________.

SMTP

The primary protocol used by clients to send an email message is the _________ protocol.

POP3 or IMAP4

The recipient's email server delivers the email message to the receiving client by using the _________ protocol.

Layer 4

Transport Layer

Segments

Transport Layer

FTP- FILE TRANSFER PROTOCOL

______ is a client-server application that transfers files between 2 computers. _____ does not provide encryption and is therefore not secure.

Active Directory

_______________ is the centralized directory database that contains user account information and security for the entire group of computers.

router

a device that manages traffic between two or more networks .. and ... can help find the best path for traffic to get from one network to another typically by reading the destination IP address of the data packet

NIC

a network port used to attach a device to a network and allow it to send and receive data on the network

Session

describes how data between applications is synched and recovered if messages don't arrive intact at the receiving application

Application

describes the interface between two applications, on separate computers (HTTP, FTP, SMTP, POP3, DNS, etc...)


Conjuntos de estudio relacionados

Lean Six Sigma Black Belt - General Terms and Notes SixSigmaStudyGuide

View Set

Econ 102: Externalities and Public Goods

View Set

Teaching Vocabulary: Growing and Processing Bananas

View Set

SLMC Principles of Speech FINAL (Ch. 7-12)

View Set

Chapter 7 - The Valuation and Characteristics of Bonds

View Set

Fundamentals of Computer Science Exam 1 Review

View Set