ISBN: 159200-792-9
Any modern client running the TCP/IP protocol suite will be capable of connecting to a UNIX-type of host via ______.
Telnet
______ is a terminal emulation protocol used to log on to remote hosts using the TCP/IP protocol suite.
Telnet
A(n) _____ converts digital signals into analog signals for use with ISDN phones and other analog devices.
Terminal adapter, TA
A(n) _______ is a divce that accepts wireless signals from multiple nodes and retransmits them to the rest of the network.
access point
The _____ indicates, in hexadecimal notation, the area of memory that the NIC and CPU will use for exchanging, or buffering, data.
memory range
A(n) _______ issues and receives wireless signals with equal strength and clarity in all directions.
omni-directional antenna
To better organize and manage objects, a network administrator places objects in _______.
organizational units
The _____ is the lowest, or first, layer of the OSI model.
physical layer
______ layer serices manage data encryption and decription.
presentation
The term ______ refers to those skills hat are now easily measurable, suck as customer relations, oral and written communications, dependability, teamwork, and leadership abilities.
soft skills
A _______ is a tool that can be used to assess the quality of a wireless signal.
spectrum analyzer
A(n) ______ is a special 32-bit number that, when combined with a device's IP address, informs the rest of the network about the segment or network to which it is atteched.
subnet mask
The relationship between two dowmains in which one allows the other to authenticate its users is known as a(n) ______.
trust relationship
Network layer addresses are also called ______.
virtual addresses
To calculate a host's network ID given its IP address and subnet mask, you follow a logical process of combining bits knowns as ________.
ANDing
A network's ________ is its method of controlling how network nodes access the communications channel.
Access method
__________ is a Network layer protocol that obtains the MAC address of a host, or node, then creates a database that maps the MAC address to the host's IP address.
Address Resolution protocol
The _____ account is a predefined user account that has the most extensive privileges for resources both on the computer and on the domain that it controls.
Administrator
A(n) _____ is a distinct communication path between nodes.
Channel
______ is a fault-tolerance technique that links multiple servers together to act as a single server.
Clustering
A ______ is a place where the computers, devices, and connectivity necessary to rebuild a network exist, but they are not appropriately configured, updated or connected.
Cold Site
A(n) _____ is a logically or physically distinct Ethernet network segment on which all participating devices must detect and accommodate data colision.
Collision domain
_______ protocols ensure that data arrives exactly as it ws sent by extablishing a connection with another node before they begin transmitting data.
Connection-oriented
A(n) Cable is useful for quickly and easily verifying that a node's NIC is transmitting and receiving signals property.
Crossover
______ occurs when a singal traveling on one wire or cable infringes on the signal traveling over an adjacent wire or cable.
Crosstalk
_______ occurs when a hacker forges a name server records to falsify his host's identity.
DNS spoofing
A ______ modulates outgoing signals and demodulates incoming signals.
DSL modem
A(n) __________ occurs when a system becomes unable to function because it has been deluged with data transmissions or otherwise disrupted data.
Denial-of-service Attack
A ________ is a password0protected and encrypted file that holds an individual's identification information, including a public key.
Digital certificate
The use of an algorithm to scramble data into a format that can be read only by resersing the algorithm is known as ________.
Encryption
______ is the original PC file system that was designed in the 1970s to support floppy disks and, later, hard disks.
FAT
______ is a network technology whose standards were originally specificed by ansi in the mid-1980s and later refined by ISO.
FDDI
______ is the capacity for a component or system to continue functioning despite damage or pertial malfunction.
Fault tolerance
_______ is equivalent to using wild cards in Windows and DOS.
File globbing
_____ refers to capability of a server to share data files, applications, and disk storage space.
File services
______ is an updated, digital version of X.25 that relies on packet switching.
Frame Relay
A(n) __________ separates a network into muliple logically defined segments.
Gateway
On a Linux or Solaris system, the ______ command creates a new group ID and makes the group available for use.
Groupadd
The _______ lists all computer components proven to be compatible with Windows Server 2003.
Hardward Compatibility List, HCL
The term _______ refers to identical components that can be changed while a machine is still running.
Hot swappable
On Unix-type systems, the ______ utility allows you to modify TCP/ip settings for a network interface, release and renew DHCP-assigned addresses, or simply check the status of your machine's TCP/IP settings.
IPCONFIG
______coordinate the storage and transfer of e-mail between users on a network.
Main services
Every UNIX-type system contains full documentation of UNIX commands in the ________.
Manual Pages
________ involves associating latter, such as M: or T:, with a disk, directory, or other resource.
Mapping
The _____ is the main circuit tha tcontrols the computer.
Motherboard
______ allows one device to send data to a specific group of devices.
Multicasting
________is the ability of a processor to perform many different opertations in a ver brief period of time.
Multitasking
______ contain databases of associated names and IP addresses and provide this informatio to resolvers on request.
Name servers
On networks that run NetBIOS over TCP/IP, the ________ utility can provide information about NetBIOS statistics and resolve NetBIOS names to their IP addreses.
Nbtstat
The _______ utility displays TCP/IP statistics and details about TCP/IP components and connections on a host.
Netstat
A ______ is a group of comuters and other divices that aer connected by some type of transmission media.
Network
_______ viruses propagate themselves via network protocols, commands, messaging programs, and data links.
Network
The _______ is a simple Application layer protocol used to synchronize the crocks of computers on a network.
Network Time Protocol, NTP
_______ is a specialized storage device or group of storage devices that provides centralized fault-tolerant data storage for a network.
Network attached storage
______ are connectivity devices that enable a workstation, server, printer, or other node to receive and transmit data over the network media.
Network interface cards, NIC
_______ is a software-based tool that continually monitors network traffic from a server or workstation attached to the network.
Network monitor
_______ implies a fluctuation in voltage levels causes by other devices on the network electromagnetic interfaces?
Noise
Resistance is measured in ______.
Ohms
_____ is a term used by network professionals to describe the non-data information that must accompany data in order for a signal to be properly routed and interpreted by the network.
Overhead
In a ______ Network, every compter can comunicate directly with any other computer.
Peer-to-peer
The most common way to measure latency on data networks is by calculation a packet's _________.
Round trip time
______is a simple subprotocol, incapable of doing anything more then transporting mail or holding it in a queue.
SMTP
______ refers to a thorough examination of each aspect of a network to determine how it might be compromised?
Security audit
Transport layer protocols break large data nuits received from the Session layer into multiple smaller units called ______.
Segments
________ is a networking technology orginally developed at Xerox in the early 1970's and improved how Digital Equipment Corporation, Intel, and Xerox.
Sequencing
_______is a mothod of identifying segments that belong to the same group of subdivided data.
Sequencing
______ are physically designed to be linked with other hubs in a single telecommunications closet.
Stackable Hubs
_____ are documented agreements containing technical specifactions or other precise criteria that stipulate how a particular product or service should be designed or performed.
Standards
_______ separates a network into multiple logically diffined segments.
Subnetting
_____ enables multiple nodes to simultaneously transmit and receive data over different logical network segments.
Switched Ethernet
______ are connectivity devices that subdivide a network into smaller logical pieces.
Switches
A(n) ______ is a network that traverses some distance and usually connects LANs, whether across the city or across the nation.
Wide area network, WAN
The ______ provides a means of resolving NetBIOS names to IP addresses.
Windows Internet Naming Service
A(n) _______ is a file that contains instructions for performing a specific task, such as reading data from and writing data to a hard drive.
kernel module
A wave's ______ is a measure of its strength at any given point in time.
Amplitude
_____ is an ITU networking standard describing Data Link Layer protocols for both network accessand signal multiplexing.
Asynchronous Transfer Mode
A(n) ______consists of the objects, classes, and properties a network typically needs.
Base schema
A ______ is a record of how the network operates under normal conditions.
Baseline
______ is th eprocess of assigning one network component to work with another.
Binding
A momentary decrease in voltage is known as a(n)_______.
Brownout
A computer's _______ is a circuit, or signaling pathway, used by the motherboard to transmit data to the computer's components, including its memory processos, hard disk, and NIC.
Bus
A WAN in which each site s directly connected to no more then two other sites in a serial fashion is known as a _______.
Bus topology WAN
A(n) _______ is a process or program that provides support personnel with a centralized means of documenting changes to the network.
Change management system
_______ refers to the soundness of a network's programs, data, services, devices, and connections.
Integrity
A(n) _______ is a message to the computer that instructs it to stop with its doing and pay attention to something else.
Interrupt request, IRQ
A network or part of a network that uses browser-based services to exchange information within an enterprise is know as a(n) _______.
Intranet
______ is a divice that handles electrical signals improperly, usually affecting the rest of the network?
Jabber
A(n) ______ is a smal, removable piece of plastic that contains a metal receptacle.
Jumper
The core of all UNIX-type systems is call the _______.
Kernel
What term discribes a network of computers and other divices that is confined to a arelatively small space, such as one building or even one office?
LAN
The term ____topology refers to the way in which data is transmitted between nodes, rather than the physical layout of the paths that data takes.
Logical
A ______ topology does not specify device types, connectivity methods, or addressing schemes for the network.
Physical
In UNIX, two or more commands connected by a pipe are called a(n) _______.
Pipeline
Protocols at the ______ layer accept Application layer data and format it so that one type of application and host can understand data from another type of application and host.
Presentation
A ______ is a routine of squential instructions that runs until it has achieved its goal.
Process
A ______ is a rule that governs how networks communicate.
Protocol
_____ ensure that data are transfered whole, in sequence, and without error from on node on the network to another.
Protocols
The term _______ refers to an implementation in which more then one component is installed and ready to use for storing, processing, or transporting data.
Redundancy
______ are any hosts on the Internet that need to look up domain name information.
Resolvers
The _______ tool is used to access consol commands through a Web browser on another computer on the network.
Rmeote Manager
In ____, a 3-byte packet, called a token, is transmitted from one node to another is a circular fashion around to the ring.
Token Passing
The ______ utility uses ICMP to trace the path from one networked node to another, identifying all intermediate hops between the two nodes.
Traceroute, tracert
______ in a standard interface used to connect multiple types of peripherals, including modems, mice, audio players, and NIC's.
USB
A(n) ______ is the creation of a communications channel for a transmission from an earth-based transmitter to an orbiting satellite.
Uplink
The distance between corresponding points on a wave's cycle is called its ______.
Wavelength
A(n) _______ is a computer installed with the appropriate software to supply Web pages to many different clients upon domand.
Web Server
The utility that allows you to querty the DNS registration database and obtain informatio about a domain name is called _______.
Whois
Trying a number of possible character combinations to find the key that will decrypt encrypted data is known as a _______.
brute force attack
In ______, a connection is established between two network nodes before they begin transmitting data.
circuit switching