Network Ch 1 -10 and 12
redirector
A service on the client workstation, called the ______, intercepts a request to determine whether it should be handled by the client or by the server.
checksum
A unique character string that allows the receiving node to determine if an arriving data unit matches exactly the data unit sent by the source.
sequence control
A unique characteristic of the 802.11 data frame is its ____ field.
amplitude
A wave's ____ is a measure of its strength at any given point in time.
server
A workgroup is a group of interconnected computers that share each other's resources without relying on a central ____.
Network
A(n) ___ is a group of computers and other devices that are connected by some type of transmission media.
node
A(n) ____ is a client, server, or other device that can communicate over a network and is identified by a unique number, known as its network address.
web server
A(n) ____ is a computer installed with the appropriate software to supply Web pages to many different clients upon demand.
domain
A(n) ____ is a group of users, servers, and other resources that share a centralized database of account and security information.
directory
A(n) ____ is a list that organizes resources and associates them with their characteristics.
LAN
A(n) ____ is a network of computers and other devices that is confined to a relatively small space, such as one building or even one office.
digital certificate
A(n) ____ is a password-protected and encrypted file that holds an individual's identification information, including a public key.
GUI
A(n) ____ is a pictorial representation of computer functions that, in the case of NOSs, enables administrators to manage files, users, groups, security, printers, and so on.
media converter
A(n) ____ is a piece of hardware that enables networks or segments running on different media to interconnect and exchange signals.
process
A(n) ____ is a routine of sequential instructions that runs until it has achieved its goal.
thread
A(n) ____ is a self-contained, well-defined task within a process.
frame
A(n) ____ is a structured package for moving data that includes not only the raw data, or "payload," but also the sender's and receiver's network addresses, and error checking and control information.
interrupt
A(n) ____ is the circuit board wire over which a device issues voltage to signal this request.
account
A(n) ____ is the record of a user that contains all of his properties, including rights to resources, password, name, and so on.
segment
A(n) ____ is usually composed of a group of nodes that use the same communications channel for all their traffic.
site survey
A(n) _______ assesses client requirements, facility characteristics, and coverage areas to determine an access point arrangement that will ensure reliable wireless connectivity within a given area.
on-board
A(n) ____________________ NIC is integrated into the motherboard.
security policy
A(n) ____________________ identifies an organization's security risks, levels of authority, designated security coordinator and team members, responsibilities for each team member, and responsibilities for each employee.
client
A(n) ____________________ is a computer on a network that requests resources or services from another computer on the network.
transreceiver
A(n) ____________________ is a device that transmits and receives signals.
proxy service
A(n) ____________________ is a software application on a network host that acts as an intermediary between the external and internal networks, screening all incoming and outgoing traffic.
security audit
A(n) ____________________ is a thorough examination of each aspect of the network to determine how it might be compromised.
device driver
A(n) ____________________ is software that enables an attached device to communicate with the computer's operating system.
T-carrier
A(n) ____________________ uses TDM (time division multiplexing) over two wire to divide a single channel into multiple channels.
B
In IPv4 addressing, a node with an IP address of 168.34.88.29 belongs to a Class ___ network.
C
In IPv4 addressing, an IP address whose first octet is in the range of 192-223 belongs to a Class ___ network.
32-bit
In IPv4 addressing, each IP address is a unique ___ number.
127 is used for a device to communicate with itself with loopback.
In IPv4 addressing, explain what is special about an address containing 127 in the first octet and how this address is used in troubleshooting.
0
In IPv4 addressing, what number is a placeholder for referring to all computers on a network
255
In IPv4 addressing, what number is for broadcast transmissions only
format prefix
In IPv6, each address contains a ___ or a variable length field at the beginning of the address that indicates what type of address it is.
schema
In LDAP-compatible directories, a(n) ______ is the set of definitions of the kinds of objects and object-related information that the directory can contain.
routable
Protocols that can span more than one LAN or LAN segment are ___ because they carry Network layer addressing information that can be interpreted by a router.
ITU
Provides developing countries with technical expertise and equipment to advance those nations' technological bases.
symmetrical technology
Provides equal capacity for data traveling both upstream and downstream.
IDS
Software that can only detect and log suspicious activity.
IPS
Software that can react to suspicious activity.
UFS
Solaris employs the file system called ____ for its native file system type.
backbone
Sometimes referred to as "a network of networks."
telnet
___ is a terminal emulation protocol used to log on to remote hosts using the TCP/IP protocol suite.
PING
___ is a utility that can verify that TCP/IP is installed, bound to the NIC, configured correctly, and communicating with the network.
UDP
___ is more efficient than TCP for carrying messages that fit within one data packet.
MAC
____ addresses contain two parts: a Block ID and a Device ID.
checksums
____ are added to data at the source and verified at the destination.
gateways
____ are combinations of networking hardware and software that connect two dissimilar kinds of networks.
Standards
____ are documented agreements containing technical specifications or other precise criteria that stipulate how a particular product or service should be designed or performed.
protocols
____ are standard methods or formats for communication between networked devices.
data packets
____ are the distinct units of data that are transmitted from one node on a network to another.
twisted-pair
____ cable consists of color-coded pairs of insulated copper wires, each with a diameter of 0.4 to 0.8 mm.
shielded twisted-pair
____ cable consists of twisted wire pairs that are not only individually insulated, but also surrounded by a shielding made of a metallic substance such as foil.
mail services
____ coordinate the storage and transfer of e-mail between users on a network.
LANE
____ encapsulates incoming Ethernet or token ring frames, then converts them into ATM cells for transmission over an ATM network.
intelligent
____ hubs possess internal processing capabilities.
iwconfig
____ is a command-line function for viewing and setting wireless interface parameters and it is common to nearly all versions of Linux and UNIX.
modal bandwidth
____ is a measure of the highest frequency of signal a multimode fiber can support over a specific distance and is measured in MHz-km.
SSL
____ is a method of encrypting TCP/IP transmissions.
sequencing
____ is a method of identifying segments that belong to the same group of subdivided data.
interference
____ is a most significant problem for wireless communications because the atmosphere is saturated with electromagnetic waves.
PGP
____ is a public key encryption system that can verify the authenticity of an e-mail sender and encrypt e-mail data in transmission.
True
T/F: In frequency modulation, the frequency of the carrier signal is modified by the application of the data signal.
False
T/F: It is best to perform connectivity tests on a computer connected to a live network.
True
T/F: Network security is more often compromised "from the inside" than from external sources.
False
T/F: Networks are usually only arranged in a ring, bus, or star formation and hybrid combinations of these patterns are not possible.
True
T/F: On a network using TCP/IP, some nodes may use multiple IP addresses.
True
T/F: POP3's design makes it best suited to users who retrieve their mail from the same workstation all the time.
True
T/F: Protocols ensure that data are transferred whole, in sequence, and without error from one node on the network to another.
False
T/F: Resource sharing is controlled by a central computer or authority in a peer-to-peer network.
True
T/F: SONET specifies framing and multiplexing techniques at the Physical layer.
False
T/F: Seven bits form a byte.
True
T/F: Spread spectrum is a popular way of making wireless transmissions more secure.
False
T/F: The MIME standard replaces SMTP.
False
T/F: The PPTP VPN tunneling protocol is based on technology developed by Cisco.
False
T/F: The command used to view IP information on a Windows XP or Windows Vista workstation is ifconfig
True
T/F: The core of all UNIX and Linux systems is called the kernel.
False
T/F: The primary function of protocols at the session layer is to translate network addresses into their physical counterparts and decide how to route data from the sender to the receiver.
False
T/F: The term domain model refers to a type of peer-to-peer network that relies on domains rather than on workgroups.
True
T/F: Transmission methods using fiber-optic cables achieve faster throughput than those using copper or wireless connections.
False
T/F: WiMAX is defined by the IEEE 802.11 standard.
False
T/F: Wireless networks are laid out using the same topologies as wired networks.
True
T/F: Wireless signals experience attenuation.
memory range
The ____________________ indicates, in hexadecimal notation, the area of memory that the NIC and CPU use for exchanging, or buffering, data.
phishing
____ is a social engineering practice in which a person attempts to glean access or authentication information by posing as someone who needs that information.
IAB
____ is a technical advisory group of researchers and technical professionals interested in overseeing the Internet's design and management.
EIA
____ is a trade organization composed of representatives from electronics manufacturing firms across the United States.
CMOS
____ is a type of microchip that requires very little energy to operate.
channel bonding
____ is an 802.11n feature that allows two adjacent 20-MHz channels to be combined to make a 40-MHz channel.
frame aggregation
____ is an 802.11n network feature allowing the combination of multiple frames into one larger frame.
ANSI
____ is an organization composed of more than a thousand representatives from industry and government who together determine standards for the electronics industry and other fields, such as chemical and nuclear engineering, health and safety, and construction.
frame relay
____ is an updated, digital version of X.25 that also relies on packet switching.
client support
____ is one of the most important functions an NOS provides.
802.11a
____ is the least popular WLAN standard.
transmission media
____ is the means through which data is transmitted and received.
frequency
____ is the number of times that a wave's amplitude cycles from its starting point, through its highest amplitude and its lowest amplitude, and back to its starting point over a fixed period of time.
PPP
____ is the preferred communications protocol for remote access communications.
flow control
____ is the process of gauging the appropriate rate of transmission based on how fast the recipient can accept data.
PPPoE
____ is the standard for connecting home computers to an ISP via DSL or broadband cable.
802.11n
____ may use either the 2.4-GHz or 5-GHz frequency range.
virtual
____ memory may be logically carved out of space on the hard drive for temporary use.
Dial-up
____ networking refers to dialing directly into a private network's or ISP's remote access server to log on to a network.
IGMP
____ operates at the Network layer and manages multicasting
authentication
____ protocols are the rules that computers follow to accomplish authentication.
file services
____ refer to the capability of a server to share data files, applications (such as word-processing or spreadsheet programs), and disk storage space.
static
____ routing is a technique in which a network administrator programs a router to use specific paths between nodes.
geosynchronous orbiting
____ satellites are the type used by the most popular satellite Internet access service providers.
digital
____ signals are composed of pulses of precise, positive voltages and zero voltages.
infared
____ signals are transmitted by frequencies in the 300- GHz to 300,000-GHz range, which is just above the top of the wireless spectrum as it is defined by the FCC.
port scanner
____ software searches a node for open ports.
remote
____ virtual computing allows a user on one computer, called the client, to control another computer, called the host or server, across a network connection.
virtual circuits
______ are connections between network nodes that, although based on potentially disparate physical links, logically appear to be direct, dedicated links between those nodes.
throughput
_______ is the measure of how much data is transmitted during a given period of time.
cross talk
_______ occurs when a signal traveling on one wire or cable infringes on the signal traveling over an adjacent wire or cable.
connectors
________ are the pieces of hardware that connect the wire to the network device, be it a file server, workstation, switch, or printer.
VNC
________ is an open source system designed to allow one workstation to remotely manipulate and receive screen updates from another workstation.
subnetting
________ separates a network into multiple logically defined segments, or subnets.
MIME
_________ is a standard for encoding and interpreting binary files, images, video, and non-ASCII character sets within an e-mail message.
application
_____________ layer services facilitate communication between software applications and lower-layer network services so that the network can interpret an application's request and, in turn, the application can interpret data sent from the network.
SMTP
______________ is the protocol responsible for moving messages from one mail server to another over TCP/IP-based networks.
switching
____________________ is a component of a network's logical topology that determines how connections are created between nodes.
reassembly
____________________ is the process of reconstructing the segmented data units.
remote desktop
____________________ is the remote virtual computing software that comes with Windows client and server operating systems.
encryption
____________________ is the use of an algorithm to scramble data into a format that can be read only by reversing the algorithm.
GEO
____________________ means that satellites orbit the Earth at the same rate as the Earth turns.
multitasking
_____is the execution of multiple tasks at one time.
46 to 1500
The data portion of an Ethernet frame may contain ____ bytes of information.
OC level
The data rate of a particular SONET ring is indicated by its ____, a rating that is internationally recognized by networking professionals and standards organizations.
255.255.0.0
The default subnet mask for a Class B network is ___.
NIC
The device inside a computer that connects a computer to the network media and allows it to communicate with other computers is known as a(n) ____.
domain
The directory containing information about objects in a domain resides on computers called ____ controllers.
wavelength
The distance between corresponding points on a wave's cycle is called its ____.
1000Base-LX
The most common 1-Gigabit Ethernet standard in use today is ____.
bus
The most common logical topologies are ____ and ring.
dotted decimal notation
The most common way of expressing IP addresses.
administrator
The most privileged user account on an NOS is the ____.
overhead
The nondata information that must accompany data for a signal to be properly routed and interpreted by the network.
PKI
The use of certificate authorities to associate public keys with certain users is known as ____.
spread-spectrum
The use of multiple frequencies to transmit a signal is known as ________ technology.
D
A class ____ network class is reserved for special purposes.
3-tier architecture
A client/server environment that incorporates middleware.
hybrid
A complex combination of pure topologies is known as a ____ topology.
server
A computer on a network that manages shared resources is known as a(n) ____________________.
bus
A computer's ____________________ is the circuit, or signaling pathway, used by the motherboard to transmit data to the computer's components, including its memory, processor, hard disk, and NIC.
TCP
A connection-oriented protocol.
wireless spectrum
A continuum of electromagnetic waves used for data and voice communication.
repeater
A device that regenerates a digital signal is called a(n) ____.
False
T/F: If a device does not know its own IP address it can still use ARP.
SSID
The _____________ is a unique character string used to identify an access point.
hostname
An administrator can discover the host name assigned to a client by using the ____ utility.
False
T/F: If a station detects the presence of several access points, it will always choose the closest access point.
1 Gbps
1000Base-SX has a maximum throughput of ____.
10
1000Base-T is a standard for achieving throughputs ____ times faster than Fast Ethernet over copper cable.
duplicate
A GUID (globally unique identifier) is a 128-bit number that ensures that no two objects have ____ names.
firmware
A NIC's transmission characteristics are held in the adapter's ____.
marginal
A PSTN offers ____ security.
four
A UDP header contains ___ fields.
concentrator
A VPN ____ authenticates VPN clients and establishes tunnels for VPN connections.
CIFS
A Windows XP client communicates with a Windows Server 2008 server using this file system.
anycast
A ___ address represents any one interface from a group of interfaces, any one of which can accept a transmission.
subnet mask
A ___ is a special 32-bit number that, when combined with a devices IP address, informs the rest of the network about the segment or network to which the device is attached
port
A ___ number is the address on a host where an application makes itself available to incoming or outgoing data.
DSLAM
A ____ aggregates multiple DSL subscriber lines and connects them to the carrier's CO.
brute force
A ____ attack occurs when a hacker tries numerous possible character combinations to find the key that will decrypt encrypted data.
dictionary
A ____ attack occurs when a hacker uses programs that try a combination of a user ID and every word in a dictionary to gain access to the network.
denial of service
A ____ attack occurs when a system becomes unable to function because it has been deluged with data transmissions or otherwise disrupted.
flashing
A ____ attack occurs when an Internet chat user sends commands to a victim's machine that cause the screen to fill with garbage characters and requires the victim to terminate their chat sessions.
terminal adapter
A ____ converts digital signals into analog signals for use with ISDN phones and other analog devices.
packet filtering
A ____ firewall is a router (or a computer installed with software that enables it to act as a router) that examines the header of every packet of data it receives to determine whether that type of packet is authorized to continue to its destination.
router
A ____ is a multiport connectivity device that directs data between nodes on a network.
hub
A ____ is a repeater with more than one output port.
daisy chain
A ____ is simply a linked series of devices.
routers
A ____ main function is to examine packets and determine where to direct them based on their Network layer addressing information.
collision
A ____ occurs when two transmissions interfere with each other.
ISP
A business that provides organizations and individuals with access to the Internet and often, other services, such as e-mail and Web hosting.
Server
A central computer.
single
A directional antenna issues wireless signals along a(n) ____ direction.
channel
A distinct communication path between nodes, much as a lane is a distinct transportation path on a freeway.
NTFS
A file system developed by Microsoft and used with its Windows NT, Windows 2000 Server, Windows Server 2003, and Windows 2008 operating systems.
content filtering
A firewall that can block designated types of traffic based on application data contained within packets.
stateful
A firewall that can view a data stream.
host-based
A firewall that protects only the computer on which it is installed.
multiplexing
A form of transmission that allows multiple signals to travel simultaneously over one medium is known as ____.
DNS
A hierarchal way of associating domain names with IP addresses.
per user
A licensing mode that allows a fixed quantity of clients to use one software package simultaneously.
per seat
A licensing mode that limits access to an application to specific users or workstations.
tree
A logical representation of multiple, hierarchical levels within a directory.
sequencing
A method of identifying segments that belong to the same group of subdivided data.
cabling
A network backbone is the ____________ that connects the hubs, switches, and routers on a network.
WAN
A network that connects two or more geographically distinct LANs or MANs.
MAN
A network that is larger than a LAN and connects clients and servers from multiple buildings is known as a(n) ____.
client/server network
A network that uses a server to enable clients to share data, data storage space, and devices is known as a(n) _________________________.
punch-down block
A panel of data receptors into which horizontal cabling from the workstations is inserted.
crossover cable
A patch cable in which the termination locations of the transmit and receive wires on one end of the cable are reversed is known as a(n) ____.
workstation
A personal computer which may or may not be connected to a network is a(n) ____.
middleware
A piece of software called ____ translates requests and responses between a client and a server.
pathping
A program similar to mtr, ____, is available as a command-line utility in Windows XP, Vista, Server 2003, and Server 2008.
DDNS
A program that is used by a service provider on a user's computer. It detects changes to the users IP address and updates the users DNS accordingly.
LDAP
A protocol used to access information stored in a directory.
interior
A router that directs data between nodes on an autonomous LAN (or one owned and operated by a single organization) is known as a(n) ____________________ router.
transmission and hardware
A router that is not configured to drop packets that match certain suspicious characteristics is an example of a risk associated with ____.
file server
A server that provides file services is called a(n) ____________________.
proxy service
A software application on a network host that acts as an intermediary between the external and internal networks, screening all incoming and outgoing traffic.
cut-through mode
A switch running in this mode reads a frame's header and decides where to forward the data before it receives the entire packet.
store-and-forward mode
A switch running in this mode reads the entire data frame into its memory and checks it for accuracy before transmitting the information.
False
T/F: If your network does not need or use APIPA, it must be uninstalled to avoid conflicts.
access point
Accepts wireless signals from multiple nodes and retransmits them to the rest of the network.
tree
Active Directory organizes multiple domains hierarchically in a domain ____.
IP
Addresses used to identify computers on the Internet and other TCP/IP-based networks are known as ____ addresses.
root
Administrator account on a UNIX or Linux system.
CSMA/CD
All Ethernet networks, independent of their speed or frame type, use an access method called ____.
radiation pattern
An antenna's ____ describes the relative strength over a three dimensional area of all the electromagnetic energy the antenna sends or receives.
True
T/F: In CIDR, conventional network class distinctions do not exist.
dig utility
Allows an administrator to query a DNS database and find the host name associated with a specific IP address or vice versa.
nslookup utility
Allows an administrator to query the DNS database from any computer on the network and find the host name of a device by specifying its IP address, or vice versa.
NIC
Also known as a network adapter.
100
An 802.11g antenna has a geographic range of ____ meters.
protocols and software
An NOS that contains a "back door" is an example of a risk associated with ____.
Microsoft Outlook
An example of a popular client email software is ____.
Microsoft Exchange Server
An example of a popular mail server is ____.
sneakernet
An outdated file-sharing method.
standalone computer
Computer that is not connected to other computers and that uses software applications and data stored on its local disks.
False
T/F: In UNIX, you combine commands using a pipe, which is entered as a forward slash ( / ).
ARP
Computers cache the MAC to IP mappings in what kind of table to find the address locally rather than requesting the information again.
False
T/F: In a star topology, a single connection failure will halt all traffic between all sites.
jamming
As part of CSMA/CD, a process known as ____________________ allows the NIC issue a special 32-bit sequence that indicates to the rest of the network nodes that its previous transmission was faulty and that those data frames are invalid.
external
CompactFlash is an example of a peripheral device attached to the computer's ____ bus.
True
T/F: In every NOS, groups form the basis for resource and account management.
resolvers
Any hosts on the internet that need to look up domain name information
fragmentation
At the Network layer, ____________________ ensures that packets issued to the network are no larger than the network's maximum transmission unit size.
smart jack
At the customer's demarcation point, either inside or outside the building, T-carrier wire pairs terminate with a ____.
nonroutable
Because WAN connections require routers or other Layer 3 devices to connect locations, their links are not capable of carrying ____ protocols.
Ethernet II
Because of its support for multiple Network layer protocols and because it uses fewer bytes as overhead, ____________________ is the frame type most commonly used on contemporary Ethernet networks.
reserved
Because the octets equal to 0 and 255 are ____, only the numbers 1 through 254 can be used for host information in an IPv4 address.
802.11n
Boasts a maximum throughput of 600 Mbps.
10.43.3.87:21
If the standard port number for the Telnet service is 21, a host whose IPv4 address is 10.43.3.87 has a socket address for Telnet of ___.
security
Broadband cable requires many subscribers to share the same local line, thus raising concerns about ____ and actual (versus theoretical) throughput.
PCI
By far, the most popular expansion board NIC is one that uses a(n) ____ bus.
forward slash
CIDR notation takes the form of the network ID followed by a(n) ____, followed by the number of bits that are used for the extended network prefix.
mail server
Computer responsible for mail services.
shim
Collectively, MPLS labels are sometimes called a ____.
switch
Connectivity device that subdivides a network into smaller logical pieces.
physical
Connectivity devices such as hubs and repeaters operate at the ____ layer.
tiered topology WAN
Contain sites that are connected in star or ring formations are interconnected at different levels, with the interconnection points being organized into layers to form hierarchical groupings.
star topology WAN
Contains a single site acting as the central connection point for several other points.
private key encryption
Data is encrypted using a single key.
public key encryption
Data is encrypted using two keys.
namespace
Database of Internet IP addresses and their associated names
standards
Define the minimum acceptable performance of a product or service.
router
Device that connects network segments and direct data.
bridge
Devices that connect two network segments by analyzing incoming frames and making decisions about where to direct them based on each frame's MAC address.
asymmetrical
Dial return satellite Internet access is a(n) ____ technology.
netstat utility
Displays TCP/IP statistics and details about TCP/IP components and connections on a host.
TDM
Divides a channel into multiple intervals of time, or time slots.
RAM
Each time a computer starts up, the device drivers for all its connected peripherals are loaded into ____.
man
Every UNIX and Linux system contains full documentation of UNIX commands in the ____ pages.
cardbus
External peripheral device specifying 32-bit interface running at 33 MHz.
10Base-T
Follows the 5-4-3 rule of networking.
WANs
Given their long-distance capabilities, 10GBase-ER and 10GBase-EW are best suited for use on ____.
repeater
Have no means to interpret the data they retransmit.
POP3
IMAP (Internet Message Access Protocol) is a mail retrieval protocol that was developed as a more sophisticated alternative to ____.
23
ISDN PRI uses ____ B channels and one 64-Kbps D channel.
interference
If intermittent and difficult-to-diagnose wireless communication errors occur, ____ might be the culprit.
RX
If the ____ NIC LED indicator is blinking, the NIC is functioning and receiving frames.
DNS spoofing
In ____ , a hacker forges name server records to falsify his host's identity.
classful
In ____ addressing, only Class A, Class B, and Class C addresses are recognized.
active
In ____ scanning, the station transmits a special frame, known as a probe, on all available channels within its frequency range.
fixed
In ____ wireless systems, the result is a point-to-point link.
narrowband
In ____, a transmitter concentrates the signal energy at a single frequency or in a very small range of frequencies.
diffraction
In ____, a wireless signal splits into secondary waves when it encounters an obstruction.
mutual authentication
In ____, both computers verify the credentials of the other.
man in the middle
In a ____ attack, a person redirects or captures secure transmissions as they occur.
bonding
In a process called ____, two 64-Kbps ISDN B channels can be combined to achieve an effective throughput of 128 Kbps.
repeater
In a ring network, each workstation acts as a(n) ____ for the transmission.
peer-to-peer
In a(n) ____ network, every computer can communicate directly with every other computer.
star
In a(n) ______ topology, every node on the network is connected through a central device, such as a hub, router, or switch.
simplex
In cases in which signals may travel in only one direction, the transmission is considered ____.
last 8 bits
In classful addressing, Class C IPv4 address host information is located in the ____.
first 16 bits
In classful addressing, the Class B IPv4 address network ID is located in the ____.
period
In dotted decimal notation, a___ separates each decimal.
confidential
In general, information is ____________________ if it could be used by other parties to impair an organization's functioning, decrease customers' confidence, cause a financial loss, damage an organization's status, or give a significant advantage to a competitor.
DHCP
In most cases BOOTP has been surpassed by the more sophisticated IP addressing utility ____.
reassembles
In packet switching, when packets reach their destination node, the node ____ them based on their control information.
long reach
In the 10GBase-LR standard, the L stands for ____.
IP
In the TCP/IP protocol suite, ___ is the core protocol responsible for logical addressing.
ip diagram
In the context of TCP/IP a packet is known as a ___.
com
In the domain name www.google.com, ___ Is the top-level domain (TLD).
frequency
In wireless communication, to exchange information, two antennas must be tuned to the same ____.
internet services
Include file transfer capabilities, Internet addressing schemes, security filters, and a means for directly logging on to other computers on the Internet.
mesh topology WAN
Incorporates many directly interconnected sites.
mapping
Involves associating a letter, such as M or T, with a disk, directory, or other resource.
omnidirectional antenna
Issues and receives wireless signals with equal strength and clarity in all directions.
directional antenna
Issues wireless signals along a single direction.
100
LEO satellites orbit the Earth with an altitude as low as ____ miles.
Star
Most ethernet networks are based on what topology?
LDAP
Naming (or addressing) conventions in Active Directory are based on the ____ naming conventions.
data transreceiver
Nearly all NICs contain a(n) ____, the device that transmits and receives data signals.
NOS
Necessary to function as a server.
wireless networks
Networks that transmit signals through the atmosphere via infrared or radiofrequency (RF) waves are known as ____.
downstream
Occurs when data travels from the carrier's switching facility to the customer.
upstream
Occurs when data travels from the customer to the carrier's switching facility.
asymmetrical technology
Occurs when downstream throughput is higher than upstream throughput.
bus topology WAN
Occurs when each site is directly connected to no more than two other sites in a serial fashion.
collision domain
On an Ethernet network, a(n) ____ is the portion of a network in which collisions occur if two nodes transmit data at the same time.
redundant
On most modern WANs, a ring topology relies on ____ rings to carry data.
dynamic ports
Ports ranging from 49152 through 65535; open for use without restriction
lanes
PCIe slots vary depending on the number of ____ they support.
110
POP3 (Post Office Protocol, version 3) relies on TCP and operates over port ____.
zeroconfig
Protocols made to simplify addressing of nodes on a TCP/IP network. This assigns a node an IP address & recognizes services without needing a DNS server.
hot spots
Places where wireless Internet access is available to the public are called ____________________.
loopback adapter
Plugs into a port and crosses over the transmit line to the receive line so that outgoing signals can be redirected into the computer for testing.
well known ports
Ports ranging from 0 to 1023; assigned to processes that only the operating system or administrator of the system can access.
registered ports
Ports ranging from 1024 to 49151; accessible to network users and processes that do not have special administrative privileges.
presentation
Protocols at the ____ layer accept Application layer data and format it so that one type of application and host can understand data from another type of application and host.
physical
Protocols at the ____ layer accept frames from the Data Link layer and generate voltage so as to transmit signals.
session
Protocols in the ____ layer coordinate and maintain communications between two nodes on the network.
whois utility
Queries a DNS registration database and obtain information about a domain.
authentication, authorization, and accounting
RADIUS and TACACS belong to a category of protocols known as AAA (____).
signal level
Refers to the T-carrier's Physical layer electrical signaling characteristics as defined by ANSI standards in the early 1980s.
ICANN
Responsible for IP addressing and domain name management.
IAB
Responsible for Internet growth and management strategy, resolution of technical disputes, and standards oversight.
25
SMTP operates from port ____.
fault tolerance
SONET's extraordinary ____ results from its use of a double-ring topology over fiber-optic cable.
Ku-
Satellite Internet access providers typically use frequencies in the C- or ____ bands.
symmetrical
Satellite return Internet access is a(n) ____ technology.
yes
Say yes
False
T/F: IMAP4 servers require less storage space and usually more processing resources than POP servers do.
PCIe
Supports up to 16 lanes.
VLANs
Switches can create ____ by grouping a number of ports into a broadcast domain.
content
Switches that operate anywhere between Layer 4 and Layer 7 are also known as ____ switches.
True
T/F A network's access method is its method of controlling how network nodes access the communications channel.
False
T/F The most popular method for connecting nodes on a network is circuit switching.
False
T/F The smallest LANs do not have a backbone.
False
T/F: A benefit to using an NTFS partition is that it can be read by older operating systems, such as Windows 95, Windows 2000 Professional, and early versions of UNIX.
True
T/F: A common way to share resources on a peer-to-peer network is by modifying the file-sharing controls via the computer's operating system.
False
T/F: A pulse of positive voltage represents a 0.
False
T/F: A security policy should state exactly which hardware, software, architecture, or protocols will be used to ensure security.
True
T/F: ATM is a WAN technology that functions in the Data Link layer.
True
T/F: Addressing is a system for assigning unique identification numbers to devices on a network.
False
T/F: All protocols are routable
True
T/F: Among the Session layer's functions are establishing and keeping alive the communications link for the duration of the session, keeping the communication secure, synchronizing the dialogue between the two nodes, determining whether communications have been cut off, and, if so, figuring out where to restart transmission, and terminating communications.
True
T/F: An access point is a device that accepts wireless signals from multiple nodes and retransmits them to the rest of the network.
True
T/F: Bridges are protocol independent.
False
T/F: By default, the 802.11 standard offers substantial security.
False
T/F: Clients on a client/server network share their resources directly with each other.
True
T/F: CompactFlash NICs are most frequently used to connect devices too small to handle PCMCIA slots.
False
T/F: Connectivity devices such as hubs and repeaters operate at the Presentation layer of the OSI Model.
False
T/F: Cut-through switches can detect corrupt packets.
True
T/F: Dial-up ISDN does not convert a computer's digital signals to analog before transmitting them over the PSTN.
True
T/F: Encryption is the last means of defense against data theft.
True
T/F: Every process that occurs during network communications can be associated with a layer of the OSI Model.
True
T/F: Human errors, ignorance, and omissions cause more than half of all security breaches sustained by networks.
False
T/F: IBM began developing the FireWire standard in the 1980s.
True
T/F: ICMP (Internet Control Message Protocol) reports on the success or failure of data deliver.
connection oriented
TCP is a ___ subprotocol
NOS
The ____ is the software that runs on a server and enables the server to manage data, users, groups, security, applications, and other networking functions.
physical
The ____ layer is the lowest, or first, layer of the OSI Model.
10GBase-SR
The 10-gigabit fiber optic standard with the shortest segment length is ____.
twisted-pair
The 10GBase-T standard is considered a breakthrough for transmitting 10 Gbps over ____ medium.
host file
The ASCII text files called HOSTS.TXT that associates host names with IP addresses
protocol data units
The Application layer separates data into ____ or discrete amounts of data.
backbone
The ____ of a network refers to that part of the network to which segments and shared devices connect.
type
The Ethernet_II frame type contains a 2-byte ____ field which differentiates it from the older Ethernet_802.3 and Ethernet_802.2 frame types.
base I/O port
The ____ setting specifies, in hexadecimal notation, which area of memory will act as a channel for
route
The ____ utility allows you to view a host's routing table.
ISO
The _________ goal is to establish international technological standards to facilitate global exchange of information and barrier-free trade.
ipconfig utility
The TCP/IP administration utility for use with Windows NT, 2000, XP, Vista, Server 2003, and Server 2008 operating systems.
ifconfig utility
The TCP/IP configuration and management utility used on UNIX and Linux systems.
default
The ____ gateway is the gateway that first interprets its outbound requests to other subnets, and then interprets its inbound requests from other subnets.
BIOS
The ____ is a simple set of instructions that enables a computer to initially recognize its hardware.
ITU
The ____ is a specialized United Nations agency that regulates international telecommunications, including radio and TV frequencies, satellite and telephony specifications, networking infrastructure, and tariffs applied to global communications.
motherboard
The ____ is the main circuit that controls the computer.
20
The average geographic range for an 802.11a antenna is ____ meters.
key pair
The combination of a public key and a private key is known as a ____.
extended network prefix
The combination of additional bits used for subnet information plus the existing network ID is known as the _________
uplink
The creation of a communications channel for a transmission from an Earth-based transmitter to an orbiting satellite.
network services
The functions provided by a network are usually referred to as ____________________.
core
The gateways that make up the Internet backbone are called ____ gateways.
core gateways
The gateways that make up the Internet backbone are called __________
range
The geographical area that an antenna or wireless system can reach is known as its ____.
cable plant
The hardware that makes up the enterprise-wide cabling system is known as the ____.
proxy server
The host that runs the proxy service.
WAN sites
The individual geographic locations connected by a WAN are known as ____.
fully qualified host name
The local host name plus its domain name.
fixed wireless
The locations of the transmitter and receiver do not move.
attenuation
The loss of a signal's strength as it travels away from its source is known as ____.
topology
The physical layout of a computer network is known as its ____.
local loop
The portion of the PSTN that connects any residence or business to the nearest CO is known as the ____.
speed
The primary difference between the two USB standards is ____.
data link
The primary function of protocols in the ____ layer, is to divide data they receive from the Network layer into distinct frames that can then be transmitted by the Physical layer.
kernel
The primary function of the UNIX ____ is to coordinate access to all your computer's hardware, such as the disks, memory, keyboard, and monitor.
logical
The printer queue is a ____ representation of the printer's input and output.
replication
The process of copying directory data to multiple domain controllers is known as ____.
phase
The progress of a wave over time in relationship to a fixed point.
mobile wireless
The receiver can be located anywhere within the transmitter's range.
10000001
The result from ANDing 11001111 with 10010001 is ____.
addressing
The scheme used to assign a unique identifying number to every node on a network is known as ____.
signal
The speed of a T-carrier depends on its ____ level.
1000
The standard message format specified by SMTP allows for lines that contain no more than ____ ASCII
IP
The subprotocol that enables TCP/IP to internetwork - that is, to traverse more than one LAN segment and more than one type of network through a router is ____
multiprocessing
The support and use of multiple processors to handle multiple threads is known as ____.
physical
The term ____ memory refers to the RAM chips that are installed on the computer's system board and whose sole function is to provide memory to that machine.
application
The top, or seventh, layer of the OSI Model is the ____ layer
application
Through ____ layer protocols, software applications negotiate their formatting, procedural, security, synchronization, and other requirements with the network.
STP
To eliminate the possibility of a broadcast storm, switches and bridges implement the ____.
downlink
Transmission from a satellite transponder to an earth-based dish-shaped antenna.
segments
Transport layer protocols break large data units received from the Session layer into multiple smaller units, called ____.
connectionless
Transport layer protocols that do not establish a connection before transmission and make no effort to ensure that data is delivered error-free are called ____________________ protocols.
hierarchical
UNIX was one of the first operating systems to implement a ____ file system.
host utility
Used if an administrator already know a host's name and wants to learn its IP address.
nbstat utility
Useful only on networks that run Windows-based operating systems and NetBIOS.
802.11b
Uses DSSS (direct-sequence spread spectrum) signaling.
traceroute utility
Uses ICMP ECHO requests to trace the path from one networked node to another, identifying all intermediate hops between the two nodes.
802.11a
Uses channels in the 5-GHz band and provides a maximum theoretical throughput of 54 Mbps.
802.11g
Uses the 2.4-GHz frequency band and provides a maximum theoretical throughput of 54 Mbps.
firewire
Uses the IEEE 1394 standard.
30
Using Bluetooth version 2.0, communicating nodes can be as far as ____ meters apart.
time to live field
What is the field that states the maximum amount of time a packet will stay on the network before being discarded.
publicly
WANs typically send data over ____ available communications networks.
Serial
What backbone is the simplest kind of backbone.
DHCP leasing
What is it called when a device will borrow an IP address temporarily while connected to the network. The length of the lease depends on server and client settings.
fading
Which of the following terms refers to a change in signal strength as a result of some of the electromagnetic energy being scattered, reflected, or diffracted after being issued by the transmitter?
fixed packet
What sets ATM apart from Ethernet is its ____ size.
point-to-point
When a data transmission involves only one transmitter and one receiver, it is considered a(n) ____ transmission.
full duplex
When signals are free to travel in both directions over a medium simultaneously, the transmission is considered _____.
0
When using classful IPv4 addressing, a network ID always ends with an octet of ____.
ip address
Whether connecting to the Internet or to another computer within a LAN, every node on a network must have a unique ____
host
Which of the following enables resource sharing by other computers on the same network?
NTP
___ is a simple Application layer protocol used to synchronize the clocks of computers on a network.
preamble
Within Ethernet frame types, the ____ signals to the receiving node that data is incoming and indicates when the data flow is about to begin.
1
Within a classful addressing subnet mask, the ____ bits indicate that corresponding bits in an IPv4 address contain network information.
255.255.0.0
Within a classful addressing, ____ is the default subnet mask for a Class C address.
terminators
Without ____, a bus network would suffer from signal bounce.
dynamic
___ ARP table entries are created when a client makes an ARP request that cannot be satisfied by data already in the ARP table.
subnetting
___ is a process of subdividing a single class of networks into multiple, smaller logical networks, or segments.
firmware
___ is a set of data or instructions that has been saved to a ROM (read-only memory) chip (which is on the NIC).