CNT 120 CH1
Troubleshooting step 6
Verify the functionality and implement preventive measures
Class C
What class of fire extinguisher is necessary to put out electrical fires?
MSDS
What piece of information would you consult to know how to properly handle substances such as chemical solvents and how to dispose of them?
HTTPS
When HTTP is layered on top of an encryption protocol such as SSL or TLS .... the result is the ________ protocol.
domain
When a Windows Server controls network access to a group of computers, this logical group is called a Windows __________.
RING TOPOLOGY
configuration in which device connections create a circular data path. Each networked device is connected to two others, like points on a circle.
LAN
covers a relatively small area (room, floor, building)
WAN
covers a very large area (between cities and even continents)
MAN
covers usually a "city-wide" area
Mesh topology
type of networking where all nodes cooperate to distribute data amongst each other.
NETWORK
is a group of computers and other devices (printers, smart phones, tablet PC, Xbox, Wii, PS, IP Phone, etc...) that are connected by some type of transmission media (copper wire, fiber optic, or RF).
switch
receives incoming data frame from one of its ports, reads the MAC address and then directs the data frame to the correct port to to the destination node
Data Link
responsible for interfacing with physical hardware on the local network - responsible for getting data onto the network (NIC, MAC Address, Ethernet, Wi-Fi)
Network
responsible for moving messages from one node to another until reaches destination (IP, ICMP, ARP)
Presentation
responsible for reformatting, compressing, and/or encrypting data in a way that the receiving application can read (.txt, .png, .mp3, .html, etc....)
Transport
responsible for transporting Application layer payloads from one application to another (TCP ... and ... UDP)
Physical
simplest layer and is responsible for sending bits via a wired or wireless transmission (Twisted Pair Copper, Fiber Optic, Radio Frequency)
Star TOPOLOGY
topology for a Local Area Network (LAN) in which all nodes are individually connected to a central connection point, like a hub or a switch.
Bus TOPOLOGY
topology for a Local Area Network (LAN) in which all the nodes are connected to a single cable. The cable to which the nodes connect is called a "backbone". If the backbone is broken, the entire segment fails.
manage data and other resources for a number of clients;ensure that only authorized users access the network;control which type of files a user can open;restrict when and from where users can access the network;dictate which rules computers will use to communicate;supply applications and data files to clients
An NOS is a special type of software designed to:
Layer 7
Application Layer
Data
Application Layer;Presentation Layer;Session layer
Frames
Data Link Layer
Layer 2
Data Link Layer
Troubleshooting step 7
Document findings, actions and outcomes
OSHA
Electrical and tool safety in workplaces are is generally regulated by______.
Troubleshooting step 4
Establish a plan for resolving the problem
Troubleshooting step 2
Establish a theory of probable cause
Layer 3
Network Layer
Packets
Network Layer
Bits
Physical Layer
Layer 1
Physical Layer
Layer 6
Presentation Layer
Layer 5
Session Layer
Troubleshooting step 1
Identify the problems and its symptoms
ESD
If you are working on the sensitive electronic components of the computer, you should wear a(n) _______ strap to protect the sensitive electronic parts from damage.
Troubleshooting step 5
Implement the solution or escalate the problem
RDP
In the Windows Operating System, the ______ application is used to provide a secure, encrypted transmission that allows a technician to remote in to a machine to make configuration changes or troubleshoot that device.
Troubleshooting step 3
Test your theory to determine the cause
SSH
The _______ protocol is used at the command-line to allow an administrator to connect to remote systems (computer, server, router, switch) to make configuration changes to that device. The ______ protocol is encrypted (it creates a secure tunnel between the 2 systems), so it is secure and more commonly used that its predecessor.
Telnet
The _______ protocol is used at the command-line to allow an administrator to connect to remote systems (computer, server, router, switch) to make configuration changes to that device. The ______ protocol is not encrypted, so it has been replaced by a protocol that is more secure.
logical
The _________ topology has to do with software, how access to the network is controlled, including how users and programs initially gain access to the network, and how specific resources, such as applications and databases are shared on the network.
physical
The _________ topology refers to a network's hardware and how computers, other devices, and cables fit together to form the network.
Peer-to-Peer
The ____________ network model, the operating system of each computer on the network is responsible for controlling access to its resources without centralized control.
Client-Server
The ____________ network model, the resources are managed by the NOS via a centralized directory database.
NOS (Network Operating System)
The client-server network model requires a(n) ______ which controls access to the entire network. (Examples are: Windows 2016 Server, Ubuntu Server, Red Hat Enterprise Linux)
user accounts and passwords to the network are assigned in one place;access to multiple shared resources can be centrally granted to a single user or groups of users;problems on a network can be monitored, diagnosed, and often fixed from one location;network is scalable
The following are advantages of a Client-Server network:
simple to configure;less expensive than other network options
The following are advantages of a Peer-to-Peer network:
they are not scalable;they are not necessarily secure;not practical for connecting more than a few computers
The following are disadvantages of a Peer-to-Peer network:
protocols
The methods and rules for communication on a network are called _______________.
HTTP
The primary protocol used by Web servers and browsers (without a layer of security) is _________.
SMTP
The primary protocol used by clients to send an email message is the _________ protocol.
POP3 or IMAP4
The recipient's email server delivers the email message to the receiving client by using the _________ protocol.
Layer 4
Transport Layer
Segments
Transport Layer
FTP- FILE TRANSFER PROTOCOL
______ is a client-server application that transfers files between 2 computers. _____ does not provide encryption and is therefore not secure.
Active Directory
_______________ is the centralized directory database that contains user account information and security for the entire group of computers.
router
a device that manages traffic between two or more networks .. and ... can help find the best path for traffic to get from one network to another typically by reading the destination IP address of the data packet
NIC
a network port used to attach a device to a network and allow it to send and receive data on the network
Session
describes how data between applications is synched and recovered if messages don't arrive intact at the receiving application
Application
describes the interface between two applications, on separate computers (HTTP, FTP, SMTP, POP3, DNS, etc...)