Network+ Chapter 1

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

Generally, if the network supports fewer than __________ computers, a peer-to-peer network is the way to go.

15

____________ manages the process of allowing a user to sign on the the network from any computer on the network and get access to the resources that Active Directory allows.

AD DS

An __________ call is the method an application uses when it makes a request of the OS.

API

The centralized directory database that contains user account information and security for the entire group of computers is called _______________.

Active Directory

In the OSI model, the ______________ layer describes the interface between two applications, each on seperate computers.

Application

What are the four layers to the TCP/IP model?

Application, Transport, Internet, and Network Interface

_________ is a client-server application that transfers files between two computers. It does not provide encryption and is, therefore, not secure.

FTP

The primary protocol used by web servers and browsers (clients) is ___________________.

HTTP

Which set of protocols are used in the application layer of the OSI model?

HTTP, SMTP, POP3, IMAP4, FTP, Telnet, and RDP.

When HTTP is layered on top of SSL or TLS, the result is _____________.

HTTPS

The ____________ system controls the environment in a data center, including the temperature, humidity, air flow and air filtering.

HVAC

IP relies on several routing protocols to find the best route for a packet when traversing several networks on the way to its destination. These routing protocols include: ____________________.

ICMP and ARP

Using ___________, the client application manages the email stored on the server.

IMAP4

The principle protocol used by the Network layer is ___________.

IP

An __________________ is an address assigned to each node on a network, which the Network layer uses to uniquely identify them on the network.

IP address

What is step 1 of the troubleshooting process?

Identify the problem and its symptoms

What is step 5 of the troubleshooting process?

Implement the solution or escalate the problem

A ___________ is a network in which each node on the network can communicate directly with others on the network.

LAN

The ___________ address of a device is embedded on every network adapter on the globe.

MAC

A group of connected LANs in the same geographical area is known as a ___________ or ________________ .

MAN & CAN

A _____________ explains how to properly handle substances such as chemical solvents and how to dispose of them.

MSDS

A ______________ is installed in an expansion slot of a computer to provide physical network access.

NIC

In the OSI model, the ______________ layer is responsible for reformatting, compressing, and/or encrypting data in a way that the application on the receiving end can read it.

Presentation

When using voice and video, network administrators must pay attention to the __________________.

QoS

In Windows operating systems, ____________ provides a secure, encrypted transmission that allows a technician to access a remote computer from the technician's local computer.

RDP

The Session layer protocol that is specifically designed to transmit audio and video and that works in conjunction with VoIP is _______________.

RTP

A client uses __________ to send an email message to the first server.

SMTP

Linux uses the ________ protocol to "remote in", which creates a secure channel or tunnel between two computers.

SSH

Which protocols are use in conjunction with HTTP to provide secure transmission?

SSL & TLS

In the OSI model, the __________ layer describes how data between applications is synced and recovered if messages don't arrive intact at the receiving application.

Session

In the OSI model, the _____________ layer is responsible for transporting application layer payloads from one application to another.

Transport

_____________ refers to the centralized management of multiple network-based communications.

UC

Transport layer protocol, ___________ does not guarantee delivery by first connecting and checking whether data is received.

UDP

What are the advantages of client-server networks?

User accounts and passwords are assigned at one place; central control of resource access management; problems can be monitored, diagnosed, and fixed from one location; and the network is more scalable.

A ________________ application, such as Skype or Google Talk, allows people to communicate in video and voice, primarily using the point-to-point model.

VTC

What is step 6 of the troubleshooting process?

Verify functionality and implement protective measures

__________ allows two or more people to have voice conversations over a network.

VoIP

A group of LANs that spread over a wide geographical area is called a ______________.

WAN

A ___________ is a central conduit that connects the segments of a network and is sometimes referred to as "a network of networks."

backbone

__________________, means the amount of traffic, or data transmission activity, on the network.

bandwidth

A __________ topology is when several devices are daisy-chained together.

bus

A _______________ failure destroys the equipment beyond use.

catastrophic

In the _____________ network model, resources are managed by the NOS via a centralized directory database.

client-server

A ____________ application involves two computers. The first requests data or a a service from the second.

client-server application

TCP is considered a ___________________ protocol.

connection-oriented

UDP is considered a ____________ or _______________ protocol.

connectionless & best-effort

Using the same network to deliver multiple types of communication services, such as video, voice, and fax, is known as ______________.

convergence

If a message is too large to transport on a network, UDP divides it into a smaller message called a ______________.

datagram

Removing a header and trailer from a layer below is called ___________.

decapsulation

Voice and video transmissions are _______________, meaning you don't want to hear breaks in your conversation or see a buffering message when you watch a movie over the internet.

delay-sensitive

The ______________ is the device that marks where a telecommunications service provider's network ends and the organization's network begins.

demarcation point

When Windows Server control network access to a group of computers, this logical group is called a Windows __________.

domain

A __________________ typically generates a loud noise and flashing lights.

emergency alert system

The process of adding a header to the data inherited from the layer above is called _____________.

encapsulation

A system that denies access during failure is said to be a ____________ system.

fail close

A system that allows access during failure is said to be a __________ system.

fail open

A computer that provides file services is called a __________, and serves up data to users, in contrast to users keeping copies of the data at their workstations.

file server

The term ____________ refers to a server's ability to share data and disk storage space.

file services

If the Network layer is aware that a packet is larger than the maximum size for its network, it will divide the packet into smaller packets in a process called ___________.

fragmentation

The entire Link layer message is called a ________.

frame

When using Windows Server, each user on the network has his own domain-level account called a ___________, which is assigned by the network administrator and is kept in Active Directory.

global account

__________ means that a device is connected directly to the earth, so that, in the event of a short, the electricity flows into the earth rather than out of control through the device and back to the power station.

grounding

The Transport protocols add their own control information in an area at the beginning of the payload called the __________ to create a message ready to be transmitted to the Network layer.

header

A _________ is any computer on a network that hosts a resource such as an application or data.

host

A topology that combines different topologies is known as a ____________ topology.

hybrid

If all computers in a peer-to-peer network are running a Windows OS, each computer has a Windows ____________ that works only on that one computer.

local account

_______________ has to do with software and describes how access to the network is controlled, including how users and programs initially gain access to the network and how specific resources, such as applications and databases, are shared on the network.

logical topology

Voice and video transmissions are considered ______________, meaning occasional loss of data can be tolerated.

loss tolerant

When you are watching a live sports event on your computer, the application is using a client-server model with one server and many clients, called a ____________________.

multicast distribution

A ______________ is a group of computers and other devices (such as printers) that are connected by some type of transmission media

network

A ___________ is any computer or device on a network that can be addressed.

node

What are the disadvantages of a peer-to-peer network?

not scalable, not necessarily secure, and are not practical for connecting more than a few computers.

A _______________ is embedded in a computer's motherboard, such as a laptop, to provide physical network access.

onboard network port

Controlling how users and programs get access to the resources on a network is a function of the ______________ used on the network.

operating systems

IP adds its own Network layer header to the segment or datagram, and the entire Network layer message is now called a ___________.

packet

Data that is passed between applications or utility programs and the operating system is called a ___________ and includes control information.

payload

__________________ mostly applies to hardware and describes how computers, other devices, and cables fit together to form the physical network.

physical topology

The space above the ceiling or below the floor in a data center is referred to as the ____________.

plenum

Computers engaged in a conference call would use a _____________ model, which involves one transmitter and multiple receivers.

point-to-multipoint

For conversational voice, VoIP applications, such as Skype and Google Talk, use a ___________________ model rather than a client-server model, which means that each computer involved is independent of the other computers.

point-to-point

The Transport layer header addresses the receiving application by a number called a _____________ number.

port

Using ____________ to share printers across a network saves time and money.

print services

Networked devices use methods or rules known as ____________.

protocols

A _____________ is an application that us installed and executed on a server and is presented to a user working at a client computer.

remote application

In a _________ topology, several nodes are connected together with each node connecting to only its two neighbor nodes.

ring

A ___________ is a device that manages traffic between two or more networks and can help find the best path for traffic to get from one network to another.

router

__________ means as a network grows larger, adding or changing significant elements of the network is possible.

scalable

If a message is too large to transport on a network, TCP divides it into smaller messages called ____________.

segments

A ______________ topology is when all devices connect to one central device.

star

When a switch in a bus topology is connected as a central device on another topology it is referred to as a ____________ topology.

star-bus

A _____________ receives incoming data from one of its ports and redirects it to another port or multiple ports that will send the data to its intended destination(s).

switch

A ___________ describes how the ports of a whole work together.

topology

The Link layer puts its own control information in a Link layer header and also attaches control information to the end of the packet in a ___________.

trailer

An ______________ failure can shorten the life of a component and/or cause intermittent errors.

upset

Electrical fires require a Class _______ fire extinguisher

C

What is step 4 of the troubleshooting process?

Establish a plan for resolving the problem

What is step 2 of the troubleshooting process?

Establish a theory of probable cause

In the OSI model, the _____________ layer is responsible for directing the packet based on source and destination MAC addresses.

Data Link

The Network Operating System is responsible for: _______________.

Data and resource management, user authorization controls, file management, access controls, dictating which rule computers will uses to communicate, and supplying applications and data files to clients.

What is step 7 of the troubleshooting process?

Document findings, actions, and outcomes

Sensitive electronic components can be damaged by __________, an electric charge at rest.

ESD

In the OSI model, the __________ layer is responsible for moving messages from one node to another until they reach the destination host based on IP address.

Network

The ____________ model is a seven-layer model developed to categorize the layers of network communication.

OSI

Using a ___________________ network model, the operating system of each computer on the network us responsible for controlling access to its resources without centralized control.

P2P

The smallest network is a ___________, which is a network of personal devices, such as the network you use when you sync your cell phone and your computer.

PAN

What is the technical name for a group of bits as it moves from one layer to the next and one LAN to the next?

PDU

Using ___________, email is downloaded to the client computer.

POP3

The mail server delivers the message to the receiving client using one of two protocols: __________ or ____________.

POP3 & IMAP4

In the OSI model, the ___________ layer is the simplest layer of all and is only responsible for sending bits via a wired or wireless transmitter.

Physical

What are the advantages of a peer-to-peer network?

Simple to configure and less expensive to set up and maintain.

Transport layer protocol, ___________ makes a connection with the end host, checks whether the data is received, and resends it if it is not.

TCP

The two primary protocols used by networks to communicate are ____________ and ____________.

TCP & IP

The two main transport layer protocols are _________, which guarantees delivery, and ________, which does not.

TCP & UDP

The suite for all the protocols an OS uses for communication on a network is the ___________ suite of protocols.

TCP/IP

The __________ protocol is used by the __________ client-server command-line application to allow an administrator to "remote in" or control a computer remotely. These transmissions are not encrypted.

Telnet

What is step 3 of the troubleshooting process?

Test your theory to determine the cause


Ensembles d'études connexes

chapter 1: business decisions and financial accounting

View Set

Literacy Grades 4-8 (Cecil) Final

View Set

CH 22 HA PERIPHERAL VASCULAR SYSTEM

View Set

FINAL STUDY GUIDE FOR QUEST FOR SUCSEES

View Set

Biology 105: Biology of Salmon Exam 1

View Set

H&I 2: Hypersensitivity- Pearson

View Set

Crucible Act II Possible Test Questions

View Set