Networking Final Exam
A ____________ is used to make connections between the network interface card and the other vital components of the computer, such as the central processing unit.
bus
basic disk
can be divided in up to four primary partitions
primary partition
can be made the active partition
dynamic disk
can be used to create a RAID
extended partition
can only be divided into logical drives
trunk port
configured to carry VLAN traffic
________ is a cell-based packet-switching technology in which the cells are of a fixed length rather than typical packet-based systems that use variable length packets.
ATM
smart jack
a type of connector for terminating a T1 line that provides diagnostic testing for troubleshooting the connection
What is the difference between a standby UPS and an online UPS?
1) A standby UPS acts as a pass through; it does not actually power the equipment attached to it with its battery until a power failure occurs. When a power failure occurs, a standby UPS quickly switches to battery power. 2) An online UPS continually powers devices from its battery so that if a power failure occurs, there is no delay in switching to battery power.
Briefly describe the three types of switching methods.
1) Cut-through switching is the fastest; it reads the destination MAC address and sends the frame out. 2)Store-and-forward switching is the slowest; it stores the entire message and then sends it to the correct port. 3)Fragment-free switching is the middle man; it reads enough to make sure the packet is not fragmented and then sends it out.
Compare and contrast hosted virtualization versus bare-metal virtualization.
1) Hosted virtualization uses a type 2 hypervisor in which the host OS accesses host hardware on behalf of the guest OS. It's used mostly for desktop virtualization solutions. 2) Bare-metal virtualization is used mainly for server virtualization in data centers and uses a type 1 hypervisor.
What are the three ways that a router can populate its routing table?
1) It knows about networks that are directly connected to it. 2) A static route can be manually entered. 3) The router can be configured to use a routing protocol, and routes will be entered dynamically.
Briefly describe three of the seven elements of a network security policy.
1) Privacy policy—Describes what staff, customers, and business partners can expect for monitoring and reporting network use. 2) Acceptable use policy—Explains for what purposes network resources can be used. 3) Authentication policy—Describes how users identify themselves to gain access to network resources. Logon names, password conventions, and authentication methods should be described. 4) Access policy—Specifies how and when users are allowed to access network resources. Policies should exist for both onsite and remote access to the network. 5) Auditing policy—Explains the manner in which security compliance or violations can be verified and the consequences for violations. 6) Data protection—Outlines the policies for backup procedures, virus protection, and disaster recovery. 7) Internet use policy—Explains what constitutes proper or improper use of Internet resources.
What is a DCE, and what does it do?
A DCE (Data Circuit-terminating Equipment) device is responsible for making the connection between the local loop and the customer premise equipment, usually a data terminal equipment (DTE) device such as a router. The DCE is typically a modem or CSU/DSU, especially when dealing with DSL and cable technologies in home environments.
How does RAID 5 work?
A RAID 5 requires three disks. Data is written across the disks in a stripe, with one disk being used for parity. The parity information is a mathematical calculation that represents the data that was just written to the disks. If one of the disks is lost, the data can be rebuilt using the existing data and the parity information. The parity information is distributed among all disks in the array so that no single disk holds all the parity information.
Describe a cold site.
A cold site is a physical location that houses the hardware needed to get IT functioning again. It includes servers, routers, and switches, plus the media to make all the connections. However, the devices aren't usually configured, and data must be restored from off-site backup before operations can start.
What is the difference between the way that a distance-vector routing protocol and a link-state routing protocol update their networks?
A distance-vector routing protocol sends out information about the network's status to all of its neighbors on a set schedule. A link-state protocol only sends out information to its neighbors when there is a change in the status.
What is a hypervisor?
A hypervisor is the component that creates the hardware environment of a virtual machine. It allows several virtual machines to run at the same time and acts as a manager for them.
What is a network security policy?
A network security policy defines the rules that apply to all users accessing the network. It includes how they are given access, what they can do once they have access, and what will happen if they don't follow the rules.
What is a server cluster? What are the two most common types?
A server cluster is a group of servers that appear to the user as a single server. The two most common types are a fail-over cluster and a load-balancing cluster.
What is the key difference between a user account created in Active Directory and a user account created in a Windows client OS?
A user account created in a client OS is meant to log on to the local machine only. A user account created in Active Directory has the ability to log on to any computer that is a member of the domain.
Describe a warm site.
A warm site is a location containing all the infrastructure needed for operations to continue, and it's mostly configured and ready to run on short notice. With a warm site, OSs are installed and largely up to date, and routers and switches are configured and connected. You just need to make some finishing touches to configurations and load the most current data from backup, and you're ready to go.
The ____________ layer of the TCP/IP model combines the top three layers of the OSI model into one layer.
Application
Application layer
Computers operate at this layer.
What is encoding, and where does it take place?
Encoding is a process performed by the Physical layer that takes the frame from the Data Link layer and changes it into 1s and 0s to be transmitted onto the medium. The type of signal that it is changed into is dependent on the type of media.
Physical layer
Hubs operate at this layer.
_____________ procedures for all data that can't be reproduced easily should be in place, and a disaster recovery procedure must be devised and carried out.
Emerncy
What are the complexity requirements for a Windows password? List the four characteristics.
For a password to be complex, it must contain three of the four characteristics. The four characteristics are uppercase letters, lowercase letters, numerals, and special characters.
What are the benefits to using a layered approach?
In a layered approach, each layer is only responsible for a specific task instead of the end-to-end communication. Therefore, when a problem occurs, it is easier to pinpoint the layer that is affected and then troubleshoot only that issue. In addition, by using a layered approach, upgrades in technology can be to individual layers without affecting the others.
What does "802" refer to in the IEEE 802 standard?
It is the project name that was given to the standard that defines all physical elements of networking communications. It represents the year and the month that the project began—February of 1980.
How do you map a shared folder using the command prompt? Provide an example of mapping a drive letter H: to a share named myshare on a server named myserver.
Open a command prompt and enter the command: net use, followed by a space and then the drive letter that you want to map it to, followed by a colon. Add another space and then enter the UNC path of the share to be mapped. For example: net use H: \\myserver\myshare
Network layer
Routers operate at this layer.
Media Access Control sublayer
Sublayer manages access to the physical medium.
What is the difference between the two types of virtual circuits?
Switched virtual circuits are established when needed and then terminated when finished, while permanent virtual circuits create pathways that exist even when not in use.
Data Link layer
Switches operate at this layer.
What does the Spanning Tree Protocol do?
The Spanning Tree Protocol is used to detect whether there is a possibility of a switching loop caused by redundant paths. If a loop is possible, it places one of the ports in blocking mode to prevent it.
What are the sublayers of the Data Link layer, and what do they do?
The first layer is the Logical Link Control sublayer, and it is responsible for handling some kinds of error recovery and flow control. The second layer is the Media Access Control sublayer, and it is responsible for providing the MAC address. It also controls the way in which a device will access the network.
The Transport layer PDU includes a field for window size. What is the "window size"?
The window size is a negotiated amount between the transmitting and receiving devices that sets the amount of data that can be transferred before an acknowledgement must be sent and received.
Session layer
This handles communication setup and teardown.
OSI reference model
This is the general framework for how networking systems should operate.
Presentation layer
This layer handles data formatting and translation.
Logical Link Control sublayer
This sublayer is responsible for some error recovery.
Transport layer
This uses port numbers as source and destination identifiers
Describe the trial-and-error method of troubleshooting and when it should and shouldn't be used.
Trial-and-error approaches involve assessment of the issue, followed by making an educated guess as to the cause and then applying a solution. This method is particularly risky in high-availability environments and generally should only be used on test systems or systems without critical data. The method also is acceptable when changes can be undone quickly and easily.
Explain how V.92 modems achieve 56 Kbps over traditional phone lines.
V.92 achieves 56 Kbps by skipping the modulation of analog data to digital data as it's received from the Telco. By using a technique called pulse code modulation, it then digitizes analog signals, which reduces the noise introduced in the signal and allows for more bits per second when transferring data.
What is live migration with respect to OS virtualization?
Virtual machines can be migrated to new hardware while they're running for performance or reliability improvements with practically no downtime. Live migration features also ensure VM fault tolerance in clustered server environments.
frame relay
WAN communications over a fast, reliable, digital packet-switching network
What is the System Idle process, and what does its value mean?
When the operating system is not busy, the kernel schedules the System Idle process with the CPU time. Therefore, a high value for the system idle process would mean that the CPU is not busy. A low value would mean that the CPU is busy with other processes.
maintenance window
a time set aside for schedule updates, upgrades, and other network maintenance procedures
In the first step of the troubleshooting process, how should you determine the scope of a problem?
You should establish who is affected by the problem by gathering information. Check to see whether there is anyone not affected by the issue, whether the problem exists only in one building, or just one application. If the issue occurs on only a few machines, then the issue is most likely configuration related and specific to those machines.
If you store mainly large files on a disk, should you use a smaller cluster size or larger cluster size? Why?
You should use a larger cluster size. If you store mostly large files on the disk, a larger cluster size usually results in better performance because fewer read/write operations need to be performed. In addition, smaller cluster sizes can lead to a fragmented disk, in which files are spread out all over the disk instead of being stored in consecutive locations. Fragmentation causes many more disk seek operations, which slows file access.
bare metal restore backup
a backup designed to allow restoring the system disk directly from backup media without having to install the OS and backup software first
hot site
a business continuity option in which a physical location has all the infrastructure in place and configured, and data is synchronized and up to date
SaaS
a category of cloud computing in which a customer pays for the use of applications that run on a service provider's network
NAS
a dedicated server device designed solely for providing shared storage for network users
modem
a device computers use to convert digital signals to analog signals
load balancer
a device that distributes traffic for a network service to multiple servers that can provide that service
Committed Information Rate (CIR)
a guaranteed minimum transmission rate offered by the service provider
SAN
a high-speed network storage solution for replacing locally attached drives on servers
Synchronous Optical Network (SONET)
a high-speed, baseband digital networking standard that specifies incrementally increasing data rates across fiber-optic links.
virtual circuit
a logical sequence of connections with bandwidth allocated for a specific transmission pathway
process
a program that is loaded into memory
point-to-point protocol
a remote access protocol that supports many protocols and is used to carry data over a variety of network connections
Removal of ______________ is very difficult because they alter system files and drivers the system depends on to run.
a rootkit
escalation
a step in the troubleshooting process in which the technician must call in additional people
How the network resources are to be used should be clearly defined in a (an) ____________ policy.
acceptable use
rights
action that a user can perform on a computer
fragment-free switching
damaged frames do not get forwarded
local profile
defines a user's environment
Spanning Tree Protocol
designed to stop switching loop
change management
documenting and managing network changes, including IP addressing and moving devices
incremental backup
does mark files as backed up
daily backup
doesn't mark files as backed up
store-and-forward switching
entire frame is read before forwarding it to the destination port
virtual disk
files stored on the host computer that represent a virtual machine's hard disk
A router's final task when handling a packet is to send the packet on to its next and possibly final destination; this is referred to as packet ____________.
forwarding
cut-through switching
frame is sent to the destination port immediately after reading the destination and source MAC address
A ___________ site can be running at a moment's notice if necessary.
hot
authentication
identifying who has access to network
rollback plan
instructions on how to undo the upgrade if problems occur during or after the upgrade
tone generator
issues an electrical signal on a wire, and a probe detects the signal
time-domain reflectometer (TDR)
measures the total cable length
A __________ is a device that allows a computer, which works with digital information, to communicate over lines that use analog signals.
modem
snapshot
partial copy of a virtual machine
system partition
partition that contains the boot loader
uninterruptible power supply
power device that provides fault tolerance through battery backup
service
runs in the background
distance-vector protocol
sends entire routing table to all routers at a scheduled time
link-state protocol
sends status to all routers whenever there is a change
thread
smallest unit of software that can be scheduled
packet shaper
software that runs on internetwork devices and prioritizes packets
Data Terminal Equipment (DTE)
the device that passes data from the customer LAN to the DCE, usually a router.
Data Circuit-terminating Equipment (DCE)
the device that sends data to (and receives data from) the local loop, usually a CSU/DSU or modem
authorization
the process of granting or denying access to a user
EGP
the routing protocol is used to exchange routing information between autonomous systems
IGP
the routing protocol is used to exchange routing information within an autonomous system.
multiprocessing
two or more threads being executed simultaneously
To eliminate the potential problems caused by power fluctuations, especially on servers, you can install _________________
uninterruptible power supplies
metric
value that tells routers the best path to the destination network