Chapters 1 Study Guide Exam LAN

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

What is the minimal amount of voltage required to damage an electrical component?

10 volts

What are some of the typical elements that might be present in a fire suppression system, and what do they do?

A fire suppression system in a data center typically includes the following:* emergency alert system-These systems vary, but they typically generate loud noise and flashing lights. Some send text and voice message alerts to key personnel, and post alerts bye mail, network messages, and other means.* portable fire extinguishers-Note that electrical fires require a Class C fire extinguisher.* emergency power-off switch-Don't use a power-off switch unless you really need to; improper shutdowns are hard on computers and their data.* suppression agent-This can consist of a foaming chemical, gas, or water that sprays everywhere to put out the fire.

What is the difference between a WAN, MAN, CAN, and a PAN?

A group of LANs that spread over a wide geographical area is called a WAN (wide area network). A group of connected LANs in the same geographical area-for example, a handful of government offices surrounding a state capitol building-is known as a MAN (metropolitan area network) or CAN (campus area network). The smallest network is a PAN (personal area network), which is a network of personal devices, such as the network you use when you sync your smartphone and your computer.

What are some of the tasks for which a network operating system is responsible?

A network operating system is typically responsible for the following: Managing data and other resources for a number of clients* Ensuring that only authorized users access the network* Controlling which types of files a user can open and read* Restricting when and from where users can access the network* Dictating which rules computers will use to communicate* In some situations, supplying applications and data files to clients

What is a remote application, and how can remote applications be implemented on Windows Server?

A remote application is an application that is installed and executed on a server and is presented to a user working at a client computer. Windows Server 2008 and later versions include Remote Desktop Services to manage remote applications, and versions of Windows Server prior to 2008 provided Terminal Services. Both use RDP (Remote Desktop Protocol)to present the remote application and its data to the client

In a domain, the process of allowing a user to sign on to the network from any computer on the network and get access to resources is managed by what service?

Active Directory Domain Services (AD DS)

What is the most popular web server application?

Apache

In the TCP/IP model, what layer combines the responsibilities of the Application, Presentation, and Session layers from the OSI model?

Application

Explain the two different categories of Application layer protocols, and then detail the PDU used at this layer

Application layer protocols are used by programs that fall into two categories:*Application programs that provide services to a user, such as a browser and Web server using the HTTP Application layer protocol*Utility programs that provide services to the system, such as SNMP (Simple Network Management Protocol) programs that monitor and gather information about network traffic and can alert network administrators about adverse conditions that need attention. Data that is passed between applications or utility programs and the operating system is called a payload and includes control information. The two end-system computers that initiate sending and receiving data are called hosts

How can you prevent damage to a component prior to touching it?

Before touching a component, first ground yourself using one of these methods:*Wear an ESD strap around your wrist that clips onto the chassis or computer case, which eliminates any ESD between you and the chassis and its components.*If you don't have an ESD strap handy, be sure to at least touch the case before you touch any component inside the case. This is not as effective as wearing an ESD strap, but can reduce the risk of ESD.*To protect a sensitive component, always store it inside an antistatic bag when it's not in use. In addition to protecting against ESD, always shut down and unplug a computer before working inside it.

What is a defining characteristic of a bus topology based network?

Devices are daisy-chained together in a single line.

An open electrical circuit as a result of a failed circuit breaker is considered to be what type of failure system?

Fail-close

A policy in which all exit doors for a building stay unlocked during a fire is an example of what type of policy?

Fail-open

Servers that have a NOS installed require less memory, processing power, and storage capacity than clients because servers are called on to handle only light processing loads and requests from multiple clients.

False

Static electricity is an electrical charge in motion.

False

The Data Link layer attaches a trailer to the end of a packet, and does not include a header.

False

The Transmission Control Protocol (TCP) is considered to be a connectionless, or best-effort delivery protocol.

False

The Transport layer header addresses a receiving application by a number called a MAC address.

False

The protocol data unit for the Physical layer of the OSI model is payload, or data.

False

In a fire suppression system, what term is used to describe what is typically a foaming chemical, gas, or water that is sprayed everywhere to put out a fire?

Fire suppression agent

The Data Link Layer utilizes what name for its protocol data unit (PDU)?

Frame

What is assigned to each node on a network, which is then used by the Network layer to uniquely identify the node?

IP address

At what layer of the OSI model does a network switch normally operate?

Layer 2

HTTP, IMAP4, FTP, and Telnet are all examples of protocols that operate at what layer of the OSI model?

Layer 7

The frame header at the Data Link layer includes hardware addresses of the source and destination NICs. What is another name for this address?

MAC (Media Access Control) address

The proper handling procedures for substances such as chemical solvents is typically outlined in which of the following options?

Material Safety Data Sheet (MSDS)

At what layer of the OSI model do the IP, ICMP, and ARP protocols operate?

Network

What federal agency is charged with safety and health in the workplace?

Occupational Safety and Health Administration (OSHA)

In the TCP/IP model, what layer is considered so simple that it is ignored entirely?

Physical

The Windows Remote Desktop application utilizes what protocol to provide secure, encrypted transmissions?

Remote Desktop Protocol (RDP)

What mail protocol is used to send mail messages to a server?

SMTP

What Application layer protocol can be used to monitor and gather information about network traffic and can alert network administrators about adverse conditions that need attention?

SNMP

What layer of the OSI model describes how data between applications is synced and recovered if messages don't arrive intact at the receiving application?

Session Layer

What are some general OSHA guidelines to use when using power (electric) tools or other hand tools in the workplace?

Some general OSHA guidelines for using power tools or other hand tools in the workplace are as follows:*Wear personal protective equipment (PPE) to protect yourself as you work. For example, wear eye protection where dust or fumes are generated by power tools.*Keep all tools in good condition and properly store tools not in use. Examine a tool for damage before you use it.*Use the right tool for the job and operate the tool according to the manufacturer's instructions and guidelines. Don't work with a tool unless you are trained and authorized to use it.*Watch out for trip hazards, so you and others don't stumble on a tool or cord. For example, keep power tool electrical extension cords out from underfoot, and don't leave hand tools lying around unattended

If your network consists of all connected devices connecting to one central device, such as a switch, what type of topology is being used?

Star topology

In considering the responsibilities of each layer of the OSI model, what statement accurately reflects those of the Presentation layer?

The Presentation layer is responsible for reformatting, compressing, and/or encrypting data in a way that the application on the receiving end can read.

In the United States, who is able to activate the Emergency Alert System at the national level?

The President

Describe how the Transmission Control Protocol (TCP) and User Datagram Protocol (UDP) differ from each other, and provide examples of where each might be used.

The Transmission Control Protocol (TCP) makes a connection with the end host, checks whether the data is received, and resends it if it is not. TCP is, therefore, called a connection-oriented protocol. TCP is used by applications such as Web browsers and email. Guaranteed delivery takes longer and is used when it is important to know that the data reached its destination. The User Datagram Protocol (UDP) does not guarantee delivery by first connecting and checking whether data is received; thus, UDP is called a connectionless protocol or best-effort protocol. UDP is used for broadcasting, such as streaming video or audio over the Web, where guaranteed delivery is not as important as fast transmission. UDP is also used to monitor network traffic.

Which of the following is an example of encapsulation?

The addition of a header to data inherited from the layer above in the OSI model.

What statement accurately reflects what occurs when a message is too large to transport on a network?

The message is divided into smaller messages called segments (for TCP) or datagrams (for UDP).

What occurs if a network layer protocol is aware that a packet is larger than the maximum size for its network?

The packet will be divided into smaller packets using fragmentation.

Explain the differences between a physical topology and a logical topology

The term physical topology, or network topology, mostly applies to hardware and describes how computers, other devices, and cables fit together to form the physical network. The term logical topology has to do with software and describes how access to the network is controlled, including how users and programs initially gain access to the network and how specific resources, such as applications and databases, are shared on the network

Which of the following is not one of the disadvantages of peer-to-peer networks?

They centralize user account logins

The TCP and UDP protocols both exist at what layer of the OSI model?

Transport

After a problem and its symptoms have been identified, a theory regarding a probable cause should be established.

True

In general, an API (application programming interface) call is the method an application uses when it makes a request of the OS.

True

The fundamental difference between a switch and a router is that a switch belongs only to its local network and a router belongs to two or more local networks.

True

The term firmware refers to programs embedded into hardware devices. This software only changes when affirm ware upgrade is performed.

True

When dealing with static electricity, what kind of failure caused by static discharge shortens the life of a component, and can cause intermittent errors?

Upset failure

What are the differences between the POP3 and IMAP4 protocols? (short answer)

Using the POP3 (Post Office Protocol, version 3), email is downloaded to the client computer. When using IMAP4 however, the client application manages the email while it's stored on the server.


Set pelajaran terkait

Exam 4 Ch. 11, 19 (evolve chapters: 27, 28, 29, 34)

View Set

Frequently Asked Questions Teacher Interview

View Set

PEDS Practice: Chapter 23: Nursing Care of the Child With an Alteration in Tissue Integrity/Integumentary Disorder

View Set

Principle Accounting 7, 8, 9, 10, 11

View Set