Network Ch 1 -10 and 12

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

redirector

A service on the client workstation, called the ______, intercepts a request to determine whether it should be handled by the client or by the server.

checksum

A unique character string that allows the receiving node to determine if an arriving data unit matches exactly the data unit sent by the source.

sequence control

A unique characteristic of the 802.11 data frame is its ____ field.

amplitude

A wave's ____ is a measure of its strength at any given point in time.

server

A workgroup is a group of interconnected computers that share each other's resources without relying on a central ____.

Network

A(n) ___ is a group of computers and other devices that are connected by some type of transmission media.

node

A(n) ____ is a client, server, or other device that can communicate over a network and is identified by a unique number, known as its network address.

web server

A(n) ____ is a computer installed with the appropriate software to supply Web pages to many different clients upon demand.

domain

A(n) ____ is a group of users, servers, and other resources that share a centralized database of account and security information.

directory

A(n) ____ is a list that organizes resources and associates them with their characteristics.

LAN

A(n) ____ is a network of computers and other devices that is confined to a relatively small space, such as one building or even one office.

digital certificate

A(n) ____ is a password-protected and encrypted file that holds an individual's identification information, including a public key.

GUI

A(n) ____ is a pictorial representation of computer functions that, in the case of NOSs, enables administrators to manage files, users, groups, security, printers, and so on.

media converter

A(n) ____ is a piece of hardware that enables networks or segments running on different media to interconnect and exchange signals.

process

A(n) ____ is a routine of sequential instructions that runs until it has achieved its goal.

thread

A(n) ____ is a self-contained, well-defined task within a process.

frame

A(n) ____ is a structured package for moving data that includes not only the raw data, or "payload," but also the sender's and receiver's network addresses, and error checking and control information.

interrupt

A(n) ____ is the circuit board wire over which a device issues voltage to signal this request.

account

A(n) ____ is the record of a user that contains all of his properties, including rights to resources, password, name, and so on.

segment

A(n) ____ is usually composed of a group of nodes that use the same communications channel for all their traffic.

site survey

A(n) _______ assesses client requirements, facility characteristics, and coverage areas to determine an access point arrangement that will ensure reliable wireless connectivity within a given area.

on-board

A(n) ____________________ NIC is integrated into the motherboard.

security policy

A(n) ____________________ identifies an organization's security risks, levels of authority, designated security coordinator and team members, responsibilities for each team member, and responsibilities for each employee.

client

A(n) ____________________ is a computer on a network that requests resources or services from another computer on the network.

transreceiver

A(n) ____________________ is a device that transmits and receives signals.

proxy service

A(n) ____________________ is a software application on a network host that acts as an intermediary between the external and internal networks, screening all incoming and outgoing traffic.

security audit

A(n) ____________________ is a thorough examination of each aspect of the network to determine how it might be compromised.

device driver

A(n) ____________________ is software that enables an attached device to communicate with the computer's operating system.

T-carrier

A(n) ____________________ uses TDM (time division multiplexing) over two wire to divide a single channel into multiple channels.

B

In IPv4 addressing, a node with an IP address of 168.34.88.29 belongs to a Class ___ network.

C

In IPv4 addressing, an IP address whose first octet is in the range of 192-223 belongs to a Class ___ network.

32-bit

In IPv4 addressing, each IP address is a unique ___ number.

127 is used for a device to communicate with itself with loopback.

In IPv4 addressing, explain what is special about an address containing 127 in the first octet and how this address is used in troubleshooting.

0

In IPv4 addressing, what number is a placeholder for referring to all computers on a network

255

In IPv4 addressing, what number is for broadcast transmissions only

format prefix

In IPv6, each address contains a ___ or a variable length field at the beginning of the address that indicates what type of address it is.

schema

In LDAP-compatible directories, a(n) ______ is the set of definitions of the kinds of objects and object-related information that the directory can contain.

routable

Protocols that can span more than one LAN or LAN segment are ___ because they carry Network layer addressing information that can be interpreted by a router.

ITU

Provides developing countries with technical expertise and equipment to advance those nations' technological bases.

symmetrical technology

Provides equal capacity for data traveling both upstream and downstream.

IDS

Software that can only detect and log suspicious activity.

IPS

Software that can react to suspicious activity.

UFS

Solaris employs the file system called ____ for its native file system type.

backbone

Sometimes referred to as "a network of networks."

telnet

___ is a terminal emulation protocol used to log on to remote hosts using the TCP/IP protocol suite.

PING

___ is a utility that can verify that TCP/IP is installed, bound to the NIC, configured correctly, and communicating with the network.

UDP

___ is more efficient than TCP for carrying messages that fit within one data packet.

MAC

____ addresses contain two parts: a Block ID and a Device ID.

checksums

____ are added to data at the source and verified at the destination.

gateways

____ are combinations of networking hardware and software that connect two dissimilar kinds of networks.

Standards

____ are documented agreements containing technical specifications or other precise criteria that stipulate how a particular product or service should be designed or performed.

protocols

____ are standard methods or formats for communication between networked devices.

data packets

____ are the distinct units of data that are transmitted from one node on a network to another.

twisted-pair

____ cable consists of color-coded pairs of insulated copper wires, each with a diameter of 0.4 to 0.8 mm.

shielded twisted-pair

____ cable consists of twisted wire pairs that are not only individually insulated, but also surrounded by a shielding made of a metallic substance such as foil.

mail services

____ coordinate the storage and transfer of e-mail between users on a network.

LANE

____ encapsulates incoming Ethernet or token ring frames, then converts them into ATM cells for transmission over an ATM network.

intelligent

____ hubs possess internal processing capabilities.

iwconfig

____ is a command-line function for viewing and setting wireless interface parameters and it is common to nearly all versions of Linux and UNIX.

modal bandwidth

____ is a measure of the highest frequency of signal a multimode fiber can support over a specific distance and is measured in MHz-km.

SSL

____ is a method of encrypting TCP/IP transmissions.

sequencing

____ is a method of identifying segments that belong to the same group of subdivided data.

interference

____ is a most significant problem for wireless communications because the atmosphere is saturated with electromagnetic waves.

PGP

____ is a public key encryption system that can verify the authenticity of an e-mail sender and encrypt e-mail data in transmission.

True

T/F: In frequency modulation, the frequency of the carrier signal is modified by the application of the data signal.

False

T/F: It is best to perform connectivity tests on a computer connected to a live network.

True

T/F: Network security is more often compromised "from the inside" than from external sources.

False

T/F: Networks are usually only arranged in a ring, bus, or star formation and hybrid combinations of these patterns are not possible.

True

T/F: On a network using TCP/IP, some nodes may use multiple IP addresses.

True

T/F: POP3's design makes it best suited to users who retrieve their mail from the same workstation all the time.

True

T/F: Protocols ensure that data are transferred whole, in sequence, and without error from one node on the network to another.

False

T/F: Resource sharing is controlled by a central computer or authority in a peer-to-peer network.

True

T/F: SONET specifies framing and multiplexing techniques at the Physical layer.

False

T/F: Seven bits form a byte.

True

T/F: Spread spectrum is a popular way of making wireless transmissions more secure.

False

T/F: The MIME standard replaces SMTP.

False

T/F: The PPTP VPN tunneling protocol is based on technology developed by Cisco.

False

T/F: The command used to view IP information on a Windows XP or Windows Vista workstation is ifconfig

True

T/F: The core of all UNIX and Linux systems is called the kernel.

False

T/F: The primary function of protocols at the session layer is to translate network addresses into their physical counterparts and decide how to route data from the sender to the receiver.

False

T/F: The term domain model refers to a type of peer-to-peer network that relies on domains rather than on workgroups.

True

T/F: Transmission methods using fiber-optic cables achieve faster throughput than those using copper or wireless connections.

False

T/F: WiMAX is defined by the IEEE 802.11 standard.

False

T/F: Wireless networks are laid out using the same topologies as wired networks.

True

T/F: Wireless signals experience attenuation.

memory range

The ____________________ indicates, in hexadecimal notation, the area of memory that the NIC and CPU use for exchanging, or buffering, data.

phishing

____ is a social engineering practice in which a person attempts to glean access or authentication information by posing as someone who needs that information.

IAB

____ is a technical advisory group of researchers and technical professionals interested in overseeing the Internet's design and management.

EIA

____ is a trade organization composed of representatives from electronics manufacturing firms across the United States.

CMOS

____ is a type of microchip that requires very little energy to operate.

channel bonding

____ is an 802.11n feature that allows two adjacent 20-MHz channels to be combined to make a 40-MHz channel.

frame aggregation

____ is an 802.11n network feature allowing the combination of multiple frames into one larger frame.

ANSI

____ is an organization composed of more than a thousand representatives from industry and government who together determine standards for the electronics industry and other fields, such as chemical and nuclear engineering, health and safety, and construction.

frame relay

____ is an updated, digital version of X.25 that also relies on packet switching.

client support

____ is one of the most important functions an NOS provides.

802.11a

____ is the least popular WLAN standard.

transmission media

____ is the means through which data is transmitted and received.

frequency

____ is the number of times that a wave's amplitude cycles from its starting point, through its highest amplitude and its lowest amplitude, and back to its starting point over a fixed period of time.

PPP

____ is the preferred communications protocol for remote access communications.

flow control

____ is the process of gauging the appropriate rate of transmission based on how fast the recipient can accept data.

PPPoE

____ is the standard for connecting home computers to an ISP via DSL or broadband cable.

802.11n

____ may use either the 2.4-GHz or 5-GHz frequency range.

virtual

____ memory may be logically carved out of space on the hard drive for temporary use.

Dial-up

____ networking refers to dialing directly into a private network's or ISP's remote access server to log on to a network.

IGMP

____ operates at the Network layer and manages multicasting

authentication

____ protocols are the rules that computers follow to accomplish authentication.

file services

____ refer to the capability of a server to share data files, applications (such as word-processing or spreadsheet programs), and disk storage space.

static

____ routing is a technique in which a network administrator programs a router to use specific paths between nodes.

geosynchronous orbiting

____ satellites are the type used by the most popular satellite Internet access service providers.

digital

____ signals are composed of pulses of precise, positive voltages and zero voltages.

infared

____ signals are transmitted by frequencies in the 300- GHz to 300,000-GHz range, which is just above the top of the wireless spectrum as it is defined by the FCC.

port scanner

____ software searches a node for open ports.

remote

____ virtual computing allows a user on one computer, called the client, to control another computer, called the host or server, across a network connection.

virtual circuits

______ are connections between network nodes that, although based on potentially disparate physical links, logically appear to be direct, dedicated links between those nodes.

throughput

_______ is the measure of how much data is transmitted during a given period of time.

cross talk

_______ occurs when a signal traveling on one wire or cable infringes on the signal traveling over an adjacent wire or cable.

connectors

________ are the pieces of hardware that connect the wire to the network device, be it a file server, workstation, switch, or printer.

VNC

________ is an open source system designed to allow one workstation to remotely manipulate and receive screen updates from another workstation.

subnetting

________ separates a network into multiple logically defined segments, or subnets.

MIME

_________ is a standard for encoding and interpreting binary files, images, video, and non-ASCII character sets within an e-mail message.

application

_____________ layer services facilitate communication between software applications and lower-layer network services so that the network can interpret an application's request and, in turn, the application can interpret data sent from the network.

SMTP

______________ is the protocol responsible for moving messages from one mail server to another over TCP/IP-based networks.

switching

____________________ is a component of a network's logical topology that determines how connections are created between nodes.

reassembly

____________________ is the process of reconstructing the segmented data units.

remote desktop

____________________ is the remote virtual computing software that comes with Windows client and server operating systems.

encryption

____________________ is the use of an algorithm to scramble data into a format that can be read only by reversing the algorithm.

GEO

____________________ means that satellites orbit the Earth at the same rate as the Earth turns.

multitasking

_____is the execution of multiple tasks at one time.

46 to 1500

The data portion of an Ethernet frame may contain ____ bytes of information.

OC level

The data rate of a particular SONET ring is indicated by its ____, a rating that is internationally recognized by networking professionals and standards organizations.

255.255.0.0

The default subnet mask for a Class B network is ___.

NIC

The device inside a computer that connects a computer to the network media and allows it to communicate with other computers is known as a(n) ____.

domain

The directory containing information about objects in a domain resides on computers called ____ controllers.

wavelength

The distance between corresponding points on a wave's cycle is called its ____.

1000Base-LX

The most common 1-Gigabit Ethernet standard in use today is ____.

bus

The most common logical topologies are ____ and ring.

dotted decimal notation

The most common way of expressing IP addresses.

administrator

The most privileged user account on an NOS is the ____.

overhead

The nondata information that must accompany data for a signal to be properly routed and interpreted by the network.

PKI

The use of certificate authorities to associate public keys with certain users is known as ____.

spread-spectrum

The use of multiple frequencies to transmit a signal is known as ________ technology.

D

A class ____ network class is reserved for special purposes.

3-tier architecture

A client/server environment that incorporates middleware.

hybrid

A complex combination of pure topologies is known as a ____ topology.

server

A computer on a network that manages shared resources is known as a(n) ____________________.

bus

A computer's ____________________ is the circuit, or signaling pathway, used by the motherboard to transmit data to the computer's components, including its memory, processor, hard disk, and NIC.

TCP

A connection-oriented protocol.

wireless spectrum

A continuum of electromagnetic waves used for data and voice communication.

repeater

A device that regenerates a digital signal is called a(n) ____.

False

T/F: If a device does not know its own IP address it can still use ARP.

SSID

The _____________ is a unique character string used to identify an access point.

hostname

An administrator can discover the host name assigned to a client by using the ____ utility.

False

T/F: If a station detects the presence of several access points, it will always choose the closest access point.

1 Gbps

1000Base-SX has a maximum throughput of ____.

10

1000Base-T is a standard for achieving throughputs ____ times faster than Fast Ethernet over copper cable.

duplicate

A GUID (globally unique identifier) is a 128-bit number that ensures that no two objects have ____ names.

firmware

A NIC's transmission characteristics are held in the adapter's ____.

marginal

A PSTN offers ____ security.

four

A UDP header contains ___ fields.

concentrator

A VPN ____ authenticates VPN clients and establishes tunnels for VPN connections.

CIFS

A Windows XP client communicates with a Windows Server 2008 server using this file system.

anycast

A ___ address represents any one interface from a group of interfaces, any one of which can accept a transmission.

subnet mask

A ___ is a special 32-bit number that, when combined with a devices IP address, informs the rest of the network about the segment or network to which the device is attached

port

A ___ number is the address on a host where an application makes itself available to incoming or outgoing data.

DSLAM

A ____ aggregates multiple DSL subscriber lines and connects them to the carrier's CO.

brute force

A ____ attack occurs when a hacker tries numerous possible character combinations to find the key that will decrypt encrypted data.

dictionary

A ____ attack occurs when a hacker uses programs that try a combination of a user ID and every word in a dictionary to gain access to the network.

denial of service

A ____ attack occurs when a system becomes unable to function because it has been deluged with data transmissions or otherwise disrupted.

flashing

A ____ attack occurs when an Internet chat user sends commands to a victim's machine that cause the screen to fill with garbage characters and requires the victim to terminate their chat sessions.

terminal adapter

A ____ converts digital signals into analog signals for use with ISDN phones and other analog devices.

packet filtering

A ____ firewall is a router (or a computer installed with software that enables it to act as a router) that examines the header of every packet of data it receives to determine whether that type of packet is authorized to continue to its destination.

router

A ____ is a multiport connectivity device that directs data between nodes on a network.

hub

A ____ is a repeater with more than one output port.

daisy chain

A ____ is simply a linked series of devices.

routers

A ____ main function is to examine packets and determine where to direct them based on their Network layer addressing information.

collision

A ____ occurs when two transmissions interfere with each other.

ISP

A business that provides organizations and individuals with access to the Internet and often, other services, such as e-mail and Web hosting.

Server

A central computer.

single

A directional antenna issues wireless signals along a(n) ____ direction.

channel

A distinct communication path between nodes, much as a lane is a distinct transportation path on a freeway.

NTFS

A file system developed by Microsoft and used with its Windows NT, Windows 2000 Server, Windows Server 2003, and Windows 2008 operating systems.

content filtering

A firewall that can block designated types of traffic based on application data contained within packets.

stateful

A firewall that can view a data stream.

host-based

A firewall that protects only the computer on which it is installed.

multiplexing

A form of transmission that allows multiple signals to travel simultaneously over one medium is known as ____.

DNS

A hierarchal way of associating domain names with IP addresses.

per user

A licensing mode that allows a fixed quantity of clients to use one software package simultaneously.

per seat

A licensing mode that limits access to an application to specific users or workstations.

tree

A logical representation of multiple, hierarchical levels within a directory.

sequencing

A method of identifying segments that belong to the same group of subdivided data.

cabling

A network backbone is the ____________ that connects the hubs, switches, and routers on a network.

WAN

A network that connects two or more geographically distinct LANs or MANs.

MAN

A network that is larger than a LAN and connects clients and servers from multiple buildings is known as a(n) ____.

client/server network

A network that uses a server to enable clients to share data, data storage space, and devices is known as a(n) _________________________.

punch-down block

A panel of data receptors into which horizontal cabling from the workstations is inserted.

crossover cable

A patch cable in which the termination locations of the transmit and receive wires on one end of the cable are reversed is known as a(n) ____.

workstation

A personal computer which may or may not be connected to a network is a(n) ____.

middleware

A piece of software called ____ translates requests and responses between a client and a server.

pathping

A program similar to mtr, ____, is available as a command-line utility in Windows XP, Vista, Server 2003, and Server 2008.

DDNS

A program that is used by a service provider on a user's computer. It detects changes to the users IP address and updates the users DNS accordingly.

LDAP

A protocol used to access information stored in a directory.

interior

A router that directs data between nodes on an autonomous LAN (or one owned and operated by a single organization) is known as a(n) ____________________ router.

transmission and hardware

A router that is not configured to drop packets that match certain suspicious characteristics is an example of a risk associated with ____.

file server

A server that provides file services is called a(n) ____________________.

proxy service

A software application on a network host that acts as an intermediary between the external and internal networks, screening all incoming and outgoing traffic.

cut-through mode

A switch running in this mode reads a frame's header and decides where to forward the data before it receives the entire packet.

store-and-forward mode

A switch running in this mode reads the entire data frame into its memory and checks it for accuracy before transmitting the information.

False

T/F: If your network does not need or use APIPA, it must be uninstalled to avoid conflicts.

access point

Accepts wireless signals from multiple nodes and retransmits them to the rest of the network.

tree

Active Directory organizes multiple domains hierarchically in a domain ____.

IP

Addresses used to identify computers on the Internet and other TCP/IP-based networks are known as ____ addresses.

root

Administrator account on a UNIX or Linux system.

CSMA/CD

All Ethernet networks, independent of their speed or frame type, use an access method called ____.

radiation pattern

An antenna's ____ describes the relative strength over a three dimensional area of all the electromagnetic energy the antenna sends or receives.

True

T/F: In CIDR, conventional network class distinctions do not exist.

dig utility

Allows an administrator to query a DNS database and find the host name associated with a specific IP address or vice versa.

nslookup utility

Allows an administrator to query the DNS database from any computer on the network and find the host name of a device by specifying its IP address, or vice versa.

NIC

Also known as a network adapter.

100

An 802.11g antenna has a geographic range of ____ meters.

protocols and software

An NOS that contains a "back door" is an example of a risk associated with ____.

Microsoft Outlook

An example of a popular client email software is ____.

Microsoft Exchange Server

An example of a popular mail server is ____.

sneakernet

An outdated file-sharing method.

standalone computer

Computer that is not connected to other computers and that uses software applications and data stored on its local disks.

False

T/F: In UNIX, you combine commands using a pipe, which is entered as a forward slash ( / ).

ARP

Computers cache the MAC to IP mappings in what kind of table to find the address locally rather than requesting the information again.

False

T/F: In a star topology, a single connection failure will halt all traffic between all sites.

jamming

As part of CSMA/CD, a process known as ____________________ allows the NIC issue a special 32-bit sequence that indicates to the rest of the network nodes that its previous transmission was faulty and that those data frames are invalid.

external

CompactFlash is an example of a peripheral device attached to the computer's ____ bus.

True

T/F: In every NOS, groups form the basis for resource and account management.

resolvers

Any hosts on the internet that need to look up domain name information

fragmentation

At the Network layer, ____________________ ensures that packets issued to the network are no larger than the network's maximum transmission unit size.

smart jack

At the customer's demarcation point, either inside or outside the building, T-carrier wire pairs terminate with a ____.

nonroutable

Because WAN connections require routers or other Layer 3 devices to connect locations, their links are not capable of carrying ____ protocols.

Ethernet II

Because of its support for multiple Network layer protocols and because it uses fewer bytes as overhead, ____________________ is the frame type most commonly used on contemporary Ethernet networks.

reserved

Because the octets equal to 0 and 255 are ____, only the numbers 1 through 254 can be used for host information in an IPv4 address.

802.11n

Boasts a maximum throughput of 600 Mbps.

10.43.3.87:21

If the standard port number for the Telnet service is 21, a host whose IPv4 address is 10.43.3.87 has a socket address for Telnet of ___.

security

Broadband cable requires many subscribers to share the same local line, thus raising concerns about ____ and actual (versus theoretical) throughput.

PCI

By far, the most popular expansion board NIC is one that uses a(n) ____ bus.

forward slash

CIDR notation takes the form of the network ID followed by a(n) ____, followed by the number of bits that are used for the extended network prefix.

mail server

Computer responsible for mail services.

shim

Collectively, MPLS labels are sometimes called a ____.

switch

Connectivity device that subdivides a network into smaller logical pieces.

physical

Connectivity devices such as hubs and repeaters operate at the ____ layer.

tiered topology WAN

Contain sites that are connected in star or ring formations are interconnected at different levels, with the interconnection points being organized into layers to form hierarchical groupings.

star topology WAN

Contains a single site acting as the central connection point for several other points.

private key encryption

Data is encrypted using a single key.

public key encryption

Data is encrypted using two keys.

namespace

Database of Internet IP addresses and their associated names

standards

Define the minimum acceptable performance of a product or service.

router

Device that connects network segments and direct data.

bridge

Devices that connect two network segments by analyzing incoming frames and making decisions about where to direct them based on each frame's MAC address.

asymmetrical

Dial return satellite Internet access is a(n) ____ technology.

netstat utility

Displays TCP/IP statistics and details about TCP/IP components and connections on a host.

TDM

Divides a channel into multiple intervals of time, or time slots.

RAM

Each time a computer starts up, the device drivers for all its connected peripherals are loaded into ____.

man

Every UNIX and Linux system contains full documentation of UNIX commands in the ____ pages.

cardbus

External peripheral device specifying 32-bit interface running at 33 MHz.

10Base-T

Follows the 5-4-3 rule of networking.

WANs

Given their long-distance capabilities, 10GBase-ER and 10GBase-EW are best suited for use on ____.

repeater

Have no means to interpret the data they retransmit.

POP3

IMAP (Internet Message Access Protocol) is a mail retrieval protocol that was developed as a more sophisticated alternative to ____.

23

ISDN PRI uses ____ B channels and one 64-Kbps D channel.

interference

If intermittent and difficult-to-diagnose wireless communication errors occur, ____ might be the culprit.

RX

If the ____ NIC LED indicator is blinking, the NIC is functioning and receiving frames.

DNS spoofing

In ____ , a hacker forges name server records to falsify his host's identity.

classful

In ____ addressing, only Class A, Class B, and Class C addresses are recognized.

active

In ____ scanning, the station transmits a special frame, known as a probe, on all available channels within its frequency range.

fixed

In ____ wireless systems, the result is a point-to-point link.

narrowband

In ____, a transmitter concentrates the signal energy at a single frequency or in a very small range of frequencies.

diffraction

In ____, a wireless signal splits into secondary waves when it encounters an obstruction.

mutual authentication

In ____, both computers verify the credentials of the other.

man in the middle

In a ____ attack, a person redirects or captures secure transmissions as they occur.

bonding

In a process called ____, two 64-Kbps ISDN B channels can be combined to achieve an effective throughput of 128 Kbps.

repeater

In a ring network, each workstation acts as a(n) ____ for the transmission.

peer-to-peer

In a(n) ____ network, every computer can communicate directly with every other computer.

star

In a(n) ______ topology, every node on the network is connected through a central device, such as a hub, router, or switch.

simplex

In cases in which signals may travel in only one direction, the transmission is considered ____.

last 8 bits

In classful addressing, Class C IPv4 address host information is located in the ____.

first 16 bits

In classful addressing, the Class B IPv4 address network ID is located in the ____.

period

In dotted decimal notation, a___ separates each decimal.

confidential

In general, information is ____________________ if it could be used by other parties to impair an organization's functioning, decrease customers' confidence, cause a financial loss, damage an organization's status, or give a significant advantage to a competitor.

DHCP

In most cases BOOTP has been surpassed by the more sophisticated IP addressing utility ____.

reassembles

In packet switching, when packets reach their destination node, the node ____ them based on their control information.

long reach

In the 10GBase-LR standard, the L stands for ____.

IP

In the TCP/IP protocol suite, ___ is the core protocol responsible for logical addressing.

ip diagram

In the context of TCP/IP a packet is known as a ___.

com

In the domain name www.google.com, ___ Is the top-level domain (TLD).

frequency

In wireless communication, to exchange information, two antennas must be tuned to the same ____.

internet services

Include file transfer capabilities, Internet addressing schemes, security filters, and a means for directly logging on to other computers on the Internet.

mesh topology WAN

Incorporates many directly interconnected sites.

mapping

Involves associating a letter, such as M or T, with a disk, directory, or other resource.

omnidirectional antenna

Issues and receives wireless signals with equal strength and clarity in all directions.

directional antenna

Issues wireless signals along a single direction.

100

LEO satellites orbit the Earth with an altitude as low as ____ miles.

Star

Most ethernet networks are based on what topology?

LDAP

Naming (or addressing) conventions in Active Directory are based on the ____ naming conventions.

data transreceiver

Nearly all NICs contain a(n) ____, the device that transmits and receives data signals.

NOS

Necessary to function as a server.

wireless networks

Networks that transmit signals through the atmosphere via infrared or radiofrequency (RF) waves are known as ____.

downstream

Occurs when data travels from the carrier's switching facility to the customer.

upstream

Occurs when data travels from the customer to the carrier's switching facility.

asymmetrical technology

Occurs when downstream throughput is higher than upstream throughput.

bus topology WAN

Occurs when each site is directly connected to no more than two other sites in a serial fashion.

collision domain

On an Ethernet network, a(n) ____ is the portion of a network in which collisions occur if two nodes transmit data at the same time.

redundant

On most modern WANs, a ring topology relies on ____ rings to carry data.

dynamic ports

Ports ranging from 49152 through 65535; open for use without restriction

lanes

PCIe slots vary depending on the number of ____ they support.

110

POP3 (Post Office Protocol, version 3) relies on TCP and operates over port ____.

zeroconfig

Protocols made to simplify addressing of nodes on a TCP/IP network. This assigns a node an IP address & recognizes services without needing a DNS server.

hot spots

Places where wireless Internet access is available to the public are called ____________________.

loopback adapter

Plugs into a port and crosses over the transmit line to the receive line so that outgoing signals can be redirected into the computer for testing.

well known ports

Ports ranging from 0 to 1023; assigned to processes that only the operating system or administrator of the system can access.

registered ports

Ports ranging from 1024 to 49151; accessible to network users and processes that do not have special administrative privileges.

presentation

Protocols at the ____ layer accept Application layer data and format it so that one type of application and host can understand data from another type of application and host.

physical

Protocols at the ____ layer accept frames from the Data Link layer and generate voltage so as to transmit signals.

session

Protocols in the ____ layer coordinate and maintain communications between two nodes on the network.

whois utility

Queries a DNS registration database and obtain information about a domain.

authentication, authorization, and accounting

RADIUS and TACACS belong to a category of protocols known as AAA (____).

signal level

Refers to the T-carrier's Physical layer electrical signaling characteristics as defined by ANSI standards in the early 1980s.

ICANN

Responsible for IP addressing and domain name management.

IAB

Responsible for Internet growth and management strategy, resolution of technical disputes, and standards oversight.

25

SMTP operates from port ____.

fault tolerance

SONET's extraordinary ____ results from its use of a double-ring topology over fiber-optic cable.

Ku-

Satellite Internet access providers typically use frequencies in the C- or ____ bands.

symmetrical

Satellite return Internet access is a(n) ____ technology.

yes

Say yes

False

T/F: IMAP4 servers require less storage space and usually more processing resources than POP servers do.

PCIe

Supports up to 16 lanes.

VLANs

Switches can create ____ by grouping a number of ports into a broadcast domain.

content

Switches that operate anywhere between Layer 4 and Layer 7 are also known as ____ switches.

True

T/F A network's access method is its method of controlling how network nodes access the communications channel.

False

T/F The most popular method for connecting nodes on a network is circuit switching.

False

T/F The smallest LANs do not have a backbone.

False

T/F: A benefit to using an NTFS partition is that it can be read by older operating systems, such as Windows 95, Windows 2000 Professional, and early versions of UNIX.

True

T/F: A common way to share resources on a peer-to-peer network is by modifying the file-sharing controls via the computer's operating system.

False

T/F: A pulse of positive voltage represents a 0.

False

T/F: A security policy should state exactly which hardware, software, architecture, or protocols will be used to ensure security.

True

T/F: ATM is a WAN technology that functions in the Data Link layer.

True

T/F: Addressing is a system for assigning unique identification numbers to devices on a network.

False

T/F: All protocols are routable

True

T/F: Among the Session layer's functions are establishing and keeping alive the communications link for the duration of the session, keeping the communication secure, synchronizing the dialogue between the two nodes, determining whether communications have been cut off, and, if so, figuring out where to restart transmission, and terminating communications.

True

T/F: An access point is a device that accepts wireless signals from multiple nodes and retransmits them to the rest of the network.

True

T/F: Bridges are protocol independent.

False

T/F: By default, the 802.11 standard offers substantial security.

False

T/F: Clients on a client/server network share their resources directly with each other.

True

T/F: CompactFlash NICs are most frequently used to connect devices too small to handle PCMCIA slots.

False

T/F: Connectivity devices such as hubs and repeaters operate at the Presentation layer of the OSI Model.

False

T/F: Cut-through switches can detect corrupt packets.

True

T/F: Dial-up ISDN does not convert a computer's digital signals to analog before transmitting them over the PSTN.

True

T/F: Encryption is the last means of defense against data theft.

True

T/F: Every process that occurs during network communications can be associated with a layer of the OSI Model.

True

T/F: Human errors, ignorance, and omissions cause more than half of all security breaches sustained by networks.

False

T/F: IBM began developing the FireWire standard in the 1980s.

True

T/F: ICMP (Internet Control Message Protocol) reports on the success or failure of data deliver.

connection oriented

TCP is a ___ subprotocol

NOS

The ____ is the software that runs on a server and enables the server to manage data, users, groups, security, applications, and other networking functions.

physical

The ____ layer is the lowest, or first, layer of the OSI Model.

10GBase-SR

The 10-gigabit fiber optic standard with the shortest segment length is ____.

twisted-pair

The 10GBase-T standard is considered a breakthrough for transmitting 10 Gbps over ____ medium.

host file

The ASCII text files called HOSTS.TXT that associates host names with IP addresses

protocol data units

The Application layer separates data into ____ or discrete amounts of data.

backbone

The ____ of a network refers to that part of the network to which segments and shared devices connect.

type

The Ethernet_II frame type contains a 2-byte ____ field which differentiates it from the older Ethernet_802.3 and Ethernet_802.2 frame types.

base I/O port

The ____ setting specifies, in hexadecimal notation, which area of memory will act as a channel for

route

The ____ utility allows you to view a host's routing table.

ISO

The _________ goal is to establish international technological standards to facilitate global exchange of information and barrier-free trade.

ipconfig utility

The TCP/IP administration utility for use with Windows NT, 2000, XP, Vista, Server 2003, and Server 2008 operating systems.

ifconfig utility

The TCP/IP configuration and management utility used on UNIX and Linux systems.

default

The ____ gateway is the gateway that first interprets its outbound requests to other subnets, and then interprets its inbound requests from other subnets.

BIOS

The ____ is a simple set of instructions that enables a computer to initially recognize its hardware.

ITU

The ____ is a specialized United Nations agency that regulates international telecommunications, including radio and TV frequencies, satellite and telephony specifications, networking infrastructure, and tariffs applied to global communications.

motherboard

The ____ is the main circuit that controls the computer.

20

The average geographic range for an 802.11a antenna is ____ meters.

key pair

The combination of a public key and a private key is known as a ____.

extended network prefix

The combination of additional bits used for subnet information plus the existing network ID is known as the _________

uplink

The creation of a communications channel for a transmission from an Earth-based transmitter to an orbiting satellite.

network services

The functions provided by a network are usually referred to as ____________________.

core

The gateways that make up the Internet backbone are called ____ gateways.

core gateways

The gateways that make up the Internet backbone are called __________

range

The geographical area that an antenna or wireless system can reach is known as its ____.

cable plant

The hardware that makes up the enterprise-wide cabling system is known as the ____.

proxy server

The host that runs the proxy service.

WAN sites

The individual geographic locations connected by a WAN are known as ____.

fully qualified host name

The local host name plus its domain name.

fixed wireless

The locations of the transmitter and receiver do not move.

attenuation

The loss of a signal's strength as it travels away from its source is known as ____.

topology

The physical layout of a computer network is known as its ____.

local loop

The portion of the PSTN that connects any residence or business to the nearest CO is known as the ____.

speed

The primary difference between the two USB standards is ____.

data link

The primary function of protocols in the ____ layer, is to divide data they receive from the Network layer into distinct frames that can then be transmitted by the Physical layer.

kernel

The primary function of the UNIX ____ is to coordinate access to all your computer's hardware, such as the disks, memory, keyboard, and monitor.

logical

The printer queue is a ____ representation of the printer's input and output.

replication

The process of copying directory data to multiple domain controllers is known as ____.

phase

The progress of a wave over time in relationship to a fixed point.

mobile wireless

The receiver can be located anywhere within the transmitter's range.

10000001

The result from ANDing 11001111 with 10010001 is ____.

addressing

The scheme used to assign a unique identifying number to every node on a network is known as ____.

signal

The speed of a T-carrier depends on its ____ level.

1000

The standard message format specified by SMTP allows for lines that contain no more than ____ ASCII

IP

The subprotocol that enables TCP/IP to internetwork - that is, to traverse more than one LAN segment and more than one type of network through a router is ____

multiprocessing

The support and use of multiple processors to handle multiple threads is known as ____.

physical

The term ____ memory refers to the RAM chips that are installed on the computer's system board and whose sole function is to provide memory to that machine.

application

The top, or seventh, layer of the OSI Model is the ____ layer

application

Through ____ layer protocols, software applications negotiate their formatting, procedural, security, synchronization, and other requirements with the network.

STP

To eliminate the possibility of a broadcast storm, switches and bridges implement the ____.

downlink

Transmission from a satellite transponder to an earth-based dish-shaped antenna.

segments

Transport layer protocols break large data units received from the Session layer into multiple smaller units, called ____.

connectionless

Transport layer protocols that do not establish a connection before transmission and make no effort to ensure that data is delivered error-free are called ____________________ protocols.

hierarchical

UNIX was one of the first operating systems to implement a ____ file system.

host utility

Used if an administrator already know a host's name and wants to learn its IP address.

nbstat utility

Useful only on networks that run Windows-based operating systems and NetBIOS.

802.11b

Uses DSSS (direct-sequence spread spectrum) signaling.

traceroute utility

Uses ICMP ECHO requests to trace the path from one networked node to another, identifying all intermediate hops between the two nodes.

802.11a

Uses channels in the 5-GHz band and provides a maximum theoretical throughput of 54 Mbps.

802.11g

Uses the 2.4-GHz frequency band and provides a maximum theoretical throughput of 54 Mbps.

firewire

Uses the IEEE 1394 standard.

30

Using Bluetooth version 2.0, communicating nodes can be as far as ____ meters apart.

time to live field

What is the field that states the maximum amount of time a packet will stay on the network before being discarded.

publicly

WANs typically send data over ____ available communications networks.

Serial

What backbone is the simplest kind of backbone.

DHCP leasing

What is it called when a device will borrow an IP address temporarily while connected to the network. The length of the lease depends on server and client settings.

fading

Which of the following terms refers to a change in signal strength as a result of some of the electromagnetic energy being scattered, reflected, or diffracted after being issued by the transmitter?

fixed packet

What sets ATM apart from Ethernet is its ____ size.

point-to-point

When a data transmission involves only one transmitter and one receiver, it is considered a(n) ____ transmission.

full duplex

When signals are free to travel in both directions over a medium simultaneously, the transmission is considered _____.

0

When using classful IPv4 addressing, a network ID always ends with an octet of ____.

ip address

Whether connecting to the Internet or to another computer within a LAN, every node on a network must have a unique ____

host

Which of the following enables resource sharing by other computers on the same network?

NTP

___ is a simple Application layer protocol used to synchronize the clocks of computers on a network.

preamble

Within Ethernet frame types, the ____ signals to the receiving node that data is incoming and indicates when the data flow is about to begin.

1

Within a classful addressing subnet mask, the ____ bits indicate that corresponding bits in an IPv4 address contain network information.

255.255.0.0

Within a classful addressing, ____ is the default subnet mask for a Class C address.

terminators

Without ____, a bus network would suffer from signal bounce.

dynamic

___ ARP table entries are created when a client makes an ARP request that cannot be satisfied by data already in the ARP table.

subnetting

___ is a process of subdividing a single class of networks into multiple, smaller logical networks, or segments.

firmware

___ is a set of data or instructions that has been saved to a ROM (read-only memory) chip (which is on the NIC).


Set pelajaran terkait

Business Law Consideration Chapter 6

View Set

Writing and Argumentative Essay about the Nobel Prize in Literature 100%

View Set

GUM Assessment Unit 12 lesson 13

View Set

Chapter 5: Competitive Rivalry & Competitive Dynamics

View Set

Chapter 13: Implementing Secure Mobile Solutions

View Set