CNT 120: Chapter 1
Class C
What class of fire extinguisher is necessary to put out electrical fires?
MSDS
What piece of information would you consult to know how to properly handle substances such as chemical solvents and how to dispose of them?
HTTPS
When HTTP is layered on top of an encryption protocol such as SSL or TLS .... the result is the ________ protocol.
domain
When a Windows Server controls network access to a group of computers, this logical group is called a Windows __________.
Network
is a group of computers and other devices (printers, smart phones, tablet PC, Xbox, Wii, PS, IP Phone, etc...) that are connected by some type of transmission media (copper wire, fiber optic, or RF).
switch
receives incoming data frame from one of its ports, reads the MAC address and then directs the data frame to the correct port to the destination node
Data Link
responsible for interfacing with physical hardware on the local network - responsible for getting data onto the network (NIC, MAC Address, Ethernet, Wi-Fi)
Network
responsible for moving messages from one node to another until reaches destination (IP, ICMP, ARP)
Presentation
responsible for reformatting, compressing, and/or encrypting data in a way that the receiving application can read (.txt, .png, .mp3, .html, etc....)
Transport
responsible for transporting Application layer payloads from one application to another (TCP ... and ... UDP)
Physical
simplest layer and is responsible for sending bits via a wired or wireless transmission (Twisted Pair Copper, Fiber Optic, Radio Frequency)
True
An NOS is a special type of software designed to: manage data and other resources for a number of clients ensure that only authorized users access the network control which type of files a user can open restrict when and from where users can access the network dictate which rules computers will use to communicate supply applications and data files to clients
data mining
Application Layer Presentation Layer Session layer
Frames
Data Link Layer
OSHA
Electrical and tool safety in workplaces are is generally regulated by______.
Packets
Network Layer
Bits
Physical Layer
LAN
-covers a relatively small area (room, floor, building) -uses are for sharing resources and data
WAN
-covers a very large area (between cities and even continents) -uses are for connecting sites of a company (Harrisburg Office to Pittsburgh Office
MAN
-covers usually a "city-wide" area -used to typically connect buildings within a city (government buildings for example)
ESD
If you are working on the sensitive electronic components of the computer, you should wear a(n) _______ strap to protect the sensitive electronic parts from damage.
RDP
In the Windows Operating System, the ______ application is used to provide a secure, encrypted transmission that allows a technician to remote in to a machine to make configuration changes or troubleshoot that device.
SSH
The _______ protocol is used at the command-line to allow an administrator to connect to remote systems (computer, server, router, switch) to make configuration changes to that device. The ______ protocol is encrypted (it creates a secure tunnel between the 2 systems), so it is secure and more commonly used that its predecessor.
Telnet
The _______ protocol is used at the command-line to allow an administrator to connect to remote systems (computer, server, router, switch) to make configuration changes to that device. The ______ protocol is not encrypted, so it has been replaced by a protocol that is more secure.
logical
The _________ topology has to do with software, how access to the network is controlled, including how users and programs initially gain access to the network, and how specific resources, such as applications and databases are shared on the network.
physical
The _________ topology refers to a network's hardware and how computers, other devices, and cables fit together to form the network.
Peer-to-Peer
The ____________ network model, the operating system of each computer on the network is responsible for controlling access to its resources without centralized control.
Client-Server
The ____________ network model, the resources are managed by the NOS via a centralized directory database.
NOS (Network Operating System)
The client-server network model requires a(n) ______ which controls access to the entire network. (Examples are: Windows 2016 Server, Ubuntu Server, Red Hat Enterprise Linux)
True
The following are advantages of a Client-Server network: user accounts and passwords to the network are assigned in one place access to multiple shared resources can be centrally granted to a single user or groups of users problems on a network can be monitored, diagnosed, and often fixed from one location network is scalable
True
The following are advantages of a Peer-to-Peer network: simple to configure less expensive than other network options
True
The following are disadvantages of a Peer-to-Peer network: they are not scalable they are not necessarily secure not practical for connecting more than a few computers
protocols
The methods and rules for communication on a network are called _______________.
HTTP
The primary protocol used by Web servers and browsers (without a layer of security) is _________.
SMTP
The primary protocol used by clients to send an email message is the _________ protocol.
POP3 or IMAP4
The recipient's email server delivers the email message to the receiving client by using the _________ protocol.
Segments
Transport Layer
FTP
______ is a client-server application that transfers files between 2 computers. _____ does not provide encryption and is therefore not secure.
Active Directory
_______________ is the centralized directory database that contains user account information and security for the entire group of computers.
router
a device that manages traffic between two or more networks .. and ... can help find the best path for traffic to get from one network to another typically by reading the destination IP address of the data packet
NIC
a network port used to attach a device to a network and allow it to send and receive data on the network
Session
describes how data between applications is synched and recovered if messages don't arrive intact at the receiving application
Application
describes the interface between two applications, on separate computers (HTTP, FTP, SMTP, POP3, DNS, etc...)