CNT 120: Chapter 1

Ace your homework & exams now with Quizwiz!

Class C

What class of fire extinguisher is necessary to put out electrical fires?

MSDS

What piece of information would you consult to know how to properly handle substances such as chemical solvents and how to dispose of them?

HTTPS

When HTTP is layered on top of an encryption protocol such as SSL or TLS .... the result is the ________ protocol.

domain

When a Windows Server controls network access to a group of computers, this logical group is called a Windows __________.

Network

is a group of computers and other devices (printers, smart phones, tablet PC, Xbox, Wii, PS, IP Phone, etc...) that are connected by some type of transmission media (copper wire, fiber optic, or RF).

switch

receives incoming data frame from one of its ports, reads the MAC address and then directs the data frame to the correct port to the destination node

Data Link

responsible for interfacing with physical hardware on the local network - responsible for getting data onto the network (NIC, MAC Address, Ethernet, Wi-Fi)

Network

responsible for moving messages from one node to another until reaches destination (IP, ICMP, ARP)

Presentation

responsible for reformatting, compressing, and/or encrypting data in a way that the receiving application can read (.txt, .png, .mp3, .html, etc....)

Transport

responsible for transporting Application layer payloads from one application to another (TCP ... and ... UDP)

Physical

simplest layer and is responsible for sending bits via a wired or wireless transmission (Twisted Pair Copper, Fiber Optic, Radio Frequency)

True

An NOS is a special type of software designed to: manage data and other resources for a number of clients ensure that only authorized users access the network control which type of files a user can open restrict when and from where users can access the network dictate which rules computers will use to communicate supply applications and data files to clients

data mining

Application Layer Presentation Layer Session layer

Frames

Data Link Layer

OSHA

Electrical and tool safety in workplaces are is generally regulated by______.

Packets

Network Layer

Bits

Physical Layer

LAN

-covers a relatively small area (room, floor, building) -uses are for sharing resources and data

WAN

-covers a very large area (between cities and even continents) -uses are for connecting sites of a company (Harrisburg Office to Pittsburgh Office

MAN

-covers usually a "city-wide" area -used to typically connect buildings within a city (government buildings for example)

ESD

If you are working on the sensitive electronic components of the computer, you should wear a(n) _______ strap to protect the sensitive electronic parts from damage.

RDP

In the Windows Operating System, the ______ application is used to provide a secure, encrypted transmission that allows a technician to remote in to a machine to make configuration changes or troubleshoot that device.

SSH

The _______ protocol is used at the command-line to allow an administrator to connect to remote systems (computer, server, router, switch) to make configuration changes to that device. The ______ protocol is encrypted (it creates a secure tunnel between the 2 systems), so it is secure and more commonly used that its predecessor.

Telnet

The _______ protocol is used at the command-line to allow an administrator to connect to remote systems (computer, server, router, switch) to make configuration changes to that device. The ______ protocol is not encrypted, so it has been replaced by a protocol that is more secure.

logical

The _________ topology has to do with software, how access to the network is controlled, including how users and programs initially gain access to the network, and how specific resources, such as applications and databases are shared on the network.

physical

The _________ topology refers to a network's hardware and how computers, other devices, and cables fit together to form the network.

Peer-to-Peer

The ____________ network model, the operating system of each computer on the network is responsible for controlling access to its resources without centralized control.

Client-Server

The ____________ network model, the resources are managed by the NOS via a centralized directory database.

NOS (Network Operating System)

The client-server network model requires a(n) ______ which controls access to the entire network. (Examples are: Windows 2016 Server, Ubuntu Server, Red Hat Enterprise Linux)

True

The following are advantages of a Client-Server network: user accounts and passwords to the network are assigned in one place access to multiple shared resources can be centrally granted to a single user or groups of users problems on a network can be monitored, diagnosed, and often fixed from one location network is scalable

True

The following are advantages of a Peer-to-Peer network: simple to configure less expensive than other network options

True

The following are disadvantages of a Peer-to-Peer network: they are not scalable they are not necessarily secure not practical for connecting more than a few computers

protocols

The methods and rules for communication on a network are called _______________.

HTTP

The primary protocol used by Web servers and browsers (without a layer of security) is _________.

SMTP

The primary protocol used by clients to send an email message is the _________ protocol.

POP3 or IMAP4

The recipient's email server delivers the email message to the receiving client by using the _________ protocol.

Segments

Transport Layer

FTP

______ is a client-server application that transfers files between 2 computers. _____ does not provide encryption and is therefore not secure.

Active Directory

_______________ is the centralized directory database that contains user account information and security for the entire group of computers.

router

a device that manages traffic between two or more networks .. and ... can help find the best path for traffic to get from one network to another typically by reading the destination IP address of the data packet

NIC

a network port used to attach a device to a network and allow it to send and receive data on the network

Session

describes how data between applications is synched and recovered if messages don't arrive intact at the receiving application

Application

describes the interface between two applications, on separate computers (HTTP, FTP, SMTP, POP3, DNS, etc...)


Related study sets

2 Digit by 1 Digit Multiplication

View Set

CSET- Multiple Subjects- Subtest 3- Music

View Set

fin300: chapter practice #6 (chapter 8)

View Set

Management Chapter 9 Practice Questions

View Set

NRSG 1125 PrepU Clinical Judgement

View Set

Variable Annuity QBank (went over)

View Set

Ms.Kovich Rational Numbers Quiz, Thusday 22nd

View Set