Cyber 100s Final Exam

Ace your homework & exams now with Quizwiz!

Disk Striping

technology that enables writing data to multiple disks simultaneously in small portions called stripes. these stripes maximize use by having all of the read/write heads working constantly. different data is stored on each disk and isn't automatically duplicated (not fault tolerant) - RAID 0 and 5

Type 1 vs. Type 2 Hypervisor

Hypervisor is the component of virtualization that creates and monitors the virtual hardware environment, which allows multiple VMs to share physical hardware resources -Type 1: implements OS virtualization by running irately on the host computer's hardware and controls the monitors guest OSs ex: would use in server visualization in data centers -Type 2: a system in which the hypervisor implements OS virtualization by being installed in a general purpose host OS, such as Windows 10 or Linux, and the host OS accesses host hardware on behalf of the gust OS ex: would use in desktop virtualization solutions

Network administrators when configuring a network interface in IPv4 enter 3 pieces of information what are they?

IP Address Subnet Mask DNS Servers

Windows Disk Type Categories

In Windows, the types of volumes you can create on a disk depends on how the disk is categorized - Basic: a traditional Windows or DOS disk arrangement in which the disk is partitioned into primary and extended partitions. A basic disk can't hold volumes spanning multiple disks or be a part of RAID - Dynamic: a disk arrangement that can hold up to 128 volumes, including spanned volumes, striped volumes, and RAID volumes

RAID

*Redundant Array of Independent Disks* A disk configuration that uses space on multiple disks to form a single logical volume. Most RAID configurations provide fault tolerance, and some enhance performance - Most common types: 0, 1, 3, 5, 10

Types of Cloud Computing

- IaaS (Infrastructure-as-a-Service): a company can use a provider's storage or virtual servers as its needs demand - PaaS (Platform-as-a-Service): a customer develops applications with the service provider's development tools and infrastructure. After applications are developed, they can be delivered to the customer's users from the provider's servers - SaaS (Software-as-a-Service): customer pays for the use of application that run on a service provider's network

Basic Rules for Creating a File Structure

- Keep a manageable number of folders in the root folder structure - Keep operating system files in the default folders recommended by the vendor - Keep different versions of software in their own folders - Keep data files in folders on the basis of their functions - Design home folders to match the functions of users in an organization - Group files with similar security needs within the same folders

Similarities/Differences between Hubs, Switches and Routers

- Network Hubs: a hub has a rather straightforward job of receiving bit signals generated by NICs and other devices, strengthening them, and then sending them along to other devices connected to its ports - Network Switches: used to interconnect multiple computers so that they can communicate with one another. ***hubs work only with electrical signals and the bits that these signals represent, whereas switches work with the actual information these bits compose, to make frames*** -Routers: connect LANs to one another. Typically have two or more network ports to which switches are connected to form an internetwork

2 categories of Local Disk Configuration

- Physical Disk Properties: must be considered before purchasing disk drives for a server, including disk capacity, physical speed, and the interface for attaching a disk to the system - Logical Properties: include its format and the partitions or volumes created on it

Considerations for Password Naming Conventions

- Should user account names have a minimum and maximum number of characters? - Should the username be based on the user's real name? If security is of utmost importance, should usernames be more cryptic and difficult to guess? - Some OSs distinguish between uppercase and lowercase letters. Should usernames contain both as well as special characters, such as periods and underscores?

long term storage

- a memory storage system that allows relatively permanent storage, probably of an unlimited amount of information - maintains data when power is turned off - referred to as nonvolatile storage - EX: USB memory sticks (flash drives), SD cards, Compact FlashCards, CDs & DVDs, Magnetic tape, Solid state drives, hard disk drives

short-term storage

- a memory storage system that briefly holds a limited amount of information - RAM (random access memory) - data is maintained without a power course - referred to as volatile storage

Common Command Line Utilities for Disk Management in LINUX

- cfdisk: partitions and verifies a hard disk - cpio: copies an backs up files to archive them on tape or disk - dump: backs up particular files or an entire file system and offers levels to specify the degree to which to backup files; use the restore command to restore files backed up by dump - fdisk: maintains disk partitions, including creating and deleting partitions and flagging the active partition

Advantages of Installing/Leaving OS & Application files in default folders

- it is easier for others to help with computer problems as they arise - in organizations that have help disks or support center, it is easier for support professionals to solve problems with drivers and network access when system files are easy to find - many software installations expect OS files to be in their default locations, and these installations work best when it is easy to find specific subfolders and key files related to the OS

Local Storage

- storage media with a direct, exclusive connection to the computer's system board through a disk controller - provides rapid and exclusive access to storage media - connected directly to the server

Linux commands for listing and removing files

-a : lists all files including hidden files -rm : removes files

View Disk Space Allocation in Linux

-df Command: shows the amount of disk space use and available on Linux file systemss -du Command: displays the amount of disk space used by the specified files and for each subdirectory

List, Copt, and Delete Files in Linux

-rm: deletes files -l: presents a detailed information listing, including permissions and file size -a: lists all files, including hidden files -n: displays the user identification numbers (UIDs) and group identification numbers (GIDs) of those who have access to files -r: sorts files in reverse alphabetical order

Types of Backups

1. Binary Backup: A technique that backs up the entire contents of one or more disk drives in a binary or image format. 2. Full file-by-file backup: A technique that backs up the entire contents of one or more disk drives, including all folders, subfolders, and files, so that any of these contents can be restored. 3. Differential Backup: A method that only backs up files that have changed since the last full backup. 4. Incremental Backup: A method that only backs up files that have changed since the last full or incremental backup.

3 Share Permissions in Windows

1. File Sharing Wizard: To start this wizard, right-click a folder, point to Share with, and then click Specific people. The File Sharing Wizard simplifies sharing for novices by simplifying the permissions settings. 2. Advanced Sharing Dialog Box: To open this dialog box, click Advanced Sharing in the Sharing tab of a folder's Properties dialog box. - different options, - more advanced 3. Shared Folders Snap-In: Use this component of the Computer Management console to monitor, change, and create shares on the local computer or a remote computer. In Windows, users are subject to both share and NTFS permissions when accessing network files NTFS Permissions: read, change, full control

4 Storage Access Methods

1. Local Storage 2. Direct-attached Storage (DAS) 3. Network-attached Storage (NAS) 4. Storage Area Network

Basic Generic Troubleshooting Steps

1. Reboot computer 2. Defrag 3. Delete temp files

4 Layers of the Network Communication Process

1. User Application: an application tries to access a network resource 2. Network client or server software: client software detects the attempt to access the network and passes the message on to the network protocol 3. Network Protocol: the protocol packages the message in a format suitable for the network and sends it to the NIC driver 4. Network Interface: the NIC driver send the data in the request to the NIC, which converts it into the necessary signals to be transmitted across the network medium

Public Cloud vs. Private Cloud

A public cloud is a cloud made available in a "pay-as-you-go" style to the public ex: Google or Windows A private cloud is a cloud hosted internally by a business or organization that is not made available to the public ex: Hewlett Packard Enterprise (HPE)

Direct Attached Storage (DAS)

A storage medium directly connected to the server using it but differs from local storage in that it includes externally connected HDDs in an enclosure with a power supply.

Bare-Metal Virtualization

A system in which the hypervisor implements OS virtualization by running directly on the host computer's hardware and controls and monitors guest OSs. See also virtualization.

Batch (.bat) file

A text file that contains a list of commands you ordinarily type at the command prompt

Cloud Computing Benefits

Cloud Computing: a networking model in which data, applications, and processing power are managed by servers on the Internet; users of these resources pay for what they use rather than for the equipment and software needed to provide resources Benefits: reduced physical plant costs (less servers = less space), less expensive (but what you want) Types: SaaS, PaaS, IaaS

Virtual Disk

Files stored on the host computer that represent a virtual machine's hard disk

Hardware and Software Components of a Network

Hardware Components make a stand-alone computer into a networked computer - Network Interface Card (NIC): a device that creates and mediates the connection between a computer and the network medium - Network Medium: this cable plugs into the NIC and makes the connection between a computer and the rest of the network - Interconnecting Device: they allow computers to communicate on a network without being connected directly

Types of Networks

LAN (local area network): a small network limited to. single collection of machines and linked by interconnecting devices in a small geographic area WAN (wide area network): Internetworks that are geographically dispersed and use 3rd party communication providers to supply connectivity between locations MAN (metropolitan area network): an internetwork confined to a geographic region, such as a city or county, a MAN uses 3rd party communication providers to supply connectivity between locations Internetwork: a network connection ton of LANs tied together by devices such as routers

Sharing Files in Linux

Linux supports Windows file sharing by using SMB in a software package called Samba •You can share a folder using the Samba Server Configuration GUI tool •Or by editing the /etc/samba/smb.conf file •When you use the GUI tool to configure Samba •Changes to the smb.conf file are made automatically Guide to Operating Systems, 5th Edition 14

Deleting Files in MAC OSX

Mac OS X is generally effective in automatically cleaning out temporary files •However, still important to periodically find and delete unneeded files •Mac OS X windows often have a list option that shows files and their sizes •Click the List view button in the window to see file sizes

How to troubleshoot a printer that won't work

ON THE PRINTER: Check power, check paper, check ink, check for jams, check network connectivity ON THE PC: Check network connectivity, check driver, check another application

How do hubs and switches handle packets differently?

Packet: a chunk of data with source and destination IP addresses added to it. Packets are generated and processed by network protocols - Unlike hubs, switches examine each packet and process it accordingly rather than simply repeating the signal to all ports

System Volume vs. Boot Volume

System Volume: contains the files a computer needs to find and load the Windows OS Boot Volume: The volume where the \Windows folder is located—usually the C drive, but this location is not mandatory

OSI Model and its Layers

The OSI Model divides network communication into 7 levels; ISO Standard 7498 defines a frame of reference for understanding networks by dividing the process of network communication into seven layers. Each layer is defined in terms of the services and data it handles on behalf of the layer above it and the services and data it needs from the layer below it. 7. Application: provides interfaces that enable applications to request and receive network services 6. Presentation: data can be encrypted and/or compressed to facilitate delivery. Platform-specific application formats are translated into generic data formats for transmission or from generic data formats into platform-specific application formats for delivery to the Application layer 5. Session: responsible for setting up, maintaining, and ending communication sequences (called sessions) across a network. 4. Transport: responsible for reliable delivery of data streams across a network. Layer 4 protocols break large streams of data into smaller chunks and use sequence numbers and acknowledgements to provide communication and flow control 3. Network: handles logical addressing and routing of PD 2. Data Link: responsible for managing access to the network medium and delivery of data frames from sender to receiver or sender to an intermediate device, such as a router. 1. Physical: transmits and receives signals and specifies the physical details of cables, NICs, connectors, and hardware behavior

Accessing Shared Files in Windows

The UNC path is used to access a shared folder with the syntax \\server-name\sharename • In Windows, you can map a drive in order to simplify access to shared folders • Associates a drive letter with the UNC path to a shared folder • Drives are usually mapped using File Explorer or the net command

RAID 0 Volume

a volume that extends across two or more dynamic disks, but data is written to all disks in the volume equally; it provides no fault tolerance but does provide a performance advantage over simple or spanned volumes

Commands for Adding Users and Groups in Linux

Using the useradd newuser command; you replace newuser with the logon name for the user account you're creating. Then you create a password for the user with the passwd newuser command. Both the logon name and password are case sensitive in Linux.

Host vs. Guest Virtualization

Virtualization: a process that creates a software environment to emulate a computer's hardware and BIOS, allowing multiple OS's to run on the same physical computer at the same time - Guest OS: the OS installed on a virtual machine - Host: the physical computer on which the VM software is installed and runs on

RAID 5 Volume

a volume that uses space from three or more dynamic disks and uses disk stripping with parity too provide a fault tolerance. When data is written, it's striped across all but one of the disks in the volume. Parity information derived from the data is written to the remaining disk, which is used to recreate lost data after a disk failure

Hard Drive Storage

When your computer stores data on its hard drive, it doesn't just throw magnetized nails into a box, all jumbled up together. The data is stored in a very orderly pattern on each platter. Bits of data are arranged in concentric, circular paths called tracks. Each track is broken up into smaller areas called sectors

RAID 1 Volume (Mirror Volume)

a volume that uses space from two dynamic disks and provides fault tolerance. data written to one disk is duplicated, or mirrored, to the second disk. If one disk fails, the other disk has a good copy of the data, and the system can continue to operate until the failed disks replaced

What advantage does IPv6 have over IPv4?

both are a connectionless internetwork layer protocol that provides source and destination addressing and routing for the TCP/IP protocol suite - IPv4 (Internet protocol version 4): IPv4 uses 32 bit dotted decimal addresses - IPv6 (Internet protocol version 6): uses 121-bit hexadecimal addresses and has a built in security and QoS features *** An IPv6 address is 128 bits rather than the 32 bits in an IPv4 address. This length increases the number of possible addresses from about 4 billion ***

RAID 10 Volume

configuration that combines disk mirroring and disk striping to protect data

Network Attached Storage (NAS)

has an enclosure, a power supply, slots for multiple HDDs, a network interface, and a built in OS tailored for managing shared files and folders

Linux Command for displaying the network interface configuration

ifconfig

Storage Area Network (SAN)

the most complex type, uses high speed networking technologies to give servers fast access to large amounts of disk storage

Defrag

the process of removing empty pockets between files and other information on a hard disk drive

Features of the Windows Disk Management Tools

this tool enables you to create and else partitions, format partitions for a file system, and generally manage partitions. - The tool also recognizes and enables you to manage removable storage, including removable hard drives, DVD/CD-ROM drives, and flash drives

Sharing Printers in Windows

•Components of a shared printer: •Print device- Two basic types of print device: •Local print device: Connected to an I/O port on a computer •Network print device: A printer attached to and shared by another computer •Printer- The icon in the Printers folder that represents print devices •Print server- A Windows computer sharing a printer **•Print queue- Storage for print jobs awaiting printing

Sharing Files in Windows

•File sharing in Windows is based on Client for Microsoft Networks (client- side) and File and Printer Sharing for Microsoft Networks (server side) •To see these components -View the properties of your network connection •To share files in Windows -You share the folder in which the files are located

Disk Cleanup in Windows

•Use the Disk Cleanup tool to delete unneeded files •In Windows 8 and later versions •The Disk Cleanup tool is scheduled to automatically run on the system drive where Windows is installed •You should also regularly open the Recycle Bin and delete its files •You can also delete these files using the Disk Cleanup tool

Testing Network Connectivity

•ping utility - used to poll another network device •ping displays statistics that include the number of packets sent, received, and lost •Also provides the round trip time in milliseconds •You can check the utilization of your network connection in Windows using the Performance tab in Task Manager •To check utilization of your interface in Linux, you may need to download and install a utility such as netdiag or netwatch


Related study sets

Primerica guarantee test questions

View Set

Organizational Behavior Chapter 7 Assignment

View Set

Communication 1100 quiz questions

View Set

Constitutional Violations and Reasonable Expectation of Privacy

View Set

Animal Science Industry Certification Study Guide UPDATED

View Set

NURS 6005 (Mental Health) Final Exam Study Set

View Set

ECON 201 Final based off practice questions

View Set

Computer Fundamentals Module 5 - Software and Apps - Quiz

View Set

AP Computer Science Principles 1st Semester Finals Part Three

View Set