ISBN: 159200-792-9

Ace your homework & exams now with Quizwiz!

Any modern client running the TCP/IP protocol suite will be capable of connecting to a UNIX-type of host via ______.

Telnet

______ is a terminal emulation protocol used to log on to remote hosts using the TCP/IP protocol suite.

Telnet

A(n) _____ converts digital signals into analog signals for use with ISDN phones and other analog devices.

Terminal adapter, TA

A(n) _______ is a divce that accepts wireless signals from multiple nodes and retransmits them to the rest of the network.

access point

The _____ indicates, in hexadecimal notation, the area of memory that the NIC and CPU will use for exchanging, or buffering, data.

memory range

A(n) _______ issues and receives wireless signals with equal strength and clarity in all directions.

omni-directional antenna

To better organize and manage objects, a network administrator places objects in _______.

organizational units

The _____ is the lowest, or first, layer of the OSI model.

physical layer

______ layer serices manage data encryption and decription.

presentation

The term ______ refers to those skills hat are now easily measurable, suck as customer relations, oral and written communications, dependability, teamwork, and leadership abilities.

soft skills

A _______ is a tool that can be used to assess the quality of a wireless signal.

spectrum analyzer

A(n) ______ is a special 32-bit number that, when combined with a device's IP address, informs the rest of the network about the segment or network to which it is atteched.

subnet mask

The relationship between two dowmains in which one allows the other to authenticate its users is known as a(n) ______.

trust relationship

Network layer addresses are also called ______.

virtual addresses

To calculate a host's network ID given its IP address and subnet mask, you follow a logical process of combining bits knowns as ________.

ANDing

A network's ________ is its method of controlling how network nodes access the communications channel.

Access method

__________ is a Network layer protocol that obtains the MAC address of a host, or node, then creates a database that maps the MAC address to the host's IP address.

Address Resolution protocol

The _____ account is a predefined user account that has the most extensive privileges for resources both on the computer and on the domain that it controls.

Administrator

A(n) _____ is a distinct communication path between nodes.

Channel

______ is a fault-tolerance technique that links multiple servers together to act as a single server.

Clustering

A ______ is a place where the computers, devices, and connectivity necessary to rebuild a network exist, but they are not appropriately configured, updated or connected.

Cold Site

A(n) _____ is a logically or physically distinct Ethernet network segment on which all participating devices must detect and accommodate data colision.

Collision domain

_______ protocols ensure that data arrives exactly as it ws sent by extablishing a connection with another node before they begin transmitting data.

Connection-oriented

A(n) Cable is useful for quickly and easily verifying that a node's NIC is transmitting and receiving signals property.

Crossover

______ occurs when a singal traveling on one wire or cable infringes on the signal traveling over an adjacent wire or cable.

Crosstalk

_______ occurs when a hacker forges a name server records to falsify his host's identity.

DNS spoofing

A ______ modulates outgoing signals and demodulates incoming signals.

DSL modem

A(n) __________ occurs when a system becomes unable to function because it has been deluged with data transmissions or otherwise disrupted data.

Denial-of-service Attack

A ________ is a password0protected and encrypted file that holds an individual's identification information, including a public key.

Digital certificate

The use of an algorithm to scramble data into a format that can be read only by resersing the algorithm is known as ________.

Encryption

______ is the original PC file system that was designed in the 1970s to support floppy disks and, later, hard disks.

FAT

______ is a network technology whose standards were originally specificed by ansi in the mid-1980s and later refined by ISO.

FDDI

______ is the capacity for a component or system to continue functioning despite damage or pertial malfunction.

Fault tolerance

_______ is equivalent to using wild cards in Windows and DOS.

File globbing

_____ refers to capability of a server to share data files, applications, and disk storage space.

File services

______ is an updated, digital version of X.25 that relies on packet switching.

Frame Relay

A(n) __________ separates a network into muliple logically defined segments.

Gateway

On a Linux or Solaris system, the ______ command creates a new group ID and makes the group available for use.

Groupadd

The _______ lists all computer components proven to be compatible with Windows Server 2003.

Hardward Compatibility List, HCL

The term _______ refers to identical components that can be changed while a machine is still running.

Hot swappable

On Unix-type systems, the ______ utility allows you to modify TCP/ip settings for a network interface, release and renew DHCP-assigned addresses, or simply check the status of your machine's TCP/IP settings.

IPCONFIG

______coordinate the storage and transfer of e-mail between users on a network.

Main services

Every UNIX-type system contains full documentation of UNIX commands in the ________.

Manual Pages

________ involves associating latter, such as M: or T:, with a disk, directory, or other resource.

Mapping

The _____ is the main circuit tha tcontrols the computer.

Motherboard

______ allows one device to send data to a specific group of devices.

Multicasting

________is the ability of a processor to perform many different opertations in a ver brief period of time.

Multitasking

______ contain databases of associated names and IP addresses and provide this informatio to resolvers on request.

Name servers

On networks that run NetBIOS over TCP/IP, the ________ utility can provide information about NetBIOS statistics and resolve NetBIOS names to their IP addreses.

Nbtstat

The _______ utility displays TCP/IP statistics and details about TCP/IP components and connections on a host.

Netstat

A ______ is a group of comuters and other divices that aer connected by some type of transmission media.

Network

_______ viruses propagate themselves via network protocols, commands, messaging programs, and data links.

Network

The _______ is a simple Application layer protocol used to synchronize the crocks of computers on a network.

Network Time Protocol, NTP

_______ is a specialized storage device or group of storage devices that provides centralized fault-tolerant data storage for a network.

Network attached storage

______ are connectivity devices that enable a workstation, server, printer, or other node to receive and transmit data over the network media.

Network interface cards, NIC

_______ is a software-based tool that continually monitors network traffic from a server or workstation attached to the network.

Network monitor

_______ implies a fluctuation in voltage levels causes by other devices on the network electromagnetic interfaces?

Noise

Resistance is measured in ______.

Ohms

_____ is a term used by network professionals to describe the non-data information that must accompany data in order for a signal to be properly routed and interpreted by the network.

Overhead

In a ______ Network, every compter can comunicate directly with any other computer.

Peer-to-peer

The most common way to measure latency on data networks is by calculation a packet's _________.

Round trip time

______is a simple subprotocol, incapable of doing anything more then transporting mail or holding it in a queue.

SMTP

______ refers to a thorough examination of each aspect of a network to determine how it might be compromised?

Security audit

Transport layer protocols break large data nuits received from the Session layer into multiple smaller units called ______.

Segments

________ is a networking technology orginally developed at Xerox in the early 1970's and improved how Digital Equipment Corporation, Intel, and Xerox.

Sequencing

_______is a mothod of identifying segments that belong to the same group of subdivided data.

Sequencing

______ are physically designed to be linked with other hubs in a single telecommunications closet.

Stackable Hubs

_____ are documented agreements containing technical specifactions or other precise criteria that stipulate how a particular product or service should be designed or performed.

Standards

_______ separates a network into multiple logically diffined segments.

Subnetting

_____ enables multiple nodes to simultaneously transmit and receive data over different logical network segments.

Switched Ethernet

______ are connectivity devices that subdivide a network into smaller logical pieces.

Switches

A(n) ______ is a network that traverses some distance and usually connects LANs, whether across the city or across the nation.

Wide area network, WAN

The ______ provides a means of resolving NetBIOS names to IP addresses.

Windows Internet Naming Service

A(n) _______ is a file that contains instructions for performing a specific task, such as reading data from and writing data to a hard drive.

kernel module

A wave's ______ is a measure of its strength at any given point in time.

Amplitude

_____ is an ITU networking standard describing Data Link Layer protocols for both network accessand signal multiplexing.

Asynchronous Transfer Mode

A(n) ______consists of the objects, classes, and properties a network typically needs.

Base schema

A ______ is a record of how the network operates under normal conditions.

Baseline

______ is th eprocess of assigning one network component to work with another.

Binding

A momentary decrease in voltage is known as a(n)_______.

Brownout

A computer's _______ is a circuit, or signaling pathway, used by the motherboard to transmit data to the computer's components, including its memory processos, hard disk, and NIC.

Bus

A WAN in which each site s directly connected to no more then two other sites in a serial fashion is known as a _______.

Bus topology WAN

A(n) _______ is a process or program that provides support personnel with a centralized means of documenting changes to the network.

Change management system

_______ refers to the soundness of a network's programs, data, services, devices, and connections.

Integrity

A(n) _______ is a message to the computer that instructs it to stop with its doing and pay attention to something else.

Interrupt request, IRQ

A network or part of a network that uses browser-based services to exchange information within an enterprise is know as a(n) _______.

Intranet

______ is a divice that handles electrical signals improperly, usually affecting the rest of the network?

Jabber

A(n) ______ is a smal, removable piece of plastic that contains a metal receptacle.

Jumper

The core of all UNIX-type systems is call the _______.

Kernel

What term discribes a network of computers and other divices that is confined to a arelatively small space, such as one building or even one office?

LAN

The term ____topology refers to the way in which data is transmitted between nodes, rather than the physical layout of the paths that data takes.

Logical

A ______ topology does not specify device types, connectivity methods, or addressing schemes for the network.

Physical

In UNIX, two or more commands connected by a pipe are called a(n) _______.

Pipeline

Protocols at the ______ layer accept Application layer data and format it so that one type of application and host can understand data from another type of application and host.

Presentation

A ______ is a routine of squential instructions that runs until it has achieved its goal.

Process

A ______ is a rule that governs how networks communicate.

Protocol

_____ ensure that data are transfered whole, in sequence, and without error from on node on the network to another.

Protocols

The term _______ refers to an implementation in which more then one component is installed and ready to use for storing, processing, or transporting data.

Redundancy

______ are any hosts on the Internet that need to look up domain name information.

Resolvers

The _______ tool is used to access consol commands through a Web browser on another computer on the network.

Rmeote Manager

In ____, a 3-byte packet, called a token, is transmitted from one node to another is a circular fashion around to the ring.

Token Passing

The ______ utility uses ICMP to trace the path from one networked node to another, identifying all intermediate hops between the two nodes.

Traceroute, tracert

______ in a standard interface used to connect multiple types of peripherals, including modems, mice, audio players, and NIC's.

USB

A(n) ______ is the creation of a communications channel for a transmission from an earth-based transmitter to an orbiting satellite.

Uplink

The distance between corresponding points on a wave's cycle is called its ______.

Wavelength

A(n) _______ is a computer installed with the appropriate software to supply Web pages to many different clients upon domand.

Web Server

The utility that allows you to querty the DNS registration database and obtain informatio about a domain name is called _______.

Whois

Trying a number of possible character combinations to find the key that will decrypt encrypted data is known as a _______.

brute force attack

In ______, a connection is established between two network nodes before they begin transmitting data.

circuit switching


Related study sets

IDSV Chap. 11 - Artificial Intelligence

View Set

CHAPTER 23 High Renaissance and Mannerism in Northern Europle and Spain

View Set

CompTIA Network+ Troubleshooting Network 1

View Set

PrepU: CH 29, 30, 31, 37 (Ricci Book-Developmental)

View Set

Complex Care Final Exam Practice Questions

View Set

NUR 221 - Ch 42 WB - patients with musculoskeletal trauma

View Set

Chapter 60: Assessment of Neurologic Function

View Set

SCIENCE!! Matter: Elements, Compounds, or Mixtures

View Set

A&P 1- Chapter 5: Check your understanding & end of chapter questions

View Set