Network+ Chapter 1
Generally, if the network supports fewer than __________ computers, a peer-to-peer network is the way to go.
15
____________ manages the process of allowing a user to sign on the the network from any computer on the network and get access to the resources that Active Directory allows.
AD DS
An __________ call is the method an application uses when it makes a request of the OS.
API
The centralized directory database that contains user account information and security for the entire group of computers is called _______________.
Active Directory
In the OSI model, the ______________ layer describes the interface between two applications, each on seperate computers.
Application
What are the four layers to the TCP/IP model?
Application, Transport, Internet, and Network Interface
_________ is a client-server application that transfers files between two computers. It does not provide encryption and is, therefore, not secure.
FTP
The primary protocol used by web servers and browsers (clients) is ___________________.
HTTP
Which set of protocols are used in the application layer of the OSI model?
HTTP, SMTP, POP3, IMAP4, FTP, Telnet, and RDP.
When HTTP is layered on top of SSL or TLS, the result is _____________.
HTTPS
The ____________ system controls the environment in a data center, including the temperature, humidity, air flow and air filtering.
HVAC
IP relies on several routing protocols to find the best route for a packet when traversing several networks on the way to its destination. These routing protocols include: ____________________.
ICMP and ARP
Using ___________, the client application manages the email stored on the server.
IMAP4
The principle protocol used by the Network layer is ___________.
IP
An __________________ is an address assigned to each node on a network, which the Network layer uses to uniquely identify them on the network.
IP address
What is step 1 of the troubleshooting process?
Identify the problem and its symptoms
What is step 5 of the troubleshooting process?
Implement the solution or escalate the problem
A ___________ is a network in which each node on the network can communicate directly with others on the network.
LAN
The ___________ address of a device is embedded on every network adapter on the globe.
MAC
A group of connected LANs in the same geographical area is known as a ___________ or ________________ .
MAN & CAN
A _____________ explains how to properly handle substances such as chemical solvents and how to dispose of them.
MSDS
A ______________ is installed in an expansion slot of a computer to provide physical network access.
NIC
In the OSI model, the ______________ layer is responsible for reformatting, compressing, and/or encrypting data in a way that the application on the receiving end can read it.
Presentation
When using voice and video, network administrators must pay attention to the __________________.
QoS
In Windows operating systems, ____________ provides a secure, encrypted transmission that allows a technician to access a remote computer from the technician's local computer.
RDP
The Session layer protocol that is specifically designed to transmit audio and video and that works in conjunction with VoIP is _______________.
RTP
A client uses __________ to send an email message to the first server.
SMTP
Linux uses the ________ protocol to "remote in", which creates a secure channel or tunnel between two computers.
SSH
Which protocols are use in conjunction with HTTP to provide secure transmission?
SSL & TLS
In the OSI model, the __________ layer describes how data between applications is synced and recovered if messages don't arrive intact at the receiving application.
Session
In the OSI model, the _____________ layer is responsible for transporting application layer payloads from one application to another.
Transport
_____________ refers to the centralized management of multiple network-based communications.
UC
Transport layer protocol, ___________ does not guarantee delivery by first connecting and checking whether data is received.
UDP
What are the advantages of client-server networks?
User accounts and passwords are assigned at one place; central control of resource access management; problems can be monitored, diagnosed, and fixed from one location; and the network is more scalable.
A ________________ application, such as Skype or Google Talk, allows people to communicate in video and voice, primarily using the point-to-point model.
VTC
What is step 6 of the troubleshooting process?
Verify functionality and implement protective measures
__________ allows two or more people to have voice conversations over a network.
VoIP
A group of LANs that spread over a wide geographical area is called a ______________.
WAN
A ___________ is a central conduit that connects the segments of a network and is sometimes referred to as "a network of networks."
backbone
__________________, means the amount of traffic, or data transmission activity, on the network.
bandwidth
A __________ topology is when several devices are daisy-chained together.
bus
A _______________ failure destroys the equipment beyond use.
catastrophic
In the _____________ network model, resources are managed by the NOS via a centralized directory database.
client-server
A ____________ application involves two computers. The first requests data or a a service from the second.
client-server application
TCP is considered a ___________________ protocol.
connection-oriented
UDP is considered a ____________ or _______________ protocol.
connectionless & best-effort
Using the same network to deliver multiple types of communication services, such as video, voice, and fax, is known as ______________.
convergence
If a message is too large to transport on a network, UDP divides it into a smaller message called a ______________.
datagram
Removing a header and trailer from a layer below is called ___________.
decapsulation
Voice and video transmissions are _______________, meaning you don't want to hear breaks in your conversation or see a buffering message when you watch a movie over the internet.
delay-sensitive
The ______________ is the device that marks where a telecommunications service provider's network ends and the organization's network begins.
demarcation point
When Windows Server control network access to a group of computers, this logical group is called a Windows __________.
domain
A __________________ typically generates a loud noise and flashing lights.
emergency alert system
The process of adding a header to the data inherited from the layer above is called _____________.
encapsulation
A system that denies access during failure is said to be a ____________ system.
fail close
A system that allows access during failure is said to be a __________ system.
fail open
A computer that provides file services is called a __________, and serves up data to users, in contrast to users keeping copies of the data at their workstations.
file server
The term ____________ refers to a server's ability to share data and disk storage space.
file services
If the Network layer is aware that a packet is larger than the maximum size for its network, it will divide the packet into smaller packets in a process called ___________.
fragmentation
The entire Link layer message is called a ________.
frame
When using Windows Server, each user on the network has his own domain-level account called a ___________, which is assigned by the network administrator and is kept in Active Directory.
global account
__________ means that a device is connected directly to the earth, so that, in the event of a short, the electricity flows into the earth rather than out of control through the device and back to the power station.
grounding
The Transport protocols add their own control information in an area at the beginning of the payload called the __________ to create a message ready to be transmitted to the Network layer.
header
A _________ is any computer on a network that hosts a resource such as an application or data.
host
A topology that combines different topologies is known as a ____________ topology.
hybrid
If all computers in a peer-to-peer network are running a Windows OS, each computer has a Windows ____________ that works only on that one computer.
local account
_______________ has to do with software and describes how access to the network is controlled, including how users and programs initially gain access to the network and how specific resources, such as applications and databases, are shared on the network.
logical topology
Voice and video transmissions are considered ______________, meaning occasional loss of data can be tolerated.
loss tolerant
When you are watching a live sports event on your computer, the application is using a client-server model with one server and many clients, called a ____________________.
multicast distribution
A ______________ is a group of computers and other devices (such as printers) that are connected by some type of transmission media
network
A ___________ is any computer or device on a network that can be addressed.
node
What are the disadvantages of a peer-to-peer network?
not scalable, not necessarily secure, and are not practical for connecting more than a few computers.
A _______________ is embedded in a computer's motherboard, such as a laptop, to provide physical network access.
onboard network port
Controlling how users and programs get access to the resources on a network is a function of the ______________ used on the network.
operating systems
IP adds its own Network layer header to the segment or datagram, and the entire Network layer message is now called a ___________.
packet
Data that is passed between applications or utility programs and the operating system is called a ___________ and includes control information.
payload
__________________ mostly applies to hardware and describes how computers, other devices, and cables fit together to form the physical network.
physical topology
The space above the ceiling or below the floor in a data center is referred to as the ____________.
plenum
Computers engaged in a conference call would use a _____________ model, which involves one transmitter and multiple receivers.
point-to-multipoint
For conversational voice, VoIP applications, such as Skype and Google Talk, use a ___________________ model rather than a client-server model, which means that each computer involved is independent of the other computers.
point-to-point
The Transport layer header addresses the receiving application by a number called a _____________ number.
port
Using ____________ to share printers across a network saves time and money.
print services
Networked devices use methods or rules known as ____________.
protocols
A _____________ is an application that us installed and executed on a server and is presented to a user working at a client computer.
remote application
In a _________ topology, several nodes are connected together with each node connecting to only its two neighbor nodes.
ring
A ___________ is a device that manages traffic between two or more networks and can help find the best path for traffic to get from one network to another.
router
__________ means as a network grows larger, adding or changing significant elements of the network is possible.
scalable
If a message is too large to transport on a network, TCP divides it into smaller messages called ____________.
segments
A ______________ topology is when all devices connect to one central device.
star
When a switch in a bus topology is connected as a central device on another topology it is referred to as a ____________ topology.
star-bus
A _____________ receives incoming data from one of its ports and redirects it to another port or multiple ports that will send the data to its intended destination(s).
switch
A ___________ describes how the ports of a whole work together.
topology
The Link layer puts its own control information in a Link layer header and also attaches control information to the end of the packet in a ___________.
trailer
An ______________ failure can shorten the life of a component and/or cause intermittent errors.
upset
Electrical fires require a Class _______ fire extinguisher
C
What is step 4 of the troubleshooting process?
Establish a plan for resolving the problem
What is step 2 of the troubleshooting process?
Establish a theory of probable cause
In the OSI model, the _____________ layer is responsible for directing the packet based on source and destination MAC addresses.
Data Link
The Network Operating System is responsible for: _______________.
Data and resource management, user authorization controls, file management, access controls, dictating which rule computers will uses to communicate, and supplying applications and data files to clients.
What is step 7 of the troubleshooting process?
Document findings, actions, and outcomes
Sensitive electronic components can be damaged by __________, an electric charge at rest.
ESD
In the OSI model, the __________ layer is responsible for moving messages from one node to another until they reach the destination host based on IP address.
Network
The ____________ model is a seven-layer model developed to categorize the layers of network communication.
OSI
Using a ___________________ network model, the operating system of each computer on the network us responsible for controlling access to its resources without centralized control.
P2P
The smallest network is a ___________, which is a network of personal devices, such as the network you use when you sync your cell phone and your computer.
PAN
What is the technical name for a group of bits as it moves from one layer to the next and one LAN to the next?
PDU
Using ___________, email is downloaded to the client computer.
POP3
The mail server delivers the message to the receiving client using one of two protocols: __________ or ____________.
POP3 & IMAP4
In the OSI model, the ___________ layer is the simplest layer of all and is only responsible for sending bits via a wired or wireless transmitter.
Physical
What are the advantages of a peer-to-peer network?
Simple to configure and less expensive to set up and maintain.
Transport layer protocol, ___________ makes a connection with the end host, checks whether the data is received, and resends it if it is not.
TCP
The two primary protocols used by networks to communicate are ____________ and ____________.
TCP & IP
The two main transport layer protocols are _________, which guarantees delivery, and ________, which does not.
TCP & UDP
The suite for all the protocols an OS uses for communication on a network is the ___________ suite of protocols.
TCP/IP
The __________ protocol is used by the __________ client-server command-line application to allow an administrator to "remote in" or control a computer remotely. These transmissions are not encrypted.
Telnet
What is step 3 of the troubleshooting process?
Test your theory to determine the cause