Networking Final Exam

Ace your homework & exams now with Quizwiz!

A ____________ is used to make connections between the network interface card and the other vital components of the computer, such as the central processing unit.

bus

basic disk

can be divided in up to four primary partitions

primary partition

can be made the active partition

dynamic disk

can be used to create a RAID

extended partition

can only be divided into logical drives

trunk port

configured to carry VLAN traffic

________ is a cell-based packet-switching technology in which the cells are of a fixed length rather than typical packet-based systems that use variable length packets.

ATM

smart jack

a type of connector for terminating a T1 line that provides diagnostic testing for troubleshooting the connection

What is the difference between a standby UPS and an online UPS?

1) A standby UPS acts as a pass through; it does not actually power the equipment attached to it with its battery until a power failure occurs. When a power failure occurs, a standby UPS quickly switches to battery power. 2) An online UPS continually powers devices from its battery so that if a power failure occurs, there is no delay in switching to battery power.

Briefly describe the three types of switching methods.

1) Cut-through switching is the fastest; it reads the destination MAC address and sends the frame out. 2)Store-and-forward switching is the slowest; it stores the entire message and then sends it to the correct port. 3)Fragment-free switching is the middle man; it reads enough to make sure the packet is not fragmented and then sends it out.

Compare and contrast hosted virtualization versus bare-metal virtualization.

1) Hosted virtualization uses a type 2 hypervisor in which the host OS accesses host hardware on behalf of the guest OS. It's used mostly for desktop virtualization solutions. 2) Bare-metal virtualization is used mainly for server virtualization in data centers and uses a type 1 hypervisor.

What are the three ways that a router can populate its routing table?

1) It knows about networks that are directly connected to it. 2) A static route can be manually entered. 3) The router can be configured to use a routing protocol, and routes will be entered dynamically.

Briefly describe three of the seven elements of a network security policy.

1) Privacy policy—Describes what staff, customers, and business partners can expect for monitoring and reporting network use. 2) Acceptable use policy—Explains for what purposes network resources can be used. 3) Authentication policy—Describes how users identify themselves to gain access to network resources. Logon names, password conventions, and authentication methods should be described. 4) Access policy—Specifies how and when users are allowed to access network resources. Policies should exist for both onsite and remote access to the network. 5) Auditing policy—Explains the manner in which security compliance or violations can be verified and the consequences for violations. 6) Data protection—Outlines the policies for backup procedures, virus protection, and disaster recovery. 7) Internet use policy—Explains what constitutes proper or improper use of Internet resources.

What is a DCE, and what does it do?

A DCE (Data Circuit-terminating Equipment) device is responsible for making the connection between the local loop and the customer premise equipment, usually a data terminal equipment (DTE) device such as a router. The DCE is typically a modem or CSU/DSU, especially when dealing with DSL and cable technologies in home environments.

How does RAID 5 work?

A RAID 5 requires three disks. Data is written across the disks in a stripe, with one disk being used for parity. The parity information is a mathematical calculation that represents the data that was just written to the disks. If one of the disks is lost, the data can be rebuilt using the existing data and the parity information. The parity information is distributed among all disks in the array so that no single disk holds all the parity information.

Describe a cold site.

A cold site is a physical location that houses the hardware needed to get IT functioning again. It includes servers, routers, and switches, plus the media to make all the connections. However, the devices aren't usually configured, and data must be restored from off-site backup before operations can start.

What is the difference between the way that a distance-vector routing protocol and a link-state routing protocol update their networks?

A distance-vector routing protocol sends out information about the network's status to all of its neighbors on a set schedule. A link-state protocol only sends out information to its neighbors when there is a change in the status.

What is a hypervisor?

A hypervisor is the component that creates the hardware environment of a virtual machine. It allows several virtual machines to run at the same time and acts as a manager for them.

What is a network security policy?

A network security policy defines the rules that apply to all users accessing the network. It includes how they are given access, what they can do once they have access, and what will happen if they don't follow the rules.

What is a server cluster? What are the two most common types?

A server cluster is a group of servers that appear to the user as a single server. The two most common types are a fail-over cluster and a load-balancing cluster.

What is the key difference between a user account created in Active Directory and a user account created in a Windows client OS?

A user account created in a client OS is meant to log on to the local machine only. A user account created in Active Directory has the ability to log on to any computer that is a member of the domain.

Describe a warm site.

A warm site is a location containing all the infrastructure needed for operations to continue, and it's mostly configured and ready to run on short notice. With a warm site, OSs are installed and largely up to date, and routers and switches are configured and connected. You just need to make some finishing touches to configurations and load the most current data from backup, and you're ready to go.

The ____________ layer of the TCP/IP model combines the top three layers of the OSI model into one layer.

Application

Application layer

Computers operate at this layer.

What is encoding, and where does it take place?

Encoding is a process performed by the Physical layer that takes the frame from the Data Link layer and changes it into 1s and 0s to be transmitted onto the medium. The type of signal that it is changed into is dependent on the type of media.

Physical layer

Hubs operate at this layer.

_____________ procedures for all data that can't be reproduced easily should be in place, and a disaster recovery procedure must be devised and carried out.

Emerncy

What are the complexity requirements for a Windows password? List the four characteristics.

For a password to be complex, it must contain three of the four characteristics. The four characteristics are uppercase letters, lowercase letters, numerals, and special characters.

What are the benefits to using a layered approach?

In a layered approach, each layer is only responsible for a specific task instead of the end-to-end communication. Therefore, when a problem occurs, it is easier to pinpoint the layer that is affected and then troubleshoot only that issue. In addition, by using a layered approach, upgrades in technology can be to individual layers without affecting the others.

What does "802" refer to in the IEEE 802 standard?

It is the project name that was given to the standard that defines all physical elements of networking communications. It represents the year and the month that the project began—February of 1980.

How do you map a shared folder using the command prompt? Provide an example of mapping a drive letter H: to a share named myshare on a server named myserver.

Open a command prompt and enter the command: net use, followed by a space and then the drive letter that you want to map it to, followed by a colon. Add another space and then enter the UNC path of the share to be mapped. For example: net use H: \\myserver\myshare

Network layer

Routers operate at this layer.

Media Access Control sublayer

Sublayer manages access to the physical medium.

What is the difference between the two types of virtual circuits?

Switched virtual circuits are established when needed and then terminated when finished, while permanent virtual circuits create pathways that exist even when not in use.

Data Link layer

Switches operate at this layer.

What does the Spanning Tree Protocol do?

The Spanning Tree Protocol is used to detect whether there is a possibility of a switching loop caused by redundant paths. If a loop is possible, it places one of the ports in blocking mode to prevent it.

What are the sublayers of the Data Link layer, and what do they do?

The first layer is the Logical Link Control sublayer, and it is responsible for handling some kinds of error recovery and flow control. The second layer is the Media Access Control sublayer, and it is responsible for providing the MAC address. It also controls the way in which a device will access the network.

The Transport layer PDU includes a field for window size. What is the "window size"?

The window size is a negotiated amount between the transmitting and receiving devices that sets the amount of data that can be transferred before an acknowledgement must be sent and received.

Session layer

This handles communication setup and teardown.

OSI reference model

This is the general framework for how networking systems should operate.

Presentation layer

This layer handles data formatting and translation.

Logical Link Control sublayer

This sublayer is responsible for some error recovery.

Transport layer

This uses port numbers as source and destination identifiers

Describe the trial-and-error method of troubleshooting and when it should and shouldn't be used.

Trial-and-error approaches involve assessment of the issue, followed by making an educated guess as to the cause and then applying a solution. This method is particularly risky in high-availability environments and generally should only be used on test systems or systems without critical data. The method also is acceptable when changes can be undone quickly and easily.

Explain how V.92 modems achieve 56 Kbps over traditional phone lines.

V.92 achieves 56 Kbps by skipping the modulation of analog data to digital data as it's received from the Telco. By using a technique called pulse code modulation, it then digitizes analog signals, which reduces the noise introduced in the signal and allows for more bits per second when transferring data.

What is live migration with respect to OS virtualization?

Virtual machines can be migrated to new hardware while they're running for performance or reliability improvements with practically no downtime. Live migration features also ensure VM fault tolerance in clustered server environments.

frame relay

WAN communications over a fast, reliable, digital packet-switching network

What is the System Idle process, and what does its value mean?

When the operating system is not busy, the kernel schedules the System Idle process with the CPU time. Therefore, a high value for the system idle process would mean that the CPU is not busy. A low value would mean that the CPU is busy with other processes.

maintenance window

a time set aside for schedule updates, upgrades, and other network maintenance procedures

In the first step of the troubleshooting process, how should you determine the scope of a problem?

You should establish who is affected by the problem by gathering information. Check to see whether there is anyone not affected by the issue, whether the problem exists only in one building, or just one application. If the issue occurs on only a few machines, then the issue is most likely configuration related and specific to those machines.

If you store mainly large files on a disk, should you use a smaller cluster size or larger cluster size? Why?

You should use a larger cluster size. If you store mostly large files on the disk, a larger cluster size usually results in better performance because fewer read/write operations need to be performed. In addition, smaller cluster sizes can lead to a fragmented disk, in which files are spread out all over the disk instead of being stored in consecutive locations. Fragmentation causes many more disk seek operations, which slows file access.

bare metal restore backup

a backup designed to allow restoring the system disk directly from backup media without having to install the OS and backup software first

hot site

a business continuity option in which a physical location has all the infrastructure in place and configured, and data is synchronized and up to date

SaaS

a category of cloud computing in which a customer pays for the use of applications that run on a service provider's network

NAS

a dedicated server device designed solely for providing shared storage for network users

modem

a device computers use to convert digital signals to analog signals

load balancer

a device that distributes traffic for a network service to multiple servers that can provide that service

Committed Information Rate (CIR)

a guaranteed minimum transmission rate offered by the service provider

SAN

a high-speed network storage solution for replacing locally attached drives on servers

Synchronous Optical Network (SONET)

a high-speed, baseband digital networking standard that specifies incrementally increasing data rates across fiber-optic links.

virtual circuit

a logical sequence of connections with bandwidth allocated for a specific transmission pathway

process

a program that is loaded into memory

point-to-point protocol

a remote access protocol that supports many protocols and is used to carry data over a variety of network connections

Removal of ______________ is very difficult because they alter system files and drivers the system depends on to run.

a rootkit

escalation

a step in the troubleshooting process in which the technician must call in additional people

How the network resources are to be used should be clearly defined in a (an) ____________ policy.

acceptable use

rights

action that a user can perform on a computer

fragment-free switching

damaged frames do not get forwarded

local profile

defines a user's environment

Spanning Tree Protocol

designed to stop switching loop

change management

documenting and managing network changes, including IP addressing and moving devices

incremental backup

does mark files as backed up

daily backup

doesn't mark files as backed up

store-and-forward switching

entire frame is read before forwarding it to the destination port

virtual disk

files stored on the host computer that represent a virtual machine's hard disk

A router's final task when handling a packet is to send the packet on to its next and possibly final destination; this is referred to as packet ____________.

forwarding

cut-through switching

frame is sent to the destination port immediately after reading the destination and source MAC address

A ___________ site can be running at a moment's notice if necessary.

hot

authentication

identifying who has access to network

rollback plan

instructions on how to undo the upgrade if problems occur during or after the upgrade

tone generator

issues an electrical signal on a wire, and a probe detects the signal

time-domain reflectometer (TDR)

measures the total cable length

A __________ is a device that allows a computer, which works with digital information, to communicate over lines that use analog signals.

modem

snapshot

partial copy of a virtual machine

system partition

partition that contains the boot loader

uninterruptible power supply

power device that provides fault tolerance through battery backup

service

runs in the background

distance-vector protocol

sends entire routing table to all routers at a scheduled time

link-state protocol

sends status to all routers whenever there is a change

thread

smallest unit of software that can be scheduled

packet shaper

software that runs on internetwork devices and prioritizes packets

Data Terminal Equipment (DTE)

the device that passes data from the customer LAN to the DCE, usually a router.

Data Circuit-terminating Equipment (DCE)

the device that sends data to (and receives data from) the local loop, usually a CSU/DSU or modem

authorization

the process of granting or denying access to a user

EGP

the routing protocol is used to exchange routing information between autonomous systems

IGP

the routing protocol is used to exchange routing information within an autonomous system.

multiprocessing

two or more threads being executed simultaneously

To eliminate the potential problems caused by power fluctuations, especially on servers, you can install _________________

uninterruptible power supplies

metric

value that tells routers the best path to the destination network


Related study sets

Chapter 14: Nursing Care of the Normal Newborn Prep- U Maternal

View Set

Medical terminology ch.10 suffix

View Set

Tax Accounting Chapter 21 "Partnerships"

View Set

MUSICAL THEATRE FINAL EXAM - TODAY'S BROADWAY

View Set

MGEC61 Chapter 16: Price Levels and Exchange Rates in the Long Run Summary

View Set

System Analysis and Design Chapter 01 (Objectives)

View Set

IM/GI → Cholecystitis, Cholangitis, Pancreatitis, PUD, mesenteric ischemia, re-feeding syndrome, Gastric cancer,

View Set