A___ is a group of computers and other devices that are connected by some type of transmission media.
Which of the following terms describes a network of computers and other devices that is confirmed to a relatively small space, such as one building or even one office?
___ ensure that data are transferred whole, in sequence, and without error from one node on the network to another.
A(n)___ is a computer installed with the appropriate software to supply Web pages to many different clients upon demand.
The term ___ refers to those skills that are not easily measurable, such as customer relations, oral and written communications, dependability, teamwork, and leadership abilities.
___ refers to the capability of a server to share data files, applications, and disk storage space.
___ are documented agreements containing technical specifications or other precise criteria that stipulate how a particular product or service should be designed or performed.
Protocols at the ___ layer accept Application layer data and format it so that one type of application and host can understand data from another type of application and host.
___ is a networking technology originally developed at Xerox in the early 1970s and improved by Digital Equipment Corporation, Intel, and Xerox.
___ is a method of identifying segments that belong to the same group of subdivided data.
___ protocols ensure that data arrives exactly as it was sent by establishing a connection with another node before they begin transmitting data.
Transport layer protocols break large data units received from the Session layer into multiple smaller units called ___
The most common way to measure latency on data networks is by calculating a packet's ____
round trip time
A(n) ___ issues and receives wireless signals with equal strength and clarity in all directions.
A(n) ___ is a device that accpets wireless signals from multiple nodes and retransmits them to the rest of the network.
___ is a term used by network professionals to describe the non-data information that must accompany data in order for a signal to be properly routed and interpreted by the network.
___occurs when a signal traveling on one wire or cable infringes on the signal traveling over an adjacent wire or cable.
____ is the capacity for a component or system to continue functioning despite damage or partial malfunction.
___ is a Network layer protocol that obtains the MAC address of a host, or node, then creates a database that maps the MAC address to the host's IP address.
Address Resolution Protocol
___ contain databases of associated names and IP addresses and provide this information to resolvers on request.
The ___ provides a means of resolving NetBIOS names to IP addresses.
Windows Internet Naming Service
A(n) ___ is a special 32-bit number that, when combined with a device's IP address, informs the rest of the network about the segment or network to which it is attached.
___ is a terminal emulation protocol used to log on to remote hosts using the TCP/IP protocol suite.
The ___ is a simple Application layer protocol used to synchronize the clocks of computers on a network.
Network Time Protocol, NTP
___ are connectivity devices that enable a workstation, server, printer, or other node to receive and transmit data over the network media.
Network interface cards
A computer's ___ is the circuit, or signaling pathway, used by the motherboard to transmit data to the computer's components, including its memory, processor, hard disk, and NIC
___ is a standard interface used to connect multiple types of peripherals, including modems, mice, audio players, and NICs.
___ are physically designed to be linked with other hubs in a single telecommunications closet.
A(n) is a message to the computer that instructs it to stop what it is doing and pay attention to something else.
interrupt request, IRQ
The ___ indicates, in hexadecimal notation, the area of memory that the NIC and CPU will use for exchangin, or buffering, data.
A(n) ___ is a logically or physically distinct Ethernet network segment on which all participating devices must detect and accomodate data collisions.
A ___ topology does not specify device types, connectivity methods, or addressing schemes for the network.
A ___ topology refers to the way in which data is transmitted between nodes, rather than the physical layout of the paths that data takes.
In ___, a connection is established between two network nodes before they begin transmitting data.
___ is a network technology whose standards were originally specified by ANSI in the mid-1980s and later refined by ISO.
___ is an ITU networking standard describing Data Link layer protocols for both network access and signal multiplexing.
Asynchronous Transfer Mode
A network's ___ is it's method of controlling how network nodes access the communications channel.
___ enables multiple nodes to simultaneously transmit and receive data over different logical network segments.
In ___, a 3-byte packet, called a token, is transmitted from one node to another in a circular fashion around the ring.
A WAN in a which each site is directly connected to no more than two other sites in a serial fashion is known as a ___
bus topology WAN
A(n) ___ is a network that traverse some distance and usually connects LANS, whether across the city or across the nation.
Wide Area Network, WAN
A(n) ___ converts digital signals into analog signals for use with ISDN phones and other analog devices
terminal adapter, TA
A(n) ___ is the creation of communications channel for a transmission from an earth-based transmitter to an orbiting satellite.
To better organized and manage objects, a network administrator places objects in ___
___ is the ability of a processor to perform many different operations in a very brief period of time.
___ is the original PC file system that was designed in the 1970s to support floppy disks and, later, hard disks.
___ involves associating a letter, such as M: or T:, with a disk, directory, or other resource.
The ___ account is a predefined user account that has the most extensive priviliges for resources both on the computer and on the domain that it controls.
The ___ lists all computer components proverb to be compatible with Windows Server 2003.
Hardware Compatibility List, HCL
The relationship between two domains in which one allows the other to authenticate its users is known as a(n) ___
On a Linux or Solaris system, the ___ command creates a new group ID and makes the group available for use.
Any modern client running the TCP/IP protocol suite will be capable of connecting to a UNIX-type of host via ___
A(n) ___ is a file that contains instructions for performing a specific task, such as reading data from and writing data to a hard drive.
The ___ tool is used to access console commands through a Web browser on another computer on the network
___ is a simple subprotocol, incapable of doing anything more than transporting mail or holding it in a queue.
The ___ utility displays TCP/IP statistics and details about TCP/IP components and connections on a hostl.
On networks that run NetBIOS over TCP/IP, the ___ utility can provide information about NetBIOS statistics and resolve NetBIOS names to their IP addresses
To calculate a host's network ID given it's IP address and subnet mask, you follow a logical process of combining bits known as ___
A network or part of a network that uses browser-based services to exchange information within an enterprise is known as a(n) ____
The utility that allows you to query the DNS registration database and obtain information about a domain name is called ___
The ___ utility uses ICMP to trace the path from one networked node to another identifying all intermediate hops between the two nodes.
On Unix-type systems, the ___ utility allows you to modify TCP/IP settings for a network interface, release and renew DHCP-assigned addresses, or simply check the status of your machine's TCP/IP settings.
___ is a software-based tool that continually monitors networks traffic from a server or workstation attached to the network.
Which of the following is a device that handle electrical signals improperly, usually affecting the rest of the network?
A ___ is a process or program that provides support personnel with a centralized means of documenting changes to the network.
change management system
A(n) ___ is a process or program that provides support personnel with a centralized means of documenting changes to the network.
change management system
A(n) ___ cable is useful for quickly and easily verifying that a node's NIC is transmitting and receiving signals properly.
___ refers to the soundness of a network's programs, data, services, devices, and connections.
The term ___ refers to an implementation in which more than one component is installed and ready to use for storing, processing, or transporting data.
Which of the following terms implies a fluctuation in voltage levels caused by other devices on the network or electromagnetic interference?
___ is a specialized storage device or group of storage devices that provides centralized fault-tolerant data storage for a network.
Network attached storage
A ___ is a place where the computers, devices, and connectivity necessary to rebuild a network exist, but they are not appropriately configured, updated or connected.
___ viruses propagate themselves via network protocols, commands, messaging programs, and data links
The term ___ refers to identical components that can be changed while a machine is still running.
___ is a fault-tolerance technique that links multiple servers together to act as a single server.
Which of the following terms refers to a thorough examination of each aspect of a network to determine how it might be compromised?
The use of an algorithm to scramble data into a format that can be read only by reversing the algorithm is known as ___
Trying a number of possible character combinations to find the key will decrypt encrypted data is known as a ___
brute force attack
A ___ is a password-protected and encrypted file that holds an individual's identification information, including a public key.
___ occurs when a hacker forges name server records to falsify his host's identity.