IT2-01

Created by zultie 

Upgrade to
remove ads

109 terms · Network + 2005 In Depth

A___ is a group of computers and other devices that are connected by some type of transmission media.

Network

In a ___ network, every computer can communicate directly with any other computer.

peer-to-peer

Which of the following terms describes a network of computers and other devices that is confirmed to a relatively small space, such as one building or even one office?

LAN

The ___ is the main circuit that controls the computer.

Motherboard

___ ensure that data are transferred whole, in sequence, and without error from one node on the network to another.

Protocols

___ coordinate the storage and transfer of e-mail between users on a network.

Mail services

A(n)___ is a computer installed with the appropriate software to supply Web pages to many different clients upon demand.

Web server

The term ___ refers to those skills that are not easily measurable, such as customer relations, oral and written communications, dependability, teamwork, and leadership abilities.

soft skills

___ refers to the capability of a server to share data files, applications, and disk storage space.

File services

___ are documented agreements containing technical specifications or other precise criteria that stipulate how a particular product or service should be designed or performed.

Standards

Protocols at the ___ layer accept Application layer data and format it so that one type of application and host can understand data from another type of application and host.

Presentation

___ is a networking technology originally developed at Xerox in the early 1970s and improved by Digital Equipment Corporation, Intel, and Xerox.

Ethernet

___ is a method of identifying segments that belong to the same group of subdivided data.

Sequencing

___ protocols ensure that data arrives exactly as it was sent by establishing a connection with another node before they begin transmitting data.

Connection-oriented

Transport layer protocols break large data units received from the Session layer into multiple smaller units called ___

Segments

Network layer addresses are also called ___

virtual addresses

The ___ is the lowest, or first, layer of the OSI model.

physical layer

___ layer services manage data encryption and decryption.

Presentation

A wave's ___ is a measuer of it's strength at any given point in time.

Amplitude

A(n)___ is a distinct communication path betweens nodes.

Channel

The most common way to measure latency on data networks is by calculating a packet's ____

round trip time

A(n) ___ issues and receives wireless signals with equal strength and clarity in all directions.

omni-directional antenna

A(n) ___ is a device that accpets wireless signals from multiple nodes and retransmits them to the rest of the network.

access point

The distance between corresponding points on a wave cycle is called its ___

Wavelength

___ is a term used by network professionals to describe the non-data information that must accompany data in order for a signal to be properly routed and interpreted by the network.

Overhead

___occurs when a signal traveling on one wire or cable infringes on the signal traveling over an adjacent wire or cable.

Crosstalk

____ is the capacity for a component or system to continue functioning despite damage or partial malfunction.

Fault tolerance

A ___ is a rule that governs how networks communicate.

Protocol

___ is a Network layer protocol that obtains the MAC address of a host, or node, then creates a database that maps the MAC address to the host's IP address.

Address Resolution Protocol

___ contain databases of associated names and IP addresses and provide this information to resolvers on request.

Name servers

The ___ provides a means of resolving NetBIOS names to IP addresses.

Windows Internet Naming Service

___ is the process of assigning one network component to work with another.

Binding

___ allows one device to send data to a specific group of devices.

Multicasting

A(n) ___ is a special 32-bit number that, when combined with a device's IP address, informs the rest of the network about the segment or network to which it is attached.

subnet mask

___ are any hosts on the Internet that need to look up domain name information.

Resolvers

___ is a terminal emulation protocol used to log on to remote hosts using the TCP/IP protocol suite.

Telnet

The ___ is a simple Application layer protocol used to synchronize the clocks of computers on a network.

Network Time Protocol, NTP

___ are connectivity devices that enable a workstation, server, printer, or other node to receive and transmit data over the network media.

Network interface cards

A computer's ___ is the circuit, or signaling pathway, used by the motherboard to transmit data to the computer's components, including its memory, processor, hard disk, and NIC

Bus

___ is a standard interface used to connect multiple types of peripherals, including modems, mice, audio players, and NICs.

USB

___ are physically designed to be linked with other hubs in a single telecommunications closet.

Stackable hubs

___ are connectivity devices that subdivide a network into smaller logical pieces.

Switches

A(n) ___ is a small, removable piece of plastics that contains a metal receptacle.

Jumper

A(n) is a message to the computer that instructs it to stop what it is doing and pay attention to something else.

interrupt request, IRQ

The ___ indicates, in hexadecimal notation, the area of memory that the NIC and CPU will use for exchangin, or buffering, data.

memory range

A(n) ___ is a logically or physically distinct Ethernet network segment on which all participating devices must detect and accomodate data collisions.

collision domain

A ___ topology does not specify device types, connectivity methods, or addressing schemes for the network.

Physical

A ___ topology refers to the way in which data is transmitted between nodes, rather than the physical layout of the paths that data takes.

Logical

In ___, a connection is established between two network nodes before they begin transmitting data.

circuit switching

___ is a network technology whose standards were originally specified by ANSI in the mid-1980s and later refined by ISO.

FDDI

___ is an ITU networking standard describing Data Link layer protocols for both network access and signal multiplexing.

Asynchronous Transfer Mode

A network's ___ is it's method of controlling how network nodes access the communications channel.

access method

___ enables multiple nodes to simultaneously transmit and receive data over different logical network segments.

Switched Ethernet

In ___, a 3-byte packet, called a token, is transmitted from one node to another in a circular fashion around the ring.

token passing

A WAN in a which each site is directly connected to no more than two other sites in a serial fashion is known as a ___

bus topology WAN

___ is an updated, digital version of X.25 that relies on packet switching.

Frame Relay

A ___ modulates outgoing signals and demodulates incoming signals.

DSL modem

A(n) ___ is a network that traverse some distance and usually connects LANS, whether across the city or across the nation.

Wide Area Network, WAN

A(n) ___ converts digital signals into analog signals for use with ISDN phones and other analog devices

terminal adapter, TA

A(n) ___ is the creation of communications channel for a transmission from an earth-based transmitter to an orbiting satellite.

Uplink

To better organized and manage objects, a network administrator places objects in ___

organizational units

___ is the ability of a processor to perform many different operations in a very brief period of time.

Multitasking

A ___ is a routine of sequential instructions that runs until it has achieved its goal.

Process

___ is the original PC file system that was designed in the 1970s to support floppy disks and, later, hard disks.

FAT

___ involves associating a letter, such as M: or T:, with a disk, directory, or other resource.

Mapping

The ___ account is a predefined user account that has the most extensive priviliges for resources both on the computer and on the domain that it controls.

Administrator

The ___ lists all computer components proverb to be compatible with Windows Server 2003.

Hardware Compatibility List, HCL

The relationship between two domains in which one allows the other to authenticate its users is known as a(n) ___

trust relationship

On a Linux or Solaris system, the ___ command creates a new group ID and makes the group available for use.

Groupadd

Any modern client running the TCP/IP protocol suite will be capable of connecting to a UNIX-type of host via ___

Telnet

____ is equivalent to using wildcards in Windows and DOS.

File globbing

Every UNIX-type system contains full documentation of UNIX commands in the ___

manual pages

The core of all UNIX-type systems is called the ___

Kernel

A(n) ___ is a file that contains instructions for performing a specific task, such as reading data from and writing data to a hard drive.

kernel module

In UNIX, two or more commands connected by a pipe are called a(n) ___

Pipeline

The ___ tool is used to access console commands through a Web browser on another computer on the network

Remote Manager

A(n) ___ consists of the objects, classes, and properties a network typically needs.

base schema

___ seperates a network into muliple logically defined segments.

Subnetting

A(n) ___ facilities communication between different networks or subnets.

Gateway

___ is a simple subprotocol, incapable of doing anything more than transporting mail or holding it in a queue.

SMTP

The ___ utility displays TCP/IP statistics and details about TCP/IP components and connections on a hostl.

Netstat

On networks that run NetBIOS over TCP/IP, the ___ utility can provide information about NetBIOS statistics and resolve NetBIOS names to their IP addresses

Nbstat

To calculate a host's network ID given it's IP address and subnet mask, you follow a logical process of combining bits known as ___

ANDing

A network or part of a network that uses browser-based services to exchange information within an enterprise is known as a(n) ____

Intranet

The utility that allows you to query the DNS registration database and obtain information about a domain name is called ___

Whois

The ___ utility uses ICMP to trace the path from one networked node to another identifying all intermediate hops between the two nodes.

traceroute, tracert

On Unix-type systems, the ___ utility allows you to modify TCP/IP settings for a network interface, release and renew DHCP-assigned addresses, or simply check the status of your machine's TCP/IP settings.

Ifconfig

___ is a software-based tool that continually monitors networks traffic from a server or workstation attached to the network.

network monitor

A ___ is a record of how the network operates under normal conditions.

Baseline

Which of the following is a device that handle electrical signals improperly, usually affecting the rest of the network?

Jabber

A ___ is a process or program that provides support personnel with a centralized means of documenting changes to the network.

change management system

A(n) ___ is a process or program that provides support personnel with a centralized means of documenting changes to the network.

change management system

A(n) ___ cable is useful for quickly and easily verifying that a node's NIC is transmitting and receiving signals properly.

Crossover

Resistance is measured in ___

Ohms

___ refers to the soundness of a network's programs, data, services, devices, and connections.

Integrity

The term ___ refers to an implementation in which more than one component is installed and ready to use for storing, processing, or transporting data.

Redundancy

Which of the following terms implies a fluctuation in voltage levels caused by other devices on the network or electromagnetic interference?

Noise

___ is a specialized storage device or group of storage devices that provides centralized fault-tolerant data storage for a network.

Network attached storage

A ___ is a place where the computers, devices, and connectivity necessary to rebuild a network exist, but they are not appropriately configured, updated or connected.

cold site

___ viruses propagate themselves via network protocols, commands, messaging programs, and data links

Network

A momentary decrease in voltage is known as a(n)

Brownout

The term ___ refers to identical components that can be changed while a machine is still running.

hot swappable

___ is a fault-tolerance technique that links multiple servers together to act as a single server.

Clustering

Which of the following terms refers to a thorough examination of each aspect of a network to determine how it might be compromised?

Security audit

The use of an algorithm to scramble data into a format that can be read only by reversing the algorithm is known as ___

Encryption

Trying a number of possible character combinations to find the key will decrypt encrypted data is known as a ___

brute force attack

A ___ is a password-protected and encrypted file that holds an individual's identification information, including a public key.

digital certificate

___ occurs when a hacker forges name server records to falsify his host's identity.

DNS spoofing

A(n) ____ occurs when a system becomes unable to function because it has been deluged with data transmissions or otherwise disrupted data.

denial-of-service attack

Please allow access to your computer’s microphone to use Voice Recording.

Having trouble? Click here for help.

We can’t access your microphone!

Click the icon above to update your browser permissions above and try again

Example:

Reload the page to try again!

Reload

Press Cmd-0 to reset your zoom

Press Ctrl-0 to reset your zoom

It looks like your browser might be zoomed in or out. Your browser needs to be zoomed to a normal size to record audio.

Please upgrade Flash or install Chrome
to use Voice Recording.

For more help, see our troubleshooting page.

Your microphone is muted

For help fixing this issue, see this FAQ.

Star this term

You can study starred terms together

NEW! Voice Recording

Create Set