How can we help?

You can also find more resources in our Help Center.

109 terms


Network + 2005 In Depth
A___ is a group of computers and other devices that are connected by some type of transmission media.
In a ___ network, every computer can communicate directly with any other computer.
Which of the following terms describes a network of computers and other devices that is confirmed to a relatively small space, such as one building or even one office?
The ___ is the main circuit that controls the computer.
___ ensure that data are transferred whole, in sequence, and without error from one node on the network to another.
___ coordinate the storage and transfer of e-mail between users on a network.
Mail services
A(n)___ is a computer installed with the appropriate software to supply Web pages to many different clients upon demand.
Web server
The term ___ refers to those skills that are not easily measurable, such as customer relations, oral and written communications, dependability, teamwork, and leadership abilities.
soft skills
___ refers to the capability of a server to share data files, applications, and disk storage space.
File services
___ are documented agreements containing technical specifications or other precise criteria that stipulate how a particular product or service should be designed or performed.
Protocols at the ___ layer accept Application layer data and format it so that one type of application and host can understand data from another type of application and host.
___ is a networking technology originally developed at Xerox in the early 1970s and improved by Digital Equipment Corporation, Intel, and Xerox.
___ is a method of identifying segments that belong to the same group of subdivided data.
___ protocols ensure that data arrives exactly as it was sent by establishing a connection with another node before they begin transmitting data.
Transport layer protocols break large data units received from the Session layer into multiple smaller units called ___
Network layer addresses are also called ___
virtual addresses
The ___ is the lowest, or first, layer of the OSI model.
physical layer
___ layer services manage data encryption and decryption.
A wave's ___ is a measuer of it's strength at any given point in time.
A(n)___ is a distinct communication path betweens nodes.
The most common way to measure latency on data networks is by calculating a packet's ____
round trip time
A(n) ___ issues and receives wireless signals with equal strength and clarity in all directions.
omni-directional antenna
A(n) ___ is a device that accpets wireless signals from multiple nodes and retransmits them to the rest of the network.
access point
The distance between corresponding points on a wave cycle is called its ___
___ is a term used by network professionals to describe the non-data information that must accompany data in order for a signal to be properly routed and interpreted by the network.
___occurs when a signal traveling on one wire or cable infringes on the signal traveling over an adjacent wire or cable.
____ is the capacity for a component or system to continue functioning despite damage or partial malfunction.
Fault tolerance
A ___ is a rule that governs how networks communicate.
___ is a Network layer protocol that obtains the MAC address of a host, or node, then creates a database that maps the MAC address to the host's IP address.
Address Resolution Protocol
___ contain databases of associated names and IP addresses and provide this information to resolvers on request.
Name servers
The ___ provides a means of resolving NetBIOS names to IP addresses.
Windows Internet Naming Service
___ is the process of assigning one network component to work with another.
___ allows one device to send data to a specific group of devices.
A(n) ___ is a special 32-bit number that, when combined with a device's IP address, informs the rest of the network about the segment or network to which it is attached.
subnet mask
___ are any hosts on the Internet that need to look up domain name information.
___ is a terminal emulation protocol used to log on to remote hosts using the TCP/IP protocol suite.
The ___ is a simple Application layer protocol used to synchronize the clocks of computers on a network.
Network Time Protocol, NTP
___ are connectivity devices that enable a workstation, server, printer, or other node to receive and transmit data over the network media.
Network interface cards
A computer's ___ is the circuit, or signaling pathway, used by the motherboard to transmit data to the computer's components, including its memory, processor, hard disk, and NIC
___ is a standard interface used to connect multiple types of peripherals, including modems, mice, audio players, and NICs.
___ are physically designed to be linked with other hubs in a single telecommunications closet.
Stackable hubs
___ are connectivity devices that subdivide a network into smaller logical pieces.
A(n) ___ is a small, removable piece of plastics that contains a metal receptacle.
A(n) is a message to the computer that instructs it to stop what it is doing and pay attention to something else.
interrupt request, IRQ
The ___ indicates, in hexadecimal notation, the area of memory that the NIC and CPU will use for exchangin, or buffering, data.
memory range
A(n) ___ is a logically or physically distinct Ethernet network segment on which all participating devices must detect and accomodate data collisions.
collision domain
A ___ topology does not specify device types, connectivity methods, or addressing schemes for the network.
A ___ topology refers to the way in which data is transmitted between nodes, rather than the physical layout of the paths that data takes.
In ___, a connection is established between two network nodes before they begin transmitting data.
circuit switching
___ is a network technology whose standards were originally specified by ANSI in the mid-1980s and later refined by ISO.
___ is an ITU networking standard describing Data Link layer protocols for both network access and signal multiplexing.
Asynchronous Transfer Mode
A network's ___ is it's method of controlling how network nodes access the communications channel.
access method
___ enables multiple nodes to simultaneously transmit and receive data over different logical network segments.
Switched Ethernet
In ___, a 3-byte packet, called a token, is transmitted from one node to another in a circular fashion around the ring.
token passing
A WAN in a which each site is directly connected to no more than two other sites in a serial fashion is known as a ___
bus topology WAN
___ is an updated, digital version of X.25 that relies on packet switching.
Frame Relay
A ___ modulates outgoing signals and demodulates incoming signals.
DSL modem
A(n) ___ is a network that traverse some distance and usually connects LANS, whether across the city or across the nation.
Wide Area Network, WAN
A(n) ___ converts digital signals into analog signals for use with ISDN phones and other analog devices
terminal adapter, TA
A(n) ___ is the creation of communications channel for a transmission from an earth-based transmitter to an orbiting satellite.
To better organized and manage objects, a network administrator places objects in ___
organizational units
___ is the ability of a processor to perform many different operations in a very brief period of time.
A ___ is a routine of sequential instructions that runs until it has achieved its goal.
___ is the original PC file system that was designed in the 1970s to support floppy disks and, later, hard disks.
___ involves associating a letter, such as M: or T:, with a disk, directory, or other resource.
The ___ account is a predefined user account that has the most extensive priviliges for resources both on the computer and on the domain that it controls.
The ___ lists all computer components proverb to be compatible with Windows Server 2003.
Hardware Compatibility List, HCL
The relationship between two domains in which one allows the other to authenticate its users is known as a(n) ___
trust relationship
On a Linux or Solaris system, the ___ command creates a new group ID and makes the group available for use.
Any modern client running the TCP/IP protocol suite will be capable of connecting to a UNIX-type of host via ___
____ is equivalent to using wildcards in Windows and DOS.
File globbing
Every UNIX-type system contains full documentation of UNIX commands in the ___
manual pages
The core of all UNIX-type systems is called the ___
A(n) ___ is a file that contains instructions for performing a specific task, such as reading data from and writing data to a hard drive.
kernel module
In UNIX, two or more commands connected by a pipe are called a(n) ___
The ___ tool is used to access console commands through a Web browser on another computer on the network
Remote Manager
A(n) ___ consists of the objects, classes, and properties a network typically needs.
base schema
___ seperates a network into muliple logically defined segments.
A(n) ___ facilities communication between different networks or subnets.
___ is a simple subprotocol, incapable of doing anything more than transporting mail or holding it in a queue.
The ___ utility displays TCP/IP statistics and details about TCP/IP components and connections on a hostl.
On networks that run NetBIOS over TCP/IP, the ___ utility can provide information about NetBIOS statistics and resolve NetBIOS names to their IP addresses
To calculate a host's network ID given it's IP address and subnet mask, you follow a logical process of combining bits known as ___
A network or part of a network that uses browser-based services to exchange information within an enterprise is known as a(n) ____
The utility that allows you to query the DNS registration database and obtain information about a domain name is called ___
The ___ utility uses ICMP to trace the path from one networked node to another identifying all intermediate hops between the two nodes.
traceroute, tracert
On Unix-type systems, the ___ utility allows you to modify TCP/IP settings for a network interface, release and renew DHCP-assigned addresses, or simply check the status of your machine's TCP/IP settings.
___ is a software-based tool that continually monitors networks traffic from a server or workstation attached to the network.
network monitor
A ___ is a record of how the network operates under normal conditions.
Which of the following is a device that handle electrical signals improperly, usually affecting the rest of the network?
A ___ is a process or program that provides support personnel with a centralized means of documenting changes to the network.
change management system
A(n) ___ is a process or program that provides support personnel with a centralized means of documenting changes to the network.
change management system
A(n) ___ cable is useful for quickly and easily verifying that a node's NIC is transmitting and receiving signals properly.
Resistance is measured in ___
___ refers to the soundness of a network's programs, data, services, devices, and connections.
The term ___ refers to an implementation in which more than one component is installed and ready to use for storing, processing, or transporting data.
Which of the following terms implies a fluctuation in voltage levels caused by other devices on the network or electromagnetic interference?
___ is a specialized storage device or group of storage devices that provides centralized fault-tolerant data storage for a network.
Network attached storage
A ___ is a place where the computers, devices, and connectivity necessary to rebuild a network exist, but they are not appropriately configured, updated or connected.
cold site
___ viruses propagate themselves via network protocols, commands, messaging programs, and data links
A momentary decrease in voltage is known as a(n)
The term ___ refers to identical components that can be changed while a machine is still running.
hot swappable
___ is a fault-tolerance technique that links multiple servers together to act as a single server.
Which of the following terms refers to a thorough examination of each aspect of a network to determine how it might be compromised?
Security audit
The use of an algorithm to scramble data into a format that can be read only by reversing the algorithm is known as ___
Trying a number of possible character combinations to find the key will decrypt encrypted data is known as a ___
brute force attack
A ___ is a password-protected and encrypted file that holds an individual's identification information, including a public key.
digital certificate
___ occurs when a hacker forges name server records to falsify his host's identity.
DNS spoofing
A(n) ____ occurs when a system becomes unable to function because it has been deluged with data transmissions or otherwise disrupted data.
denial-of-service attack