Shared Flashcard Set

Details

CTS 220
FINAL
145
Computer Networking
Undergraduate 2
07/29/2013

Additional Computer Networking Flashcards

 


 

Cards

Term
Reverting to a ____ point can solve problems with registry entries the application uses that have become corrupted.
Definition
Restore
Term
When you see the Microsoft progress bar appear, you know the ____, including all critical services and drivers, has loaded.
Definition
Windows Kernel
Term
For essential hardware devices, use the ____ to verify and replace system files.
Definition
System File Checker
Term
If you have a laptop or a brand-name computer such as a Gateway, Dell, or IBM, most likely the manufacturer has set up a ____ on the hard drive that can be used to recover the Windows installation.
Definition
hidden partition
Term
If the system is caught in an endless loop of restarts, boot into ____.
Definition
Safe mode
Term
During a reinstallation, Vista setup will move all folders of the old installation into the ____ folder.
Definition
\Windows.old
Term
If you can identify the approximate date the error started and that date is in the recent past, use ____.
Definition
System Restore
Term
Use the ____ tool to test memory
Definition
Memory Diagnostics
Term
Check ____ to verify that a device is enabled and Windows thinks the device should be working.
Definition
Device Manager
Term
If you can boot to the Windows desktop when using a Windows 2000/XP boot disk, you can assume that the boot files in the root directory of drive C are missing or corrupted.
Definition
True
Term
For a laptop or other brand-name computer, don’t forget to reinstall Windows using recovery CDs provided by ____.
Definition
the computer manufacturer
Term
To uninstall a program, in Device Manager ____ the device and select Uninstall.
Definition
right-click
Term
After you boot into Safe Mode, you can use the ____ commands to verify system files and clean the hard drive.
Definition
SFC, Chkdsk, and Defrag
Term
As you work to solve a Windows problem, always choose the method that makes the most changes to the system as possible in order to rejuvenate the machine.
Definition
False
Term
The error ____ is caused by a driver or service making an illegal access to memory.
Definition
op 0x0A or IRQL_NOT_LESS_OR_EQUAL
Term
Errors or warnings in Device Manager are displayed as a ____.
Definition
yellow triangle or question mark
Term
The key that loads services and drivers can be found in the ____ location
Definition
HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services
Term
Sometimes a Windows update solves a problem with a hardware device.
Definition
True
Term
The command ____ searches for and replaces corrupted system files.
Definition
sfc /scannow
Term
The ____ Configuration is updated after you log on normally to Vista
Definition
Last Known Good
Term
When connecting to a private and secured wireless access point, you must provide the information that proves you have the right to use the network.
Definition
True
Term
Delays in network transmissions are called ____.
Definition
latency
Term
The ____ command can display TCP/IP configuration information and refresh the IP address.
Definition
ipconfig
Term
A ____ is a device that manages traffic between two networks
Definition
router
Term
The three main protocols for encryption for 802.11 wireless networks are ____.
Definition
WEP, WPA, and WPA2
Term
All wireless phone systems, including cellular, use ____ transmission, which means both people in a conversation can talk or transmit at the same time.
Definition
full-duplex
Term
The IP addresses available to the Internet are called ____ IP addresses.
Definition
public
Term
Wireless networks are either public, unsecured hotspots or private, secured hotspots.
Definition
True
Term
The solution for securing private data traveling over a public network is a ____.
Definition
Virtual Private Network
Term
The ____ command tests connectivity by sending an echo request to a remote computer
Definition
ping
Term
To connect to the Internet, a network first connects to an ____.
Definition
Internet Service Provider
Term
When connecting to a network, by default Windows assumes static IP addressing and automatically configures the network connection
Definition
False
Term
A(n) ____ is a group of four dotted decimal numbers such as 255.255.0.0 that tells TCP/IP if a computer’s IP address is on the same or a different network
Definition
Subnet Mask
Term
The ____ for a cellular network is a fixed transceiver and antenna.
Definition
base station
Term
A(n) ____ is a 32-bit string used to identify a computer on a network
Definition
IP address
Term
A ____ IP address is assigned for the current connection only.
Definition
Dynamic
Term
A____ application means one computer (the remote computer) is running the Telnet server and another computer (the local computer) runs the Telnet client.
Definition
client/server
Term
To use ____, you can create user accounts using the Control Panel.
Definition
Telnet
Term
For almost all networks today, including the Internet, the communication protocol used is called ____.
Definition
TCP/IP
Term
____ is a standard for short-range wireless communication and data synchronization between devices.
Definition
Bluetooth
Term
Wireless networks are either public, unsecured hotspots or private, secured hotspots
Definition
True
Term
____ technology uses a dedicated line from your ISP to your place of business or residence.
Definition
Fiber Optic
Term
____ is the most popular cabling method for local networks
Definition
Twisted-pair cable
Term
When connecting to a private and secured wireless access point, you must provide the information that proves you have the right to use the network
Definition
True
Term
An on-demand broadband connection that is not always up requires that a user name and password be authenticated at the ISP each time you make the connection.
Definition
True
Term
ny software vendors use FTP sites for downloading software to their customers
Definition
True
Term
In order to activate your service, the cable company must know the ____ of the cable modem you have installed
Definition
MAC Address
Term
Most broadband connections today are always up and use ____ IP addressing.
Definition
dynamic
Term
The logon for an on-demand broadband connection is managed by a protocol called ____.
Definition
PPPoE
Term
Port ____ opens a port when a PC on the network initiates communication through another port
Definition
triggering
Term
For port forwarding to work, the computer on your network must have a ____ IP Address.
Definition
static
Term
____ is essential to keep others from hacking into your wireless data and to prevent unauthorized use of your wireless LAN.
Definition
Encryption
Term
When supporting and troubleshooting small networks, you’ll need to use ____ to test the physical connections of the network
Definition
cable testers
Term
To find out what your DNS server knows about the domain name www.microsoft.com, use the ____ command.
Definition
kup www.microsoft.com
Term
A(n) ____ lookup is when you use the Nslookup command to find the host name when you know a computer’s IP address.
Definition
reverse
Term
Remote ____ gives a user access to his or her Windows desktop from anywhere on the Internet.
Definition
Desktop
Term
To prepare a computer to serve up Remote Desktop, you need to configure the computer for ____ IP addressing
Definition
static
Term
Remote ____ can help you support users and their computers from a distance
Definition
Assistance
Term
A log file is kept of every Remote Assistance session in the ____ folder.
Definition
C:\Users\username\Documents\Remote Assistance Logs
Term
Networking happens in ____.
Definition
layers
Term
To disconnect a mapped network drive, use the ____ command.
Definition
net use z: /delete
Term
The command to flush the DNS cache kept on the computer is ____.
Definition
ipconfig /flushdns
Term
If you have a problem with connecting to a secured Web site from a corporate network, you might be using the wrong ____ server on the network.
Definition
proxy
Term
When setting up a VoIP system, know that each digital phone or ATA must be programmed with a phone number from the ____.
Definition
VoIP provider
Term
A network ____ map is one of the most powerful and versatile methods of communicating over a network.
Definition
drive
Term
(n)____ password means it is not easy to guess by both humans and computer programs designed to hack passwords.
Definition
strong
Term
(n) ____ account has complete access to the system and can make changes that affect the security of the system and other users
Definition
administrator
Term
Folders and files stored on a workstation or server that contain user data need to be classified as to the ____ assigned to the data.
Definition
permissions
Term
Most encryption software products use a method called ____.
Definition
Public Key Encryption
Term
____ is assigned by a Certification Authority, and is used to prove you are who you say you are
Definition
digital certificate
Term
A ____ virus is a combination of a boot sector virus and a file virus and can hide in either
Definition
multipartite
Term
A ____ virus can hide in either of two boot areas of a hard drive
Definition
boot sector
Term
A ____ is made of several words with spaces allowed
Definition
passphrase
Term
____ is any annoying and unwanted program that might or might not mean you harm.
Definition
Grayware
Term
A(n) ____ account has read-write access only on its own folders, read-only access to most system folders, and no access to other users’ data
Definition
limited
Term
Generally speaking, the weakest link in setting up security in a computer environment is ____.
Definition
people
Term
Internet Explorer includes the pop-up blocker, the ability to manage add-ons, the ability to block scripts and disable scripts embedded in Web pages, and the ability to set the general security level
Definition
True
Term
A ____ is a small program contained in a document that can be automatically executed either when the document is first loaded or later by pressing a key combination
Definition
macro
Term
For the health care industry, the ____ includes regulations to secure patient data that apply to all health care companies and professionals
Definition
HIPAA
Term
A Trojan sometimes installs a ____ in the system, which is a hidden way to allow malware to reach the system in secret even after the Trojan has been removed.
Definition
backdoor
Term
In the computer arena, ____ is the practice of tricking people into giving out private information or allowing unsafe programs into the network or computer
Definition
social engineering
Term
Because of the problem of losing encrypted data and Internet passwords when a user password is reset, each new user should create a password ____ disk for use in the event the user forgets the password.
Definition
reset
Term
As a defensive and offensive measure to protect against malicious software, install and run ____ software and keep it current.
Definition
antivirus
Term
Don’t use the same password on more than one system (computer, network, or application).
Definition
true
Term
Don’t use the same password on more than one system (computer, network, or application).
Definition
Network Service
Term
The ____ command can be used to encrypt, decrypt, or recover an encrypted file when the certificates are lost
Definition
Cipher
Term
If you cannot access an encrypted file because the certificate is corrupted and there are no backup certificates, you might be able to recover the file using a(n) ____ certificate.
Definition
recovery
Term
When you share folders on the network, the ____ permissions for remote users need to be set
Definition
share
Term
Certificates are managed using the ____ console
Definition
Certificate Manager
Term
It is necessary that all computers belong to the same workgroup in order to share resources
Definition
False
Term
The term ____ applies to a kit or set of tools used originally on UNIX computers
Definition
rootkit
Term
The best way to change inherited permissions is to change the permissions of the ____.
Definition
parent object
Term
Use ____ to search for malware processes, especially those that mask themselves as core Windows processes and elude AV software
Definition
Task Manager
Term
Many notebook computers have a chip on the motherboard called the ____.
Definition
TPM
Term
Permissions manually set for a subfolder or file cannot override inherited permissions.
Definition
False
Term
A $ at the end of the folder name creates a(n) ____ share.
Definition
hidden
Term
If an infected computer will not boot, it might be that the boot sectors of the hard drive are infected or damaged or the BIOS code might be corrupted
Definition
True
Term
For a stand-alone computer that is not part of a Windows domain, the EFS encrypting process generates a ____ digital certificate to be used for the encryption.
Definition
self-signed
Term
To know for sure exactly which permissions for a file or folder are in effect, see the ____ tab of the Advanced Security Settings box.
Definition
Effective Permissions
Term
To know for sure exactly which permissions for a file or folder are in effect, see the ____ tab of the Advanced Security Settings box.
Definition
Effective Permissions
Term
____ on a motherboard offers security features including power-on passwords, support for intrusion-detection devices, and support for a TPM chip
Definition
BIOS
Term
When controlling access to data folders or files, permissions to these resources are assigned to individual user accounts or user groups
Definition
True
Term
Windows XP uses ____ file sharing by default, which means you have no control over who has access to a shared folder or file
Definition
simple
Term
A(n) ____ computer is not allowed to use the network, is put on a different network dedicated to them, or is only allowed to access certain network resources
Definition
quarantined
Term
To see a list of services managed by Svchost, enter this command in a command-prompt window: ____.
Definition
tasklist /SVC
Term
____ cards include one or more variations of PC Card, CardBus, and ExpressCard.
Definition
PCMCIA
Term
A MicroDIMM that contains DDR SDRAM has ____ pins.
Definition
172
Term
A(n) ____ is about the size of a credit card, but thicker.
Definition
PC Card
Term
In a notebook, replacing the motherboard probably means you’ll need to fully disassemble the entire notebook except the LCD assembly.
Definition
True
Term
Most notebook manufacturers provide ____ software that can help you test components to determine which component needs replacing.
Definition
diagnostic
Term
Notebook computer cases tend to be similar to one another, and components in notebook systems tend to be interchangeable among manufacturers.
Definition
False
Term
IBM and Lenovo ThinkPad notebooks use a unique and popular pointing device embedded in the keyboard called a ____ or point stick.
Definition
TrackPoint
Term
Use the ____ box to adjust pointer speed, mouse trails, pointer size, how the touch pad buttons work, and other settings for pointing devices.
Definition
Mouse Properties
Term
To substitute an internal device with an external device, first go into ____ setup and disable the internal device.
Definition
BIOS
Term
A notebook drive is ____ inches wide.
Definition
2.5
Term
You can adjust the way the touch pad or works on a laptop using the ____ box.
Definition
Mouse Properties
Term
In ____ sleep, all work is saved to the hard drive, but the system still maintains a trickle of power.
Definition
hybrid
Term
The latest PCMCIA standard is ____, which uses the PCI Express bus standard or the USB 2.0 standard
Definition
ExpressCard
Term
When you first purchase a notebook, make sure you have a ____ CD containing the installed OS so you can recover from a failed hard drive.
Definition
recovery
Term
For tablet PCs, the stylus can be controlled from the ____ box.
Definition
Pen and Input Devices
Term
The brightness is a function of the ____ component of the LCD panel.
Definition
backlight
Term
A(n) ____ is an electrical device that changes DC to AC.
Definition
inverter
Term
A ____ station provides the same functions as a port replicator, but provides additional slots for adding secondary storage devices and expansion cards
Definition
docking
Term
A mouse, graphics tablet, or other input device is likely to use a(n) ____ port
Definition
USB
Term
A tablet PC has more features than a notebook, including a touch screen that also allows you to handwrite on it with a stylus.
Definition
True
Term
____ printers use wax-based ink that is heated by heat pins that melt the ink onto paper. The print head containing these heat pins is as wide as the paper.
Definition
Thermal
Term
____ printers tend to smudge on inexpensive paper, and they are slower than laser printers.
Definition
Inkjet
Term
A(n) ____ printer uses solid dyes embedded on different transparent films.
Definition
dye-sublimation
Term
____ is a language used to communicate how a page is to print and was developed by Adobe Systems
Definition
PostScript
Term
Check ____ for recorded events that have to do with the printer or the port it is using.
Definition
Event Viewer
Term
A printer ____ page generally prints some text, some graphics, and some information about the printer, such as the printer resolution and how much memory is installed
Definition
test
Term
Routine printer maintenance procedures are generally the same from manufacturer to manufacturer and printer to printer
Definition
False
Term
A laser printer can produce better-quality printouts than a dot matrix printer, even when printing at the same dpi, because it can vary the size of the dots it prints, creating a sharp, clear image using a technology called ____.
Definition
REt
Term
A ____ printer connects directly to a computer by way of a USB port, parallel port, serial port, wireless connection (Bluetooth, infrared, or Wi-Fi), IEEE 1394 (FireWire) port, SCSI port, PC Card, or ExpressCard connection
Definition
local
Term
When cleaning a printer, to prevent the inkjet nozzles from drying out, don’t leave the ink cartridges out of their cradle for longer than ____ minutes
Definition
30
Term
Automatically printing on both sides of the page is called ____ printing
Definition
duplex
Term
A dedicated device or computer called a print ____ can control several printers connected to a network.
Definition
server
Term
To know the IP address of a network printer, direct the printer to print a ____ page.
Definition
configuration
Term
Printer ____ is updated by replacing the printer’s DIMM that contains the code or by downloading the update from the manufacturer’s Web site.
Definition
firmware
Term
If you can afford it, the best practice is to purchase one machine for one purpose, instead of bundling many functions into a single machine
Definition
True
Term
____ printers work by placing toner on an electrically charged rotating drum and then depositing the toner on paper as the paper moves through the system at the same speed the drum is turning.
Definition
Laser
Term
If loose toner comes out with your printout, the fuser is not reaching the proper temperature and professional service is required.
Definition
True
Term
If symbols or other special characters don’t print correctly on a laser printer, try using ____ printing rather than asking the printer to interpret the characters
Definition
binary
Term
Several print jobs can accumulate in the queue, which you can view in the Vista Printers window or the XP Printers and Faxes window in a process called ____.
Definition
spooling
Term
Manufacturers of high-end printers provide ____ kits, which include specific printer components, step-by-step instructions for performing maintenance, and any special tools or equipment you need to do maintenance.
Definition
printer maintenance
Supporting users have an ad free experience!