Shared Flashcard Set

Details

3D052 Volume 2 All Questions
All questions from volume 2, Self and URE
226
Computer Networking
Professional
04/24/2012

Additional Computer Networking Flashcards

 


 

Cards

Term
What is the first job of the BIOS at system startup?
Definition
Run the power-on self-test (POST).
Term
What does the CMOS store and what other component uses this information?
Definition
The configuration information about the computer; BIOS.
Term
How is main memory distinguished from secondary memory?
Definition
By the speed between the two.
Term
When power is removed from the computer, what happens to the stored information in ROM?
Definition
Its contents remain in memory.
Term
Why is RAM considered as volatile memory?
Definition
Because the contents are erased (lost) from memory.
Term
How are dynamic RAM and static RAM different?
Definition
DRAM chips must be refreshed constantly or they lose their contents. SRAM chips will hold their data without needing to be refreshed as long as power is supplied, thus the term static is used.
Term
What is cache memory and what is normally stored in it?
Definition
Temporary storage area; a collection of data duplicating original values.
Term
What is the main goal of buffers?
Definition
To temporarily hold data used by some type of hardware device until the device is ready to utilize the data.
Term
What is the purpose of the DMA controller?
Definition
To move data and to freeing up the CPU to process data.
Term
Define an interrupt.
Definition
An asynchronous signal from a computer hardware device indicating the need for attention (from the CPU) or a synchronous event in a software application program indicating the need for a change in execution.
Term
How are interrupts commonly used?
Definition
For computer multitasking, especially in real-time computing.
Term
Describe data integrity in a simple manner.
Definition
The assurance that data is consistent, correct, and accessible.
Term
What is parity?
Definition
A method in which the computer ensures the data it processes is accurate.
Term
What is the difference between error correction code (ECC) memory and the parity method?
Definition
The parity method can only detect an error while ECC memory can both detect and correct errors.
Term
Give three examples of storage devices that can be placed in a SAN.
Definition
Disk arrays, CD/DVD towers, tape libraries.
Term
How can using a SAN make equipment failure easier to repair?
Definition
The data does not need to be affected; you can replace only the server.
Term
What are the three protocols listed that support a SAN?
Definition
Fibre Channel, ATA over Ethernet, iSCSI.
Term
How does a SAN and a NAS differ?
Definition
A SAN appears to the server to be physically attached; the NAS is treated as a network drive.
Term
Why is a hardware implementation of RAID preferred over a software version?
Definition
For one it does not require CPU time as the controller card has a processer on board that manages the array.
Term
What are the three concepts of RAID?
Definition
Mirroring, striping, and error correction.
Term
Why is RAID 5 considered to be more efficient when it comes to parity checks?
Definition
Because you do not need separate hard drives for parity checks.
Term
Why is RAID 5 considered to be more efficient when it comes to parity checks?
Definition
Because one array type is "nested" within another array type.
Term
What are some characteristics of HOLs?
Definition
They use English-like statements to increase user understanding, are nearly self-documenting, and permit the use of most scientific and mathematic notations. Programs written for one computer can usually be used on another computer with few changes.
Term
Name four HOLs and give a reason for using each.
Definition
FORTRAN: It is a scientific language with great capacity for precise numeric equations
COBOL: It is the language of choice for writing programs to produce reports or other formatted output products
Ada: Designed for embedded computer applications, is a language recommended for DOD missioncritical systems
Pascal: It was originally a programming language used to teach programming logic, but it quickly developed into an easy-to-use and very powerful programming language.
Term
What are some characteristics of assembler language?
Definition
Instead of writing English-like statements, the programmer writes mnemonics, which are converted directly to machine language by a language processor. These languages are machine specific.
Term
What is machine code?
Definition
Instructions written or existing in a form acceptable by a computer.
Term
What is the distinction of an interpreted language?
Definition
No permanent object code is produced.
Term
What is the European Organization for Nuclear Research commonly known as?
Definition
CERN.
Term
How would you best describe a URL?
Definition
The address of a file or resource accessible on the Internet.
Term
What is HTML?
Definition
The set of markup symbols or codes inserted in a file intended for display on a Web browser page.
Term
What significant role will XHTML play in the future?
Definition
It is most likely to succeed HTML for Internet purposes.
Term
Describe CGI.
Definition
A standard method for a Web server to pass a Web user's request to an application program and to exchange data back to the user.
Term
Define secure socket layer.
Definition
A commonly used protocol for managing the security of a message transmission on the Internet.
Term
What is session management?
Definition
The process of keeping track of a user's activity across sessions of interaction with the computer system.
Term
Why is session management useful when using the internet?
Definition
Without it, you would have to re-authenticate yourself every time you clicked on a hyperlink, rendering the internet almost useless for secure communications.
Term
Give an example of a session management used for security?
Definition
With some Websites, for security reasons, the session is terminated after a period of time of inactivity, say ten minutes. After that, you must re-authenticate yourself to the server.
Term
What are the methods of optimizing your system?
Definition
Task manager, disk defragmenter, chkdsk, and disk quotas.
Term
What triggers can you set the task manager to launch a program on?
Definition
Daily, weekly, monthly, one time only, when the computer starts, and when you log on.
Term
What would happen if you tried to run CHKDSK while you were using the system?
Definition
If any files or applications are running, check disk informs you it could not gain exclusive access to the drive. It then asks if you want to schedule check disk to run the next time your computer starts. The answer would be "Yes."
Term
How does defragmenting improve your systems performance?
Definition
It gathers all the pieces of files and folders, reorganizes things a little and rewrites the files and folders in a continuous fashion. In other words, it puts all the pages back in order with one beginning and one ending.
Term
How can you best describe a radix and what does it indicate?
Definition
Also known as the base, and indicates the number of digits used in a particular numbering system.
Term
What is an exponent and what does it indicate?
Definition
The exponent is written as a superscript, located on the upper right side of the number. An exponent indicates how many times a number is to be multiplied by itself. The value of the exponent is known as the power.
Term
Explain the difference between the most and least significant digits.
Definition
The MSD is the left most nonzero digit of a numeric value. The MSD is the digit that expresses the greatest possible value. The LSD is the rightmost digit of a numeric value to include zeros.
Term
State the purpose of a fractional point.
Definition
Separates the whole portion of the number from the fractional portion of a number.
Term
State how you would convert a decimal number to a binary equivalent.
Definition
Divide the decimal value by the base value (2). The remainder then becomes the LSD. Next, divide the result again by the base, and the remainder becomes the digit to the left of the LSD. Continue this pattern until the result is zero.
Term
State how you would convert a binary number to a hexadecimal equivalent.
Definition
Separate the binary number into groups of four, treating each group as one hex value. To come up with the result, add the decimal value of each bit containing a one and convert the sum to a valid hexadecimal digit. Then combine the digits together to form one hexadecimal number.
Term
State how you would convert a decimal number to a hexadecimal equivalent.
Definition
Divide the decimal number by the base (16). The remainder is the LSD. Then, divide the result by the base again. The remainder becomes the digit to the left of the LSD. Continue this process until the result is zero.
Term
From an IT contingency planning perspective, what are the two primary functions of risk management?
Definition
First, risk management should identify threats and vulnerabilities so that appropriate controls can be put into place to either prevent incidents from happening, or to limit the effects of an incident. Second, risk management should identify residual risks for which contingency plans must be put into place.
Term
Describe the three main classifications of threat.
Definition
Natural, Human, Environmental.
Term
Describe a COOP.
Definition
Focuses on restoring an organization's (usually a headquarters element) essential functions at an alternate site and performing those functions for up to 30 days before returning to normal operations.
Term
What should a contingency plan spell out?
Definition
What systems are prioritized in what order for the basis of protecting those systems from disasters and contingency and for bringing those systems back online after a disaster/contingency.
Term
What criteria should you consider when selecting an offsite storage facility?
Definition
Geographic area, accessibility, security, environment, and cost.
Term
Name the five types of alternate sites.
Definition
Cold, warm, hot, mobile, and mirrored sites.
Term
Why should you focus most of your backup efforts on data instead of programs?
Definition
Data that is unique and software can always be re-loaded.
Term
What three factors is the choice of backup media based on?
Definition
Size, cost, and speed.
Term
Name the four different types of backup you can schedule.
Definition
Full (also known as normal), differential, incremental, and daily.
Term
Why should you keep a copy of your backups at an alternate location?
Definition
The problem or damage effects only your primary site and not your offsite.
Term
Which original components were very susceptible to damage from electrostatic discharge?
Definition
Complementary metal-oxide semiconductor (CMOS).
Term
What is considered to be a computer's main storage?
Definition
Random access memory (RAM).
Term
What is considered as nonvolatile permanent memory?
Definition
Read only memory (ROM).
Term
What is a form of firmware that contains the computer's startup instructions?
Definition
Basic input/output system (BIOS).
Term
What is defined as an asynchronous signal from a computer hardware device indicating the need for attention from a central processing unit (CPU) or a synchronous event?
Definition
Interrupt.
Term
Which controller component interprets an electronic signal, prioritizes it, and requests the attention of the central processing unit (CPU)?
Definition
Priority interrupt.
Term
Which interrupt request (IRQ) line number is normally used for the floppy disk controller?
Definition
6.
Term
Which is a term used to describe that data is whole or complete?
Definition
Data integrity.
Term
What is considered as a technique or method of checking data integrity?
Definition
Parity.
Term
Which is a very simple example of an error detecting code?
Definition
Parity bit.
Term
What is a way of utilizing a group of storage devices as if they were physically connected to a server when they are not?
Definition
Storage area network (SAN).
Term
What is an advantage of using a storage area network (SAN) architecture?
Definition
Ease of replacing server.
Term
What is the connection type of choice for storage area networks (SAN)?
Definition
Fibre channel.
Term
Which storage device can be easily connected to a network and appears as a network drive?
Definition
Storage area network (SAN).
Term
Which storage device has the means of providing data storage reliability using multiple hard drives?
Definition
Redundant array of independent disks (RAID).
Term
The hard drives in a redundant array of independent disks (RAID) array are presented to the server as
Definition
one single hard drive.
Term
Which technology is often used in redundant array of independent disks (RAID) array that can be daisy chained?
Definition
Small computer system interface (SCSI).
Term
Which is not a characteristic of high-order languages?
Definition
Source codes that are written closest to machine language.
Term
What best describes programming machine code?
Definition
Instructions in a form that is acceptable to the computer.
Term
Which selection is a set of markup symbols or codes inserted in a file intended for display on a Web browser page?
Definition
HyperText Markup Language (HTML).
Term
Which Web application is most likely to succeed Hypertext Markup Language (HTML)?
Definition
Extensible HTML (XHTML).
Term
A standard Web application used to pass a Web user's request to a server's application program and to exchange data back to the user is called a
Definition
common gateway interface (CGI).
Term
Which protocol is commonly used for managing the security of a message transmission on the Internet?
Definition
Secure socket layer (SSL).
Term
Which program can be used to automatically launch programs on a preset schedule?
Definition
Task scheduler.
Term
Which error-checking tool allows you to monitor the file system for errors?
Definition
Check disk.
Term
Which numbering system characteristic is the leftmost non-zero digit of a numeric value
Definition
Most significant digit (MSD).
Term
What should each organization have that spells out which systems are prioritized in what order for the basis of protecting those systems from disasters?
Definition
List of critical devices.
Term
Which type of backup would you use at the end of the week to save all data that you select on your systems?
Definition
Normal/full.
Term
Which type of backup will backup all files that have been altered in the last 24 hours?
Definition
Daily.
Term
What speed are main memory and disk drives measured in?
Definition
Nanoseconds and milliseconds.
Term
What does a device driver do?
Definition
It accepts generic commands from a program and translates them into specialized commands for devices.
Term
What is the act of polling?
Definition
Actively sampling the status of external devices by a client program as a synchronous activity.
Term
What does the term Client Server refer to?
Definition
The interaction between the user's computer and the server in which server shares its resources with the client.
Term
How does SAS differ from SCSI?
Definition
SAS is serial based while SCSI is parallel based.
Term
What is XML?
Definition
A set of syntax rules for creating semantically rich markup languages in a particular domain.
Term
What is SGML?
Definition
A meta-language in which one can define markup languages for documents.
Term
What is based around a central directory database containing information about all the domain controllers in the network?
Definition
Active directory.
Term
What is a group of users, servers, and other resources that share a centralized database of account and security information?
Definition
Domain.
Term
Where does a copy of the active directory database reside?
Definition
Domain controllers.
Term
What kind of server contains the master listing of all active directory objects in the forest?
Definition
Global catalog.
Term
What is a set of rules that can be set to affect active directory leaf objects to control what can be done by a user?
Definition
Group policy objects.
Term
Which type of interface is friendlier for the average user to use?
Definition
Graphical User Interface.
Term
Which of the following is not one of the elements that most graphical user interfaces are composed of?
Definition
Programs.
Term
Sitting at a computer and loading a software patch onto it is an example of what type of software patch?
Definition
Attended.
Term
Which type of patch would utilize a remote installation services (RIS)?
Definition
Unattended.
Term
Which components of domain name service (DNS) contain a database of associated names and IP addresses?
Definition
Name servers.
Term
Which query is made by one name server to another name server?
Definition
Non-recursive query.
Term
Which software program manages an IP address allocation for a network?
Definition
DHCP.
Term
The group of IP addresses that a dynamic host configuration protocol (DHCP) server manages is known as a
Definition
scope
Term
What is the minimum number of scopes a dynamic host configuration protocol (DHCP) server can have?
Definition
One.
Term
According to Air Force dynamic host configuration protocol (DHCP) policies, how long is the lease that a noncritical workstation will have applied to them?
Definition
30 days.
Term
What type of service allows network administrators to install upgrades on any number of client computers at one time from a centralized location?
Definition
RIS
Term
Which is not a component of Internet information services (IIS)?
Definition
SNMP.
Term
What component of windows unifies and simplifies day to day system management tasks?
Definition
MMC.
Term
Which type of group manages user's rights assignments and access permissions?
Definition
Security.
Term
Which special identity can represent users currently logged on to a particular computer and accessing a given resource located on that computer?
Definition
Interactive.
Term
What defines the rules by which operations can be performed on a particular resource?
Definition
Permissions.
Term
A feature of networking that enables individuals to designate resources they want other users to be able to access through the network is called
Definition
sharing.
Term
What permission always overrides all other permissions assigned to a user or group to which the user belongs?
Definition
No access.
Term
When a new folder or file is created on a new technology file system (NTFS) partition, what permissions are automatically assigned?
Definition
Inherited permissions of the folder it's contained in.
Term
Which exchange service is the first service launched when Microsoft Exchange starts and the last to stop when it is shut down?
Definition
System Attendant.
Term
In Exchange System Manager, which container holds configuration objects such as Queues, Mailbox stores and Public Folder stores and protocols information?
Definition
Servers.
Term
Which type of lists uses pointers to connect each element together?
Definition
Linked.
Term
A set of data elements (values) organized using a model of horizontal rows and vertical columns whose data is calculated in response to a query is called a
Definition
view.
Term
What is the most common type of operation in sequential query language (SQL)?
Definition
Queries.
Term
What type of sequential query language (SQL) statement would you use to make the changes you were working on permanent?
Definition
Transactions.
Term
Which is the most commonly used sequential query language (SQL) data statement?
Definition
Select.
Term
Which sequential query language (SQL) server feature tracks changes and is used to ensure data integrity?
Definition
Logging.
Term
What is the key to understanding AD?
Definition
AD structural terms.
Term
What may be contained within objects?
Definition
Network users, computers, printers, groups, data files, applications and the attributes of those objects (i.e. name, IP address, etc)
Term
Why is the global catalog server a critical component in a domain?
Definition
They have a "master list" of all AD objects from all domains in the forest.
Term
What are the five FSMO roles responsible for?
Definition
Schema Master - DC responsible for updating directory schema
Domain Naming Master - DC responsible for making changes to the forest-wide domain name space
RID Master - DC responsible for for processing relative ID pool requests; PDC Emulator - DC that is the authority for the W32Time (windows time) service. The timekeeper for the network; Infrastructure Master - DC responsible for updating an objects SID and distinguished name for cross domain referencing.
Term
What are GPOs applied against?
Definition
"Leaf objects", such as users and computers, but not security or distribution groups.
Term
Which command do you use to launch the AD Installation Wizard to promote a server to a domain controller?
Definition
DCPROMO.
Term
When can a command line interface be better than a GUI?
Definition
It uses less RAM and less power from the microprocessor than any other interface.
Term
What is the biggest advantage of a GUI?
Definition
It is the most user friendly of all interfaces
Term
What are the four elements most GUIs are composed of?
Definition
Windows, Icons, Menus, and Pointing devices.
Term
What are the two methods of installing Windows Server 2003?
Definition
Attended and unattended.
Term
What is the difference between a hot fix and a service pack?
Definition
A hot fix is usually a program created by Microsoft to quickly fix a specific problem with one of their products. The Service Pack provides a collection of fixes in the following areas: security, application compatibility, OS reliability, and setup.
Term
How do the three components of DNS work together?
Definition
A resolver needs to look-up domain name information. It sends the request to the name server, which reviews its records to find the information, and then it passes the required information back to the resolver.
Term
How are a forward lookup and a reverse lookup different?
Definition
Unlike forward lookups, where you provide a domain name and request an I/P address, a reverse lookup allows you to specify an IP address, and the DNS server returns the hostname defined for it.
Term
How do recursive queries and non-recursive queries differ?
Definition
Where recursive queries are made by client applications, non-recursive queries are made by name servers to other name servers.
Term
Explain the importance, in DNS, of the "root."
Definition
In DNS, the root consists of 13 name server clusters located world-wide. These servers form the upper most layer of the DNS namespace.
Term
What three things must Air Force DNS servers do?
Definition
Provide reverse lookup capability, i.e. reside on the in-addr.arpa domain, allow zone transfers only between the primary and secondary name servers, and run only the DNS service. All unnecessary services (such as http, ftp, telnet, NetBIOS, etc.) will be turned off on the name servers.
Term
What does a DHCP server do?
Definition
Manages a pool of IP addresses (known as a scope) available for lease by authorized clients for a specific period of time.
Term
What must you be aware of when using more than one DHCP server on a network?
Definition
Each scope is unique so you do not cause the creation of duplicate IP addresses.
Term
What does Air Force Policy say about using DHCP?
Definition
Manage all base IP address space through utilization of Dynamic Host Configuration Protocol (DHCP). DHCP
Term
According to Air Force policy, how long should noncritical workstations' IP addresses be leased for?
Definition
30 days.
Term
On what servers can you install RIS?
Definition
Any server that meets the Windows Server 2003 minimum requirements.
Term
What directory does the RIS service default to?
Definition
\RemoteInstall.
Term
When deciding on a default directory for RIS, what are the two rules you must follow?
Definition
The directory has to be on a partition other than the partition that holds the Windows Server 2003 operating
Term
What are the services that IIS can provide?
Definition
World Wide Web publishing services, File Transfer Protocol (FTP) services, Simple Mail Transport Protocol (SMTP) services, and Network News Transfer Protocol (NNTP) services.
Term
Why is IIS 6.0 not activated automatically?
Definition
The reason for this is that hackers have learned to look for IIS services running with their default setup, which allowed them a method of access. By locking IIS down by default, it greatly reduces the number of access points for hackers.
Term
What are IIS's components?
Definition
World Wide Web Server, Simple Mail Transfer Protocol, Network News Transfer Protocol (NNTP), File Transfer Protocol (FTP) Server, Internet Information Services Snap-in, Internet Services Manager.
Term
What is usually the sole purpose of installing IIS on an Air Force server?
Definition
To facilitate the installation of Microsoft Exchange Server.
Term
Explain what a snap-in is.
Definition
It is an interface for a program designed to integrate with the MMC.
Term
As an administrator, how would MMC make accomplishing your duties easier?
Definition
It simplifies the management of the server and network.
Term
What are the two places a user account can be created?
Definition
On a local computer or a domain controller.
Term
What is the difference between Permissions and Rights?
Definition
Permissions control access to an object, such as a folder or file. Rights enable a user account or group to perform predefined tasks.
Term
Where is a domain user account valid?
Definition
On any computer in the domain for which the account was created.
Term
Which snap-in to the MMC would you use to create a new user account?
Definition
AD Users and Computers.
Term
Why would you use group nesting?
Definition
To simplify and reduce security management overhead.
Term
What scopes can apply to special identities?
Definition
None.
Term
What do permissions define?
Definition
Rules by which operations can be performed on a particular resource, read, write, delete.
Term
Rules by which operations can be performed on a particular resource.
Definition
By sharing resources.
Term
What are the four shared folder permissions?
Definition
Full control, Change, Read, and No Access.
Term
Which permission over rides all others?
Definition
No access.
Term
What are the six NTFS permissions?
Definition
Read, Write, Execute, Delete, Change permission, and Take Ownership.
Term
Why would you remove full control permission from the everyone group?
Definition
With this permission in place, literally anyone on the network could delete or modify those resources.
Term
What features does Microsoft Exchange server share with other email systems?
Definition
It transfers email messages to intended recipients in a reliable way, whether the recipients reside on the local server, another server in the same Exchange Server 2003 organization, or another server in an external messaging environment that is connected to the organization
It stores the email messages in a server-based store
It supports various email clients that are used to access or download messages
It provides users with information about recipients in the organization through an address book or global address list.
Term
What does Microsoft Exchange server integrate tightly with to provide its many features?
Definition
The TCP/IP infrastructure provided by Microsoft Windows Server 2003 and AD service.
Term
What protocols does Exchange server use to support web based mail client connectivity?
Definition
HTTP, SMTP, POP3, IMAP4, NNTP.
Term
What is the core data storage repository for Microsoft Exchange server?
Definition
The Exchange Information Store Service.
Term
What information does a mailbox store about a particular mail recipient?
Definition
Mail Messages, Calendar Data, Tasks, Personal Information.
Term
What are the two Microsoft Exchange server roles?
Definition
Mailbox Server and Bridgehead Server.
Term
Microsoft Exchange server 2003 requires what components and services to be installed and enabled on the server?
Definition
.NET framework, ASP.NET, IIS, WWW Publishing Service, SMTP, and NNTP.
Term
What must the account you use to install the first Exchange 2003 server in the forest be?
Definition
The account you use to run DomainPrep must be a member of the Domain Administrators group in the local domain and a local computer administrator.
Term
What are data structures designed to do?
Definition
To organize data to suit a specific programming purpose so you can access them later and use them in appropriate ways to produce a desired output.
Term
What is the purpose of a schema?
Definition
It describes the objects that are represented in the database, and the relationships among them.
Term
Why do we define a group of ordered data items or elements as a linked list?
Definition
Because we use pointers to connect each element together, thus specifying their order.
Term
How does a sequential list differ from a linked list?
Definition
In contrast to the physical layout of data items in a linked list, where pointers connect each element together and specifying their order, a sequential list, or ordered list, is configured in the order that the items are read.
Term
How are columns and rows identified in a table?
Definition
The columns are identified by name, and the rows are identified by the values appearing in a particular column subset, which has been identified as a candidate key.
Term
How do base tables and derived tables differ?
Definition
Base tables are self-contained, meaning that all of the data in them is in that table, not from any other table. A derived table contains information that was retrieved from another table.
Term
When referring to databases, what is a view?
Definition
A virtual or logical table composed of the result set of a query
Term
How does a network, or plex, data structure differ from a hierarchical, or tree, data structure?
Definition
With a network structure, both the relationship from child-to-parent and the relationship from parent to child can be a one to many.
Term
Describe a relational database.
Definition
A collection of data items organized as a set of formally-described tables from which data can be accessed or reassembled in many different ways without having to reorganize the database tables.
Term
What three values form the basis of the three valued logic used by SQL?
Definition
Null, True and False.
Term
Describe the three basic types of SQL statements.
Definition
Data statements - queries and or modifies tables and columns

Transaction statements - these statements control transactions, either making changes permanent, or removing them;

Schema statements - statements that maintain schema, creating or removing tables and views and granting privileges.
Term
In SQL, how is logging used to ensure data integrity?
Definition
If an action is logged, but it is not completed before the system failed, the actions can be read from the log and completed.
Term
Describe the two types of concurrency used by Microsoft SQL server.
Definition
Pessimistic concurrency which uses locks to control access to data while Optimistic concurrency is where Each time a change is made to data in a row, a new version of that row is created and the old one is removed from the database and stored in a back up file, so that any changes can be undone later if need be.
Term
What is the first job of the BIOS at startup?
Definition
POST.
Term
What is a memory chip that stores configuration information about the computer used by the BIOS every time the system is booted up?
Definition
CMOS.
Term
What are the two types of PROM?
Definition
EPROM and Flash Memory.
Term
What are the two types of DRAM chips?
Definition
SDRAM and DDR SDRAM.
Term
Why are DDR SDRAM chips faster than SDRAM?
Definition
They transfer data twice for each clock cycle.
Term
What are the three types of RAM?
Definition
DRAM, SRAM and cache memory.
Term
Which is more reliable - SRAM or DRAM? Why?
Definition
SRAM because they hold their data without needing to be refreshed.
Term
Describe DRAM.
Definition
DRAM chips need to be refreshed constantly or they lose their contents.
Term
What are the three forms of data integrity?
Definition
Parity, nonparity and ECC memory.
Term
What type of client shares an application between two users and normally resides on the hard drive?
Definition
Thin client.
Term
For which type of service does it appear as though the user running the program may as well be at the datacenter typing in commands to the terminal there?
Definition
Terminal service.
Term
What are the three connection methods from SANs?
Definition
AoE over Ethernet, iSCSI, and Fibre Channel.
Term
What are the most prominent RAID controller cards today?
Definition
SCSI and SAS.
Term
Describe striping as it pertains to the RAID concept.
Definition
Splitting data amongst more than one disk, so that it can be retreived more quickly than if all the data had to be read from one disk.
Term
What are four common High Order Languages?
Definition
FORTRAN, COBOL, Pascal and Ada.
Term
What is the HOL, Ada, created for?
Definition
The DoD contracted to have it developed so that it could be used by virtually everybody. It is designed for embedded computer applications and was recommended for DoD mission-critical systems.
Term
What are the two main components of Microsoft .NET Framework?
Definition
CLR and FCL.
Term
How does SSL achieve authentication?
Definition
By using public-key cryptographic algorithms such as RSA or DSS.
Term
How does SSL achieve integrity?
Definition
By using cryptographic functions such as MD5 or SHA1.
Term
What is the purpose of SOA?
Definition
To build applications out of software services.
Term
What are the three types of session management?
Definition
Desktop, browser, and web server.
Term
What are the four types of contingency plans?
Definition
COOP, Cyber Incident Responce Plan, DRP, and EAP.
Term
What does the EAP cover?
Definition
The response to procedures for occupants fo a facility in the event of a situation posing a potential threat to the health and safety of personnel, the environment, or property.
Term
What does the DRP apply to?
Definition
Major, usually catostrophic events that deny access to the normal facility for an extended period.
Term
What does the COOP focus on?
Definition
Restoring an organization's essential functions at an alternate site and performing those functions for up to 30 days before returning to normal operations.
Term
What are the main AD components?
Definition
Domain controllers, global catalog servers, member servers, group policy objects, and flexible single master operation role holders.
Term
What are the two types of domain groups?
Definition
Distribution and security.
Term
What are the five main messaging protocols used by Microsoft Exchange Server?
Definition
HTTP, SMTP, POP3, IMAP4, and NNTP.
Term
Describe a bridgehead server?
Definition
A connection point that performs message transfer to external messaging systems.
Term
What is the purpose of predicates in SQL?
Definition
To specify the conditions that can be evaluated and are used to limit the effects of statements and queries.
Term
Which type of statements create and remove tables and views?
Definition
Schema statements.
Term
What are the five characteristics of UNIX?
Definition
Multi-user, multitasking, simplicity, flexibility, and portability.
Term
What component of UNIX allows the user to choose from many different commands that allow them to use the system to its maximum potential?
Definition
Flexibility.
Term
Memory management, system access, file system management, error handling, input and output, and resource allocation are features of what UNIX component?
Definition
Kernal.
Term
What does the w following the c in "cWtxdysz" represent?
Definition
The controller.
Term
What does the x following the t in "cwtXdysz" represent?
Definition
The bus target number.
Term
What does the y following the d in "cwtxdYsz" represent?
Definition
The drive number.
Term
What does the z following the s in "cwtxdysZ" represent?
Definition
The partition number.
Term
What are the eight types of UNIX files?
Definition
Ordinary, directory, hard link, symbolic link, sockets, named pipes, character pipes, and block devices.
Supporting users have an ad free experience!