Shared Flashcard Set

Details

cst 1810
final
57
Advertising
Graduate
12/15/2011

Additional Advertising Flashcards

 


 

Cards

Term
What is at the top of an NDS tree?
Definition
users
Term
Which of the following is the oldest NOS?
Definition
unix
Term
A DNS server is an example of which of the following?
Definition
network support service
Term
Which of the following runs completely from a CD or DVD without the need to install it on a system's hard disk?
Definition
KNOPPIX
Term
Which of the following makes Unix appear as a Windows server for file sharing?
Definition
samba
Term
When you scale up, you add more servers of the same time.
Definition
false
Term
most server applications are resource intensive
Definition
true
Term
Data incompatibility is a software issue
Definition
true
Term
You should place servers local to the devices that most often need access to them.
Definition
true
Term
A firewall is used to isolate a perimeter network from the rest of a LAN.
Definition
true
Term
Around how many NAPs are there today in the United States?
Definition
12
Term
What is the goal of the needs analysis step of the basic design process?
Definition
produce a logical network design
Term
What is the maximum downstream rate for ASDL?
Definition
6mbps
Term
Which of the following is usually the busiest and most important part of a network?
Definition
core layer
Term
What is the key deliverable of the physical network design step?
Definition
a set of one or more physical network designs
Term
The Internet is hierarchical in structure
Definition
true
Term
Higher-level ISPs typically do not charge lower-level ISPs to transmit their data.
Definition
false
Term
The maximum length of the local loop when using VDSL is 1000 feet.
Definition
false
Term
Capacity planning requires assessment of the current and future circuit loading.
Definition
true
Term
An RFP is a thumbnail sketch of what you need that specifies what equipment, software, and services are desired.
Definition
true
Term
Which of the following resets the archive bit as each file is backed up?
Definition
incremental backup
Term
Which of the following backs up files based on the file's Date modified property?
Definition
daily backup
Term
What do packet errors typically indicate?
Definition
that a nic is malfunctioning
Term
If CPU usage is frequently over ____, the CPU is a potential performance bottleneck
Definition
90%
Term
Which SNMP command do administrators use to request information from the agent on a manageable device?
Definition
get
Term
Level 1 support staff are responsible for resolving desktop application issues.
Definition
true
Term
When a file's archive bit is set off, it indicates that the file has changed and needs to be backed up.
Definition
false
Term
RAID 5 requires at least two hard disks.
Definition
false
Term
DMI is the emerging standard in ESD software.
Definition
true
Term
SNMP is included as a standard part of the TCP/IP protocol suite.
Definition
true
Term
According to various surveys, which of the following events was least likely to be experienced by an organization?
Definition
sabotage
Term
Which of the following is not a primary goal in providing security?
Definition
accuracy
Term
Which of the following policy settings would you use to set password expiration?
Definition
maximum password age
Term
Which of the following is used to manage Active Directory accounts?
Definition
active directory users and computers utility
Term
Which of the following is an example of a Windows account lockout policy?
Definition
all of the above
Term
The number of Internet security incidents reported to CERT doubled nearly every year between 1997 and 2003.
Definition
true
Term
Most cases of unauthorized access involve external attackers.
Definition
false
Term
Most multimedia files are a form of an executable file.
Definition
true
Term
An organization's data is one of its most important assets.
Definition
true
Term
Firewalls are usually a combination of hardware and software.
Definition
true
Term
________ ________ is a Linux-based platform that supports the same functionality as NetWare.
Definition
open enterprise
Term
What does a GNU public license provide?
Definition
A GNU public license allows you to modify a distribution as long as you include the source code when you redistribute it.
Term
What is the dominant standard for cable modem access?
Definition
The Data over Cable Service Interface Specification (DOCSIS) standard is the dominant standard for cable modem access.
Term
The _________ -_______ design process starts with a few standard components and uses them over and over.
Definition
building block
Term
What are bottlenecks?
Definition
areas with less than optimal performance
Term
What is fault tolerance?
Definition
Fault tolerance involves designing a network so that it able to withstand a partial failure and continue to operate, albeit with some impact on performance. Fault tolerance requires redundancy.
Term
The ______ ______ records the number of disk accesses waiting to be serviced.
Definition
disk queue
Term
What is warm redundancy?
Definition
With warm redundancy, you have hardware, operating system, and software in place, but the data on the redundant server isn't synchronized with the main server.
Term
A virus can be recognized by its _________.
Definition
signature
Term
What are the three primary goals of security?
Definition
confidentiality, integrity, availability
Term
essay for labels
Definition
c country, o organization, ou organizational unit,cn leaf way of labeling in netware administration
Term
essay windows interoperability
Definition
way that windows can run other platforms such as unix, netware
Term
essay developing plan
Definition
circuit costs, devices, hardware, software, network management, test and maintenance, cost to operate
Term
essay different backups
Definition
normal used to backup all data, differential use the archive bit to determine whether a file has changed and does not reset archive bit, incremental archive bit is reset as each file is backed up takes less time to backup longer to restore
Term
essay what to monitor
Definition
cpu usage, memory usage, network traffic, disk read/write
Term
essay lockout policies
Definition
enforce different passwords, max password age, min password age, min legnth, complexity requirements, store using encryption
Term
essay different infections
Definition
worms spread themselves, trojan appears to be one thing but is another, rootkit program that hides itself and allow ppl to sneak in, spyware collects information about users activities, adware advertises with popups about ur location
Supporting users have an ad free experience!