Term
| What is at the top of an NDS tree? |
|
Definition
|
|
Term
| Which of the following is the oldest NOS? |
|
Definition
|
|
Term
| A DNS server is an example of which of the following? |
|
Definition
|
|
Term
| Which of the following runs completely from a CD or DVD without the need to install it on a system's hard disk? |
|
Definition
|
|
Term
| Which of the following makes Unix appear as a Windows server for file sharing? |
|
Definition
|
|
Term
| When you scale up, you add more servers of the same time. |
|
Definition
|
|
Term
| most server applications are resource intensive |
|
Definition
|
|
Term
| Data incompatibility is a software issue |
|
Definition
|
|
Term
| You should place servers local to the devices that most often need access to them. |
|
Definition
|
|
Term
| A firewall is used to isolate a perimeter network from the rest of a LAN. |
|
Definition
|
|
Term
| Around how many NAPs are there today in the United States? |
|
Definition
|
|
Term
| What is the goal of the needs analysis step of the basic design process? |
|
Definition
| produce a logical network design |
|
|
Term
| What is the maximum downstream rate for ASDL? |
|
Definition
|
|
Term
| Which of the following is usually the busiest and most important part of a network? |
|
Definition
|
|
Term
| What is the key deliverable of the physical network design step? |
|
Definition
| a set of one or more physical network designs |
|
|
Term
| The Internet is hierarchical in structure |
|
Definition
|
|
Term
| Higher-level ISPs typically do not charge lower-level ISPs to transmit their data. |
|
Definition
|
|
Term
| The maximum length of the local loop when using VDSL is 1000 feet. |
|
Definition
|
|
Term
| Capacity planning requires assessment of the current and future circuit loading. |
|
Definition
|
|
Term
| An RFP is a thumbnail sketch of what you need that specifies what equipment, software, and services are desired. |
|
Definition
|
|
Term
| Which of the following resets the archive bit as each file is backed up? |
|
Definition
|
|
Term
| Which of the following backs up files based on the file's Date modified property? |
|
Definition
|
|
Term
| What do packet errors typically indicate? |
|
Definition
| that a nic is malfunctioning |
|
|
Term
| If CPU usage is frequently over ____, the CPU is a potential performance bottleneck |
|
Definition
|
|
Term
| Which SNMP command do administrators use to request information from the agent on a manageable device? |
|
Definition
|
|
Term
| Level 1 support staff are responsible for resolving desktop application issues. |
|
Definition
|
|
Term
| When a file's archive bit is set off, it indicates that the file has changed and needs to be backed up. |
|
Definition
|
|
Term
| RAID 5 requires at least two hard disks. |
|
Definition
|
|
Term
| DMI is the emerging standard in ESD software. |
|
Definition
|
|
Term
| SNMP is included as a standard part of the TCP/IP protocol suite. |
|
Definition
|
|
Term
| According to various surveys, which of the following events was least likely to be experienced by an organization? |
|
Definition
|
|
Term
| Which of the following is not a primary goal in providing security? |
|
Definition
|
|
Term
| Which of the following policy settings would you use to set password expiration? |
|
Definition
|
|
Term
| Which of the following is used to manage Active Directory accounts? |
|
Definition
| active directory users and computers utility |
|
|
Term
| Which of the following is an example of a Windows account lockout policy? |
|
Definition
|
|
Term
| The number of Internet security incidents reported to CERT doubled nearly every year between 1997 and 2003. |
|
Definition
|
|
Term
| Most cases of unauthorized access involve external attackers. |
|
Definition
|
|
Term
| Most multimedia files are a form of an executable file. |
|
Definition
|
|
Term
| An organization's data is one of its most important assets. |
|
Definition
|
|
Term
| Firewalls are usually a combination of hardware and software. |
|
Definition
|
|
Term
| ________ ________ is a Linux-based platform that supports the same functionality as NetWare. |
|
Definition
|
|
Term
| What does a GNU public license provide? |
|
Definition
| A GNU public license allows you to modify a distribution as long as you include the source code when you redistribute it. |
|
|
Term
| What is the dominant standard for cable modem access? |
|
Definition
| The Data over Cable Service Interface Specification (DOCSIS) standard is the dominant standard for cable modem access. |
|
|
Term
| The _________ -_______ design process starts with a few standard components and uses them over and over. |
|
Definition
|
|
Term
|
Definition
| areas with less than optimal performance |
|
|
Term
|
Definition
| Fault tolerance involves designing a network so that it able to withstand a partial failure and continue to operate, albeit with some impact on performance. Fault tolerance requires redundancy. |
|
|
Term
| The ______ ______ records the number of disk accesses waiting to be serviced. |
|
Definition
|
|
Term
|
Definition
| With warm redundancy, you have hardware, operating system, and software in place, but the data on the redundant server isn't synchronized with the main server. |
|
|
Term
| A virus can be recognized by its _________. |
|
Definition
|
|
Term
| What are the three primary goals of security? |
|
Definition
| confidentiality, integrity, availability |
|
|
Term
|
Definition
| c country, o organization, ou organizational unit,cn leaf way of labeling in netware administration |
|
|
Term
| essay windows interoperability |
|
Definition
| way that windows can run other platforms such as unix, netware |
|
|
Term
|
Definition
| circuit costs, devices, hardware, software, network management, test and maintenance, cost to operate |
|
|
Term
|
Definition
| normal used to backup all data, differential use the archive bit to determine whether a file has changed and does not reset archive bit, incremental archive bit is reset as each file is backed up takes less time to backup longer to restore |
|
|
Term
|
Definition
| cpu usage, memory usage, network traffic, disk read/write |
|
|
Term
|
Definition
| enforce different passwords, max password age, min password age, min legnth, complexity requirements, store using encryption |
|
|
Term
| essay different infections |
|
Definition
| worms spread themselves, trojan appears to be one thing but is another, rootkit program that hides itself and allow ppl to sneak in, spyware collects information about users activities, adware advertises with popups about ur location |
|
|