Shared Flashcard Set

Details

IS 112 Final Exam
Networking
160
Computer Science
Undergraduate 4
06/21/2006

Additional Computer Science Flashcards

 


 

Cards

Term
For a fixed price, a site license allows an unlimited number of users to legally access an application.

True or False.
Definition
True
Term
Multitasking means performing more than one operation simultaneously.

True or False.
Definition
False
Term
A collection of one or more domain trees is known as a forest.

True or False
Definition
True
Term
In LDAP-compatible directories, a ____ is the set of definitions of the kinds of objects and object-related information that the database can contain.
a.domain c.schema
b.namespace d.partition
Definition
c.schema
Term
A(n) ____ is the record of a user that contains all of his properties, including rights to resources, password, and name.
a.schema c.workgroup
b.snap-in d.account
Definition
d.account
Term
____ is stored on the hard disk as a page file, the use of which is managed by the operating system.
a.Virtual memory c.Namespace
b.Middleware d.Physical memory
Definition
a.Virtual memory
Term
A ____ is a routine of sequential instructions that runs until it has achieved its goal.
a.page c.partition
b.process d.thread
Definition
b.process
Term
A(n) ____ is a logically separate area of storage on the hard disk.
a.thread c.object
b.process d.partition
Definition
d.partition
Term
A ____ is a group of interconnected computers that share each other’s resources without relying on a central server.
a.forest c.domain controller
b.workgroup d.root domain
Definition
b.workgroup
Term
The directory containing information about objects in a domain resides on computers called ____.
a.workgroups c.domain controllers
b.threads d.root domains
Definition
c.domain controllers
Term
The relationship between two domains in which one domain allows another domain to authenticate its users is known as ____.
a.object relationship c.file
relationship
b.time sharing d.trust relationship
Definition
d.trust relationship
Term
____ is a 128-bit number that ensures that no two objects have duplicate names.
a.SMB c.UDF
b.GUID d.MMC
Definition
b.GUID
Term
The ____ account is a predefined user account with limited privileges that allows a user to log on to the computer.
a.domain c.Administrator
b.local d.Guest
Definition
d.Guest
Term
Assigns subtasks to a specific processor.
a.AppleTalk Filing Protocol f.CDFS
b.Middleware g. UPN
c.Asymmetric multiprocessing h.Logon
d.GUI scripts
e.FAT 16 i.Tree
Definition
c.Asymmetric multiprocessing
Term
The preferred naming convention for users in e-mail and related Internet services.
a.AppleTalk Filing Protocol f.CDFS
b.Middleware g. UPN
c.Asymmetric multiprocessing h.Logon
d.GUI scripts
e.FAT 16
Definition
g.UPN
Term
Map drives to directories on the server that contain files required by client applications.
a.AppleTalk Filing Protocol f.CDFS
b.Middleware g. UPN
c.Asymmetric multiprocessing h.Logon
d.GUI scripts
e.FAT 16
Definition
h.Logon scripts
Term
Was the standard file system for early DOS and Windows-based computers.
a.AppleTalk Filing Protocol f.CDFS
b.Middleware g.UPN
c.Asymmetric multiprocessing h.Logon
d.GUI scripts
e.FAT 16 i.Tr
Definition
e.FAT 16
Term
Translates requests and responses between clients and servers.
a.AppleTalk Filing Protocol f.CDFS
b.Middleware g.UPN
c.Asymmetric multiprocessing h.Logon
d.GUI scripts
e.FAT 16 i.Tree
Definition
b.Middleware
Term
A logical representation of multiple, hierarchical levels within a directory.
a.AppleTalk Filing Protocol f.CDFS
b.Middleware g.UPN
c.Asymmetric multiprocessing h.Logon
d.GUI scripts
e.FAT 16
Definition
i.Tree
Term
Files system used to read from and write to a CD-ROM disc.
a.AppleTalk Filing Protocol f.CDFS
b.Middleware g.UPN
c.Asymmetric multiprocessing h.Logon
d.GUI scripts
e.FAT 16 i.Tree
Definition
f.CDFS
Term
/Users/jones is the login (or home) directory for the user Jones on a UNIX system.

True/False
Definition
False
Term
Every file and directory on a UNIX-type of system is owned by exactly one user and is a member of exactly one group.

True/False
Definition
True
Term
Apple and IBM use the same central processing unit, the PowerPC, in their computers.

True/False
Definition
True
Term
An implementation of UNIX for which the source code is either unavailable or available only by purchasing a licensed copy from The SCO Group is known as ____.
a.open source software c.proprietary
UNIX
b.BSD d
Definition
c.proprietary UNIX
Term
Apple Computer released Mac OS X to the public in the Spring of 2001 to replace its previously released network operating system software, ____.
a.AppleShare IP c. SPARC
b.Mach d. Solaris
Definition
a.AppleShare IP
Term
____ in a UNIX server can take the form of a disk partition, or it can be in a file.
a.Kernel modules c.i-nodes
b.Virtual memory d.Command
interpreters
Definition
b.Virtual memory
Term
A UNIX ____ is a file that contains instructions for performing a specific task such as reading data from and writing data to a hard drive.
a.UFS c. shell
b.kernel module d. pipeline
Definition
b.kernel module
Term
A(n) ____ is a method of organizing files and directories on a disk in which directories may contain files and other directories.
a.command interpreter c.daemon
b.shell d.hierarchical
file system
Definition
d.hierarchical file system
Term
Apple’s ____ is the native file system for Mac OS X Server.
a.HFS+ c. Fedora Core
b.ext3 d. i-node
Definition
a.HFS+
Term
In UNIX, you combine commands using a(n) ____.
a.lpr c. lpd
b.Mach d. pipe
Definition
d.pipe
Term
On a Linux or Solaris system, the ____ command creates a new group ID and makes the group available for use.
a.man c.root
b.chmod d.groupadd
Definition
d.groupadd
Term
UNIX-type systems enable you to restrict access to resources by assigning user and group ____ to files and directories.
a.pipelines c.shells
b.permissions d.nodes
Definition
b.permissions
Term
Changing file and directory permissions requires use of the ____ command.
a.groupadd c.lpr
b.pipe d.chmod
Definition
d.chmod
Term
All modern flavors of UNIX, Linux, and Mac OS X Server support data sharing using directory services based on ____.
a.LDAP c.NFS
b.XNU d.Samba
Definition
a.LDAP
Term
The native file system type on Linux is called ____.
a.BSD c.Fedora Core
b.HFS+ d.ext3
Definition
d.ext3
Term
Owns the UNIX trademark.
a.Source code f.Network file systems
b.The Open Group g.Samba
c.The SCO Group h.Command interpreter
d.Mac OS X Server i.File globbing
e.Kernel
Definition
b.The Open Group
Term
Runs only on Apple hardware.
a.Source code f.Network file systems
b.The Open Group g.Samba
c.The SCO Group h.Command interpreter
d.Mac OS X Server i.File globbing
e.Kernel

Runs only on Apple hardware
Definition
d.Mac OS X Server
Term
An open source application
a.Source code f.Network file systems
b.The Open Group g.Samba
c.The SCO Group h.Command interpreter
d.Mac OS X Server i.File globbing
e.Kernel
Definition
g.Samba
Term
Program that accepts and runs the commands you type on the keyboard.
a.Source code f.Network file systems
b.The Open Group g.Samba
c.The SCO Group h.Command interpreter
d.Mac OS X Server i.File globbing
e.Kernel
Definition
h.Command interpreter
Term
Owns the rights to the UNIX source code.
a.Source code f.Network file systems
b.The Open Group g.Samba
c.The SCO Group h.Command interpreter
d.Mac OS X Server i.File globbing
e.Kernel
Definition
c.The SCO Group
Term
ConsoleOne can be used either at the server or from another computer connected to the same network.

True/False
Definition
True
Term
A user is a leaf object because it contains and manages objects other than the network user it represents.

True/False
Definition
False
Term
____ are routines that enable the sever to run a range of programs and offer a variety of services.
a.Monitors c.Consoles
b.NLMs d.Contexts
Definition
b.NLMs
Term
The text-based menu that allows a network administrator to view and modify server parameters through console commands is called ____.
a.Partition c.Monitor
b.Tree object d.Pattern
Definition
c.Monitor
Term
____ is NetWare 6.5’s directory database.
a.GroupWise c.NLM
b.NetStorage d.eDirectory
Definition
d.eDirectory
Term
The ____ notation is a relatively lengthy way of expressing context that includes identifiers for the organization and OUs.
a.typeless c.GroupWise
b.typeful d.console
Definition
b.typeful
Term
____ is software that, when installed on Windows clients, allows them to access directories on a NetWare 6.5 server.
a.NetDrive c.NSS
b.Remote Manage d.X Server
Definition
a.NetDrive
Term
____ is Novell’s tool for integrating eDirectory and Windows Active Directory or Windows NT domain data.
a.BorderManager c.NetDrive
b.DirXML d.ConsoleOne
Definition
b.DirXML
Term
NetWare’s ____ is started by the program server.exe, which runs from a server’s DOS partition (over the DOS operating system) when a server boots up.
a.kernel c.base schema
b.partition d.context
Definition
a.kernel
Term
After an NLM loads into memory, it is considered part of the ____.
a.context c.boot partition
b.base schema d.kernel
Definition
d.kernel
Term
NetWare uses ____ as the basis for organizing files and directories on the server.
a.pools c.patterns
b.tree objects d.volumes
Definition
d.volumes
Term
When a change is made to NetWare’s base schema, the new schema is known as a(n) ____.
a.new schema c.revised schema
b.extended schema d.enhanced schema
Definition
b.extended schema
Term
NetWare is capable of providing clients with direct access to NSS using the clients’ ____.
a.NDS c.boot partitions
b.tree objects d.native file access
protocols
Definition
d.native file access protocols
Term
Primary boot partition from which the server.exe file runs.
a.NetWare Integrated f.iManager
Kernel g.Base schema
b.X Server h.Context
c.File system i.Printer
d.DOS partition queue
e.SYS
Definition
d.DOS partition
Term
The core of the NetWare 6.5 operating system.
a.NetWare Integrated f.iManager
Kernel g.Base schema
b.X Server h.Context
c.File system i.Printer
d.DOS partition queue
e.SYS
Definition
a.NetWare Integrated Kernel
Term
Primary GUI tool used to manage all objects in NetWare 6.5.
a.NetWare Integrated f.iManager
Kernel g.Base schema
b.X Server h.Context
c.File system i.Printer
d.DOS partition queue
e.SYS
Definition
f.iManager
Term
Consists of an object’s OU names, arranged from most specific to most general, plus the organization name.
a.NetWare Integrated f.iManager
Kernel g.Base schema
b.X Server h.Context
c.File system i.Printer
Definition
h.Context
Term
Consists of the object classes and properties a network typically requires.
a.NetWare Integrated f.iManager
Kernel g.Base schema
b.X Server h.Context
c.File system i.Printer
d.DOS partition q
Definition
g.Base schema
Term
An example of a leaf object.
a.NetWare Integrated f.iManager
Kernel g.Base schema
b.X Server h.Context
c.File system i.Printer
d.DOS partition queue
e.SYS
Definition
i.printer
Term
An operating system’s method of organizing, managing, and accessing its files.
a.NetWare Integrated f.iManager
Kernel g.Base schema
b.X Server h.Context
c.File system i.Printer
d.DOS partition
Definition
c.File system
Term
The “0” bits in a subnet mask indicate that corresponding bits in an IP address contain network information.

True/False
Definition
False
Term
Routers that rely on older routing protocols, such as RIP, are capable of interpreting classless IP addresses.

True/False
Definition
False
Term
A(n) ____ indicates where network information is located in an IP address.
a.CIDR c.subnet mask
b.gateway d.ICS host
Definition
c.subnet mask
Term
Together, the additional bits used for subnet information plus the existing network ID are known as the ____.
a.network prefix c.NAT
b.extended network prefix d.supernet
mask
Definition
b.extended network prefix
Term
____ are a combination of software and hardware that enable two different network segments to exchange data.
a.Intranets c.Softphones
b.Gateways d.ICS hosts
Definition
b.Gateways
Term
____ is the protocol responsible for moving messages from one mail server to another over TCP/IP-based networks.
a.MIME c.VoIP
b.SMTP d.PBX
Definition
b.SMTP
Term
____ is an Application layer protocol used to retrieve messages from a mail server.
a.POP c.NAT
b.MIME d.ICS
Definition
a.POP
Term
The netstat ____ command allows you to display the routing table on a given machine.
a.-a c.-r
b.-e d.-p
Definition
c.-r
Term
The ____ utility allows you to query the DNS database from any computer on the network and find the host name of a device by specifying its IP address, or vice versa.
a.nbtstat c.tracert
b.netstat d.nslookup
Definition
d.nslookup
Term
The ____ utility uses ICMP to trace the path from one networked node to another, identifying all intermediate hops between the two nodes.
a.dig c.nslookup
b.netstat d.traceroute
Definition
d.traceroute
Term
The ____ utility performs the same TCP/IP configuration and management as the ipconfig utility, but applies to Windows 9x and Me operating systems.
a.netstat c.whois
b.dig d.winipcfg
Definition
d.winipcfg
Term
In classful addressing, the network information portion of an IP address (the network ID) is limited to the first ____ bits in a Class A address.
a.4 c.8
b.6 d.10
Definition
c.8
Term
Consists of four 8-bit octets (or bytes) that can be expressed in either binary or dotted decimal notation.
a.IP address f.ICS host
b.Subnetting g. SMTP
c.Broadcast address h. MIME
d.CIDR notation i. dig
e.Internet gateway
Definition
a.IP address
Term
Octet(s) that represent host information are set to equal all 1s, or in decimal notation 255.
a.IP address f.ICS host
b.Subnetting g. SMTP
c.Broadcast address h. MIME
d.CIDR notation i. dig
e.Internet gateway
Definition
c.Broadcast address
Term
Incapable of doing anything more than transporting mail or holding it in a queue.
a.IP address f.ICS host
b.Subnetting g. SMTP
c.Broadcast address h. MIME
d.CIDR notation i. dig
e.Internet gateway
Definition
g.SMTP
Term
Takes the form of the network ID followed by a forward slash (/), followed by the number of bits that are used for the extended network prefix.
a.IP address f.ICS host
b.Subnetting g. SMTP
c.Broadcast address h. MIME
d.CIDR notation i.
Definition
d.CIDR notation
Term
A TCP/IP utility similar to nslookup.
a.IP address f.ICS host
b.Subnetting g. SMTP
c.Broadcast address h. MIME
d.CIDR notation i. dig
e.Internet gateway
Definition
i.dig
Term
Separates a network into multiple logically defined segments, or subnets.
a.IP address f.ICS host
b.Subnetting g. SMTP
c.Broadcast address h. MIME
d.CIDR notation i. dig
e.Internet gateway
Definition
b.Subnetting
Term
Identifies each element of a mail message according to content type.
a.IP address f.ICS host
b.Subnetting g. SMTP
c.Broadcast address h. MIME
d.CIDR notation i. dig
e.Internet gateway
Definition
h.MIME
Term
Requires two network connections: one that connects to the Internet and one that connects to the LAN.
a.IP address f.ICS host
b.Subnetting g. SMTP
c.Broadcast address h. MIME
d.CIDR notation i. dig
e.Internet gateway
Definition
f.ICS host
Term
Tone generators and tone locators can be used to determine the characteristics of a cable, such as whether it has defects or whether its length exceeds IEEE standards for a certain type of network.

True/False
Definition
False
Term
You can use a continuity tester on a live network cable.

True/False
Definition
False
Term
A(n) ____ is a small electronic device that issues a signal on a wire pair.
a.runt c.tone generator
b.network analyzer d.tone locator
Definition
c.tone generator
Term
A(n) ____ should never be used on a wire that is connected to a device’s port or network adapter.
a.tone locator c.voltmeter
b.continuity tester d.tone generator
Definition
d.tone generator
Term
The instrument that measures the pressure, or voltage, of an electric current is called a(n) ____.
a.ohmmeter c.voltmeter
b.multimeter d.tone locator
Definition
c.voltmeter
Term
____ is a fundamental property of wire that depends on a wire’s molecular structure and size.
a.Voltage c.Baseline
b.Resistance d.TDR
Definition
b.Resistance
Term
The device used to measure resistance is called a(n) ____.
a.time domain reflectometer
b.spectral analyzer
c.optical time domain reflectometer
d.ohmmeter
Definition
d.ohmmeter
Term
When used on a copper-based cable, a(n) ____ applies a small amount of voltage to each conductor at one end of the cable, and then checks whether that voltage is detectable at the other end.
a.jabber c.voltmeter
b.continuity tester d.network monit
Definition
b.continuity tester
Term
A(n) ____ issues a signal on a cable and then measures the way the signal bounces back to it.
a.cable performance tester
b.tone generator
c.time domain reflectometer
d.tone locater
Definition
c.time domain reflectometer
Term
A (n) ____ is a tool that can capture traffic and also analyze frames.
a.runt c.protocol analyzer
b.ghost d.TDR
Definition
c.protocol analyzer
Term
The combination of a tone generator and a tone locator is called a(n) ____.
a.fox and hound c.jabber
b.continuity testerd. d.network monitor
Definition
a.fox and hound
Term
Tools used to determine whether your cable is carrying a signal to its destination are called ____.
a.jabber c.cable tester
b.ghost d.continuity testers
Definition
d.continuity testers
Term
Used to track changes on a network.
a.First step in troublesh
b.Network change recordsooting
c.Software error
d.Ports
e.Impedance
f.Centrally located database
g.Help desk analyst
h.Call tracking system
i.Crossover cable
Definition
b.Network change recordsooting
Term
Very high or low levels can signify a damaged wire, incorrect pairing, or a termination point.
a.First step in troublesh
b.Network change recordsooting
c.Software error
d.Ports
e.Impedance
f.Centrally located database
g.Help desk analyst
h.Call t
Definition
e.Impedance
Term
Often considered first-level support.
a.First step in troublesh
b.Network change recordsooting
c.Software error
d.Ports
e.Impedance
f.Centrally located database
g.Help desk analyst
h.Call tracking system
i.Crossover cable
Definition
g.Help desk analyst
Term
Effective way to document problems and solutions.
a.First step in troubleshooting
b.Network change records
c.Software error
d.Ports
e.Impedance
f.Centrally located database
g.Help desk analyst
h.Call tracking system
i.Crossover cable
Definition
f.Centrally located database
Term
Can be operational one day and faulty the next.
a.First step in troubleshooting
b.Network change records
c.Software error
d.Ports
e.Impedance
f.Centrally located database
g.Help desk analyst
h.Call tracking system
i.Crossover cable
Definition
d.Ports
Term
The transmit and receive wire pairs in one of the connectors are reversed.
a.First step in troubleshooting
b.Network change records
c.Software error
d.Ports
e.Impedance
f.Centrally located database
g.Help desk analyst
h.Call tracking system
i.Cr
Definition
i.Crossover cable
Term
Identify the specific symptoms of the problem.
a.First step in troubleshooting
b.Network change records
c.Software error
d.Ports
e.Impedance
f.Centrally located database
g.Help desk analyst
h.Call tracking system
i.Crossover cable
Definition
a.First step in troubleshooting
Term
Software that provides a user-friendly graphical interface that prompts the user for every piece of information associated with the problem.
a.First step in troubleshooting
b.Network change records
c.Software error
d.Ports
e.Impedance
f.Centrally l
Definition
h.Call tracking system
Term
On a LAN, a star topology and a parallel backbone provide the greatest fault tolerance.


True/False
Definition
True
Term
In RAID Level 3 a parity bit is assigned to each data byte when it is transmitted or written to a disk.

True/False
Definition
True
Term
Viruses do not alter other programs in the same way that other threats do, but they may carry worms.

True/False
Definition
False
Term
Polymorphic viruses are programmed to activate on a particular date.

True/False
Definition
False
Term
If your antivirus software resides on the server and checks every file and transaction, you will protect important files and increase your network performance considerably.

True/False
Definition
False
Term
____ of a file or system refers to how consistently and reliably it can be accessed by authorized personnel.
a.Availability c.The integrity
b.Full backup d.The parity
Definition
a.Availability
Term
A fluctuation in voltage levels caused by other devices on the network or electromagnetic interference is called ____.
a.cold spare c.brownout
b.blackout d.noise
Definition
d.noise
Term
In a critical component such as a router or switch, the utmost fault tolerance necessitates the use of redundant NICs, power supplies, cooling fans, interfaces, and I/O modules, all of which should ideally be able to immediately assume the duties of an id
Definition
b.fail-over
Term
____ is a fault-tolerance technique that links multiple servers together to act as a single server.
a.Clustering c.NAS
b.RAID d.IRC
Definition
a.Clustering
Term
RAID Level 0 is also referred to as ____.
a.clustering c.cold spare
b.hot spare d.disk striping
Definition
d.disk striping
Term
In ____, data is continually copied from one disk to another when it is saved, just as in disk mirroring.
a.disk duplexing c.server mirroring
b.parity error checking d.signature
scanning
Definition
a.disk duplexing
Term
A(n) ____ can be written to once and can store up to 650 MB of data.
a.CD-R c.CD-RW
b.recordable DVD d.array
Definition
a.CD-R
Term
External disk drives are also known as ____.
a.floppy disks c.compact disks
b.hard drives d.removable disk drives
Definition
d.removable disk drives
Term
A(n) ____ is a place where the computers, devices, and connectivity necessary to rebuild a network exist, but they are not appropriately configured, updated, or connected.
a.hot site c.cold site
b.hot spare d.vault
Definition
c.cold site
Term
Scanning techniques that attempt to identify viruses by discovering “virus-like” behavior are known as ____.
a.polymorphic scanning c.signature
scanning
b.heuristic scanning d.integrity
checking
Definition
b.heuristic scanning
Term
Identical components that can be changed while a machine is still running.
a.Trojan horse f.Warm site
b.Stealth viruse g.Hot site
c.Sag h.Redundancy
d.Hot swappable i.Virus
e.Replication
Definition
d.Hot swappable
Term
Place where the computers, devices, and connectivity necessary to rebuild a network exist, and all are appropriately configured, updated, and connected to match your network’s current state.
a.Trojan horse f.Warm site
b.Stealth viruse g.Hot site
Definition
g.Hot site
Term
Place where the computers, devices, and connectivity necessary to rebuild a network exist, with some appropriately configured, updated, or connected.
a.Trojan horse f.Warm site
b.Stealth viruse g.Hot site
c.Sag h.Redundancy
d.Hot sw
Definition
f.Warm site
Term
A momentary decrease in voltage.
a.Trojan horse f.Warm site
b.Stealth viruse g.Hot site
c.Sag h.Redundancy
d.Hot swappable i.Virus
e.Replication
Definition
c.Sag
Term
Dynamic copying of data from one location to another.
a.Trojan horse f.Warm site
b.Stealth viruse g.Hot site
c.Sag h.Redundancy
d.Hot swappable i.Virus
e.Replication
Definition
e.Replication
Term
Packet-filtering firewalls operate at the Application layer of the OSI Model.

True/False
Definition
False
Term
The password authentication protocol is a simple authentication protocol that is very secure.

True/False
Definition
False
Term
A(n) ____ is a software application on a network host that acts as an intermediary between the external and internal networks, screening all incoming and outgoing traffic.
a.session c.principal
b.proxy service d.network key
Definition
b.proxy service
Term
In ____, data is encrypted using a single key that only the sender and the receiver know.
a.symmetric encryption c.public key
encryption
b.asymmetric encryption d.private key
encryption
Definition
d.private key encryption
Term
In ____, data is encrypted using two keys: One is a key known only to a user (that is, a private key), and the other is a public key associated with the user.
a.asymmetric encryption c.HTTP
b.public key encryption d.private key
Definition
b.public key encryption
Term
Because public key encryption requires the use of two different keys, it is also known as ____.
a.asymmetric encryption c.IPSec
b.symmetric encryption d.Kerberos
Definition
a.asymmetric encryption
Term
A(n) ____ is a password-protected and encrypted file that holds an individual’s identification information, including a public key.
a.ticket c.digital certificate
b.session d.key pair
Definition
c.digital certificate
Term
____ is a method of encrypting TCP/IP transmissions - including Web pages and data entered into Web forms - en route between the client and server using public key encryption technology.
a.TGS c.TGT
b.SSL d.TLS
Definition
b.SSL
Term
____ occurs when a hacker forges name server records to falsify his host’s identity.
a.IP spoofing c.Encapsulation
b.DNS spoofing d.Bio-recognition
access
Definition
b.DNS spoofing
Term
____ protocol defines encryption, authentication, and key management for TCP/IP transmissions.
a.SCP c.SFTP
b.SSH d.IPSec
Definition
d.IPSec
Term
____ is a service defined by the IETF that runs over UDP and provides centralized network authentication and accounting for multiple users.
a.ESP c.RADIUS
b.HTTP d.DES
Definition
c.RADIUS
Term
In Kerberos terminology, the server that issues keys to clients during initial client authentication is known as the ____.
a.authenticator c.proxy
b.KDC d.gateway
Definition
b.KDC
Term
For some measure of security, 802.11 allows for optional encryption using the ____ standard.
a.MS_CHAP c.IPSec
b.Kerberos d.Wired Equivalent
Privacy
Definition
d.Wired Equivalent Privacy
Term
Occurs when a system becomes unable to function because it has been deluged with data transmissions or otherwise disrupted.
a.Hacker f.Diffie-Hellman
b.Denial-of-service g.Secure CoPy
attack h.Principal
c.Security policy
Definition
b.Denial-of-service attack
Term
A specialized device, or a computer installed with specialized software, that selectively filters or blocks traffic between networks.
a.Hacker f.Diffie-Hellman
b.Denial-of-service g.Secure CoPy
attack h.Principal
c.Security p
Definition
d.Firewall
Term
The first public, or asymmetric, key algorithm.
a.Hacker f.Diffie-Hellman
b.Denial-of-service g.Secure CoPy
attack h.Principal
c.Security policy i.Proxy server
d.Firewall
e.Encryption
Definition
f.Diffie-Hellman
Term
Term used to describe individuals who gain unauthorized access to voice or data networks, with or without malicious intent.
a.Hacker f.Diffie-Hellman
b.Denial-of-service g.Secure CoPy
attack h.Principal
c.Security policy
Definition
a.Hacker
Term
A utility that allows you to copy files from one host to another securely.
a.Hacker f.Diffie-Hellman
b.Denial-of-service g.Secure CoPy
attack h.Principal
c.Security policy i.Proxy server
d.Firewall
e.Encryption
Definition
g.Secure CoPy
Term
The use of an algorithm to scramble data into a format that can be read only by reversing the algorithm.
a.Hacker f.Diffie-Hellman
b.Denial-of-service g.Secure CoPy
attack h.Principal
c.Security policy i.Proxy server
d.
Definition
e.Encryption
Term
Must address an organization’s specific security risks.
a.Hacker f.Diffie-Hellman
b.Denial-of-service g.Secure CoPy
attack h.Principal
c.Security policy i.Proxy server
d.Firewall
e.Encryption
Definition
c.Security policy
Term
The feasibility study should help determine whether you can achieve the project goals within the given time, budgetary, and staffing constraints.

True/False
Definition
True
Term
SNMP is part of the TCP/IP suite of protocols and typically runs over UDP on port 161.

True/False
Definition
True
Term
Adding a new processor to a server, a new NIC to a router, or more memory to a printer never affects your service or warranty agreement with the manufacturer.

True/False
Definition
False
Term
A feasibility study involves interviewing users and comparing perceptions to factual data.

True/False
Definition
False
Term
A(n) ____ is a reference point that marks the completion of a major task or group of tasks in the project and contributes to measuring the project’s progress.
a.poll c.patch
b.milestone d.service pack
Definition
b.milestone
Term
A(n) ____ is the process of clarifying the reasons and objectives underlying a proposed change.
a.project assessment c.needs assessment
b.network poll d.performance
assessment
Definition
c.needs assessment
Term
A(n) ____ is a popular method for depicting when projects begin and end along a horizontal timeline.
a.Gantt chart c.service pack
b.contingency plan d.MRTG
Definition
a.Gantt chart
Term
____ refers to the assessment, monitoring, and maintenance of all aspects of a network.
a.Project management c.User
management
b.Asset management d.Network
management
Definition
d.Network management
Term
A(n) ____ agent is a software routine that collects information about the device’s operation and provides it to the network management application running on the console.
a.fault management c.network
management
b.user managemen
Definition
c.network management
Term
____ is a command-line utility that uses SNMP to poll devices, collects data in a log file, then generates HTML-based views of the data.
a.MIB c.TCP
b.MRTG d.SMTP
Definition
b.MRTG
Term
The ____ is responsible for facilitating regular, effective communication among project participants.
a.stakeholder c.project manager
b.shareholder d.sponsor
Definition
c.project manager
Term
A(n) network ____ represents the main conduit for data on LANs and WANs, connecting major routers, servers, and switches.
a.milestone c.poll
b.upgrade d.backbone
Definition
d.backbone
Term
A(n) ____ is a report of the network’s current state of operation.
a.service pack c.baseline
b.upgrade d.poll
Definition
c.baseline
Term
The ____ is used by agents to communicate information about managed devices.
a.SMTP c.SNMP
b.MIB d.MRTG
Definition
c.SNMP
Term
Should be performed for any large-scale project before resources are committed to that project.
a.Feasibility study f.Service packs
b.Sponsors g.Bug
c.Pilot network h.Backleveling
d.Baseline measurements i.Migrating
e,MRTG
Definition
a.Feasibility study
Term
A flaw in a software application that causes some part of the application to malfunction.
a.Feasibility study f.Service packs
b.Sponsors g.Bug
c.Pilot network h.Backleveling
d.Baseline measurements i.Migrating
e,MRTG
Definition
g.Bug
Term
Allow(s) you to compare future performance increases or decreases caused by network changes with past network performance.
a.Feasibility study f.Service packs
b.Sponsors g.Bug
c.Pilot network h.Backleveling
d.Baseline measurements i.Mi
Definition
d.Baseline measurements
Term
Windows operating system patches.
a.Feasibility study f.Service packs
b.Sponsors g.Bug
c.Pilot network h.Backleveling
d.Baseline measurements i.Migrating
e,MRTG from Token
Ring to
Definition
f.Service packs
Term
Should be similar enough to closely mimic the larger network’s hardware, software, connectivity, unique configurations, and load.
a.Feasibility study f.Service packs
b.Sponsors g.Bug
c.Pilot network h.Backleveling
d.Baseline measuremen
Definition
c.Pilot network
Term
Process of reverting to a previous version of software after attempting to upgrade.
a.Feasibility study f.Service packs
b.Sponsors g.Bug
c.Pilot network h.Backleveling
d.Baseline measurements i.Migrating
e,MRTG from
Definition
h.Backleveling
Supporting users have an ad free experience!