Term
What is at the top of an NDS tree? |
|
Definition
|
|
Term
Which of the following is the oldest NOS? |
|
Definition
|
|
Term
A DNS server is an example of which of the following? |
|
Definition
|
|
Term
Which of the following runs completely from a CD or DVD without the need to install it on a system's hard disk? |
|
Definition
|
|
Term
Which of the following makes Unix appear as a Windows server for file sharing? |
|
Definition
|
|
Term
When you scale up, you add more servers of the same time. |
|
Definition
|
|
Term
most server applications are resource intensive |
|
Definition
|
|
Term
Data incompatibility is a software issue |
|
Definition
|
|
Term
You should place servers local to the devices that most often need access to them. |
|
Definition
|
|
Term
A firewall is used to isolate a perimeter network from the rest of a LAN. |
|
Definition
|
|
Term
Around how many NAPs are there today in the United States? |
|
Definition
|
|
Term
What is the goal of the needs analysis step of the basic design process? |
|
Definition
produce a logical network design |
|
|
Term
What is the maximum downstream rate for ASDL? |
|
Definition
|
|
Term
Which of the following is usually the busiest and most important part of a network? |
|
Definition
|
|
Term
What is the key deliverable of the physical network design step? |
|
Definition
a set of one or more physical network designs |
|
|
Term
The Internet is hierarchical in structure |
|
Definition
|
|
Term
Higher-level ISPs typically do not charge lower-level ISPs to transmit their data. |
|
Definition
|
|
Term
The maximum length of the local loop when using VDSL is 1000 feet. |
|
Definition
|
|
Term
Capacity planning requires assessment of the current and future circuit loading. |
|
Definition
|
|
Term
An RFP is a thumbnail sketch of what you need that specifies what equipment, software, and services are desired. |
|
Definition
|
|
Term
Which of the following resets the archive bit as each file is backed up? |
|
Definition
|
|
Term
Which of the following backs up files based on the file's Date modified property? |
|
Definition
|
|
Term
What do packet errors typically indicate? |
|
Definition
that a nic is malfunctioning |
|
|
Term
If CPU usage is frequently over ____, the CPU is a potential performance bottleneck |
|
Definition
|
|
Term
Which SNMP command do administrators use to request information from the agent on a manageable device? |
|
Definition
|
|
Term
Level 1 support staff are responsible for resolving desktop application issues. |
|
Definition
|
|
Term
When a file's archive bit is set off, it indicates that the file has changed and needs to be backed up. |
|
Definition
|
|
Term
RAID 5 requires at least two hard disks. |
|
Definition
|
|
Term
DMI is the emerging standard in ESD software. |
|
Definition
|
|
Term
SNMP is included as a standard part of the TCP/IP protocol suite. |
|
Definition
|
|
Term
According to various surveys, which of the following events was least likely to be experienced by an organization? |
|
Definition
|
|
Term
Which of the following is not a primary goal in providing security? |
|
Definition
|
|
Term
Which of the following policy settings would you use to set password expiration? |
|
Definition
|
|
Term
Which of the following is used to manage Active Directory accounts? |
|
Definition
active directory users and computers utility |
|
|
Term
Which of the following is an example of a Windows account lockout policy? |
|
Definition
|
|
Term
The number of Internet security incidents reported to CERT doubled nearly every year between 1997 and 2003. |
|
Definition
|
|
Term
Most cases of unauthorized access involve external attackers. |
|
Definition
|
|
Term
Most multimedia files are a form of an executable file. |
|
Definition
|
|
Term
An organization's data is one of its most important assets. |
|
Definition
|
|
Term
Firewalls are usually a combination of hardware and software. |
|
Definition
|
|
Term
________ ________ is a Linux-based platform that supports the same functionality as NetWare. |
|
Definition
|
|
Term
What does a GNU public license provide? |
|
Definition
A GNU public license allows you to modify a distribution as long as you include the source code when you redistribute it. |
|
|
Term
What is the dominant standard for cable modem access? |
|
Definition
The Data over Cable Service Interface Specification (DOCSIS) standard is the dominant standard for cable modem access. |
|
|
Term
The _________ -_______ design process starts with a few standard components and uses them over and over. |
|
Definition
|
|
Term
|
Definition
areas with less than optimal performance |
|
|
Term
|
Definition
Fault tolerance involves designing a network so that it able to withstand a partial failure and continue to operate, albeit with some impact on performance. Fault tolerance requires redundancy. |
|
|
Term
The ______ ______ records the number of disk accesses waiting to be serviced. |
|
Definition
|
|
Term
|
Definition
With warm redundancy, you have hardware, operating system, and software in place, but the data on the redundant server isn't synchronized with the main server. |
|
|
Term
A virus can be recognized by its _________. |
|
Definition
|
|
Term
What are the three primary goals of security? |
|
Definition
confidentiality, integrity, availability |
|
|
Term
|
Definition
c country, o organization, ou organizational unit,cn leaf way of labeling in netware administration |
|
|
Term
essay windows interoperability |
|
Definition
way that windows can run other platforms such as unix, netware |
|
|
Term
|
Definition
circuit costs, devices, hardware, software, network management, test and maintenance, cost to operate |
|
|
Term
|
Definition
normal used to backup all data, differential use the archive bit to determine whether a file has changed and does not reset archive bit, incremental archive bit is reset as each file is backed up takes less time to backup longer to restore |
|
|
Term
|
Definition
cpu usage, memory usage, network traffic, disk read/write |
|
|
Term
|
Definition
enforce different passwords, max password age, min password age, min legnth, complexity requirements, store using encryption |
|
|
Term
essay different infections |
|
Definition
worms spread themselves, trojan appears to be one thing but is another, rootkit program that hides itself and allow ppl to sneak in, spyware collects information about users activities, adware advertises with popups about ur location |
|
|