Term
For a fixed price, a site license allows an unlimited number of users to legally access an application.
True or False. |
|
Definition
|
|
Term
Multitasking means performing more than one operation simultaneously.
True or False. |
|
Definition
|
|
Term
A collection of one or more domain trees is known as a forest.
True or False |
|
Definition
|
|
Term
In LDAP-compatible directories, a ____ is the set of definitions of the kinds of objects and object-related information that the database can contain. a.domain c.schema b.namespace d.partition |
|
Definition
|
|
Term
A(n) ____ is the record of a user that contains all of his properties, including rights to resources, password, and name. a.schema c.workgroup b.snap-in d.account |
|
Definition
|
|
Term
____ is stored on the hard disk as a page file, the use of which is managed by the operating system. a.Virtual memory c.Namespace b.Middleware d.Physical memory |
|
Definition
|
|
Term
A ____ is a routine of sequential instructions that runs until it has achieved its goal. a.page c.partition b.process d.thread |
|
Definition
|
|
Term
A(n) ____ is a logically separate area of storage on the hard disk. a.thread c.object b.process d.partition |
|
Definition
|
|
Term
A ____ is a group of interconnected computers that share each other’s resources without relying on a central server. a.forest c.domain controller b.workgroup d.root domain |
|
Definition
|
|
Term
The directory containing information about objects in a domain resides on computers called ____. a.workgroups c.domain controllers b.threads d.root domains |
|
Definition
|
|
Term
The relationship between two domains in which one domain allows another domain to authenticate its users is known as ____. a.object relationship c.file relationship b.time sharing d.trust relationship |
|
Definition
|
|
Term
____ is a 128-bit number that ensures that no two objects have duplicate names. a.SMB c.UDF b.GUID d.MMC |
|
Definition
|
|
Term
The ____ account is a predefined user account with limited privileges that allows a user to log on to the computer. a.domain c.Administrator b.local d.Guest |
|
Definition
|
|
Term
Assigns subtasks to a specific processor. a.AppleTalk Filing Protocol f.CDFS b.Middleware g. UPN c.Asymmetric multiprocessing h.Logon d.GUI scripts e.FAT 16 i.Tree |
|
Definition
c.Asymmetric multiprocessing |
|
|
Term
The preferred naming convention for users in e-mail and related Internet services. a.AppleTalk Filing Protocol f.CDFS b.Middleware g. UPN c.Asymmetric multiprocessing h.Logon d.GUI scripts e.FAT 16 |
|
Definition
|
|
Term
Map drives to directories on the server that contain files required by client applications. a.AppleTalk Filing Protocol f.CDFS b.Middleware g. UPN c.Asymmetric multiprocessing h.Logon d.GUI scripts e.FAT 16 |
|
Definition
|
|
Term
Was the standard file system for early DOS and Windows-based computers. a.AppleTalk Filing Protocol f.CDFS b.Middleware g.UPN c.Asymmetric multiprocessing h.Logon d.GUI scripts e.FAT 16 i.Tr |
|
Definition
|
|
Term
Translates requests and responses between clients and servers. a.AppleTalk Filing Protocol f.CDFS b.Middleware g.UPN c.Asymmetric multiprocessing h.Logon d.GUI scripts e.FAT 16 i.Tree |
|
Definition
|
|
Term
A logical representation of multiple, hierarchical levels within a directory. a.AppleTalk Filing Protocol f.CDFS b.Middleware g.UPN c.Asymmetric multiprocessing h.Logon d.GUI scripts e.FAT 16 |
|
Definition
|
|
Term
Files system used to read from and write to a CD-ROM disc. a.AppleTalk Filing Protocol f.CDFS b.Middleware g.UPN c.Asymmetric multiprocessing h.Logon d.GUI scripts e.FAT 16 i.Tree |
|
Definition
|
|
Term
/Users/jones is the login (or home) directory for the user Jones on a UNIX system.
True/False |
|
Definition
|
|
Term
Every file and directory on a UNIX-type of system is owned by exactly one user and is a member of exactly one group.
True/False |
|
Definition
|
|
Term
Apple and IBM use the same central processing unit, the PowerPC, in their computers.
True/False |
|
Definition
|
|
Term
An implementation of UNIX for which the source code is either unavailable or available only by purchasing a licensed copy from The SCO Group is known as ____. a.open source software c.proprietary UNIX b.BSD d |
|
Definition
|
|
Term
Apple Computer released Mac OS X to the public in the Spring of 2001 to replace its previously released network operating system software, ____. a.AppleShare IP c. SPARC b.Mach d. Solaris |
|
Definition
|
|
Term
____ in a UNIX server can take the form of a disk partition, or it can be in a file. a.Kernel modules c.i-nodes b.Virtual memory d.Command interpreters |
|
Definition
|
|
Term
A UNIX ____ is a file that contains instructions for performing a specific task such as reading data from and writing data to a hard drive. a.UFS c. shell b.kernel module d. pipeline |
|
Definition
|
|
Term
A(n) ____ is a method of organizing files and directories on a disk in which directories may contain files and other directories. a.command interpreter c.daemon b.shell d.hierarchical file system |
|
Definition
d.hierarchical file system |
|
|
Term
Apple’s ____ is the native file system for Mac OS X Server. a.HFS+ c. Fedora Core b.ext3 d. i-node |
|
Definition
|
|
Term
In UNIX, you combine commands using a(n) ____. a.lpr c. lpd b.Mach d. pipe |
|
Definition
|
|
Term
On a Linux or Solaris system, the ____ command creates a new group ID and makes the group available for use. a.man c.root b.chmod d.groupadd |
|
Definition
|
|
Term
UNIX-type systems enable you to restrict access to resources by assigning user and group ____ to files and directories. a.pipelines c.shells b.permissions d.nodes |
|
Definition
|
|
Term
Changing file and directory permissions requires use of the ____ command. a.groupadd c.lpr b.pipe d.chmod |
|
Definition
|
|
Term
All modern flavors of UNIX, Linux, and Mac OS X Server support data sharing using directory services based on ____. a.LDAP c.NFS b.XNU d.Samba |
|
Definition
|
|
Term
The native file system type on Linux is called ____. a.BSD c.Fedora Core b.HFS+ d.ext3 |
|
Definition
|
|
Term
Owns the UNIX trademark. a.Source code f.Network file systems b.The Open Group g.Samba c.The SCO Group h.Command interpreter d.Mac OS X Server i.File globbing e.Kernel |
|
Definition
|
|
Term
Runs only on Apple hardware. a.Source code f.Network file systems b.The Open Group g.Samba c.The SCO Group h.Command interpreter d.Mac OS X Server i.File globbing e.Kernel
Runs only on Apple hardware |
|
Definition
|
|
Term
An open source application a.Source code f.Network file systems b.The Open Group g.Samba c.The SCO Group h.Command interpreter d.Mac OS X Server i.File globbing e.Kernel |
|
Definition
|
|
Term
Program that accepts and runs the commands you type on the keyboard. a.Source code f.Network file systems b.The Open Group g.Samba c.The SCO Group h.Command interpreter d.Mac OS X Server i.File globbing e.Kernel |
|
Definition
|
|
Term
Owns the rights to the UNIX source code. a.Source code f.Network file systems b.The Open Group g.Samba c.The SCO Group h.Command interpreter d.Mac OS X Server i.File globbing e.Kernel |
|
Definition
|
|
Term
ConsoleOne can be used either at the server or from another computer connected to the same network.
True/False |
|
Definition
|
|
Term
A user is a leaf object because it contains and manages objects other than the network user it represents.
True/False |
|
Definition
|
|
Term
____ are routines that enable the sever to run a range of programs and offer a variety of services. a.Monitors c.Consoles b.NLMs d.Contexts |
|
Definition
|
|
Term
The text-based menu that allows a network administrator to view and modify server parameters through console commands is called ____. a.Partition c.Monitor b.Tree object d.Pattern |
|
Definition
|
|
Term
____ is NetWare 6.5’s directory database. a.GroupWise c.NLM b.NetStorage d.eDirectory |
|
Definition
|
|
Term
The ____ notation is a relatively lengthy way of expressing context that includes identifiers for the organization and OUs. a.typeless c.GroupWise b.typeful d.console |
|
Definition
|
|
Term
____ is software that, when installed on Windows clients, allows them to access directories on a NetWare 6.5 server. a.NetDrive c.NSS b.Remote Manage d.X Server |
|
Definition
|
|
Term
____ is Novell’s tool for integrating eDirectory and Windows Active Directory or Windows NT domain data. a.BorderManager c.NetDrive b.DirXML d.ConsoleOne |
|
Definition
|
|
Term
NetWare’s ____ is started by the program server.exe, which runs from a server’s DOS partition (over the DOS operating system) when a server boots up. a.kernel c.base schema b.partition d.context |
|
Definition
|
|
Term
After an NLM loads into memory, it is considered part of the ____. a.context c.boot partition b.base schema d.kernel |
|
Definition
|
|
Term
NetWare uses ____ as the basis for organizing files and directories on the server. a.pools c.patterns b.tree objects d.volumes |
|
Definition
|
|
Term
When a change is made to NetWare’s base schema, the new schema is known as a(n) ____. a.new schema c.revised schema b.extended schema d.enhanced schema |
|
Definition
|
|
Term
NetWare is capable of providing clients with direct access to NSS using the clients’ ____. a.NDS c.boot partitions b.tree objects d.native file access protocols |
|
Definition
d.native file access protocols |
|
|
Term
Primary boot partition from which the server.exe file runs. a.NetWare Integrated f.iManager Kernel g.Base schema b.X Server h.Context c.File system i.Printer d.DOS partition queue e.SYS |
|
Definition
|
|
Term
The core of the NetWare 6.5 operating system. a.NetWare Integrated f.iManager Kernel g.Base schema b.X Server h.Context c.File system i.Printer d.DOS partition queue e.SYS |
|
Definition
a.NetWare Integrated Kernel |
|
|
Term
Primary GUI tool used to manage all objects in NetWare 6.5. a.NetWare Integrated f.iManager Kernel g.Base schema b.X Server h.Context c.File system i.Printer d.DOS partition queue e.SYS |
|
Definition
|
|
Term
Consists of an object’s OU names, arranged from most specific to most general, plus the organization name. a.NetWare Integrated f.iManager Kernel g.Base schema b.X Server h.Context c.File system i.Printer |
|
Definition
|
|
Term
Consists of the object classes and properties a network typically requires. a.NetWare Integrated f.iManager Kernel g.Base schema b.X Server h.Context c.File system i.Printer d.DOS partition q |
|
Definition
|
|
Term
An example of a leaf object. a.NetWare Integrated f.iManager Kernel g.Base schema b.X Server h.Context c.File system i.Printer d.DOS partition queue e.SYS |
|
Definition
|
|
Term
An operating system’s method of organizing, managing, and accessing its files. a.NetWare Integrated f.iManager Kernel g.Base schema b.X Server h.Context c.File system i.Printer d.DOS partition |
|
Definition
|
|
Term
The “0” bits in a subnet mask indicate that corresponding bits in an IP address contain network information.
True/False |
|
Definition
|
|
Term
Routers that rely on older routing protocols, such as RIP, are capable of interpreting classless IP addresses.
True/False |
|
Definition
|
|
Term
A(n) ____ indicates where network information is located in an IP address. a.CIDR c.subnet mask b.gateway d.ICS host |
|
Definition
|
|
Term
Together, the additional bits used for subnet information plus the existing network ID are known as the ____. a.network prefix c.NAT b.extended network prefix d.supernet mask |
|
Definition
b.extended network prefix |
|
|
Term
____ are a combination of software and hardware that enable two different network segments to exchange data. a.Intranets c.Softphones b.Gateways d.ICS hosts |
|
Definition
|
|
Term
____ is the protocol responsible for moving messages from one mail server to another over TCP/IP-based networks. a.MIME c.VoIP b.SMTP d.PBX |
|
Definition
|
|
Term
____ is an Application layer protocol used to retrieve messages from a mail server. a.POP c.NAT b.MIME d.ICS |
|
Definition
|
|
Term
The netstat ____ command allows you to display the routing table on a given machine. a.-a c.-r b.-e d.-p |
|
Definition
|
|
Term
The ____ utility allows you to query the DNS database from any computer on the network and find the host name of a device by specifying its IP address, or vice versa. a.nbtstat c.tracert b.netstat d.nslookup |
|
Definition
|
|
Term
The ____ utility uses ICMP to trace the path from one networked node to another, identifying all intermediate hops between the two nodes. a.dig c.nslookup b.netstat d.traceroute |
|
Definition
|
|
Term
The ____ utility performs the same TCP/IP configuration and management as the ipconfig utility, but applies to Windows 9x and Me operating systems. a.netstat c.whois b.dig d.winipcfg |
|
Definition
|
|
Term
In classful addressing, the network information portion of an IP address (the network ID) is limited to the first ____ bits in a Class A address. a.4 c.8 b.6 d.10 |
|
Definition
|
|
Term
Consists of four 8-bit octets (or bytes) that can be expressed in either binary or dotted decimal notation. a.IP address f.ICS host b.Subnetting g. SMTP c.Broadcast address h. MIME d.CIDR notation i. dig e.Internet gateway |
|
Definition
|
|
Term
Octet(s) that represent host information are set to equal all 1s, or in decimal notation 255. a.IP address f.ICS host b.Subnetting g. SMTP c.Broadcast address h. MIME d.CIDR notation i. dig e.Internet gateway |
|
Definition
|
|
Term
Incapable of doing anything more than transporting mail or holding it in a queue. a.IP address f.ICS host b.Subnetting g. SMTP c.Broadcast address h. MIME d.CIDR notation i. dig e.Internet gateway |
|
Definition
|
|
Term
Takes the form of the network ID followed by a forward slash (/), followed by the number of bits that are used for the extended network prefix. a.IP address f.ICS host b.Subnetting g. SMTP c.Broadcast address h. MIME d.CIDR notation i. |
|
Definition
|
|
Term
A TCP/IP utility similar to nslookup. a.IP address f.ICS host b.Subnetting g. SMTP c.Broadcast address h. MIME d.CIDR notation i. dig e.Internet gateway |
|
Definition
|
|
Term
Separates a network into multiple logically defined segments, or subnets. a.IP address f.ICS host b.Subnetting g. SMTP c.Broadcast address h. MIME d.CIDR notation i. dig e.Internet gateway |
|
Definition
|
|
Term
Identifies each element of a mail message according to content type. a.IP address f.ICS host b.Subnetting g. SMTP c.Broadcast address h. MIME d.CIDR notation i. dig e.Internet gateway |
|
Definition
|
|
Term
Requires two network connections: one that connects to the Internet and one that connects to the LAN. a.IP address f.ICS host b.Subnetting g. SMTP c.Broadcast address h. MIME d.CIDR notation i. dig e.Internet gateway |
|
Definition
|
|
Term
Tone generators and tone locators can be used to determine the characteristics of a cable, such as whether it has defects or whether its length exceeds IEEE standards for a certain type of network.
True/False |
|
Definition
|
|
Term
You can use a continuity tester on a live network cable.
True/False |
|
Definition
|
|
Term
A(n) ____ is a small electronic device that issues a signal on a wire pair. a.runt c.tone generator b.network analyzer d.tone locator |
|
Definition
|
|
Term
A(n) ____ should never be used on a wire that is connected to a device’s port or network adapter. a.tone locator c.voltmeter b.continuity tester d.tone generator |
|
Definition
|
|
Term
The instrument that measures the pressure, or voltage, of an electric current is called a(n) ____. a.ohmmeter c.voltmeter b.multimeter d.tone locator |
|
Definition
|
|
Term
____ is a fundamental property of wire that depends on a wire’s molecular structure and size. a.Voltage c.Baseline b.Resistance d.TDR |
|
Definition
|
|
Term
The device used to measure resistance is called a(n) ____. a.time domain reflectometer b.spectral analyzer c.optical time domain reflectometer d.ohmmeter |
|
Definition
|
|
Term
When used on a copper-based cable, a(n) ____ applies a small amount of voltage to each conductor at one end of the cable, and then checks whether that voltage is detectable at the other end. a.jabber c.voltmeter b.continuity tester d.network monit |
|
Definition
|
|
Term
A(n) ____ issues a signal on a cable and then measures the way the signal bounces back to it. a.cable performance tester b.tone generator c.time domain reflectometer d.tone locater |
|
Definition
c.time domain reflectometer |
|
|
Term
A (n) ____ is a tool that can capture traffic and also analyze frames. a.runt c.protocol analyzer b.ghost d.TDR |
|
Definition
|
|
Term
The combination of a tone generator and a tone locator is called a(n) ____. a.fox and hound c.jabber b.continuity testerd. d.network monitor |
|
Definition
|
|
Term
Tools used to determine whether your cable is carrying a signal to its destination are called ____. a.jabber c.cable tester b.ghost d.continuity testers |
|
Definition
|
|
Term
Used to track changes on a network. a.First step in troublesh b.Network change recordsooting c.Software error d.Ports e.Impedance f.Centrally located database g.Help desk analyst h.Call tracking system i.Crossover cable |
|
Definition
b.Network change recordsooting |
|
|
Term
Very high or low levels can signify a damaged wire, incorrect pairing, or a termination point. a.First step in troublesh b.Network change recordsooting c.Software error d.Ports e.Impedance f.Centrally located database g.Help desk analyst h.Call t |
|
Definition
|
|
Term
Often considered first-level support. a.First step in troublesh b.Network change recordsooting c.Software error d.Ports e.Impedance f.Centrally located database g.Help desk analyst h.Call tracking system i.Crossover cable |
|
Definition
|
|
Term
Effective way to document problems and solutions. a.First step in troubleshooting b.Network change records c.Software error d.Ports e.Impedance f.Centrally located database g.Help desk analyst h.Call tracking system i.Crossover cable |
|
Definition
f.Centrally located database |
|
|
Term
Can be operational one day and faulty the next. a.First step in troubleshooting b.Network change records c.Software error d.Ports e.Impedance f.Centrally located database g.Help desk analyst h.Call tracking system i.Crossover cable |
|
Definition
|
|
Term
The transmit and receive wire pairs in one of the connectors are reversed. a.First step in troubleshooting b.Network change records c.Software error d.Ports e.Impedance f.Centrally located database g.Help desk analyst h.Call tracking system i.Cr |
|
Definition
|
|
Term
Identify the specific symptoms of the problem. a.First step in troubleshooting b.Network change records c.Software error d.Ports e.Impedance f.Centrally located database g.Help desk analyst h.Call tracking system i.Crossover cable |
|
Definition
a.First step in troubleshooting |
|
|
Term
Software that provides a user-friendly graphical interface that prompts the user for every piece of information associated with the problem. a.First step in troubleshooting b.Network change records c.Software error d.Ports e.Impedance f.Centrally l |
|
Definition
|
|
Term
On a LAN, a star topology and a parallel backbone provide the greatest fault tolerance.
True/False |
|
Definition
|
|
Term
In RAID Level 3 a parity bit is assigned to each data byte when it is transmitted or written to a disk.
True/False |
|
Definition
|
|
Term
Viruses do not alter other programs in the same way that other threats do, but they may carry worms.
True/False |
|
Definition
|
|
Term
Polymorphic viruses are programmed to activate on a particular date.
True/False |
|
Definition
|
|
Term
If your antivirus software resides on the server and checks every file and transaction, you will protect important files and increase your network performance considerably.
True/False |
|
Definition
|
|
Term
____ of a file or system refers to how consistently and reliably it can be accessed by authorized personnel. a.Availability c.The integrity b.Full backup d.The parity |
|
Definition
|
|
Term
A fluctuation in voltage levels caused by other devices on the network or electromagnetic interference is called ____. a.cold spare c.brownout b.blackout d.noise |
|
Definition
|
|
Term
In a critical component such as a router or switch, the utmost fault tolerance necessitates the use of redundant NICs, power supplies, cooling fans, interfaces, and I/O modules, all of which should ideally be able to immediately assume the duties of an id |
|
Definition
|
|
Term
____ is a fault-tolerance technique that links multiple servers together to act as a single server. a.Clustering c.NAS b.RAID d.IRC |
|
Definition
|
|
Term
RAID Level 0 is also referred to as ____. a.clustering c.cold spare b.hot spare d.disk striping |
|
Definition
|
|
Term
In ____, data is continually copied from one disk to another when it is saved, just as in disk mirroring. a.disk duplexing c.server mirroring b.parity error checking d.signature scanning |
|
Definition
|
|
Term
A(n) ____ can be written to once and can store up to 650 MB of data. a.CD-R c.CD-RW b.recordable DVD d.array |
|
Definition
|
|
Term
External disk drives are also known as ____. a.floppy disks c.compact disks b.hard drives d.removable disk drives |
|
Definition
|
|
Term
A(n) ____ is a place where the computers, devices, and connectivity necessary to rebuild a network exist, but they are not appropriately configured, updated, or connected. a.hot site c.cold site b.hot spare d.vault |
|
Definition
|
|
Term
Scanning techniques that attempt to identify viruses by discovering “virus-like” behavior are known as ____. a.polymorphic scanning c.signature scanning b.heuristic scanning d.integrity checking |
|
Definition
|
|
Term
Identical components that can be changed while a machine is still running. a.Trojan horse f.Warm site b.Stealth viruse g.Hot site c.Sag h.Redundancy d.Hot swappable i.Virus e.Replication |
|
Definition
|
|
Term
Place where the computers, devices, and connectivity necessary to rebuild a network exist, and all are appropriately configured, updated, and connected to match your network’s current state. a.Trojan horse f.Warm site b.Stealth viruse g.Hot site |
|
Definition
|
|
Term
Place where the computers, devices, and connectivity necessary to rebuild a network exist, with some appropriately configured, updated, or connected. a.Trojan horse f.Warm site b.Stealth viruse g.Hot site c.Sag h.Redundancy d.Hot sw |
|
Definition
|
|
Term
A momentary decrease in voltage. a.Trojan horse f.Warm site b.Stealth viruse g.Hot site c.Sag h.Redundancy d.Hot swappable i.Virus e.Replication |
|
Definition
|
|
Term
Dynamic copying of data from one location to another. a.Trojan horse f.Warm site b.Stealth viruse g.Hot site c.Sag h.Redundancy d.Hot swappable i.Virus e.Replication |
|
Definition
|
|
Term
Packet-filtering firewalls operate at the Application layer of the OSI Model.
True/False |
|
Definition
|
|
Term
The password authentication protocol is a simple authentication protocol that is very secure.
True/False |
|
Definition
|
|
Term
A(n) ____ is a software application on a network host that acts as an intermediary between the external and internal networks, screening all incoming and outgoing traffic. a.session c.principal b.proxy service d.network key |
|
Definition
|
|
Term
In ____, data is encrypted using a single key that only the sender and the receiver know. a.symmetric encryption c.public key encryption b.asymmetric encryption d.private key encryption |
|
Definition
|
|
Term
In ____, data is encrypted using two keys: One is a key known only to a user (that is, a private key), and the other is a public key associated with the user. a.asymmetric encryption c.HTTP b.public key encryption d.private key |
|
Definition
|
|
Term
Because public key encryption requires the use of two different keys, it is also known as ____. a.asymmetric encryption c.IPSec b.symmetric encryption d.Kerberos |
|
Definition
|
|
Term
A(n) ____ is a password-protected and encrypted file that holds an individual’s identification information, including a public key. a.ticket c.digital certificate b.session d.key pair |
|
Definition
|
|
Term
____ is a method of encrypting TCP/IP transmissions - including Web pages and data entered into Web forms - en route between the client and server using public key encryption technology. a.TGS c.TGT b.SSL d.TLS |
|
Definition
|
|
Term
____ occurs when a hacker forges name server records to falsify his host’s identity. a.IP spoofing c.Encapsulation b.DNS spoofing d.Bio-recognition access |
|
Definition
|
|
Term
____ protocol defines encryption, authentication, and key management for TCP/IP transmissions. a.SCP c.SFTP b.SSH d.IPSec |
|
Definition
|
|
Term
____ is a service defined by the IETF that runs over UDP and provides centralized network authentication and accounting for multiple users. a.ESP c.RADIUS b.HTTP d.DES |
|
Definition
|
|
Term
In Kerberos terminology, the server that issues keys to clients during initial client authentication is known as the ____. a.authenticator c.proxy b.KDC d.gateway |
|
Definition
|
|
Term
For some measure of security, 802.11 allows for optional encryption using the ____ standard. a.MS_CHAP c.IPSec b.Kerberos d.Wired Equivalent Privacy |
|
Definition
d.Wired Equivalent Privacy |
|
|
Term
Occurs when a system becomes unable to function because it has been deluged with data transmissions or otherwise disrupted. a.Hacker f.Diffie-Hellman b.Denial-of-service g.Secure CoPy attack h.Principal c.Security policy |
|
Definition
b.Denial-of-service attack |
|
|
Term
A specialized device, or a computer installed with specialized software, that selectively filters or blocks traffic between networks. a.Hacker f.Diffie-Hellman b.Denial-of-service g.Secure CoPy attack h.Principal c.Security p |
|
Definition
|
|
Term
The first public, or asymmetric, key algorithm. a.Hacker f.Diffie-Hellman b.Denial-of-service g.Secure CoPy attack h.Principal c.Security policy i.Proxy server d.Firewall e.Encryption |
|
Definition
|
|
Term
Term used to describe individuals who gain unauthorized access to voice or data networks, with or without malicious intent. a.Hacker f.Diffie-Hellman b.Denial-of-service g.Secure CoPy attack h.Principal c.Security policy |
|
Definition
|
|
Term
A utility that allows you to copy files from one host to another securely. a.Hacker f.Diffie-Hellman b.Denial-of-service g.Secure CoPy attack h.Principal c.Security policy i.Proxy server d.Firewall e.Encryption |
|
Definition
|
|
Term
The use of an algorithm to scramble data into a format that can be read only by reversing the algorithm. a.Hacker f.Diffie-Hellman b.Denial-of-service g.Secure CoPy attack h.Principal c.Security policy i.Proxy server d. |
|
Definition
|
|
Term
Must address an organization’s specific security risks. a.Hacker f.Diffie-Hellman b.Denial-of-service g.Secure CoPy attack h.Principal c.Security policy i.Proxy server d.Firewall e.Encryption |
|
Definition
|
|
Term
The feasibility study should help determine whether you can achieve the project goals within the given time, budgetary, and staffing constraints.
True/False |
|
Definition
|
|
Term
SNMP is part of the TCP/IP suite of protocols and typically runs over UDP on port 161.
True/False |
|
Definition
|
|
Term
Adding a new processor to a server, a new NIC to a router, or more memory to a printer never affects your service or warranty agreement with the manufacturer.
True/False |
|
Definition
|
|
Term
A feasibility study involves interviewing users and comparing perceptions to factual data.
True/False |
|
Definition
|
|
Term
A(n) ____ is a reference point that marks the completion of a major task or group of tasks in the project and contributes to measuring the project’s progress. a.poll c.patch b.milestone d.service pack |
|
Definition
|
|
Term
A(n) ____ is the process of clarifying the reasons and objectives underlying a proposed change. a.project assessment c.needs assessment b.network poll d.performance assessment |
|
Definition
|
|
Term
A(n) ____ is a popular method for depicting when projects begin and end along a horizontal timeline. a.Gantt chart c.service pack b.contingency plan d.MRTG |
|
Definition
|
|
Term
____ refers to the assessment, monitoring, and maintenance of all aspects of a network. a.Project management c.User management b.Asset management d.Network management |
|
Definition
|
|
Term
A(n) ____ agent is a software routine that collects information about the device’s operation and provides it to the network management application running on the console. a.fault management c.network management b.user managemen |
|
Definition
|
|
Term
____ is a command-line utility that uses SNMP to poll devices, collects data in a log file, then generates HTML-based views of the data. a.MIB c.TCP b.MRTG d.SMTP |
|
Definition
|
|
Term
The ____ is responsible for facilitating regular, effective communication among project participants. a.stakeholder c.project manager b.shareholder d.sponsor |
|
Definition
|
|
Term
A(n) network ____ represents the main conduit for data on LANs and WANs, connecting major routers, servers, and switches. a.milestone c.poll b.upgrade d.backbone |
|
Definition
|
|
Term
A(n) ____ is a report of the network’s current state of operation. a.service pack c.baseline b.upgrade d.poll |
|
Definition
|
|
Term
The ____ is used by agents to communicate information about managed devices. a.SMTP c.SNMP b.MIB d.MRTG |
|
Definition
|
|
Term
Should be performed for any large-scale project before resources are committed to that project. a.Feasibility study f.Service packs b.Sponsors g.Bug c.Pilot network h.Backleveling d.Baseline measurements i.Migrating e,MRTG |
|
Definition
|
|
Term
A flaw in a software application that causes some part of the application to malfunction. a.Feasibility study f.Service packs b.Sponsors g.Bug c.Pilot network h.Backleveling d.Baseline measurements i.Migrating e,MRTG |
|
Definition
|
|
Term
Allow(s) you to compare future performance increases or decreases caused by network changes with past network performance. a.Feasibility study f.Service packs b.Sponsors g.Bug c.Pilot network h.Backleveling d.Baseline measurements i.Mi |
|
Definition
|
|
Term
Windows operating system patches. a.Feasibility study f.Service packs b.Sponsors g.Bug c.Pilot network h.Backleveling d.Baseline measurements i.Migrating e,MRTG from Token Ring to |
|
Definition
|
|
Term
Should be similar enough to closely mimic the larger network’s hardware, software, connectivity, unique configurations, and load. a.Feasibility study f.Service packs b.Sponsors g.Bug c.Pilot network h.Backleveling d.Baseline measuremen |
|
Definition
|
|
Term
Process of reverting to a previous version of software after attempting to upgrade. a.Feasibility study f.Service packs b.Sponsors g.Bug c.Pilot network h.Backleveling d.Baseline measurements i.Migrating e,MRTG from |
|
Definition
|
|