Term
When a key network admin leaves, what does the company depend on to keep using the network? |
|
Definition
|
|
Term
What is the most common central device used today? |
|
Definition
|
|
Term
What is the most common adapter or connector used to connect a computer to a wired network? |
|
Definition
|
|
Term
What is the difference between a "Half Duplex" and a "full Duplex"? |
|
Definition
A "Full Duplex" can send and receive data at the same time. While a "Half Duplex" can not. |
|
|
Term
What would you use to set up an isolated group of computers within your organization? |
|
Definition
|
|
Term
What would you use to create a VLAN? |
|
Definition
|
|
Term
What zone is used to publish external websites for an organization? |
|
Definition
|
|
Term
Which topology is the most redundant and the most expensive? |
|
Definition
|
|
Term
What Ethernet standard describes CSMA/CD |
|
Definition
|
|
Term
What mechanism do wireless network use to access the network. |
|
Definition
|
|
Term
What model promises the most processing power? |
|
Definition
|
|
Term
Which model uses a central database for authentication? |
|
Definition
|
|
Term
What type of server does Active Director run on? |
|
Definition
|
|
Term
In which model does each host have their own security database? |
|
Definition
|
|
Term
What type of communication is sent to a single designated host? |
|
Definition
|
|
Term
What is used to uniquely identify a host on a TCP/IP |
|
Definition
|
|
Term
|
Definition
Two or more computers that exchange data, confined to a small geographic area. |
|
|
Term
Why would a organization need a network? |
|
Definition
Sharing, Communication, Organization, Money |
|
|
Term
Wireless Access Point (WAP) |
|
Definition
Acts as the central connection device for a wireless network. |
|
|
Term
|
Definition
A group of host with a common set of requirements that communicate as if they were connected together in a normal fashion on one switch, regardless of their physical location. |
|
|
Term
|
Definition
AKA DMZ, Small network set up separately from a company's private LAN and the internet. |
|
|
Term
Back-to-Back Configuration |
|
Definition
When a DMZ is situated between two firewall devices. |
|
|
Term
3-leg perimeter configuration |
|
Definition
The DMZ is usually attached to a separate connection of the company firewall. 1Con to LAN - 1Con to DMZ - 1Con to internet |
|
|
Term
|
Definition
Defines the physical connection of hosts in a computer network. |
|
|
Term
|
Definition
Most common topology, each computer is individually wired to a central connecting device with twisted-pair cabling. |
|
|
Term
|
Definition
Every computer connects to every other computer; No central connection device is needed. |
|
|
Term
|
Definition
Each computer is connected to the network using a closed loop; done with coaxial cable. This is a pretty outdated concept |
|
|
Term
|
Definition
Sends data logically in a ring fashion, but is physically connected in a star fashion. |
|
|
Term
|
Definition
A group of networking technologies that define how information is sent and received between network adapters, hubs, switches, and other devices. |
|
|
Term
|
Definition
A group of bytes packaged by a network adapter for transmission across the network, these frames are created on Layer 2 of the OSI model. |
|
|
Term
|
Definition
an architecture that distributes applications between servers such as Windows Server 2008 and client computers such as Windows 7 or Windows Vista. |
|
|
Term
|
Definition
A server that stores files for computers to share |
|
|
Term
|
Definition
A server that controls printers that can be connected directly to the server or are connected to the network. |
|
|
Term
|
Definition
email servers, but also fax, instant messaging, collaborative, and other types of messaging servers. |
|
|
Term
|
Definition
where a company's telephone system meets its computer system, PBXs, and VOIP |
|
|
Term
|
Definition
Each computer has an equal ability to server data and to access data, just like any other computer on the network. |
|
|
Term
|
Definition
7 layers which house different protocols within one of several protocol suites, how data communicates on computer networks. |
|
|
Term
When are Inbound Ports used? |
|
Definition
When another computer whats to connect to a service or application running on your computer. |
|
|
Term
When are Outbound Ports used? |
|
Definition
When your computer wants to connect to a service or application running on another computer. |
|
|
Term
Where is the port # shown? |
|
Definition
After the IP address separated by a colon : |
|
|
Term
What are the 7 layers of the OSI model? |
|
Definition
Application, Presentation, Session, Transport, Network, Datalink, Physical |
|
|
Term
what is the 1st layer of the OSI model and it's unit of measurement? |
|
Definition
|
|
Term
What is the 2nd layer of the OSI model and it's unit of measurement? |
|
Definition
|
|
Term
What is the 3rd layer of the OSI model and it's unit of measurement? |
|
Definition
|
|
Term
What is the 4th layer of the OSI model and it's unit of measurement? |
|
Definition
|
|
Term
What is the 5th layer of the OSI model? |
|
Definition
|
|
Term
What is the 6th layer of the OSI model? |
|
Definition
|
|
Term
What is the 7th layer of the OSI model? |
|
Definition
|
|
Term
What layers are within the Communication Subnet? |
|
Definition
Physical, Datalink, Network |
|
|
Term
Describe the Physical Layer of the OSI model. |
|
Definition
1st layer of the OSI model. Defines network standards for electrical signals, connectors, media types, and the way data is placed on the network media. |
|
|
Term
Give examples of the physical layer. |
|
Definition
Signals, Hubs, Cables, Connectors, Physical topologies(Bus, Ring, Star, Mesh) |
|
|
Term
________ is an enormous system of interlinked hypertext documents that are accessed with a web browser. _______ is the current stage. |
|
Definition
World Wide Web (WWW)
Web 2.0 |
|
|
Term
________ is a private computer network that an organization implements to share data with employees. |
|
Definition
|
|
Term
________ is a private computer network that extends to users outside a company in order to share data. |
|
Definition
|
|
Term
________ a connection between two or more computers or devices that are not on the same private network. In effect creating a tunnel through LANs and WANs connecting the 2 devices together. |
|
Definition
VPN (Virtual Private Network) |
|
|
Term
__________ define the physical connections of hosts in a computer network. |
|
Definition
|
|
Term
_________ topology describes how the data is actually sent from one computer to the next. |
|
Definition
|
|
Term
What is the most common adapter or connector used to connect a computer to a wired network. |
|
Definition
|
|
Term
What layer does the Router reside on? |
|
Definition
|
|
Term
Which layer deals with the serial transfer of data? |
|
Definition
|
|
Term
You run a netstat -an command in the command prompt and notice many connections being made that say TCP in the left-most column. What layer of the OSI is TCP referring to? |
|
Definition
|
|
Term
You suspect a problem with your computer's network adapter and its ability to send the correct frames of data that correspond with the network architecture used by the rest of your computers. What layer should you attempt to use as a troubleshooting |
|
Definition
|
|
Term
A standard such as 100BASE-T refers to which OSI layer? |
|
Definition
|
|
Term
Almost all of your users connect to Web sites with Internet Explorer. They usually type domain names such as www.microsoft.com. What protocol is initiated by default when they press Enter after typing the domain name? |
|
Definition
HTTP: Hypertext transfer protocol |
|
|
Term
You need to find out the MAC address of your director's computer. He has given you permission to access his computer. You access the command prompt. What command should you type to see the computer's MAC address? |
|
Definition
|
|
Term
You need to find out the MAC addresses of all the computers that a particular user's computer has connected to in the recent past. What command should you use to accomplish this? |
|
Definition
|
|
Term
You have been instructed to capture and analyze packets on a server. What tools will allow you to do this? |
|
Definition
Protocol Analyzer or Wireshark |
|
|
Term
The manager of IT asks you ping his laptop to see whether your computer can find it on the network. In this scenario, the ____________ protocol is being implemented |
|
Definition
|
|