Term
|
Definition
NFS is the "Network File System" for Unix and Linux operating systems. It allows files to be shared transparently between servers |
|
|
Term
|
Definition
A Request for Comments (RFC) is a formal document drafted by the Internet Engineering Task Force (IETF) that describes the specifications for a particular technology. |
|
|
Term
|
Definition
Common Internet File System (CIFS)
The CIFS protocol is Microsoft's renaming of future versions of the SMB protocol that will be used in Windows products - the two terms can be used interchangeably |
|
|
Term
|
Definition
A daemon that allows file and printer sharing on an SMB network and provides authentication and authorization for SMB clients. |
|
|
Term
|
Definition
A daemon that looks after the Windows Internet Name Service (WINS), and assists with browsing |
|
|
Term
|
Definition
Service for Unix
Services for UNIX provides file sharing, remote access and administration, password |
|
|
Term
|
Definition
Storage Area Network
is a high-speed subnetwork of shared storage devices? |
|
|
Term
8) What are management Proxies? |
|
Definition
Are entities that provide management information on behalf of other entities |
|
|
Term
|
Definition
Simple Network Management Protocol, is a set of protocols for managing complex networks. It is used for collecting information from, and configuring, network devices, |
|
|
Term
|
Definition
Lightweight Directory Access Protocol, is a usable subnet of the ponderous but universally accepted X.500 standard
It is a software protocol for enabling anyone to locate organizations, individuals, and other resources such as files and devices in a network, whether on the public Internet or on a corporate intranet |
|
|
Term
|
Definition
Asymmetric Digital Subscriber Line, is a high-speed modem protocol put forth by telephone companies to compete with cable modems |
|
|
Term
|
Definition
is an Internet standard protocol used by email clients to retrieve email messages from a mail server over a TCP/IP connection.
mark a mail as read, it gets marked as read in your web-based inbox too (because the changes are happening on the server).
Uses ports 143, 993 |
|
|
Term
|
Definition
A system designed to prevent unauthorized access to or from a private network. Firewalls can be both software, hardware, or a combination of both |
|
|
Term
|
Definition
Multipurpose Internet Mail Extensions, it defines how Content-Type headers should be set by website administrators, and how web browsers should display the non-textual data of the website (i.e. an image). |
|
|
Term
|
Definition
Simple Mail Transfer Protocol, is a protocol for sending messages between mail servers |
|
|
Term
|
Definition
Mail Transfer Agent, is responsible for receiving incoming e-mails and delivering them to individual users |
|
|
Term
17) What is an example of a MUA? |
|
Definition
Mail User Agent, is responsible for allowing access to a user’s e-mail, allowing for it to be remotely managed without logging in onto the mail server directly |
|
|
Term
18) What is an example of a MTA? |
|
Definition
Unix Sendmail, Microsoft Exchange, Axigen |
|
|
Term
|
Definition
Network Attached Storage, or NAS, is a data storage mechanism that uses special devices connected directly to the network media.
These devices are assigned an IP address and can then be accessed by clients via a server that acts as a gateway to the data, or in some cases allows the device to be accessed directly by the clients without an intermediary. |
|
|
Term
20) Which is not a techniques used by firewalls. |
|
Definition
A) Packet Filter B) Application Gateway C) Stateful Inspection D) ??? |
|
|
Term
|
Definition
A technique used to gain unauthorized access to computers, whereby the intruder sends messages to a computer with an IP address indicating that the message is coming from a trusted host |
|
|
Term
22) What is the difference between Unicode and ASCII? |
|
Definition
ASKII is 8 bit (7 of which are usable)(256 characters) and UNICODE is 16 bits(65 536 characters) |
|
|
Term
|
Definition
describes the normal status on the network, and provides a reference point |
|
|
Term
24) Which is not one of the five audit types listed in lecture two? |
|
Definition
A) Inventory B) Security C) Operational D) ??? |
|
|
Term
25) What type of audit describes what is normal for any given network? |
|
Definition
A) Inventory B) Security C) Operational D) Research |
|
|
Term
|
Definition
Electro magnetic interference is a disturbance generated by an external source that affects an electrical circuit by electromagnetic induction |
|
|
Term
27) What is SMB the same as? |
|
Definition
|
|
Term
|
Definition
Server Message Block (SMB) file and print service protocol utilized by Windows NT Server |
|
|
Term
|
Definition
Samba is a suite of Unix applications that speak the SMB (Server Message Block) protocol
Samba allows Unix servers to communicate with the same networking protocol as Microsoft Windows products
Samba can run on UNIX, Linux, IBM System 390, OpenVMS, and other operating systems. |
|
|
Term
|
Definition
Radio frequency interference is the conduction or radiation of radio frequency energy that causes an electronic or electrical device to produce noise that typically interferes with the function of an adjacent device |
|
|
Term
|
Definition
Simple Object Access Protocol, is a protocol which provided applications a way to communicate with each other over the Internet, independent of platform |
|
|
Term
|
Definition
Direct attached storage is the term used to describe a storage device that is directly attached to a host system |
|
|
Term
|
Definition
Small Computer System Interface, is a set of ANSI standard electronic interfaces that allow personal computers to communicate with peripheral hardware such as disk drives, tape drives, CD-ROM drives, printers, and scanners faster and more flexibly than previous interfaces |
|
|
Term
34) What is Fibre Channel? |
|
Definition
A technology for transmitting data between computer devices at a data rate of up to 1 Gbps |
|
|
Term
|
Definition
A technology that allows data to be transported to and from storage devices over an IP network |
|
|
Term
36) What is the difference between Postscript and PCL? |
|
Definition
Both Adobe's PS and HP's PCL drivers are page description languages. This means they are both languages that describe how to print a page. Each has its own positive and negative qualities, and they are good for different things. PCL drivers do most of the rendering on the local workstation and the information is sent in essentially binary form to the printer. Post Script drivers essentially send a page description to the printer, where it is rendered. Since local workstations are generally MUCH faster than the printer's, PCL printing is much faster than Post Script and because PCL printing requires less printer memory some jobs may only print if sent using PCL drivers. However, PCL is also a simpler language than Post Script so it lacks many of the complex drawing and scaling functions that are available in Post Script. Therefore, if you are using a package which takes advantage of Post Script's capabilities (e.g. most Adobe products and some others), you may get better quality output using Post Script drivers whereas your complex print job may not print properly or at all using the PCL driver. |
|
|
Term
37) What is a WinPrinter? |
|
Definition
a printer designed to accept output from a host computer running the GDI under Windows |
|
|
Term
|
Definition
Common UNIX Printing System ("CUPS") is a cross-platform printing solution for all UNIX environments.
It is based on the "Internet Printing Protocol |
|
|
Term
39) What is Raster Graphics? |
|
Definition
Raster, or bitmapped, graphics produce images as grids of individually defined pixels |
|
|
Term
40) What is Vector Graphics? |
|
Definition
Vector graphics produce images using mathematically generated points, lines, and shapes. |
|
|
Term
|
Definition
Berkeley Internet Name Domain is an open source software that enables you to publish your Domain Name System (DNS) information on the Internet, and to resolve DNS queries for your users |
|
|
Term
42) What is a purpose of using a PROXY server? |
|
Definition
A server that sits between a client application, such as a Web browser, and a real server. It intercepts all requests to the real server to see if it can fulfill the requests itself. If not, it forwards the request to the real server. Proxy servers have two main purposes: - Improve Performance - Filter Requests |
|
|
Term
|
Definition
A DeMilitarized Zone is used by a company that wants to host its own Internet services without sacrificing unauthorized access to its private network |
|
|
Term
|
Definition
a combination of hardware and software that links two different types of networks |
|
|
Term
|
Definition
A business-to-business intranet that allows for limited, control, and secure access between a company’s intranet to be used by authenticated users from remote locations |
|
|
Term
|
Definition
Extensible Markup Language, is it considered to be the next generation of internet applications |
|
|
Term
47) What are three elements of network management as stated in the slides? |
|
Definition
A) Security, Performance, Reliability B) None of the above |
|
|
Term
48) What is the difference between a Manager and an Agent? |
|
Definition
Manager can also poll Agents to check the values of certain variables.
Agents in the managed devices respond to all polls |
|
|
Term
|
Definition
Storage location of compiled information about managed devices |
|
|
Term
50) Why would you do a network audit? |
|
Definition
To help to define normal, “baseline” conditions of the network |
|
|