• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/55

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

55 Cards in this Set

  • Front
  • Back
frame is sent to the destination port immediately after reading the destination and source MAC address
cut-through switching
configured to carry VLAN traffic
trunk port
designed to stop switching loops
Spanning Tree Protocol
sends status to all routers whenever there is a change
link-state protocol
sends entire routing table to all routers at a scheduled time
distance-vector protocol
uses hop count to determine best path
Routing Information Protocol
damaged frames do not get forwarded
fragment-free switching
entire frame is read before forwarding it to the destination port
store-and-forward switching
broadcast frames are forwarded in a continual loop
broadcast storm
value that tells routers the best path to the destination network
Metric
smallest unit of software that can be scheduled
Thread
a program that is loaded into memory
Process
hypervisor installed in a general-purpose OS
hosted virtualization
the process of granting or denying access to a user
authorization
two or more threads being executed simultaneously
multiprocessing
partial copy of a virtual machine
snapshot
identifying who has access to network
authentication
creates and monitors the guest operating systems
hypervisor
runs in the background
Service
hypervisor installed directly onto the server
bare-metal virtualization
can be used to create a RAID
dynamic disk
if the primary server fails, the secondary server takes over
failover cluster
can be divided in up to four primary partitions
basic disk
defines a user’s environment
local profile
multiple servers acting as a single server
load-balancing cluster
power device that provides fault tolerance through battery backup
uninterruptible power supply
partition that contains the boot loader
system partition
action that a user can perform on a computer
right
can be made the active partition
primary partition
can only be divided into logical drives
extended partition
the Linux native file sharing protocol
NFS
agreement regarding the use of an application
EULA
how much something costs when intangibles are factored in
Total Cost of Ownership (TCO)
VPN connection between two routers
gateway-to-gateway
the process by which a router forwards a request for a TCP or UDP port
port forwarding
a file sharing option in Windows 7
HomeGroup
the Linux file sharing protocol that is compatible with Windows
Samba
software designed to help business owners
CRM
connection between a desktop and a VPN device
client-to-gateway
a device designed specifically for file sharing
Network-Attached Storage (NAS)
an industry-standard protocol used for network management and monitoring
Simple Network Management Protocol (SNMP)
specialized software that gathers network data and provides statistics to a network management console
remote monitoring (RMON)
copies all files changed since the last full or incremental backup and marks files as backed up
incremental backup
copies all files changed the day the backup is made; doesn’t mark files as backed up
daily backup
part of the SNMP structure loaded on to each device to be monitored
software agents
a set of objects containing information about a networking device that SNMP uses to manage that device
management information base (MIB)
software that monitors network traffic and gathers information about packet types, errors, and packet traffic to and from each computer
network monitors
a network troubleshooting device that can determine whether there’s a break or short in the cable, and, if so, approximately how far down the cable it’s located
time-domain reflectometer (TDR)
a backup that copies all selected files to the selected media and marks files as backed up; also called a normal backup
full backup
part of an upgrade plan that provides instructions on how to undo the upgrade if problems occur during or after the upgrade
rollback plan
When a disk is formatted, it is impossible to recover the data that was on the disk. (T or F)
FALSE
What kind of software would you use to view and troubleshoot protocol specific problems such as TCP retries caused by missed acknowledgements, or duplicate acknowledgements that cause network slow-down?
protocol analyzer
Almost immediately after a server migration project, employees are complaining that they can’t reach the Internet. You sit down at a machine and try to ping a well-known website, which fails. You then try to ping a known-public IP address, which succeeds. What is most likely the issue?
DNS settings are incorrect.
You are the network administrator for a company. The company’s policy is that the users are allowed to set their own passwords but that they must change their password every 30 days. You have just received a call from a user who can’t log on because she forgot her password. After you change her password, which of the password options listed would you set in the user’s account so that she will have to change the password when she logs on using the password you assigned?
User must change password at next logon.
What storage solution involves a third-party company that provides off-site hosting of data?
cloud-based storage