• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/49

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

49 Cards in this Set

  • Front
  • Back
What are the 3 frame forwarding methods at the switching? Which one is the fastest?
Cut-through (fastest), Fragment-free, and Store-and-forward.
What is the information at a switching table?
MAC Address and Port number. Can be more than one MAC Address per port.
What are the functions of Spanning Tree Protocol?
Enables switches to detect when there’s a potential for a loop. If it detects a loop it goes into blocking mode and prevents forwarding frames that would create a loop.
What is the VLAN? What is the advantage/disadvantage of VLAN? Where is VLAN configured? What does VLAN create?
"enable you to configure one or more switch ports into separate broadcast domains. A switch with two or more VLANs configured is effectively divided into logically disconnected networks."
What is the information at a routing table?
Destination network, Next hop, Metric, How the route is derived, and Timestamp
What is the difference between the way that a distance-vector routing protocol and a link-state routing protocol update their networks?
Distance-vector protocols transfer routing data periodically and link-state routing protocols transfer routing data only when a change occurs.
What are the 2 main routing protocols?
Distance-vector protocols and Link-state protocols
What is packet filtering?
When an access control list blocks a packet,
What is access control list?
a set of rules configured on a router’s interface for specifying which addresses and which protocols can pass through the interface and to which destinations
What are the three most common encryption protocols for wireless security? Which is the strongest? Which is the weakest?
Wired Equivalent Privacy (WEP) (Weakest), Wi-Fi Protected Access (WPA), and Wi-Fi Protected Access 2 (WPA2) (Strongest).
Kernel
Schedules processes to run; manages memory; and makes sure I/O devices are accessed by only one process at a time. One layer about CPU.
Cluster
the smallest amount of space that can be occupied by a file stored on the disk. For example, if you have a file system that groups four sectors to make a cluster, each cluster is 2048 (2K) bytes. So if you store a file that’s 148 bytes, it occupies one cluster of 2048 bytes, which wastes 1900 bytes of storage. The waste occurs because no other file can occupy any part of a cluster already occupied by another file.
Service
A process that runs in the background and provides things like File and Printer Sharing clients and network clients.
Context Switching
The act of changing to another process.
Preemptive Multitasking
the OS controls which process gets access to the CPU and for how long; when the assigned time slice expires or a higher priority task has work to do, the current process is suspended, and the next process gets access to the CPU.
Cooperative Multitasking
the OS can’t stop a process; when a process gets control of the CPU, it maintains control until it satisfies its computing needs. No other process can access the CPU until the current process releases it.
What are file sharing protocols used in Windows and Unix?
Windows is Server Message Block (SMB) and Unix is
How does sharing and NTFS permission work?
Share Permissions are Read, Change, and Full Control and is the first gatekeeper, NTFS is the second and if you make it through both you keep the permission that is the most restrictive.
Authentication
enables administrators to control who has access to the network
Authorization
enables administrators to control what users can do after they’re logged on to the network
Active Directory
a directory service that allows users to log on to the network once with their username and password and access resources they’re authorized for regardless of which computer stores the resource. When installed on a server, the server becomes a domain controller, and users and computers with accounts in it are referred to as domain members.
LDAP
Lightweight Directory Access Protocol, Active Directory is based on it and is used to control domain
What is network-attached storage, storage area network and cloud-based storage?
a dedicated server device designed solely for providing shared storage for network users.
How does DHCP work?
"DHCPDiscover—The client announces to the network that it’s looking for a DHCP server from which to lease IP address settings.
DHCPOffer—The server replies and offers the client an IP address for lease.
DHCPRequest—The client wants the offered IP address.
DHCPAck—The server acknowledges the transaction, and the client can now use the IP address."
What is group account?
"used to organize users so that assignment of resource permissions and rights can be managed more easily than working with dozens or hundreds of individual user accounts."
user profile
a collection of a user’s personal files and settings that define his or her working environment.
local profile
user profile stored on the same system where the user logs on.
roaming profile
a profile type that follows the user no matter which computer he or she logs on to.
mandatory profile
discards a user’s profile changes at logoff so that the profile is always the same when the user logs on. Sometimes used on shared computers and for guest accounts.
primary partition
A partition that can be formatted with a file system and assigned a drive letter or mounted in an empty folder on an existing drive letter. It’s also a volume.
system partition
The active primary partition storing the Windows boot loader.
boot partition
The partition or logical drive holding the Windows OS files.
What are the file system used in Windows and UNIX?
Windows uses FAT and NTFS and Linux uses Ext3/Ext4.
What is share permission for files?
"*Read—Users can view contents of files, copy files, run applications and script files, open folders and subfolders, and view file attributes.
*Change—All permissions granted by Read, plus create files and folders, change contents and attributes of files and folders, and delete files and folders.
*Full Control—All permissions granted by Change, plus change file and folder permissions as well as take ownership of files and folders."
What are the 3 permissions in Linux?
read, write, and execute
What is the file sharing protocol in windows and Linux?
Windows = SMB; Linux = NFS
What is Samba?
A software package that allows Linux to support Windows file sharing by using SMB.
What is print server?
A computer that’s sharing a printer. It accepts print jobs from computers on the network and sends jobs to the printer to be printed on the print device.
What is print queue?
A storage location for print jobs awaiting printing.
What kind of information can be viewed at Event Viewer?
event log entries generated by system services and applications.
What information can be viewed at Task Manager,
processes and services running on your computer and how much CPU time and memory each process is using
Online UPS
supplies power continuously to plugged-in devices through the UPS battery, which is recharged continually by the wall outlet power
Standby UPS
upplies power to plugged-in devices by passing power from the wall outlet directly to the device. In a power outage, a standby UPS detects the power failure and switches to battery power quickly.
What is RAID 5
disk striping with parity
What is RAID 1
disk mirroring
What are the functions of Windows 7 HomeGroup?
simplifies the process of sharing files and printers between multiple Windows 7 computers operating in a peer-to-peer network configuration
What should be considered when purchasing a switch for small business network?
Switch speed, managed or unmanaged, and support for multiple media types (ie both copper and fiber optic)
What are hosted applications?
Cloud based – like google apps.
What network layers are protocol analyzers working at?
network, transport, or application layer