• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/130

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

130 Cards in this Set

  • Front
  • Back
The data portion of an Ethernet frame may contain ____ bytes of information.
46 to 1500
The most common 1-Gigabit Ethernet standard in use today is ____.
1000Base-LX
As part of CSMA/CD, a process known as ____________________ allows the NIC issue a special 32-bit sequence that indicates to the rest of the network nodes that its previous transmission was faulty and that those data frames are invalid.
jamming
A ____ is simply a linked series of devices.
daisy-chain
The most common logical topologies are ____ and ring.
bus
In packet switching, when packets reach their destination node, the node ____ them based on their control information.
reassembles
____________________ is a component of a network’s logical topology that determines how connections are created between nodes.
Switching
Given their long-distance capabilities, 10GBase-ER and 10GBase-EW are best suited for use on ____.
WANs
In the 10GBase-LR standard, the L stands for ____.
long reach
The 10GBase-T standard is considered a breakthrough for transmitting 10 Gbps over ____ medium.
twisted pair
A physical topology ____.
depicts a network in broad scope
A ____ occurs when two transmissions interfere with each other.
collision
1000Base-SX has a maximum throughput of ____.
1 Gbps
Collectively, MPLS labels are sometimes called a ____.
shim
1000Base-T is a standard for achieving throughputs ____ times faster than Fast Ethernet over copper cable.
10
A complex combination of pure topologies is known as a ____ topology.
hybrid
Without ____, a bus network would suffer from signal bounce.
terminators
On an Ethernet network, a(n) ____ is the portion of a network in which collisions occur if two nodes transmit data at the same time.
collision domain
The 10-gigabit fiber optic standard with the shortest segment length is ____.
10GBase-SR
In a ring network, each workstation acts as a(n) ____ for the transmission.
repeater
Within Ethernet frame types, the ____ signals to the receiving node that data is incoming and indicates when the data flow is about to begin.
preamble
The Ethernet_II frame type contains a 2-byte ____ field which differentiates it from the older Ethernet_802.3 and Ethernet_802.2 frame types.
type
Because of its support for multiple Network layer protocols and because it uses fewer bytes as overhead, ____________________ is the frame type most commonly used on contemporary Ethernet networks.
Ethernet_II
A network backbone is the ____________________ that connects the hubs, switches, and routers on a network.
cabling
All Ethernet networks, independent of their speed or frame type, use an access method called ____.
CSMA/CD
In a(n) ____________________ topology, every node on the network is connected through a central device, such as a hub, router, or switch.
star
____ routing is a technique in which a network administrator programs a router to use specific paths between nodes.

Static
Dynamic
Best path
Link-state
Static
A computer’s ____________________ is the circuit, or signaling pathway, used by the motherboard to transmit data to the computer’s components, including its memory, processor, hard disk, and NIC.
bus
A router that directs data between nodes on an autonomous LAN (or one owned and operated by a single organization) is known as a(n) ____________________ router.
interior
The primary difference between the two USB standards is ____.

connector pin organization
security limitations
speed
transceiver placement
speed
____ is a type of microchip that requires very little energy to operate.

ROM
RAM
CMOS
EEPROM
CMOS
Each time a computer starts up, the device drivers for all its connected peripherals are loaded into ____.

ROM
EEPROM
RAM
CMOS
RAM
Switches that operate anywhere between Layer 4 and Layer 7 are also known as ____ switches.

peripheral
STP
content
multiport
content
Switches can create ____ by grouping a number of ports into a broadcast domain.

trunks
spanning trees
gateways
VLANs
VLANs
A(n) ____________________ is software that enables an attached device to communicate with the computer’s operating system.
device driver
CompactFlash is an example of a peripheral device attached to the computer’s ____ bus.
external
A(n) ____ is the circuit board wire over which a device issues voltage to signal this request.

interrupt
IRQ
IRQ number
RX
interrupt
To eliminate the possibility of a broadcast storm, switches and bridges implement the ____.

RIP (Routing Information Protocol)
STP (Spanning Tree Protocol)
BGP (Border Gateway Protocol)
OSPF (Open Shortest Path First) protocol
STP (Spanning Tree Protocol)
If the ____ NIC LED indicator is blinking, the NIC is functioning and receiving frames.

LNK
ACT
TX
RX
RX
____ is a set of data or instructions that has been saved to a ROM (read-only memory) chip (which is on the NIC).

Micro code
Firmware
EEPROM
Driver code
Firmware
Nearly all NICs contain a(n) ____, the device that transmits and receives data signals.

keyboard port
mouse port
data transceiver
antenna
data transceiver
By far, the most popular expansion board NIC is one that uses a(n) ____ bus.

onboard
PCI
ExpressCard
ISA
PCI
A ____ is a multiport connectivity device that directs data between nodes on a network.

switch
bridge
router
gateway
router
____ are combinations of networking hardware and software that connect two dissimilar kinds of networks.

Routers
Switches
Gateways
Broadcast domains
Gateways
The ____________________ indicates, in hexadecimal notation, the area of memory that the NIC and CPU use for exchanging, or buffering, data.
memory range
The ____ is a simple set of instructions that enables a computer to initially recognize its hardware.

BIOS
Firmware
EEPROM
Driver code
BIOS
A NIC’s transmission characteristics are held in the adapter’s ____.

slot
RAM
ROM
firmware
firmware
A(n) ____________________ NIC is integrated into the motherboard.
on-board
____ hubs possess internal processing capabilities.

Passive
Intelligent
Stand-alone hubs
Workgroup
Intelligent
The ____ setting specifies, in hexadecimal notation, which area of memory will act as a channel for moving data between the NIC and the CPU.

memory range
base I/O port
IRQ range
firmware ROM
base I/O port
PCIe slots vary depending on the number of ____ they support.

lanes
labels
cards
processors
lanes
A ____ is a repeater with more than one output port.

bridge
switch
hub
router
hub
Broadband cable requires many subscribers to share the same local line, thus raising concerns about ____ and actual (versus theoretical) throughput.

access
costs
noise
security
security
A PSTN offers ____ security.

exceptional
marginal
expanded
dedicated
marginal
At the customer’s demarcation point, either inside or outside the building, T-carrier wire pairs terminate with a ____.

terminal adapter
smart jack
CSU/DSU
switch
smart jack
The individual geographic locations connected by a WAN are known as ____.

WAN sites
WAN links
network service providers
central offices
WAN sites
The data rate of a particular SONET ring is indicated by its ____, a rating that is internationally recognized by networking professionals and standards organizations.

OC (Optical Carrier) level
CIR (committed information rate)
BRI (Basic Rate Interface)
DS0 (digital signal, level 0)
OC (Optical Carrier) level
____ networking refers to dialing directly into a private network’s or ISP’s remote access server to log on to a network.

Remote
Direct
Dial-up
Virtual
Dial-up
ISDN PRI uses ____ B channels and one 64-Kbps D channel.

10
12
23
32
23
A(n) ____________________ uses TDM (time division multiplexing) over two wire to divide a single channel into multiple channels.
T-carrier
Because WAN connections require routers or other Layer 3 devices to connect locations, their links are not capable of carrying ____ protocols.

open
standard
routable
nonroutable
nonroutable
On most modern WANs, a ring topology relies on ____ rings to carry data.

flexible
open
serial
redundant
redundant
___________________________________ is an open source system designed to allow one workstation to remotely manipulate and receive screen updates from another workstation.
VNC (virtual network computing)
____ is the standard for connecting home computers to an ISP via DSL or broadband cable.

SLIP
SLIPoE
PPP
PPPoE
PPPoE
A ____ aggregates multiple DSL subscriber lines and connects them to the carrier’s CO.

terminal adapter
DSLAM
smart jack
terminator
DSLAM
____ virtual computing allows a user on one computer, called the client, to control another computer, called the host or server, across a network connection.

Random
Network
Open
Remote
Remote
____ is the preferred communications protocol for remote access communications.

SLIP
IP
PPP
TCP/IP
PPP
The portion of the PSTN that connects any residence or business to the nearest CO is known as the ____.

demarcation point
NIU (Network Interface Unit)
local loop
central office
local loop
____________________ encapsulates incoming Ethernet or token ring frames, then converts them into ATM cells for transmission over an ATM network.
LANE (LAN Emulation)
____ is an updated, digital version of X.25 that also relies on packet switching.

DSL
ISDN
Frame relay
ATM
Frame relay
In a process called ____, two 64-Kbps ISDN B channels can be combined to achieve an effective throughput of 128 Kbps.

slicing
linking
merging
bonding
bonding
____________________ are connections between network nodes that, although based on potentially disparate physical links, logically appear to be direct, dedicated links between those nodes.
Virtual circuits
A ____ converts digital signals into analog signals for use with ISDN phones and other analog devices.

terminal adapter
DSLAM
smart jack
terminator
terminal adapter
The speed of a T-carrier depends on its ____ level.

signal
hierarchy
channel
traffic
signal
WANs typically send data over ____ available communications networks.

privately
publicly
individually
serially
publicly
____________________ is the remote virtual computing software that comes with Windows client and server operating systems.
Remote Desktop
SONET’s extraordinary ____ results from its use of a double-ring topology over fiber-optic cable.

throughput
low cost
fault tolerance
latency
fault tolerance
What sets ATM apart from Ethernet is its ____ size.

channel
frame
variable packet
fixed packet
fixed packet
Using Bluetooth version 2.0, communicating nodes can be as far as ____ meters apart.

30
100
300
330
30
A directional antenna issues wireless signals along a(n) ____ direction.

open
narrow
wide
single
single
A unique characteristic of the 802.11 data frame is its ____ field.

Frame Control
Sequence Control
Data
Duration
Sequence Control
Satellite return Internet access is a(n) ____ technology.

symmetrical
asymmetrical
proprietary
open source
symmetrical
____ is an 802.11n network feature allowing the combination of multiple frames into one larger frame.

Channel bonding
Channel aggregation
Frame aggregation
Frame bonding
Frame aggregation
____________________ means that satellites orbit the Earth at the same rate as the Earth turns.
Geosynchronous orbit
If intermittent and difficult-to-diagnose wireless communication errors occur, ____ might be the culprit.

incorrect encryption
SSID mismatch
interference
incorrect antenna placement
interference
The average geographic range for an 802.11a antenna is ____ meters.

20
100
330
600
20
____ is a command-line function for viewing and setting wireless interface parameters and it is common to nearly all versions of Linux and UNIX.

ipconfig
iwconfig
config
ivconfig
iwconfig
____ is an 802.11n feature that allows two adjacent 20-MHz channels to be combined to make a 40-MHz channel.

Channel bonding
Channel aggregation
Frame aggregation
Frame bonding
Channel bonding
In ____, a wireless signal splits into secondary waves when it encounters an obstruction.

reflection
scattering
diffraction
bounce back
diffraction
In ____ scanning, the station transmits a special frame, known as a probe, on all available channels within its frequency range.

active
passive
fixed
open
active
Places where wireless Internet access is available to the public are called ____________________.
hot spots
The use of multiple frequencies to transmit a signal is known as ____________________ technology.
spread-spectrum
In wireless communication, to exchange information, two antennas must be tuned to the same ____.

frequency
variance
attenuation speed
port
frequency
____ may use either the 2.4-GHz or 5-GHz frequency range.

802.11a
802.11b
802.11g
802.11n
802.11n
____ satellites are the type used by the most popular satellite Internet access service providers.

Transponder
Medium Earth orbiting
Low Earth orbiting
Geosynchronous orbiting
Geosynchronous orbiting
LEO satellites orbit the Earth with an altitude as low as ____ miles.

100
1240
6,000
22,300
100
In ____ wireless systems, the result is a point-to-point link.

mobile
variable
fixed
open
fixed
An 802.11g antenna has a geographic range of ____ meters.

20
100
300
330
100
The ______________________________ is a unique character string used to identify an access point.
SSID (service set identifier)
Dial return satellite Internet access is a(n) ____ technology.

symmetrical
asymmetrical
proprietary
open source
asymmetrical
A(n) ____________________ assesses client requirements, facility characteristics, and coverage areas to determine an access point arrangement that will ensure reliable wireless connectivity within a given area.
site survey
____ is a most significant problem for wireless communications because the atmosphere is saturated with electromagnetic waves.

Attenuation
Fading
Diffraction
Interference
Interference
____ is the least popular WLAN standard.

802.11a
802.11b
802.11g
802.11n
802.11a
Satellite Internet access providers typically use frequencies in the C- or ____ bands.

L-
S-
Ku-
Ka-
Ku-
Solaris employs the file system called ____ for its native file system type.

UFS
NTFS
ext3
NFS
UFS
A(n) ____ is a pictorial representation of computer functions that, in the case of NOSs, enables administrators to manage files, users, groups, security, printers, and so on.

snapshot
shortcut
icon
GUI
GUI
____ memory may be logically carved out of space on the hard drive for temporary use.

Virtual
Logical
Physical
Hierarchical
Virtual
In LDAP-compatible directories, a(n) ____________________ is the set of definitions of the kinds of objects and object-related information that the directory can contain.
schema
A(n) ____________________ is a group of users, servers, and other resources that share a centralized database of account and security information.
domain
The process of copying directory data to multiple domain controllers is known as ____.

replication
duplication
correlation
sharing
replication
The printer queue is a ____ representation of the printer’s input and output.

virtual
logical
physical
hierarchical
logical
A(n) ____ is a self-contained, well-defined task within a process.

task
thread
activity
job
thread
The primary function of the UNIX ____ is to coordinate access to all your computer’s hardware, such as the disks, memory, keyboard, and monitor.

kernel
root
directory system
pipe system
kernel
A GUID (globally unique identifier) is a 128-bit number that ensures that no two objects have ____ names.

similar
duplicate
opposing
non-standard
duplicate
A(n) ____ is the record of a user that contains all of his properties, including rights to resources, password, name, and so on.

shell
container
account
directory
account
Every UNIX and Linux system contains full documentation of UNIX commands in the ____ pages.

doc
library
man
command
man
The directory containing information about objects in a domain resides on computers called ____ controllers.

OU
domain
database
server
domain
A(n) ____ is a list that organizes resources and associates them with their characteristics.

file inode
container
account
directory
directory
The support and use of multiple processors to handle multiple threads is known as ____.

multiprocessing
multitasking
multithreading
multisharing
multiprocessing
Active Directory organizes multiple domains hierarchically in a domain ____.

OU
directory
tree
bucket
tree
UNIX was one of the first operating systems to implement a ____ file system.

virtual
logical
physical
hierarchical
hierarchical
The most privileged user account on an NOS is the ____________________.
administrator
The term ____ memory refers to the RAM chips that are installed on the computer’s system board and whose sole function is to provide memory to that machine.

virtual
logical
physical
hierarchical
physical
A(n) ____ is a routine of sequential instructions that runs until it has achieved its goal.

process
thread
activity
job
process
A workgroup is a group of interconnected computers that share each other’s resources without relying on a central ____.

OU
domain
database
server
server
____________________ is the execution of multiple tasks at one time.
Multitasking
____ is one of the most important functions an NOS provides.

Client support
Printer sharing
Authentication
Memory management
Client support
Naming (or addressing) conventions in Active Directory are based on the ____ naming conventions.

SMB
LDAP
NTFS
NFS
LDAP
A service on the client workstation, called the ____________________, intercepts a request to determine whether it should be handled by the client or by the server.
redirector
A piece of software called ____ translates requests and responses between a client and a server.

kernel module
shell
middleware
firmware
middleware