• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/25

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

25 Cards in this Set

  • Front
  • Back
A static image of a system's (or network's) performance when all elements are known to be working properly.
Baseline
A command-line utility for Linux servers and workstations that displays the current TCP/IP configuration of the machine.
IFconfig
The command-line utility used to display the current TCP/IP configuration on the local computer and to modify the DHCP addresses assigned to each interface.
IPconfig
A multitasking electronic measuring instrument which typically includes features like the ability to measure voltage, current and resistance.
Multi-meter
A command-line utility used to examine the sockets-based connections open on a given host.
Netstat
Software run on a host that gathers packets and analyzes them.
Packet Sniffer
Term for a small network message (ICMP ECHO) sent by a computer to check for the presence and responsiveness of another. Also used to verify the presence of another system.
Ping (Packet Internet Groper)
A tool that sends out a signal and measures how much time it takes to return. It is used to find short open circuits.
Time-Domain Reflectormeter
Utility commonly used to locate failures along a TCP/IP communication path by tracing the route from origin to destination. Each router interface encountered is echoed to the screen along with some statistical information about the path timing.
Tracert
A form of bandwidth optimization that works by delaying packets that meet a certain criteria to guarantee usable bandwidth for other applications.
Traffic Shaping
Digital connections leased from the telephone company. The connection type is denoted by the letter T plus a number and is an indication of throughput.
T-Series Connections
Software tools, either protocol analyzers or performance monitoring tools, used to troubleshoot network problems.
Network Software Diagnostics
A software and hardware troubleshooting tool that is used to decode protocol information to try to determine the source of a network problem and to establish baselines.
Protocol Analyzers
The amount of time the system is up and accessible to end-users.
Uptime
The technologies that work to deliver voice communications over the internet or other data networks. It may cases it can include voice and vide applications.
VoIP
The tool used to install twisted pair cabling into patch panels and wiring closets. It forces the wire down into the insulation displacement connector.
Punch-down Tool
A virus that alters the code in the MBR of a hard drive. Once a machine is booted, the virus will reside in memory and attempt to infect other systems.
Boot Sector Virus
A virus that attacks executable application and system program files, such as those ending in .com, .exe, and .dll.
File Virus
A specially written macro that performs the same functions as a virus. These macros normally auto start within the application is run and then make copies of themselves, often propagating across the network.
Macro Virus
A type of virus that can reproduce itself, is self-contained and doesn't need a host application to be transported.
Worm
Used to perform tests of phone and network lines. Generates a tone to assist in the identification of the wire being checked.
Tone Generator
A program that enters a system or network under the guise of another program. Often may be included as an attachment or as part of an installation program.
Trojan Virus
A program that can make a copy of itself without you necessarily being aware of it; some viruses can destroy or damage files, and generally the best protection is always to maintain backups of your files.
Virus
The command-line utility that allows you to query a name server to see which IP Address a name resolves to.
NSLOOKUP
The command-line utility used to view, modify and configure a host's routing table.
Route