• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/61

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

61 Cards in this Set

  • Front
  • Back
The major disadvantage to using store-and-forward switching in a large network is that it will slow down the speed of network traffic.
True
Communications through a router are noticeably faster than communications through a switch.
False
Changing the SSID on the access point aqnd disabling SSID broadcast is sufficient security for most wireless networks.
False
When a disk is formatted, it is impossible to recover that data that was on the disk.
False
In Windows, you can start Task Manager by simply right-clicking the taskbar and choosing Task Manager.
True
One critical difference between a client OS and a server OS is the addition of directory services on some server OSs
True
Virtualization is designed for testing and development purposes only.
False
Group accounts make it easier for an administrator to manage user rights and permissions.
True
An event log entry that is an error is marked with a red cirlce with a white exclamation point in the center.
True
A RAID that is configured as a level 0 requires two drives because it copies
False
Which of the following combinations will you find in a switching table?
MAC address/ switch port number
Which of the following is the fastest switching mode?
cut-through
Which of the following is the switching protocol that is used to eliminate the possibility of switching loops?
STP
When an access control list is applied on a router's interface, that interface is performing a specific function on the packets that it receives. Whast is that function called?
packet filtering
A wireless router is actually composed of three devices, a wireless access point and which two other devices
a router and a switch
Which is the strongest form of wireless security?
WPA2
Which advanced feature of a NIC allows a computer to download an OS from the network instead of from a local drive?
preboot execution environment
Which part of the OS provides users and applications with an interface to manipulate files?
file system
Older OSs first used what type of multitasking, which allowed a process to monopolize the CPU's time until the process had completed its own task/
cooperative
What method does the CPU use to divide its computing cycles between more than one process/
time slicing
In Windows, you use Task Manager to view the processes running on your computer. What do you use to view the running processes on some Linux system
System monitor
What is the native file-sharing protocol in Linux?
NFS
What is the process called that grants or denies a user's access to network resources?
authorization
You are the network administrator for a company. The company’s policy is that the users are allowed to set their own passwords but that they must change their password every 30 days. You have just received a call from a user who can’t log on because she forgot her password. After you change her password, which of the password options listed would you set in the user’s account so that she will have to change the password when she logs on using the password you assigned?
User must change password at next logon
You are creating a new group for the Sales department. All of the users that will be in this group will need to have access to the same resources. What scope would you use for this group?
global
In Linux, what is the command for viewing a file's contents onscreen/
cat
The partition that contains the Windows OS files is known as the what type of partition?
boot
A disk must be formatted as what type of disk if you want to access additional features such as disk spanning?
dynamic
If you need to limit the amount of data users can store on a volume, you would implement which of the following?
disk quotas
What tool would you use to view error messages that are generated by system services or applications?
Event viewer
A security policy should clearly state the desired rules, even if they cannot be enforced
False
You don't need to physically secure your servers as long as you use a good strong password for your accounts
False
A Trojan is a self-replicating program that masks itself as a useful program but is actually a type of malware.
False
A DoS attack ties up network bandwidth or services, rendering resources useless to legitimate userds.
True
Most small businesses require high level of security including encryption technologies and complex network connections.
False
Most small businesses require a high level of security including encryption technologies and complex network connections.
False
When purchasing new equipment for a small business it is a good idea to invest in expandability features that will meet the company's needs for the next 10 to 15 years.
True
In a small business network, the router usually takes on the responsibilities of many roles which include a firewall as well as a DHCP server.
True
In most cases, you can install a small business network and move on to the next job, leaving company's IT staff to support the network
False
Packet switched WANs use virtual circuits to ensure that packets are delivered reliably and at the agreed-on bandwidth level
True
Multiprotocol Label Switching (MPLS) supports both IPv4 and IPv6, as well as other network layer protocols.
True
Link Control Protocol is responsible for the setup of a PPP connection, as well as the termination of a connection when it has ended.
True
What is a policy that defines the methods involved when a user logs on to the network called?
authentication
In Windows 7, what is the maximum length that a password can be?
128
If the minimum password length on a Windows system is set to zero, what does that mean?
The user can use a blank password.
Which protocol is used to encrypt data as it travels a network?
IPSec
Which form of authentication involves the exchange of a password-like key that must be entered on both devices?
preshared key
If you need to implement a VPN on a Windows Server 2008 system, what server role must be installed to access routing and remote access services?
network policy and access services
Which of the following is not a requirement for most small business networks?
complex WAN environment
Which of the following is a new file-sharing option that can be used on the network if all the computers have Windows 7 installed?
HomeGroup
If your network consists mostly of computers with Linux operating systems, which file-sharing system can you use that is native to Linux?
NFS
Which of the following should you consider when choosing a wireless network instead of a wired network?
the ability of unauthorized users to receive a signal
Before you purchase any software for a small business, especially the OS, you should be aware of the number of users that are allowed to access the software. What document will give you that information?
EULA
After you have set up a network for a small business, you may need to access the network remotely to provide support for the users. Which remote access option should not be used unless a secure connection can be established first?
Telnet
Select the true statement regarding analog and digital signals.
Analog signals vary over time continually and can be represented by a sine wave, while digital signals are binary 1s and 0s using voltage levels.
You’re the network administrator for a large bean-bag chair company. You are presenting to your supervisor several reasons to make use of cloud computing for handling data processing. Which answer would be a valid benefit of using cloud computing?
reduced physical plant costs
Which of the following terms describes the category of cloud computing in which a customer develops applications using development tools and infrastructure provided by the service provider?
hosted platforms
You are a network architect for an IT consulting company. One of your clients needs a WAN connection and has asked you about the disadvantage of a packet-switched WAN method. Which of the following is a disadvantage that applies?
shared bandwidth
What would an Asynchronous Transfer Mode (ATM) network be best suited for?
carrying voice data and time-sensitive information
Which cloud computing category refers to the use of software hosted on a service provider’s network, and is usually subscription based?
hosted applications
What is the signaling method used to allocate time slots for each channel in a T-carrier line called?
Time Division Multiplexing (TDM)