Term
| When a key network admin leaves, what does the company depend on to keep using the network? |
|
Definition
|
|
Term
| What is the most common central device used today? |
|
Definition
|
|
Term
| What is the most common adapter or connector used to connect a computer to a wired network? |
|
Definition
|
|
Term
| What is the difference between a "Half Duplex" and a "full Duplex"? |
|
Definition
| A "Full Duplex" can send and receive data at the same time. While a "Half Duplex" can not. |
|
|
Term
| What would you use to set up an isolated group of computers within your organization? |
|
Definition
|
|
Term
| What would you use to create a VLAN? |
|
Definition
|
|
Term
| What zone is used to publish external websites for an organization? |
|
Definition
|
|
Term
| Which topology is the most redundant and the most expensive? |
|
Definition
|
|
Term
| What Ethernet standard describes CSMA/CD |
|
Definition
|
|
Term
| What mechanism do wireless network use to access the network. |
|
Definition
|
|
Term
| What model promises the most processing power? |
|
Definition
|
|
Term
| Which model uses a central database for authentication? |
|
Definition
|
|
Term
| What type of server does Active Director run on? |
|
Definition
|
|
Term
| In which model does each host have their own security database? |
|
Definition
|
|
Term
| What type of communication is sent to a single designated host? |
|
Definition
|
|
Term
| What is used to uniquely identify a host on a TCP/IP |
|
Definition
|
|
Term
|
Definition
| Two or more computers that exchange data, confined to a small geographic area. |
|
|
Term
| Why would a organization need a network? |
|
Definition
| Sharing, Communication, Organization, Money |
|
|
Term
| Wireless Access Point (WAP) |
|
Definition
| Acts as the central connection device for a wireless network. |
|
|
Term
|
Definition
| A group of host with a common set of requirements that communicate as if they were connected together in a normal fashion on one switch, regardless of their physical location. |
|
|
Term
|
Definition
| AKA DMZ, Small network set up separately from a company's private LAN and the internet. |
|
|
Term
| Back-to-Back Configuration |
|
Definition
| When a DMZ is situated between two firewall devices. |
|
|
Term
| 3-leg perimeter configuration |
|
Definition
| The DMZ is usually attached to a separate connection of the company firewall. 1Con to LAN - 1Con to DMZ - 1Con to internet |
|
|
Term
|
Definition
| Defines the physical connection of hosts in a computer network. |
|
|
Term
|
Definition
| Most common topology, each computer is individually wired to a central connecting device with twisted-pair cabling. |
|
|
Term
|
Definition
| Every computer connects to every other computer; No central connection device is needed. |
|
|
Term
|
Definition
| Each computer is connected to the network using a closed loop; done with coaxial cable. This is a pretty outdated concept |
|
|
Term
|
Definition
| Sends data logically in a ring fashion, but is physically connected in a star fashion. |
|
|
Term
|
Definition
| A group of networking technologies that define how information is sent and received between network adapters, hubs, switches, and other devices. |
|
|
Term
|
Definition
| A group of bytes packaged by a network adapter for transmission across the network, these frames are created on Layer 2 of the OSI model. |
|
|
Term
|
Definition
| an architecture that distributes applications between servers such as Windows Server 2008 and client computers such as Windows 7 or Windows Vista. |
|
|
Term
|
Definition
| A server that stores files for computers to share |
|
|
Term
|
Definition
| A server that controls printers that can be connected directly to the server or are connected to the network. |
|
|
Term
|
Definition
| email servers, but also fax, instant messaging, collaborative, and other types of messaging servers. |
|
|
Term
|
Definition
| where a company's telephone system meets its computer system, PBXs, and VOIP |
|
|
Term
|
Definition
| Each computer has an equal ability to server data and to access data, just like any other computer on the network. |
|
|
Term
|
Definition
| 7 layers which house different protocols within one of several protocol suites, how data communicates on computer networks. |
|
|
Term
| When are Inbound Ports used? |
|
Definition
| When another computer whats to connect to a service or application running on your computer. |
|
|
Term
| When are Outbound Ports used? |
|
Definition
| When your computer wants to connect to a service or application running on another computer. |
|
|
Term
| Where is the port # shown? |
|
Definition
| After the IP address separated by a colon : |
|
|
Term
| What are the 7 layers of the OSI model? |
|
Definition
| Application, Presentation, Session, Transport, Network, Datalink, Physical |
|
|
Term
| what is the 1st layer of the OSI model and it's unit of measurement? |
|
Definition
|
|
Term
| What is the 2nd layer of the OSI model and it's unit of measurement? |
|
Definition
|
|
Term
| What is the 3rd layer of the OSI model and it's unit of measurement? |
|
Definition
|
|
Term
| What is the 4th layer of the OSI model and it's unit of measurement? |
|
Definition
|
|
Term
| What is the 5th layer of the OSI model? |
|
Definition
|
|
Term
| What is the 6th layer of the OSI model? |
|
Definition
|
|
Term
| What is the 7th layer of the OSI model? |
|
Definition
|
|
Term
| What layers are within the Communication Subnet? |
|
Definition
| Physical, Datalink, Network |
|
|
Term
| Describe the Physical Layer of the OSI model. |
|
Definition
| 1st layer of the OSI model. Defines network standards for electrical signals, connectors, media types, and the way data is placed on the network media. |
|
|
Term
| Give examples of the physical layer. |
|
Definition
| Signals, Hubs, Cables, Connectors, Physical topologies(Bus, Ring, Star, Mesh) |
|
|
Term
| ________ is an enormous system of interlinked hypertext documents that are accessed with a web browser. _______ is the current stage. |
|
Definition
World Wide Web (WWW)
Web 2.0 |
|
|
Term
| ________ is a private computer network that an organization implements to share data with employees. |
|
Definition
|
|
Term
| ________ is a private computer network that extends to users outside a company in order to share data. |
|
Definition
|
|
Term
| ________ a connection between two or more computers or devices that are not on the same private network. In effect creating a tunnel through LANs and WANs connecting the 2 devices together. |
|
Definition
| VPN (Virtual Private Network) |
|
|
Term
| __________ define the physical connections of hosts in a computer network. |
|
Definition
|
|
Term
| _________ topology describes how the data is actually sent from one computer to the next. |
|
Definition
|
|
Term
| What is the most common adapter or connector used to connect a computer to a wired network. |
|
Definition
|
|
Term
| What layer does the Router reside on? |
|
Definition
|
|
Term
| Which layer deals with the serial transfer of data? |
|
Definition
|
|
Term
| You run a netstat -an command in the command prompt and notice many connections being made that say TCP in the left-most column. What layer of the OSI is TCP referring to? |
|
Definition
|
|
Term
| You suspect a problem with your computer's network adapter and its ability to send the correct frames of data that correspond with the network architecture used by the rest of your computers. What layer should you attempt to use as a troubleshooting |
|
Definition
|
|
Term
| A standard such as 100BASE-T refers to which OSI layer? |
|
Definition
|
|
Term
| Almost all of your users connect to Web sites with Internet Explorer. They usually type domain names such as www.microsoft.com. What protocol is initiated by default when they press Enter after typing the domain name? |
|
Definition
| HTTP: Hypertext transfer protocol |
|
|
Term
You need to find out the MAC address of your director's computer. He has given you permission to access his computer. You access the command prompt. What command should you type to see the computer's MAC address? |
|
Definition
|
|
Term
You need to find out the MAC addresses of all the computers that a particular user's computer has connected to in the recent past. What command should you use to accomplish this? |
|
Definition
|
|
Term
| You have been instructed to capture and analyze packets on a server. What tools will allow you to do this? |
|
Definition
| Protocol Analyzer or Wireshark |
|
|
Term
| The manager of IT asks you ping his laptop to see whether your computer can find it on the network. In this scenario, the ____________ protocol is being implemented |
|
Definition
|
|