Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
130 Cards in this Set
- Front
- Back
The data portion of an Ethernet frame may contain ____ bytes of information.
|
46 to 1500
|
|
The most common 1-Gigabit Ethernet standard in use today is ____.
|
1000Base-LX
|
|
As part of CSMA/CD, a process known as ____________________ allows the NIC issue a special 32-bit sequence that indicates to the rest of the network nodes that its previous transmission was faulty and that those data frames are invalid.
|
jamming
|
|
A ____ is simply a linked series of devices.
|
daisy-chain
|
|
The most common logical topologies are ____ and ring.
|
bus
|
|
In packet switching, when packets reach their destination node, the node ____ them based on their control information.
|
reassembles
|
|
____________________ is a component of a network’s logical topology that determines how connections are created between nodes.
|
Switching
|
|
Given their long-distance capabilities, 10GBase-ER and 10GBase-EW are best suited for use on ____.
|
WANs
|
|
In the 10GBase-LR standard, the L stands for ____.
|
long reach
|
|
The 10GBase-T standard is considered a breakthrough for transmitting 10 Gbps over ____ medium.
|
twisted pair
|
|
A physical topology ____.
|
depicts a network in broad scope
|
|
A ____ occurs when two transmissions interfere with each other.
|
collision
|
|
1000Base-SX has a maximum throughput of ____.
|
1 Gbps
|
|
Collectively, MPLS labels are sometimes called a ____.
|
shim
|
|
1000Base-T is a standard for achieving throughputs ____ times faster than Fast Ethernet over copper cable.
|
10
|
|
A complex combination of pure topologies is known as a ____ topology.
|
hybrid
|
|
Without ____, a bus network would suffer from signal bounce.
|
terminators
|
|
On an Ethernet network, a(n) ____ is the portion of a network in which collisions occur if two nodes transmit data at the same time.
|
collision domain
|
|
The 10-gigabit fiber optic standard with the shortest segment length is ____.
|
10GBase-SR
|
|
In a ring network, each workstation acts as a(n) ____ for the transmission.
|
repeater
|
|
Within Ethernet frame types, the ____ signals to the receiving node that data is incoming and indicates when the data flow is about to begin.
|
preamble
|
|
The Ethernet_II frame type contains a 2-byte ____ field which differentiates it from the older Ethernet_802.3 and Ethernet_802.2 frame types.
|
type
|
|
Because of its support for multiple Network layer protocols and because it uses fewer bytes as overhead, ____________________ is the frame type most commonly used on contemporary Ethernet networks.
|
Ethernet_II
|
|
A network backbone is the ____________________ that connects the hubs, switches, and routers on a network.
|
cabling
|
|
All Ethernet networks, independent of their speed or frame type, use an access method called ____.
|
CSMA/CD
|
|
In a(n) ____________________ topology, every node on the network is connected through a central device, such as a hub, router, or switch.
|
star
|
|
____ routing is a technique in which a network administrator programs a router to use specific paths between nodes.
Static Dynamic Best path Link-state |
Static
|
|
A computer’s ____________________ is the circuit, or signaling pathway, used by the motherboard to transmit data to the computer’s components, including its memory, processor, hard disk, and NIC.
|
bus
|
|
A router that directs data between nodes on an autonomous LAN (or one owned and operated by a single organization) is known as a(n) ____________________ router.
|
interior
|
|
The primary difference between the two USB standards is ____.
connector pin organization security limitations speed transceiver placement |
speed
|
|
____ is a type of microchip that requires very little energy to operate.
ROM RAM CMOS EEPROM |
CMOS
|
|
Each time a computer starts up, the device drivers for all its connected peripherals are loaded into ____.
ROM EEPROM RAM CMOS |
RAM
|
|
Switches that operate anywhere between Layer 4 and Layer 7 are also known as ____ switches.
peripheral STP content multiport |
content
|
|
Switches can create ____ by grouping a number of ports into a broadcast domain.
trunks spanning trees gateways VLANs |
VLANs
|
|
A(n) ____________________ is software that enables an attached device to communicate with the computer’s operating system.
|
device driver
|
|
CompactFlash is an example of a peripheral device attached to the computer’s ____ bus.
|
external
|
|
A(n) ____ is the circuit board wire over which a device issues voltage to signal this request.
interrupt IRQ IRQ number RX |
interrupt
|
|
To eliminate the possibility of a broadcast storm, switches and bridges implement the ____.
RIP (Routing Information Protocol) STP (Spanning Tree Protocol) BGP (Border Gateway Protocol) OSPF (Open Shortest Path First) protocol |
STP (Spanning Tree Protocol)
|
|
If the ____ NIC LED indicator is blinking, the NIC is functioning and receiving frames.
LNK ACT TX RX |
RX
|
|
____ is a set of data or instructions that has been saved to a ROM (read-only memory) chip (which is on the NIC).
Micro code Firmware EEPROM Driver code |
Firmware
|
|
Nearly all NICs contain a(n) ____, the device that transmits and receives data signals.
keyboard port mouse port data transceiver antenna |
data transceiver
|
|
By far, the most popular expansion board NIC is one that uses a(n) ____ bus.
onboard PCI ExpressCard ISA |
PCI
|
|
A ____ is a multiport connectivity device that directs data between nodes on a network.
switch bridge router gateway |
router
|
|
____ are combinations of networking hardware and software that connect two dissimilar kinds of networks.
Routers Switches Gateways Broadcast domains |
Gateways
|
|
The ____________________ indicates, in hexadecimal notation, the area of memory that the NIC and CPU use for exchanging, or buffering, data.
|
memory range
|
|
The ____ is a simple set of instructions that enables a computer to initially recognize its hardware.
BIOS Firmware EEPROM Driver code |
BIOS
|
|
A NIC’s transmission characteristics are held in the adapter’s ____.
slot RAM ROM firmware |
firmware
|
|
A(n) ____________________ NIC is integrated into the motherboard.
|
on-board
|
|
____ hubs possess internal processing capabilities.
Passive Intelligent Stand-alone hubs Workgroup |
Intelligent
|
|
The ____ setting specifies, in hexadecimal notation, which area of memory will act as a channel for moving data between the NIC and the CPU.
memory range base I/O port IRQ range firmware ROM |
base I/O port
|
|
PCIe slots vary depending on the number of ____ they support.
lanes labels cards processors |
lanes
|
|
A ____ is a repeater with more than one output port.
bridge switch hub router |
hub
|
|
Broadband cable requires many subscribers to share the same local line, thus raising concerns about ____ and actual (versus theoretical) throughput.
access costs noise security |
security
|
|
A PSTN offers ____ security.
exceptional marginal expanded dedicated |
marginal
|
|
At the customer’s demarcation point, either inside or outside the building, T-carrier wire pairs terminate with a ____.
terminal adapter smart jack CSU/DSU switch |
smart jack
|
|
The individual geographic locations connected by a WAN are known as ____.
WAN sites WAN links network service providers central offices |
WAN sites
|
|
The data rate of a particular SONET ring is indicated by its ____, a rating that is internationally recognized by networking professionals and standards organizations.
OC (Optical Carrier) level CIR (committed information rate) BRI (Basic Rate Interface) DS0 (digital signal, level 0) |
OC (Optical Carrier) level
|
|
____ networking refers to dialing directly into a private network’s or ISP’s remote access server to log on to a network.
Remote Direct Dial-up Virtual |
Dial-up
|
|
ISDN PRI uses ____ B channels and one 64-Kbps D channel.
10 12 23 32 |
23
|
|
A(n) ____________________ uses TDM (time division multiplexing) over two wire to divide a single channel into multiple channels.
|
T-carrier
|
|
Because WAN connections require routers or other Layer 3 devices to connect locations, their links are not capable of carrying ____ protocols.
open standard routable nonroutable |
nonroutable
|
|
On most modern WANs, a ring topology relies on ____ rings to carry data.
flexible open serial redundant |
redundant
|
|
___________________________________ is an open source system designed to allow one workstation to remotely manipulate and receive screen updates from another workstation.
|
VNC (virtual network computing)
|
|
____ is the standard for connecting home computers to an ISP via DSL or broadband cable.
SLIP SLIPoE PPP PPPoE |
PPPoE
|
|
A ____ aggregates multiple DSL subscriber lines and connects them to the carrier’s CO.
terminal adapter DSLAM smart jack terminator |
DSLAM
|
|
____ virtual computing allows a user on one computer, called the client, to control another computer, called the host or server, across a network connection.
Random Network Open Remote |
Remote
|
|
____ is the preferred communications protocol for remote access communications.
SLIP IP PPP TCP/IP |
PPP
|
|
The portion of the PSTN that connects any residence or business to the nearest CO is known as the ____.
demarcation point NIU (Network Interface Unit) local loop central office |
local loop
|
|
____________________ encapsulates incoming Ethernet or token ring frames, then converts them into ATM cells for transmission over an ATM network.
|
LANE (LAN Emulation)
|
|
____ is an updated, digital version of X.25 that also relies on packet switching.
DSL ISDN Frame relay ATM |
Frame relay
|
|
In a process called ____, two 64-Kbps ISDN B channels can be combined to achieve an effective throughput of 128 Kbps.
slicing linking merging bonding |
bonding
|
|
____________________ are connections between network nodes that, although based on potentially disparate physical links, logically appear to be direct, dedicated links between those nodes.
|
Virtual circuits
|
|
A ____ converts digital signals into analog signals for use with ISDN phones and other analog devices.
terminal adapter DSLAM smart jack terminator |
terminal adapter
|
|
The speed of a T-carrier depends on its ____ level.
signal hierarchy channel traffic |
signal
|
|
WANs typically send data over ____ available communications networks.
privately publicly individually serially |
publicly
|
|
____________________ is the remote virtual computing software that comes with Windows client and server operating systems.
|
Remote Desktop
|
|
SONET’s extraordinary ____ results from its use of a double-ring topology over fiber-optic cable.
throughput low cost fault tolerance latency |
fault tolerance
|
|
What sets ATM apart from Ethernet is its ____ size.
channel frame variable packet fixed packet |
fixed packet
|
|
Using Bluetooth version 2.0, communicating nodes can be as far as ____ meters apart.
30 100 300 330 |
30
|
|
A directional antenna issues wireless signals along a(n) ____ direction.
open narrow wide single |
single
|
|
A unique characteristic of the 802.11 data frame is its ____ field.
Frame Control Sequence Control Data Duration |
Sequence Control
|
|
Satellite return Internet access is a(n) ____ technology.
symmetrical asymmetrical proprietary open source |
symmetrical
|
|
____ is an 802.11n network feature allowing the combination of multiple frames into one larger frame.
Channel bonding Channel aggregation Frame aggregation Frame bonding |
Frame aggregation
|
|
____________________ means that satellites orbit the Earth at the same rate as the Earth turns.
|
Geosynchronous orbit
|
|
If intermittent and difficult-to-diagnose wireless communication errors occur, ____ might be the culprit.
incorrect encryption SSID mismatch interference incorrect antenna placement |
interference
|
|
The average geographic range for an 802.11a antenna is ____ meters.
20 100 330 600 |
20
|
|
____ is a command-line function for viewing and setting wireless interface parameters and it is common to nearly all versions of Linux and UNIX.
ipconfig iwconfig config ivconfig |
iwconfig
|
|
____ is an 802.11n feature that allows two adjacent 20-MHz channels to be combined to make a 40-MHz channel.
Channel bonding Channel aggregation Frame aggregation Frame bonding |
Channel bonding
|
|
In ____, a wireless signal splits into secondary waves when it encounters an obstruction.
reflection scattering diffraction bounce back |
diffraction
|
|
In ____ scanning, the station transmits a special frame, known as a probe, on all available channels within its frequency range.
active passive fixed open |
active
|
|
Places where wireless Internet access is available to the public are called ____________________.
|
hot spots
|
|
The use of multiple frequencies to transmit a signal is known as ____________________ technology.
|
spread-spectrum
|
|
In wireless communication, to exchange information, two antennas must be tuned to the same ____.
frequency variance attenuation speed port |
frequency
|
|
____ may use either the 2.4-GHz or 5-GHz frequency range.
802.11a 802.11b 802.11g 802.11n |
802.11n
|
|
____ satellites are the type used by the most popular satellite Internet access service providers.
Transponder Medium Earth orbiting Low Earth orbiting Geosynchronous orbiting |
Geosynchronous orbiting
|
|
LEO satellites orbit the Earth with an altitude as low as ____ miles.
100 1240 6,000 22,300 |
100
|
|
In ____ wireless systems, the result is a point-to-point link.
mobile variable fixed open |
fixed
|
|
An 802.11g antenna has a geographic range of ____ meters.
20 100 300 330 |
100
|
|
The ______________________________ is a unique character string used to identify an access point.
|
SSID (service set identifier)
|
|
Dial return satellite Internet access is a(n) ____ technology.
symmetrical asymmetrical proprietary open source |
asymmetrical
|
|
A(n) ____________________ assesses client requirements, facility characteristics, and coverage areas to determine an access point arrangement that will ensure reliable wireless connectivity within a given area.
|
site survey
|
|
____ is a most significant problem for wireless communications because the atmosphere is saturated with electromagnetic waves.
Attenuation Fading Diffraction Interference |
Interference
|
|
____ is the least popular WLAN standard.
802.11a 802.11b 802.11g 802.11n |
802.11a
|
|
Satellite Internet access providers typically use frequencies in the C- or ____ bands.
L- S- Ku- Ka- |
Ku-
|
|
Solaris employs the file system called ____ for its native file system type.
UFS NTFS ext3 NFS |
UFS
|
|
A(n) ____ is a pictorial representation of computer functions that, in the case of NOSs, enables administrators to manage files, users, groups, security, printers, and so on.
snapshot shortcut icon GUI |
GUI
|
|
____ memory may be logically carved out of space on the hard drive for temporary use.
Virtual Logical Physical Hierarchical |
Virtual
|
|
In LDAP-compatible directories, a(n) ____________________ is the set of definitions of the kinds of objects and object-related information that the directory can contain.
|
schema
|
|
A(n) ____________________ is a group of users, servers, and other resources that share a centralized database of account and security information.
|
domain
|
|
The process of copying directory data to multiple domain controllers is known as ____.
replication duplication correlation sharing |
replication
|
|
The printer queue is a ____ representation of the printer’s input and output.
virtual logical physical hierarchical |
logical
|
|
A(n) ____ is a self-contained, well-defined task within a process.
task thread activity job |
thread
|
|
The primary function of the UNIX ____ is to coordinate access to all your computer’s hardware, such as the disks, memory, keyboard, and monitor.
kernel root directory system pipe system |
kernel
|
|
A GUID (globally unique identifier) is a 128-bit number that ensures that no two objects have ____ names.
similar duplicate opposing non-standard |
duplicate
|
|
A(n) ____ is the record of a user that contains all of his properties, including rights to resources, password, name, and so on.
shell container account directory |
account
|
|
Every UNIX and Linux system contains full documentation of UNIX commands in the ____ pages.
doc library man command |
man
|
|
The directory containing information about objects in a domain resides on computers called ____ controllers.
OU domain database server |
domain
|
|
A(n) ____ is a list that organizes resources and associates them with their characteristics.
file inode container account directory |
directory
|
|
The support and use of multiple processors to handle multiple threads is known as ____.
multiprocessing multitasking multithreading multisharing |
multiprocessing
|
|
Active Directory organizes multiple domains hierarchically in a domain ____.
OU directory tree bucket |
tree
|
|
UNIX was one of the first operating systems to implement a ____ file system.
virtual logical physical hierarchical |
hierarchical
|
|
The most privileged user account on an NOS is the ____________________.
|
administrator
|
|
The term ____ memory refers to the RAM chips that are installed on the computer’s system board and whose sole function is to provide memory to that machine.
virtual logical physical hierarchical |
physical
|
|
A(n) ____ is a routine of sequential instructions that runs until it has achieved its goal.
process thread activity job |
process
|
|
A workgroup is a group of interconnected computers that share each other’s resources without relying on a central ____.
OU domain database server |
server
|
|
____________________ is the execution of multiple tasks at one time.
|
Multitasking
|
|
____ is one of the most important functions an NOS provides.
Client support Printer sharing Authentication Memory management |
Client support
|
|
Naming (or addressing) conventions in Active Directory are based on the ____ naming conventions.
SMB LDAP NTFS NFS |
LDAP
|
|
A service on the client workstation, called the ____________________, intercepts a request to determine whether it should be handled by the client or by the server.
|
redirector
|
|
A piece of software called ____ translates requests and responses between a client and a server.
kernel module shell middleware firmware |
middleware
|