Академический Документы
Профессиональный Документы
Культура Документы
1. Two computers running the MS-DOS operating system can be connected and information
can be shared. (Yes or No).
Yes
Direct-cable connection
folder
administrator
5. The user account contains information that defines a user to the network's
___________________ system.
security
copying
profile
8. Two key pieces of information that should be entered when creating a user account are
account name and ___________________.
password
9. The ____________ account is for people who do not have a valid user account but need
temporary access to the network.
Guest
group
domain
12. Groups are used to give users ______________ to perform system tasks such as backing
up and restoring files.
rights
permissions
14. After being deleted, a user can no longer use the network, because the network
__________________ database will contain record or description of the user.
security
Network Security
1. The first consideration in keeping data safe is to ensure the security of the network
__________________.
hardware
user-level security
resource
read-only
rights
6. The most efficient way to assign permissions is through the use of ______________.
groups
security logs
8. A data- __________________ utility scrambles data before it goes out onto the network.
encryption
algorithms
10. Diskless computers communicate with the server and log on through the use of a special
ROM boot chip installed on the computer ________________ _________________
___________.
temperature, humidity
12. True or False: If network cables are installed in the walls and in the ceilings, they will be
safe from all damage.
False
13. The first line of defense against loss of data is usually a ___________
________________ system.
tape backup
schedule
15. Maintaining a __________ of all backups is important for later file recovery.
log
16. When backing up across a network, network traffic can be reduced by placing the backup
computer on an isolated _______________.
segment
17. Fault-tolerant systems protect data by duplicating data or placing data in different
_______________ sources.
physical
18. RAID level 0, called ____________ _______________, divides data into 64K blocks and
spreads it equally in a fixed rate and order among all disks in an array.
disk striping
20. Disk __________________ duplicates a partition and moves the duplication onto another
physical disk so that there are always two copies of the data.
mirroring
21. Writing complete blocks of data to each disk in the array is known as disk
________________.
striping
independent
Printing on a Network
1. When network users want to print data on a shared network printer, the data is sent to a
_____________ that feeds the data to the printer.
server
2. Each network print job must be ________________ away from a computer's local printer
port and onto the network cable.
redirected
3. The memory buffer in the print server's RAM that holds the print job until the printer is
ready is called a ______________.
spooler
4. In order for users to access a shared printer, they must have a way to ________________
the printer.
identify
5. Managing users who access printing over a computer network includes assigning
_________________, as with any other shared network resource.
permissions
reorder
print-sharing utility
Administering Change
1. Monitoring and documenting the network when it is in good working order provide a
_______________ against which unusual network performance can be compared.
baseline
2. A network ______________ is a tool that captures and filters data packets and analyzes
network activity.
monitor
3. __________ and _____________ are utilities that are used to test the network
connections by sending a packet to a remote host and monitoring its return.
ping, tracert
bottlenecks
6. After creating a baseline for a network's performance, you will need to maintain a
performance _______________ to aid with future troubleshooting.
history
9. The best tool to use to confirm hardware changes to a network is the _________ utility.
ping
10. How long the network can afford to be ___________ is in important factor in organizing
and timing a move.
down
Troubleshooting a Network
1. To isolate a network problem, the engineer can divide the network into
_______________.
segments
2. Protocol analyzers look inside the ______________ to determine the cause of a problem.
packet
3. Advanced cable testers will tell you if a particular cable or _______ is causing problems.
NIC
bottleneck
real, recorded
agents
performance
alert
capture, analyze
11. Other useful sources of information for network troubleshooting include _________,
___________ _____________, and __________________.
FTP
14. You can use _______________ to act as a remote terminal to an Internet host.
Telnet
15. In addition to URLs, every computer on the Internet has a unique ______ address.
IP
Troubleshooting Tools
1. The _____________ ________________ is the primary all-purpose electronic measuring
tool used by computer and electronic technicians.
digital voltmeter
Time-domain reflectometers
Oscilloscopes
4. In a crossover cable, the send wire from one computer is connected to the ____________
port on the other computer.
receive
5. Protocol analyzers, also called "network analyzers," perform __________ - __________
network traffic analysis using packet capture, decoding, and transmission data.
real-time
performance monitor
data streams
Technet
2. The Web, FTP, e-mail, news, and telnet are all services that are available on the
_________________.
Internet
four
5. Every Uniform Resource Locator (URL) consists of the _________________, a colon (:),
and the ________________ of the resource.
protocol, address
6. The most common protocol used for sending files between computers is the _________
__________________ _________________.
identification, @, location
8. The difference between Network News and e-mail is that with Network News,
conversations take place in a _____________ ____________ called a newsgroup.
public forum
remote terminal
WI-FI
1. What are the Wireless Network Types?
The WWANS or Wireless Area Networks that can be maintained over large
areas such as in different cities or between different countries, via multiple
satellite systems or antenna sites.
4. What are the security methods that we use in the wireless networking?
1) Wired Equivalent Privacy (WEP)
Wired Equivalent Privacy is intended to stop the interference of radio frequency that
is signaled by unauthorized users and this security measure is most suitable for the
small networks. There is not key management protocol and each key is entered
manually into the clients that’s why this is very time consuming administrative task.
The WEP security method is based on the RC4 encryption algorithm. In the WEP all
the client computers and Access points are configured with the same encryption and
decryption keys.
2) Service Set Identifier (SSID)
Service Set Identifier (SSID) acts a simple password by allowing WLAN network to
be split up into different networks and each having a unique identifier. These
identifiers are configured in the multiple access points. To access any of any
networks, a computer is configured in such a way that each is having a corresponding
SSID identifier for that network. If the SSID match between the two computers or
networks then access is granted to each other.
3) Media Access Control filtering (MAC Access Control)
A list of the MAC addresses of the client computers can be inputted into an Access
point and only those computers are granted to give the access to the network. When a
computer makes a request, its MAC address is compared to the list of the MAC
addresses to the Access point and based on this access permission granted to deny.
This is a good security method but it is mainly involved in the small wireless
networks because there is more manual work is involved of entering the MAC
address into the Access point.
5. What is Bluetooth?
Bluetooth is a simple type of the wireless networking that operates in the digital
devices, like mobiles phones, personal computers, PDA, Laptops, digital camera,
MP3 players and other Bluetooth enabled devices to form a small network. In
the Bluetooth technology eight devices can be connected to each other at the
same time. Bluetooth technology falls in the category of personal area
networking because it operates in the range of 30 to 300 feet.
o WPA2 encryption
Power
Radiation Pattern
Gain.
Backfires,
Yagi,
Panel and
dish type
12. What is Omni-Directional antenna?
This is the common “Base” antenna used for Point-to-Multi-Point or can be an omni-
directional antenna for your car. An Omni-Directional antenna would serve as your main
antenna to distribute the signal to other computers or devices (such as wireless printers,
PDAs, etc) in your workgroup.
13. Point-to-Point
Point-to-Point systems usually involve 2 different wireless points, or building to building
wireless connections. But there are exceptions to every rule. If the access point is across a
long valley and the owner of the system wishes to share the connection with multiple
users on the other side of the valley. This would be a point to Multi-Point system but
using directional antennas.
14.
Point to Point WiFi System
15. Point to Multi-Point
Point to Multi-Point systems is usually for sharing a WLAN (Wireless Local Area
Network) or a high-speed internet connection inside of your home or with neighbors
(oops, we didn't say that). They can also be for WAP (Wireless Access Points) such as
you find at local coffee shops, truck stops, airports, RV parks and the ever expanding list
of WAPs becoming available. Traveling with a notebook computer is extremely fun and
can be a great business tool for the frequent traveler.
16.
Point to Multi-Point WiFi system