Вы находитесь на странице: 1из 15

Establishing Network Shares and Accounts

1. Two computers running the MS-DOS operating system can be connected and information
can be shared. (Yes or No).

Yes

2. Connecting two computers with a communications cable is called _____________ -


____________ ____________________.

Direct-cable connection

3. Sharing on a peer-to-peer network takes place at the _____________ level.

folder

4. The first person to log on to a Windows NT network uses the ______________________


account.

administrator

5. The user account contains information that defines a user to the network's
___________________ system.

security

6. Most network account-management utilities offer an account _____________ feature


with which an administrator can create a template user with certain characteristics and
parameters that are common among multiple users.

copying

7. A Windows NT administrator can use a _____________ to configure and maintain a


user's logon environment.

profile

8. Two key pieces of information that should be entered when creating a user account are
account name and ___________________.

password

9. The ____________ account is for people who do not have a valid user account but need
temporary access to the network.
Guest

10. An administrator can create a ______________ account in order to simplify


administrative tasks when dealing with a large numbers of users.

group

11. A global group is used across an entire ________________.

domain

12. Groups are used to give users ______________ to perform system tasks such as backing
up and restoring files.

rights

13. The network administrator assigns ____________________ to groups to access


resources, such as files, directories, and printers.

permissions

14. After being deleted, a user can no longer use the network, because the network
__________________ database will contain record or description of the user.

security
Network Security
1. The first consideration in keeping data safe is to ensure the security of the network
__________________.

hardware

2. Another term for access permissions is __________ - _____________


_________________.

user-level security

3. Implementing password-protected shares involves assigning a password to each shared


_________________.

resource

4. If a share is set up as ___________ - ___________, users can look at the documents or


copy them to their machines, but they cannot change the original documents.

read-only

5. Access permission security involves assigning certain ______________ on a user-by-user


basis.

rights

6. The most efficient way to assign permissions is through the use of ______________.

groups

7. Through auditing, selected types of events are recorded in the _________________


__________ of a server in order to track network activities by user accounts.

security logs

8. A data- __________________ utility scrambles data before it goes out onto the network.

encryption

9. The Commercial COMSEC Endorsement Program (CCEP) authorizes manufacturers to


incorporate classified ________________ into the communication systems they sell.

algorithms
10. Diskless computers communicate with the server and log on through the use of a special
ROM boot chip installed on the computer ________________ _________________
___________.

network interface card

11. The two most important environmental conditions to monitor are


_____________________ and __________________.

temperature, humidity

12. True or False: If network cables are installed in the walls and in the ceilings, they will be
safe from all damage.

False

13. The first line of defense against loss of data is usually a ___________
________________ system.

tape backup

14. It is important to have a regular ______________ for backing up data.

schedule

15. Maintaining a __________ of all backups is important for later file recovery.

log

16. When backing up across a network, network traffic can be reduced by placing the backup
computer on an isolated _______________.

segment

17. Fault-tolerant systems protect data by duplicating data or placing data in different
_______________ sources.

physical

18. RAID level 0, called ____________ _______________, divides data into 64K blocks and
spreads it equally in a fixed rate and order among all disks in an array.

disk striping

19. Level 0 disk striping does not offer data ___________________.


protection

20. Disk __________________ duplicates a partition and moves the duplication onto another
physical disk so that there are always two copies of the data.

mirroring

21. Writing complete blocks of data to each disk in the array is known as disk
________________.

striping

22. "Clustering" is the term applied to a group of ___________________ systems working


together as a single system.

independent
Printing on a Network
1. When network users want to print data on a shared network printer, the data is sent to a
_____________ that feeds the data to the printer.

server

2. Each network print job must be ________________ away from a computer's local printer
port and onto the network cable.

redirected

3. The memory buffer in the print server's RAM that holds the print job until the printer is
ready is called a ______________.

spooler

4. In order for users to access a shared printer, they must have a way to ________________
the printer.

identify

5. Managing users who access printing over a computer network includes assigning
_________________, as with any other shared network resource.

permissions

6. One task an administrator can accomplish from a remote location is to ______________


print jobs in the queue.

reorder

7. Most current network operating systems allow an administrator to manage a network


printer with a ____________ - _______________ ______________.

print-sharing utility
Administering Change
1. Monitoring and documenting the network when it is in good working order provide a
_______________ against which unusual network performance can be compared.

baseline

2. A network ______________ is a tool that captures and filters data packets and analyzes
network activity.

monitor

3. __________ and _____________ are utilities that are used to test the network
connections by sending a packet to a remote host and monitoring its return.

ping, tracert

4. During monitoring of network performance, ________________ can indicate areas of


poor performance that can benefit from upgrading.

bottlenecks

5. Many network vendors provide a ___________ ______________ __________________


software to aid in the monitoring and improvement of network performance.

total system management

6. After creating a baseline for a network's performance, you will need to maintain a
performance _______________ to aid with future troubleshooting.

history

7. To improve the performance of a network, an administrator can upgrade


_______________, ___________________, __________ and ___________.

servers, workstations, NICs, media

8. When working on electronic components, be careful to prevent ___________


________________ _____________ that will do damage to the components.

static electrical charges

9. The best tool to use to confirm hardware changes to a network is the _________ utility.

ping
10. How long the network can afford to be ___________ is in important factor in organizing
and timing a move.

down
Troubleshooting a Network
1. To isolate a network problem, the engineer can divide the network into
_______________.

segments

2. Protocol analyzers look inside the ______________ to determine the cause of a problem.

packet

3. Advanced cable testers will tell you if a particular cable or _______ is causing problems.

NIC

4. One reason it is important to monitor network performance is to provide essential


information for ____________________ detection.

bottleneck

5. Windows NT Server Performance Monitor helps a network administrator view operations


in both ___________ time and _________________ time.

real, recorded

6. In an SNMP environment, programs called _____________ monitor network traffic.

agents

7. A ___________________ monitor is a tool that is used to track network performance.

performance

8. Windows NT Performance Monitor has the ability to send an ____________ to the


network manager when there is a problem.

alert

9. Windows NT Server Network Monitor gives the administrator the ability to


______________ and _______________ network data streams to and from the server.

capture, analyze

10. The best source of information for Microsoft products is ___________________.


TechNet

11. Other useful sources of information for network troubleshooting include _________,
___________ _____________, and __________________.

BBSs, User Groups, periodicals

12. _________ is used to perform simple file transfers on the Internet.

FTP

13. ______________ ___________ ________________ _________________ is an Internet


standard protocol defined for distribution, inquiry, retrieval, and posting of news articles.

Network News Transfer Protocol

14. You can use _______________ to act as a remote terminal to an Internet host.

Telnet

15. In addition to URLs, every computer on the Internet has a unique ______ address.

IP

Troubleshooting Tools
1. The _____________ ________________ is the primary all-purpose electronic measuring
tool used by computer and electronic technicians.

digital voltmeter

2. _________ - ______________ _______________________ send sonar-like pulses along


cables to locate breaks, shorts, or imperfections.

Time-domain reflectometers

3. __________________ are electronic instruments that measure the amount of signal


voltage per unit of time and display the results on a monitor.

Oscilloscopes

4. In a crossover cable, the send wire from one computer is connected to the ____________
port on the other computer.

receive
5. Protocol analyzers, also called "network analyzers," perform __________ - __________
network traffic analysis using packet capture, decoding, and transmission data.

real-time

6. A ____________________ _________________ can help to establish a network's


information baseline.

performance monitor

7. A network monitor allows the administrator to capture and analyze network


___________ _______________ to and from the server.

data streams

Where to Find Help


1. Microsoft _______________ provides information to support all aspects of networking
with an emphasis on Microsoft products.

Technet

2. The Web, FTP, e-mail, news, and telnet are all services that are available on the
_________________.

Internet

3. An IP address consists of __________ sets of digits separated by dots.

four

4. The domain types for commercial organizations, educational institutions, government


organizations, military organizations, network service providers, and organizations are
______, ______, ______, ______, ______, ______.

.com, .edu, .gov, .mil, .net, .org

5. Every Uniform Resource Locator (URL) consists of the _________________, a colon (:),
and the ________________ of the resource.

protocol, address

6. The most common protocol used for sending files between computers is the _________
__________________ _________________.

file transfer protocol


7. An e-mail address is composed of the user's __________________, followed by the ___
sign, followed by the _____________ of the recipient's computer.

identification, @, location

8. The difference between Network News and e-mail is that with Network News,
conversations take place in a _____________ ____________ called a newsgroup.

public forum

9. The telnet protocol allows your computer to act as a _______________


___________________ to an Internet host.

remote terminal

WI-FI
1. What are the Wireless Network Types?

o Wireless Local Area Networks (WLANS)


o Wireless Personal Area Networks (WPANS)
o Wireless Metropolitan Area Networks (WMANS)
o Wireless Wide Area Networks (WWANS)

2. What types of wireless networks are called 2G ?

The WWANS or Wireless Area Networks that can be maintained over large
areas such as in different cities or between different countries, via multiple
satellite systems or antenna sites.

3. What are the ranges of wi-fi networks?

Personal Area Network 0-10

Local Area Network 0-100

Wide Are Network 0-10000

4. What are the security methods that we use in the wireless networking?
1) Wired Equivalent Privacy (WEP)
Wired Equivalent Privacy is intended to stop the interference of radio frequency that
is signaled by unauthorized users and this security measure is most suitable for the
small networks. There is not key management protocol and each key is entered
manually into the clients that’s why this is very time consuming administrative task.
The WEP security method is based on the RC4 encryption algorithm. In the WEP all
the client computers and Access points are configured with the same encryption and
decryption keys.
2) Service Set Identifier (SSID)
Service Set Identifier (SSID) acts a simple password by allowing WLAN network to
be split up into different networks and each having a unique identifier. These
identifiers are configured in the multiple access points. To access any of any
networks, a computer is configured in such a way that each is having a corresponding
SSID identifier for that network. If the SSID match between the two computers or
networks then access is granted to each other.
3) Media Access Control filtering (MAC Access Control)
A list of the MAC addresses of the client computers can be inputted into an Access
point and only those computers are granted to give the access to the network. When a
computer makes a request, its MAC address is compared to the list of the MAC
addresses to the Access point and based on this access permission granted to deny.
This is a good security method but it is mainly involved in the small wireless
networks because there is more manual work is involved of entering the MAC
address into the Access point.

5. What is Bluetooth?

Bluetooth is a simple type of the wireless networking that operates in the digital
devices, like mobiles phones, personal computers, PDA, Laptops, digital camera,
MP3 players and other Bluetooth enabled devices to form a small network. In
the Bluetooth technology eight devices can be connected to each other at the
same time. Bluetooth technology falls in the category of personal area
networking because it operates in the range of 30 to 300 feet.

6. What are the types of Wireless Encryption?


WEP, WPA, and WPA2.

7. What are the 5 Best Ways to Secure your Wireless network.


o WEP encryption
o WPA encryption

o WPA2 encryption

o Hiding your SSID

o Mac- Address filtering

8. What are the common antenna characteristics ?


Frequency

Power

Radiation Pattern

Gain.

9. How you extend the range of your 802.11 system?


Install an external antenna with some good gain and directional or omni-
directional qualities.

10. Where do you use Directional Antennas ?

Directional antennas are used for Point-to-Point or sometimes for Multi-Point


systems depending on the setup. If you are trying to go from one location (say for
instance your router), to another location, this is the type of antenna we recommend.

11. What are the types of Directional antennas?

Backfires,

Yagi,

Panel and

dish type
12. What is Omni-Directional antenna?

This is the common “Base” antenna used for Point-to-Multi-Point or can be an omni-
directional antenna for your car. An Omni-Directional antenna would serve as your main
antenna to distribute the signal to other computers or devices (such as wireless printers,
PDAs, etc) in your workgroup.

13. Point-to-Point
Point-to-Point systems usually involve 2 different wireless points, or building to building
wireless connections. But there are exceptions to every rule. If the access point is across a
long valley and the owner of the system wishes to share the connection with multiple
users on the other side of the valley. This would be a point to Multi-Point system but
using directional antennas.

14.
Point to Point WiFi System
15. Point to Multi-Point
Point to Multi-Point systems is usually for sharing a WLAN (Wireless Local Area
Network) or a high-speed internet connection inside of your home or with neighbors
(oops, we didn't say that). They can also be for WAP (Wireless Access Points) such as
you find at local coffee shops, truck stops, airports, RV parks and the ever expanding list
of WAPs becoming available. Traveling with a notebook computer is extremely fun and
can be a great business tool for the frequent traveler.

16.
Point to Multi-Point WiFi system

Вам также может понравиться