The flashcards below were created by user
on FreezingBlue Flashcards.
What identifies a PC on a network?
How many host nodes are supported on a single Class C network?
of the following utilities enables a machine to check whether or not it can
communicate with another machine?
What is the default subnet mask for Class C addresses?
At what layer of the OSI model does the IP protocol handle IP
Which device is used to perform a loopback test on a NIC?
Which operating systems install both IPv4 and IPv6 by default?
- Windows Vista
- and Windows 7
What type of topologies are star ring and star bus considered?
How many bits make up a complete MAC address?
Which Ethernet technology supports speeds up to 1 Gbps?
What kind of cable is most commonly used in 10/100/1000BaseT Ethernet
star bus topology networks?
What central connection box is used in Ethernet star bus networks?
Which of the following provides data speeds up to 1 Gbps?
Which type of cable is shielded to protect from EMI?
Of the following, which standard uses UTP cabling?
What are the two TIA/EIA standards for connecting RJ-45 connectors to
the UTP cable?
568A and 568B
What do most fiber Ethernet networks use?
62.5/125 multimode cable
Which is not a fiber connector?
What is used to map IP addresses to corresponding domain names?
What should you enter at a command prompt to see all of your TCP/IP
What is the standard connector used for UTP Ethernet
What type of cable can be used to connect two systems together without
using a hub or switch?
What is the default subnet mask for Class A addresses?
A(n) ____________________ protocol defines everything necessary to get
data from one computer to another.
Every network interface card (NIC) has a built-in identifier called the
Modern domain-based networks use a(n) ____________________ to store
user and computer account information.
In a TCP/IP network, the ____________________ combines with the IP address to
determine the subnet
In a domain-based network environment, one or more dedicated servers
called ____________________ hold the security database for all systems.
The three organizational groups for network operating systems (NOSs)
are client/server, peer-to-peer, and ____________________.
NIC LEDs, also known as ____________________ give you clues about
what's happening with your network connection.
By default, the TCP/IP protocol is configured to receive an IP address
automatically from a(n) ____________________ server on the network.
Dynamic Host Configuration Protocol
When you set the IP address manually, the IP address will not change
and is called a _____
static IP address
Networks based on Windows 2000/XP/Vista/7 don't use WINS; they use an improved DNS called
____________________ enables NetBIOS network names such as SERVER1 to
correlate to IP addresses.
Windows Internet Name Service
DNS names that end with .com, .edu, .org, .net, or .uk are called ____________________.
The ____________________ provides a common point for connection for network devices.
hub or switch
Ethernet networks commonly connect via a cable called ____________________.
unshielded twisted pair
My Network Places in Windows 2000/XP is called ____________________ in Windows Vista/7.
The most famous TCP/IP service is called ____________________, the language of the World Wide Web.
Common TCP/IP session types use destination port numbers ranging from __ to __
The IPv4 loop back address is _____
The IP address 2001:0db8:85a3:0000:0000:8a2e:0370:7334 is an example of a/an __________ address.
Part of an IP address identifies the network, and part identifies the ______ address on the network.
The Internet uses the ____ protocol.
On a network, data moves from one PC to another in discrete chunks called ____.
To have network connectivity, you need a ___, ____, and _____
NIC, Protocol, Network client
Machines that connect LANs together are called _____
To change your computer description, workgroup, or domain in Windows
Vista, go to the Computer Name tab in ____
Directory Services and dedicated controllers are used in a(n) __-based network.
A(n) ____ network enables any or all machines on a network to act as a server.
peer to peer
You are setting up a broadband
connection for your home computer. A UTP cable is used to connect to the cable
modem. What does the other end of the UTP cable connect to?
Network interface card (NIC)
What is the router to which you connect
at the ISP called?
The Integrated Services Digital Network
(ISDN) sends telephone transmissions across what type of lines?
What kind of cable does broadband cable
use to provide high-speed Internet access?
Regular cable TV cables
What port numbers are used by FTP?
20 and 21
What component in the computer converts
individual serial bits of data into 8-bit parallel data that the PC can understand?
Universal Asynchronous Receiver/Transmitter (UART)
The Internet consists of millions of
computers all over the world interwoven together through long-distance,
high-speed, fiber-optic networks. What are these called?
Tier 1 and Tier2 providers lease their
Internet connections to ____.
Internet service providers (ISPs)
What tool enables multiple computers to
use the Internet connection provided by one computer on the network?
Internet Connection Sharing (ICS)
What service provides the structure for
the World Wide Web?
Hypertext Transfer Protocol (HTTP)
Which of the following transfers data
via analog signals?
Dial-up links to the Internet use PPP.
What is PPP?
The Internet was designed to survive
failures. What model does it use to achieve this?
How many lines does the Basic Rate
Interface (BRI) setup use?
What is the unit of measurement, also
known as one cycle per second, that expresses the speed of phone lines?
Broadband cable typically offers speeds
of 1-10 Mbps for upload. What is the typical speed for download?
What port number is used by HTTPS?
Almost all ____ modems connect to a PCI
or PCI Express expansion bus slot inside the PC.
What device converts analog signals to
digital and vice versa, enabling computers to talk to each other via standard
commercial telephone lines?
What type of signal does a computer use
Flow control or hardware handshaking
uses two signals. One signal, ____________________, is used to indicate when a
computer wants to send data. The other signal, ___________________, is used to
indicate when the receiving computer is ready to receive the data.
ready to send, clear to send
Almost all ____________________ modems
connect to a PCI or PCI Express expansion bus slot inside the PC.
External modems can convert __
signals to digital and vice versa.
Internet Connection Sharing (ICS)
enables one system to share its Internet connection with other systems on the
Satellite connections to the Internet
get the data beamed to a/an ____ on a house or an office.
V standards are international standards
for ____________________ technology.
ISDN service consists of
_____ channels and ____ channels.
Bearer (B), Delta (D)
Internet backbones span the major cities
of the Earth and interconnect at special locations called
Network access points
Dial-up links to the Internet have their
own hardware protocol called ____________________.
Point to Point Protocol
Both DSL and cable modem Internet
connections can be used by two or more computers if they are part of a(n)
local area network
Which of the following is not considered grayware?
What word describes the process of cleaning up after a virus infection?
Physical security, authentication, the file system, users and groups,
and security policies combine to make what?
How does a computer determine who can or should access it?
A user has a credit card-sized card used to prove her identity with a PIN. What is this card called?
What could a computer use to determine a user's identity with the most authority?
Sally is a member of multiple groups. A file has been granted different permissions to the different groups. What is Sally's effective permission?
Combined permissions of all groups
To lock down security settings on a single computer in a workgroup, what would you use?
Local Security Settings
To lock down security settings on a single computer in a domain, what would you use?
What is a piece of malicious software that gets passed from computer to computer by attaching itself to a program?
What is a software program that looks like one thing (such as a utility or a game) but is actually doing something else (such as modifying CMOS
What is a complete program that travels from machine to machine through computer networks and has the capability to cause malicious problems?
Together, what are viruses, Trojans, and worms called?
Antivirus programs can passively monitor your computer's activity. In
this mode, what are they called?
To make sure antivirus programs are as useful as possible, what should be updated regularly?
What type of virus attempts to change its signature to prevent detection by antivirus programs?
What type of program runs in the background on your PC, sending information about your browsing habits to the company that installed it on your
What type of program isn't destructive by itself but leaches bandwidth in networks?
Access control is the process of implementing methods to ensure unauthorized users can't access your system. Two primary methods are physical security and ____________________.
Windows XP and later come with an excellent software firewall, called the _______
A(n) ____________________ is a device or software (or combination of both) used to protect an internal network from unauthorized access from the Internet.
Surprise browser windows that appear automatically when you visit a Web site are
Unsolicited e-mail is more commonly known as ____________________.
The list of viruses your antivirus program can recognize is called the _____ file.
The scrambling code used to attempt to modify a(n) __ virus to prevent detection is actually used as the signature to detect the
Boot sector viruses that use various methods to hide from antivirus software are known as ____ viruses.
To detect executable viruses, an antivirus program uses a library of _______
A complete program that travels from machine to machine through computer networks and can cause so much activity that it can overload a network is a(n) ____.
A program that looks useful, such as a game or a utility, but is actually maliciously doing something else to the system is known as a/n
Malicious software is also known as ____________________.
The tool used to apply policy settings to multiple computers in an Active Directory domain is
The tool used to set local policies on an individual system is
Local Security Settings
Sally is member of the Sales group and the Marketing group. The Marketing group has Full Control permission to a folder named NewProducts, and the Sales group has Read permission to the same folder. Sally's permission to the folder is ____________________?
A device that can prove who you are based on your fingerprint is known as a(n) ______ device.
What is another name for the Service Set
Most WAPs support filtering in which
data packets that do not contain the appropriate address are rejected. What
kind of address is filtered?
Which of the following provides a
security improvement in WPA addresses over WEP?
Which of the following wireless
networking standards supports data throughput of up to 11 Mbps?
What is the theoretical maximum range of
the 802.11a wireless networking standard?
At what frequency range does the
802.11a-based wireless technology operate?
At what frequency range do the 802.11b-
and 802.11g-based wireless technologies operate?
What is the speed at which the 802.11g
wireless technology transfers data?
What is the central connection point for
a wireless network working in infrastructure mode?
What is the maximum capacity for data
transfer between infrared devices?
Which of the following represents a
security improvement in WPA2 over WEP and WPA?
How many bits does WEP encryption use to
scramble data packets?
What device centrally connects wireless
network nodes in the same way that a hub or switch connects wired Ethernet
Wireless access point
What method do wireless networks use to
determine if other nodes are currently broadcasting?
What 802.11n feature increases its range
What frequencies does 802.11n use?
2.4 and 5 GHz
What wireless technology is often used
to connect headsets to smartphones?
What is a very small wireless network
preconfigured to do a specific job called?
What is the maximum distance of a Class
3 Bluetooth device?
What enables you to connect to the
Internet through a PDA, cell phone, or smartphone?
Cellular wireless network
What type of wireless network can
quickly be used to share files, folders, and printers without a WAP?
Today, which of the following is not
considered a good security practice when setting up a WAP?
Enable WEP encryption
What allows you to specifically allow or
deny access to a WAP?
A service area that is extended by
adding WAPs is called a/an _____________.
Extended Basic Service Set
Changing the default___ for a WAP is the first step in setting up a new wireless
You should place a WAP with an
omnidirectional antenna in the __ of an area where you want wireless coverage.
center or middle
With ____________________ 802.11n WAPs,
you can choose which band to put 802.11n traffic on,
Almost all wireless headsets are now
You can easily add wireless Ethernet and
Bluetooth capabilities using ___________________ adapters.
USB, PCI, PCIe, or PC Card
A(n) ____________________ enables you to
connect to the Internet through a network-aware PDA, cell
cellular wireless network
The IEEE organization has made
first-generation Bluetooth the basis for its 802.15 standard for wireless
Personal Area Networks
Like 802.11g, ____________________ WAPs
can run in the 2.4 GHz ISM band, supporting earlier, slower 802.11b/g devices.
Microsoft Windows fully supports the
IEEE ____________________ standard, more commonly known as
____________________, to lock down wireless networks.
____________________ is a handy way of
creating a type of "accepted users" list to limit access to your wireless network and Internet routers.
MAC address filtering
Two or more wireless nodes communicating in ad hoc mode form what's called a(n)
Independent Basic Service Set
Devices such as ____________________ and
____________________ can cause a great deal of interference.
cordless phones, microwaves, baby monitors
A(n) ____________________ combines an
infrared transceiver with an Ethernet NIC and translates the IrDA protocol into
an Ethernet signal.
infrared access point
IrDA links are direct ______ and are susceptible to interference.
line of sight
The maximum distance between infrared
devices is ____________________ meter.
Communication between infrared devices
is enabled in ____________________ mode.
Products that adhere to the 802.11b
standard provide a maximum of ____________________ channels
The 802.11g standard is backward
compatible with ____________________.
The IEEE 802.11 wireless Ethernet
standard defines methods by which devices may communicate using ____________ radio waves.
WPA2 uses the ____________________ for
Advanced Encryption Standard
Wireless networks running in _____ mode use one or more wireless access points to connect the
wireless network nodes to a wired network segment.
To protect wireless systems, turn off
Wireless devices operate using the
____________________ networking scheme.
To protect wireless systems, the default
SSID name should be ____________________.
Wireless access points can act as
high-speed ________ and Internet routers.
Wireless networks using infrared light
are limited to those that use the ___________ protocol.