IS 112 Final Exam Flashcards

IP address
Terms Definitions
For a fixed price, a site license allows an unlimited number of users to legally access an application.True or False.
True
Multitasking means performing more than one operation simultaneously.True or False.
False
A collection of one or more domain trees is known as a forest.True or False
True
In LDAP-compatible directories, a ____ is the set of definitions of the kinds of objects and object-related information that the database can contain.a.domain c.schemab.namespace d.partition
c.schema
A(n) ____ is the record of a user that contains all of his properties, including rights to resources, password, and name.a.schema c.workgroupb.snap-in d.account
d.account
____ is stored on the hard disk as a page file, the use of which is managed by the operating system.a.Virtual memory c.Namespaceb.Middleware d.Physical memory
a.Virtual memory
A ____ is a routine of sequential instructions that runs until it has achieved its goal.a.page c.partitionb.process d.thread
b.process
A(n) ____ is a logically separate area of storage on the hard disk.a.thread c.objectb.process d.partition
d.partition
A ____ is a group of interconnected computers that share each other’s resources without relying on a central server.a.forest c.domain controllerb.workgroup d.root domain
b.workgroup
The directory containing information about objects in a domain resides on computers called ____.a.workgroups c.domain controllersb.threads d.root domains
c.domain controllers
The relationship between two domains in which one domain allows another domain to authenticate its users is known as ____.a.object relationship c.filerelationship b.time sharing d.trust relationship
d.trust relationship
____ is a 128-bit number that ensures that no two objects have duplicate names.a.SMB c.UDFb.GUID d.MMC
b.GUID
The ____ account is a predefined user account with limited privileges that allows a user to log on to the computer.a.domain c.Administratorb.local d.Guest
d.Guest
Assigns subtasks to a specific processor.a.AppleTalk Filing Protocol f.CDFSb.Middleware g. UPNc.Asymmetric multiprocessing h.Logond.GUI scripts e.FAT 16 i.Tree
c.Asymmetric multiprocessing
The preferred naming convention for users in e-mail and related Internet services. a.AppleTalk Filing Protocol f.CDFSb.Middleware g. UPNc.Asymmetric multiprocessing h.Logond.GUI scripts e.FAT 16
g.UPN
Map drives to directories on the server that contain files required by client applications.a.AppleTalk Filing Protocol f.CDFSb.Middleware g. UPNc.Asymmetric multiprocessing h.Logond.GUI scripts e.FAT 16
h.Logon scripts
Was the standard file system for early DOS and Windows-based computers.a.AppleTalk Filing Protocol f.CDFSb.Middleware g.UPNc.Asymmetric multiprocessing h.Logond.GUI scripts e.FAT 16 i.Tr
e.FAT 16
Translates requests and responses between clients and servers.a.AppleTalk Filing Protocol f.CDFSb.Middleware g.UPNc.Asymmetric multiprocessing h.Logond.GUI scripts e.FAT 16 i.Tree
b.Middleware
A logical representation of multiple, hierarchical levels within a directory.a.AppleTalk Filing Protocol f.CDFSb.Middleware g.UPNc.Asymmetric multiprocessing h.Logond.GUI scripts e.FAT 16
i.Tree
Files system used to read from and write to a CD-ROM disc.a.AppleTalk Filing Protocol f.CDFSb.Middleware g.UPNc.Asymmetric multiprocessing h.Logond.GUI scripts e.FAT 16 i.Tree
f.CDFS
/Users/jones is the login (or home) directory for the user Jones on a UNIX system.True/False
False
Every file and directory on a UNIX-type of system is owned by exactly one user and is a member of exactly one group.True/False
True
Apple and IBM use the same central processing unit, the PowerPC, in their computers. True/False
True
An implementation of UNIX for which the source code is either unavailable or available only by purchasing a licensed copy from The SCO Group is known as ____.a.open source software c.proprietary UNIX b.BSD d
c.proprietary UNIX
Apple Computer released Mac OS X to the public in the Spring of 2001 to replace its previously released network operating system software, ____.a.AppleShare IP c. SPARCb.Mach d. Solaris
a.AppleShare IP
____ in a UNIX server can take the form of a disk partition, or it can be in a file.a.Kernel modules c.i-nodesb.Virtual memory d.Command interpreters
b.Virtual memory
A UNIX ____ is a file that contains instructions for performing a specific task such as reading data from and writing data to a hard drive.a.UFS c. shellb.kernel module d. pipeline
b.kernel module
A(n) ____ is a method of organizing files and directories on a disk in which directories may contain files and other directories.a.command interpreter c.daemonb.shell d.hierarchical file system
d.hierarchical file system
Apple’s ____ is the native file system for Mac OS X Server.a.HFS+ c. Fedora Coreb.ext3 d. i-node
a.HFS+
In UNIX, you combine commands using a(n) ____.a.lpr c. lpdb.Mach d. pipe
d.pipe
On a Linux or Solaris system, the ____ command creates a new group ID and makes the group available for use.a.man c.rootb.chmod d.groupadd
d.groupadd
UNIX-type systems enable you to restrict access to resources by assigning user and group ____ to files and directories.a.pipelines c.shellsb.permissions d.nodes
b.permissions
Changing file and directory permissions requires use of the ____ command.a.groupadd c.lprb.pipe d.chmod
d.chmod
All modern flavors of UNIX, Linux, and Mac OS X Server support data sharing using directory services based on ____.a.LDAP c.NFSb.XNU d.Samba
a.LDAP
The native file system type on Linux is called ____.a.BSD c.Fedora Coreb.HFS+ d.ext3
d.ext3
Owns the UNIX trademark.a.Source code f.Network file systemsb.The Open Group g.Sambac.The SCO Group h.Command interpreterd.Mac OS X Server i.File globbinge.Kernel
b.The Open Group
Runs only on Apple hardware.a.Source code f.Network file systemsb.The Open Group g.Sambac.The SCO Group h.Command interpreterd.Mac OS X Server i.File globbinge.KernelRuns only on Apple hardware
d.Mac OS X Server
An open source applicationa.Source code f.Network file systemsb.The Open Group g.Sambac.The SCO Group h.Command interpreterd.Mac OS X Server i.File globbinge.Kernel
g.Samba
Program that accepts and runs the commands you type on the keyboard.a.Source code f.Network file systemsb.The Open Group g.Sambac.The SCO Group h.Command interpreterd.Mac OS X Server i.File globbinge.Kernel
h.Command interpreter
Owns the rights to the UNIX source code.a.Source code f.Network file systemsb.The Open Group g.Sambac.The SCO Group h.Command interpreterd.Mac OS X Server i.File globbinge.Kernel
c.The SCO Group
ConsoleOne can be used either at the server or from another computer connected to the same network.True/False
True
A user is a leaf object because it contains and manages objects other than the network user it represents.True/False
False
____ are routines that enable the sever to run a range of programs and offer a variety of services.a.Monitors c.Consolesb.NLMs d.Contexts
b.NLMs
The text-based menu that allows a network administrator to view and modify server parameters through console commands is called ____.a.Partition c.Monitorb.Tree object d.Pattern
c.Monitor
____ is NetWare 6.5’s directory database.a.GroupWise c.NLMb.NetStorage d.eDirectory
d.eDirectory
The ____ notation is a relatively lengthy way of expressing context that includes identifiers for the organization and OUs.a.typeless c.GroupWiseb.typeful d.console
b.typeful
____ is software that, when installed on Windows clients, allows them to access directories on a NetWare 6.5 server.a.NetDrive c.NSSb.Remote Manage d.X Server
a.NetDrive
____ is Novell’s tool for integrating eDirectory and Windows Active Directory or Windows NT domain data.a.BorderManager c.NetDriveb.DirXML d.ConsoleOne
b.DirXML
NetWare’s ____ is started by the program server.exe, which runs from a server’s DOS partition (over the DOS operating system) when a server boots up.a.kernel c.base schemab.partition d.context
a.kernel
After an NLM loads into memory, it is considered part of the ____.a.context c.boot partitionb.base schema d.kernel
d.kernel
NetWare uses ____ as the basis for organizing files and directories on the server.a.pools c.patternsb.tree objects d.volumes
d.volumes
When a change is made to NetWare’s base schema, the new schema is known as a(n) ____.a.new schema c.revised schemab.extended schema d.enhanced schema
b.extended schema
NetWare is capable of providing clients with direct access to NSS using the clients’ ____.a.NDS c.boot partitionsb.tree objects d.native file access protocols
d.native file access protocols
Primary boot partition from which the server.exe file runs.a.NetWare Integrated f.iManager Kernel g.Base schemab.X Server h.Contextc.File system i.Printer d.DOS partition queuee.SYS
d.DOS partition
The core of the NetWare 6.5 operating system.a.NetWare Integrated f.iManager Kernel g.Base schemab.X Server h.Contextc.File system i.Printer d.DOS partition queuee.SYS
a.NetWare Integrated Kernel
Primary GUI tool used to manage all objects in NetWare 6.5.a.NetWare Integrated f.iManager Kernel g.Base schemab.X Server h.Contextc.File system i.Printer d.DOS partition queuee.SYS
f.iManager
Consists of an object’s OU names, arranged from most specific to most general, plus the organization name.a.NetWare Integrated f.iManager Kernel g.Base schemab.X Server h.Contextc.File system i.Printer
h.Context
Consists of the object classes and properties a network typically requires.a.NetWare Integrated f.iManager Kernel g.Base schemab.X Server h.Contextc.File system i.Printer d.DOS partition q
g.Base schema
An example of a leaf object.a.NetWare Integrated f.iManager Kernel g.Base schemab.X Server h.Contextc.File system i.Printer d.DOS partition queuee.SYS
i.printer
An operating system’s method of organizing, managing, and accessing its files.a.NetWare Integrated f.iManager Kernel g.Base schemab.X Server h.Contextc.File system i.Printer d.DOS partition
c.File system
The “0” bits in a subnet mask indicate that corresponding bits in an IP address contain network information.True/False
False
Routers that rely on older routing protocols, such as RIP, are capable of interpreting classless IP addresses.True/False
False
A(n) ____ indicates where network information is located in an IP address.a.CIDR c.subnet maskb.gateway d.ICS host
c.subnet mask
Together, the additional bits used for subnet information plus the existing network ID are known as the ____.a.network prefix c.NATb.extended network prefix d.supernet mask
b.extended network prefix
____ are a combination of software and hardware that enable two different network segments to exchange data.a.Intranets c.Softphonesb.Gateways d.ICS hosts
b.Gateways
____ is the protocol responsible for moving messages from one mail server to another over TCP/IP-based networks.a.MIME c.VoIPb.SMTP d.PBX
b.SMTP
____ is an Application layer protocol used to retrieve messages from a mail server.a.POP c.NATb.MIME d.ICS
a.POP
The netstat ____ command allows you to display the routing table on a given machine.a.-a c.-rb.-e d.-p
c.-r
The ____ utility allows you to query the DNS database from any computer on the network and find the host name of a device by specifying its IP address, or vice versa.a.nbtstat c.tracertb.netstat d.nslookup
d.nslookup
The ____ utility uses ICMP to trace the path from one networked node to another, identifying all intermediate hops between the two nodes.a.dig c.nslookupb.netstat d.traceroute
d.traceroute
The ____ utility performs the same TCP/IP configuration and management as the ipconfig utility, but applies to Windows 9x and Me operating systems.a.netstat c.whoisb.dig d.winipcfg
d.winipcfg
In classful addressing, the network information portion of an IP address (the network ID) is limited to the first ____ bits in a Class A address.a.4 c.8b.6 d.10
c.8
Consists of four 8-bit octets (or bytes) that can be expressed in either binary or dotted decimal notation.a.IP address f.ICS hostb.Subnetting g. SMTPc.Broadcast address h. MIMEd.CIDR notation i. dige.Internet gateway
a.IP address
Octet(s) that represent host information are set to equal all 1s, or in decimal notation 255.a.IP address f.ICS hostb.Subnetting g. SMTPc.Broadcast address h. MIMEd.CIDR notation i. dige.Internet gateway
c.Broadcast address
Incapable of doing anything more than transporting mail or holding it in a queue.a.IP address f.ICS hostb.Subnetting g. SMTPc.Broadcast address h. MIMEd.CIDR notation i. dige.Internet gateway
g.SMTP
Takes the form of the network ID followed by a forward slash (/), followed by the number of bits that are used for the extended network prefix.a.IP address f.ICS hostb.Subnetting g. SMTPc.Broadcast address h. MIMEd.CIDR notation i.
d.CIDR notation
A TCP/IP utility similar to nslookup.a.IP address f.ICS hostb.Subnetting g. SMTPc.Broadcast address h. MIMEd.CIDR notation i. dige.Internet gateway
i.dig
Separates a network into multiple logically defined segments, or subnets.a.IP address f.ICS hostb.Subnetting g. SMTPc.Broadcast address h. MIMEd.CIDR notation i. dige.Internet gateway
b.Subnetting
Identifies each element of a mail message according to content type.a.IP address f.ICS hostb.Subnetting g. SMTPc.Broadcast address h. MIMEd.CIDR notation i. dige.Internet gateway
h.MIME
Requires two network connections: one that connects to the Internet and one that connects to the LAN.a.IP address f.ICS hostb.Subnetting g. SMTPc.Broadcast address h. MIMEd.CIDR notation i. dige.Internet gateway
f.ICS host
Tone generators and tone locators can be used to determine the characteristics of a cable, such as whether it has defects or whether its length exceeds IEEE standards for a certain type of network.True/False
False
You can use a continuity tester on a live network cable.True/False
False
A(n) ____ is a small electronic device that issues a signal on a wire pair.a.runt c.tone generatorb.network analyzer d.tone locator
c.tone generator
A(n) ____ should never be used on a wire that is connected to a device’s port or network adapter.a.tone locator c.voltmeterb.continuity tester d.tone generator
d.tone generator
The instrument that measures the pressure, or voltage, of an electric current is called a(n) ____.a.ohmmeter c.voltmeterb.multimeter d.tone locator
c.voltmeter
____ is a fundamental property of wire that depends on a wire’s molecular structure and size.a.Voltage c.Baselineb.Resistance d.TDR
b.Resistance
The device used to measure resistance is called a(n) ____.a.time domain reflectometer b.spectral analyzer c.optical time domain reflectometerd.ohmmeter
d.ohmmeter
When used on a copper-based cable, a(n) ____ applies a small amount of voltage to each conductor at one end of the cable, and then checks whether that voltage is detectable at the other end.a.jabber c.voltmeterb.continuity tester d.network monit
b.continuity tester
A(n) ____ issues a signal on a cable and then measures the way the signal bounces back to it.a.cable performance tester b.tone generatorc.time domain reflectometerd.tone locater
c.time domain reflectometer
A (n) ____ is a tool that can capture traffic and also analyze frames.a.runt c.protocol analyzerb.ghost d.TDR
c.protocol analyzer
The combination of a tone generator and a tone locator is called a(n) ____.a.fox and hound c.jabberb.continuity testerd. d.network monitor
a.fox and hound
Tools used to determine whether your cable is carrying a signal to its destination are called ____.a.jabber c.cable testerb.ghost d.continuity testers
d.continuity testers
Used to track changes on a network.a.First step in troubleshb.Network change recordsootingc.Software errord.Ports e.Impedancef.Centrally located databaseg.Help desk analysth.Call tracking systemi.Crossover cable
b.Network change recordsooting
Very high or low levels can signify a damaged wire, incorrect pairing, or a termination point.a.First step in troubleshb.Network change recordsootingc.Software errord.Ports e.Impedancef.Centrally located databaseg.Help desk analysth.Call t
e.Impedance
Often considered first-level support.a.First step in troubleshb.Network change recordsootingc.Software errord.Ports e.Impedancef.Centrally located databaseg.Help desk analysth.Call tracking systemi.Crossover cable
g.Help desk analyst
Effective way to document problems and solutions.a.First step in troubleshootingb.Network change recordsc.Software errord.Ports e.Impedancef.Centrally located databaseg.Help desk analysth.Call tracking systemi.Crossover cable
f.Centrally located database
Can be operational one day and faulty the next.a.First step in troubleshootingb.Network change recordsc.Software errord.Ports e.Impedancef.Centrally located databaseg.Help desk analysth.Call tracking systemi.Crossover cable
d.Ports
The transmit and receive wire pairs in one of the connectors are reversed.a.First step in troubleshootingb.Network change recordsc.Software errord.Ports e.Impedancef.Centrally located databaseg.Help desk analysth.Call tracking systemi.Cr
i.Crossover cable
Identify the specific symptoms of the problem.a.First step in troubleshootingb.Network change recordsc.Software errord.Ports e.Impedancef.Centrally located databaseg.Help desk analysth.Call tracking systemi.Crossover cable
a.First step in troubleshooting
Software that provides a user-friendly graphical interface that prompts the user for every piece of information associated with the problem.a.First step in troubleshootingb.Network change recordsc.Software errord.Ports e.Impedancef.Centrally l
h.Call tracking system
On a LAN, a star topology and a parallel backbone provide the greatest fault tolerance.True/False
True
In RAID Level 3 a parity bit is assigned to each data byte when it is transmitted or written to a disk.True/False
True
Viruses do not alter other programs in the same way that other threats do, but they may carry worms.True/False
False
Polymorphic viruses are programmed to activate on a particular date.True/False
False
If your antivirus software resides on the server and checks every file and transaction, you will protect important files and increase your network performance considerably.True/False
False
____ of a file or system refers to how consistently and reliably it can be accessed by authorized personnel.a.Availability c.The integrityb.Full backup d.The parity
a.Availability
A fluctuation in voltage levels caused by other devices on the network or electromagnetic interference is called ____.a.cold spare c.brownoutb.blackout d.noise
d.noise
In a critical component such as a router or switch, the utmost fault tolerance necessitates the use of redundant NICs, power supplies, cooling fans, interfaces, and I/O modules, all of which should ideally be able to immediately assume the duties of an id
b.fail-over
____ is a fault-tolerance technique that links multiple servers together to act as a single server.a.Clustering c.NASb.RAID d.IRC
a.Clustering
RAID Level 0 is also referred to as ____.a.clustering c.cold spareb.hot spare d.disk striping
d.disk striping
In ____, data is continually copied from one disk to another when it is saved, just as in disk mirroring.a.disk duplexing c.server mirroringb.parity error checking d.signature scanning
a.disk duplexing
A(n) ____ can be written to once and can store up to 650 MB of data.a.CD-R c.CD-RWb.recordable DVD d.array
a.CD-R
External disk drives are also known as ____.a.floppy disks c.compact disksb.hard drives d.removable disk drives
d.removable disk drives
A(n) ____ is a place where the computers, devices, and connectivity necessary to rebuild a network exist, but they are not appropriately configured, updated, or connected.a.hot site c.cold siteb.hot spare d.vault
c.cold site
Scanning techniques that attempt to identify viruses by discovering “virus-like” behavior are known as ____.a.polymorphic scanning c.signature scanningb.heuristic scanning d.integrity checking
b.heuristic scanning
Identical components that can be changed while a machine is still running.a.Trojan horse f.Warm siteb.Stealth viruse g.Hot sitec.Sag h.Redundancyd.Hot swappable i.Viruse.Replication
d.Hot swappable
Place where the computers, devices, and connectivity necessary to rebuild a network exist, and all are appropriately configured, updated, and connected to match your network’s current state.a.Trojan horse f.Warm siteb.Stealth viruse g.Hot site
g.Hot site
Place where the computers, devices, and connectivity necessary to rebuild a network exist, with some appropriately configured, updated, or connected.a.Trojan horse f.Warm siteb.Stealth viruse g.Hot sitec.Sag h.Redundancyd.Hot sw
f.Warm site
A momentary decrease in voltage.a.Trojan horse f.Warm siteb.Stealth viruse g.Hot sitec.Sag h.Redundancyd.Hot swappable i.Viruse.Replication
c.Sag
Dynamic copying of data from one location to another.a.Trojan horse f.Warm siteb.Stealth viruse g.Hot sitec.Sag h.Redundancyd.Hot swappable i.Viruse.Replication
e.Replication
Packet-filtering firewalls operate at the Application layer of the OSI Model.True/False
False
The password authentication protocol is a simple authentication protocol that is very secure.True/False
False
A(n) ____ is a software application on a network host that acts as an intermediary between the external and internal networks, screening all incoming and outgoing traffic.a.session c.principalb.proxy service d.network key
b.proxy service
In ____, data is encrypted using a single key that only the sender and the receiver know.a.symmetric encryption c.public key encryptionb.asymmetric encryption d.private key encryption
d.private key encryption
In ____, data is encrypted using two keys: One is a key known only to a user (that is, a private key), and the other is a public key associated with the user.a.asymmetric encryption c.HTTPb.public key encryption d.private key
b.public key encryption
Because public key encryption requires the use of two different keys, it is also known as ____.a.asymmetric encryption c.IPSecb.symmetric encryption d.Kerberos
a.asymmetric encryption
A(n) ____ is a password-protected and encrypted file that holds an individual’s identification information, including a public key.a.ticket c.digital certificateb.session d.key pair
c.digital certificate
____ is a method of encrypting TCP/IP transmissions - including Web pages and data entered into Web forms - en route between the client and server using public key encryption technology.a.TGS c.TGTb.SSL d.TLS
b.SSL
____ occurs when a hacker forges name server records to falsify his host’s identity.a.IP spoofing c.Encapsulationb.DNS spoofing d.Bio-recognition access
b.DNS spoofing
____ protocol defines encryption, authentication, and key management for TCP/IP transmissions.a.SCP c.SFTPb.SSH d.IPSec
d.IPSec
____ is a service defined by the IETF that runs over UDP and provides centralized network authentication and accounting for multiple users.a.ESP c.RADIUSb.HTTP d.DES
c.RADIUS
In Kerberos terminology, the server that issues keys to clients during initial client authentication is known as the ____.a.authenticator c.proxyb.KDC d.gateway
b.KDC
For some measure of security, 802.11 allows for optional encryption using the ____ standard.a.MS_CHAP c.IPSecb.Kerberos d.Wired Equivalent Privacy
d.Wired Equivalent Privacy
Occurs when a system becomes unable to function because it has been deluged with data transmissions or otherwise disrupted.a.Hacker f.Diffie-Hellmanb.Denial-of-service g.Secure CoPy attack h.Principalc.Security policy
b.Denial-of-service attack
A specialized device, or a computer installed with specialized software, that selectively filters or blocks traffic between networks.a.Hacker f.Diffie-Hellmanb.Denial-of-service g.Secure CoPy attack h.Principalc.Security p
d.Firewall
The first public, or asymmetric, key algorithm.a.Hacker f.Diffie-Hellmanb.Denial-of-service g.Secure CoPy attack h.Principalc.Security policy i.Proxy serverd.Firewall e.Encryption
f.Diffie-Hellman
Term used to describe individuals who gain unauthorized access to voice or data networks, with or without malicious intent.a.Hacker f.Diffie-Hellmanb.Denial-of-service g.Secure CoPy attack h.Principalc.Security policy
a.Hacker
A utility that allows you to copy files from one host to another securely.a.Hacker f.Diffie-Hellmanb.Denial-of-service g.Secure CoPy attack h.Principalc.Security policy i.Proxy serverd.Firewall e.Encryption
g.Secure CoPy
The use of an algorithm to scramble data into a format that can be read only by reversing the algorithm.a.Hacker f.Diffie-Hellmanb.Denial-of-service g.Secure CoPy attack h.Principalc.Security policy i.Proxy serverd.
e.Encryption
Must address an organization’s specific security risks.a.Hacker f.Diffie-Hellmanb.Denial-of-service g.Secure CoPy attack h.Principalc.Security policy i.Proxy serverd.Firewall e.Encryption
c.Security policy
The feasibility study should help determine whether you can achieve the project goals within the given time, budgetary, and staffing constraints.True/False
True
SNMP is part of the TCP/IP suite of protocols and typically runs over UDP on port 161.True/False
True
Adding a new processor to a server, a new NIC to a router, or more memory to a printer never affects your service or warranty agreement with the manufacturer.True/False
False
A feasibility study involves interviewing users and comparing perceptions to factual data.True/False
False
A(n) ____ is a reference point that marks the completion of a major task or group of tasks in the project and contributes to measuring the project’s progress.a.poll c.patchb.milestone d.service pack
b.milestone
A(n) ____ is the process of clarifying the reasons and objectives underlying a proposed change.a.project assessment c.needs assessmentb.network poll d.performance assessment
c.needs assessment
A(n) ____ is a popular method for depicting when projects begin and end along a horizontal timeline.a.Gantt chart c.service packb.contingency plan d.MRTG
a.Gantt chart
____ refers to the assessment, monitoring, and maintenance of all aspects of a network.a.Project management c.User managementb.Asset management d.Network management
d.Network management
A(n) ____ agent is a software routine that collects information about the device’s operation and provides it to the network management application running on the console.a.fault management c.network managementb.user managemen
c.network management
____ is a command-line utility that uses SNMP to poll devices, collects data in a log file, then generates HTML-based views of the data.a.MIB c.TCPb.MRTG d.SMTP
b.MRTG
The ____ is responsible for facilitating regular, effective communication among project participants.a.stakeholder c.project managerb.shareholder d.sponsor
c.project manager
A(n) network ____ represents the main conduit for data on LANs and WANs, connecting major routers, servers, and switches.a.milestone c.pollb.upgrade d.backbone
d.backbone
A(n) ____ is a report of the network’s current state of operation.a.service pack c.baselineb.upgrade d.poll
c.baseline
The ____ is used by agents to communicate information about managed devices.a.SMTP c.SNMPb.MIB d.MRTG
c.SNMP
Should be performed for any large-scale project before resources are committed to that project.a.Feasibility study f.Service packsb.Sponsors g.Bugc.Pilot network h.Backlevelingd.Baseline measurements i.Migratinge,MRTG
a.Feasibility study
A flaw in a software application that causes some part of the application to malfunction.a.Feasibility study f.Service packsb.Sponsors g.Bugc.Pilot network h.Backlevelingd.Baseline measurements i.Migratinge,MRTG
g.Bug
Allow(s) you to compare future performance increases or decreases caused by network changes with past network performance.a.Feasibility study f.Service packsb.Sponsors g.Bugc.Pilot network h.Backlevelingd.Baseline measurements i.Mi
d.Baseline measurements
Windows operating system patches.a.Feasibility study f.Service packsb.Sponsors g.Bugc.Pilot network h.Backlevelingd.Baseline measurements i.Migratinge,MRTG from Token Ring to
f.Service packs
Should be similar enough to closely mimic the larger network’s hardware, software, connectivity, unique configurations, and load.a.Feasibility study f.Service packsb.Sponsors g.Bugc.Pilot network h.Backlevelingd.Baseline measuremen
c.Pilot network
Process of reverting to a previous version of software after attempting to upgrade.a.Feasibility study f.Service packsb.Sponsors g.Bugc.Pilot network h.Backlevelingd.Baseline measurements i.Migratinge,MRTG from
h.Backleveling
/ 160
Term:
Definition:
Definition:

Leave a Comment ({[ getComments().length ]})

Comments ({[ getComments().length ]})

{[comment.username]}

{[ comment.comment ]}

View All {[ getComments().length ]} Comments
Ask a homework question - tutors are online