Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
55 Cards in this Set
- Front
- Back
frame is sent to the destination port immediately after reading the destination and source MAC address
|
cut-through switching
|
|
configured to carry VLAN traffic
|
trunk port
|
|
designed to stop switching loops
|
Spanning Tree Protocol
|
|
sends status to all routers whenever there is a change
|
link-state protocol
|
|
sends entire routing table to all routers at a scheduled time
|
distance-vector protocol
|
|
uses hop count to determine best path
|
Routing Information Protocol
|
|
damaged frames do not get forwarded
|
fragment-free switching
|
|
entire frame is read before forwarding it to the destination port
|
store-and-forward switching
|
|
broadcast frames are forwarded in a continual loop
|
broadcast storm
|
|
value that tells routers the best path to the destination network
|
Metric
|
|
smallest unit of software that can be scheduled
|
Thread
|
|
a program that is loaded into memory
|
Process
|
|
hypervisor installed in a general-purpose OS
|
hosted virtualization
|
|
the process of granting or denying access to a user
|
authorization
|
|
two or more threads being executed simultaneously
|
multiprocessing
|
|
partial copy of a virtual machine
|
snapshot
|
|
identifying who has access to network
|
authentication
|
|
creates and monitors the guest operating systems
|
hypervisor
|
|
runs in the background
|
Service
|
|
hypervisor installed directly onto the server
|
bare-metal virtualization
|
|
can be used to create a RAID
|
dynamic disk
|
|
if the primary server fails, the secondary server takes over
|
failover cluster
|
|
can be divided in up to four primary partitions
|
basic disk
|
|
defines a user’s environment
|
local profile
|
|
multiple servers acting as a single server
|
load-balancing cluster
|
|
power device that provides fault tolerance through battery backup
|
uninterruptible power supply
|
|
partition that contains the boot loader
|
system partition
|
|
action that a user can perform on a computer
|
right
|
|
can be made the active partition
|
primary partition
|
|
can only be divided into logical drives
|
extended partition
|
|
the Linux native file sharing protocol
|
NFS
|
|
agreement regarding the use of an application
|
EULA
|
|
how much something costs when intangibles are factored in
|
Total Cost of Ownership (TCO)
|
|
VPN connection between two routers
|
gateway-to-gateway
|
|
the process by which a router forwards a request for a TCP or UDP port
|
port forwarding
|
|
a file sharing option in Windows 7
|
HomeGroup
|
|
the Linux file sharing protocol that is compatible with Windows
|
Samba
|
|
software designed to help business owners
|
CRM
|
|
connection between a desktop and a VPN device
|
client-to-gateway
|
|
a device designed specifically for file sharing
|
Network-Attached Storage (NAS)
|
|
an industry-standard protocol used for network management and monitoring
|
Simple Network Management Protocol (SNMP)
|
|
specialized software that gathers network data and provides statistics to a network management console
|
remote monitoring (RMON)
|
|
copies all files changed since the last full or incremental backup and marks files as backed up
|
incremental backup
|
|
copies all files changed the day the backup is made; doesn’t mark files as backed up
|
daily backup
|
|
part of the SNMP structure loaded on to each device to be monitored
|
software agents
|
|
a set of objects containing information about a networking device that SNMP uses to manage that device
|
management information base (MIB)
|
|
software that monitors network traffic and gathers information about packet types, errors, and packet traffic to and from each computer
|
network monitors
|
|
a network troubleshooting device that can determine whether there’s a break or short in the cable, and, if so, approximately how far down the cable it’s located
|
time-domain reflectometer (TDR)
|
|
a backup that copies all selected files to the selected media and marks files as backed up; also called a normal backup
|
full backup
|
|
part of an upgrade plan that provides instructions on how to undo the upgrade if problems occur during or after the upgrade
|
rollback plan
|
|
When a disk is formatted, it is impossible to recover the data that was on the disk. (T or F)
|
FALSE
|
|
What kind of software would you use to view and troubleshoot protocol specific problems such as TCP retries caused by missed acknowledgements, or duplicate acknowledgements that cause network slow-down?
|
protocol analyzer
|
|
Almost immediately after a server migration project, employees are complaining that they can’t reach the Internet. You sit down at a machine and try to ping a well-known website, which fails. You then try to ping a known-public IP address, which succeeds. What is most likely the issue?
|
DNS settings are incorrect.
|
|
You are the network administrator for a company. The company’s policy is that the users are allowed to set their own passwords but that they must change their password every 30 days. You have just received a call from a user who can’t log on because she forgot her password. After you change her password, which of the password options listed would you set in the user’s account so that she will have to change the password when she logs on using the password you assigned?
|
User must change password at next logon.
|
|
What storage solution involves a third-party company that provides off-site hosting of data?
|
cloud-based storage
|