Name: 
 

CS-440 Networking Final Review



True/False
Indicate whether the statement is true or false.
 

 1. 

IBM began developing the FireWire standard in the 1980s.
 

 2. 

CompactFlash NICs are most frequently used to connect devices too small to handle PCMCIA slots.
 

 3. 

It is best to perform connectivity tests on a computer connected to a live network.
 

 4. 

Bridges are protocol independent.
 

 5. 

Cut-through switches can detect corrupt packets.
 

 6. 

In every NOS, groups form the basis for resource and account management.
 

 7. 

A benefit to using an NTFS partition is that it can be read by older operating systems, such as Windows 95, Windows 2000 Professional, and early versions of UNIX.
 

 8. 

The term domain model refers to a type of peer-to-peer network that relies on domains rather than on workgroups.
 

 9. 

The core of all UNIX and Linux systems is called the kernel.
 

 10. 

In UNIX, you combine commands using a pipe, which is entered as a forward slash ( / ).
 

 11. 

Documenting and capturing an accurate picture of a network’s physical and logical elements are initial steps in understanding the network.
 

 12. 

The more data you gather while establishing your network’s baseline, the less accurate your prediction will be.
 

 13. 

The first step in configuration management is to take an inventory of each node on the network.
 

 14. 

A patch is a replacement for an entire software package.
 

 15. 

For a cabling upgrade, the best way to ensure that future upgrades go smoothly is to carefully document the existing cable after making any upgrades.
 

Multiple Choice
Identify the choice that best completes the statement or answers the question.
 

 1. 

Nearly all NICs contain a(n) ____, the device that transmits and receives data signals.
a.
keyboard port
c.
data transceiver
b.
mouse port
d.
antenna
 

 2. 

PCIe slots vary depending on the number of ____ they support.
a.
lanes
c.
cards
b.
labels
d.
processors
 

 3. 

The primary difference between the two USB standards is ____.
a.
connector pin organization
c.
speed
b.
security limitations
d.
transceiver placement
 

 4. 

____ is a set of data or instructions that has been saved to a ROM (read-only memory) chip (which is on the NIC).
a.
Micro code
c.
EEPROM
b.
Firmware
d.
Driver code
 

 5. 

If the ____ NIC LED indicator is blinking, the NIC is functioning and receiving frames.
a.
LNK
c.
TX
b.
ACT
d.
RX
 

 6. 

A(n) ____ is the circuit board wire over which a device issues voltage to signal this request.
a.
interrupt
c.
IRQ number
b.
IRQ
d.
RX
 

 7. 

The ____ setting specifies, in hexadecimal notation, which area of memory will act as a channel for moving data between the NIC and the CPU.
a.
memory range
c.
IRQ range
b.
base I/O port
d.
firmware ROM
 

 8. 

____ hubs possess internal processing capabilities.
a.
Passive
c.
Stand-alone hubs
b.
Intelligent
d.
Workgroup
 

 9. 

Switches can create ____ by grouping a number of ports into a broadcast domain.
a.
trunks
c.
gateways
b.
spanning trees
d.
VLANs
 

 10. 

Switches that operate anywhere between Layer 4 and Layer 7 are also known as ____ switches.
a.
peripheral
c.
content
b.
STP
d.
multiport
 

 11. 

____ are combinations of networking hardware and software that connect two dissimilar kinds of networks.
a.
Routers
c.
Gateways
b.
Switches
d.
Broadcast domains
 

 12. 

____ is one of the most important functions an NOS provides.
a.
Client support
c.
Authentication
b.
Printer sharing
d.
Memory management
 

 13. 

A piece of software called ____ translates requests and responses between a client and a server.
a.
kernel module
c.
middleware
b.
shell
d.
firmware
 

 14. 

A(n) ____ is the record of a user that contains all of his properties, including rights to resources, password, name, and so on.
a.
shell
c.
account
b.
container
d.
directory
 

 15. 

The printer queue is a ____ representation of the printer’s input and output.
a.
virtual
c.
physical
b.
logical
d.
hierarchical
 

 16. 

The term ____ memory refers to the RAM chips that are installed on the computer’s system board and whose sole function is to provide memory to that machine.
a.
virtual
c.
physical
b.
logical
d.
hierarchical
 

 17. 

A(n) ____ is a routine of sequential instructions that runs until it has achieved its goal.
a.
process
c.
activity
b.
thread
d.
job
 

 18. 

A(n) ____ is a self-contained, well-defined task within a process.
a.
task
c.
activity
b.
thread
d.
job
 

 19. 

The process of copying directory data to multiple domain controllers is known as ____.
a.
replication
c.
correlation
b.
duplication
d.
sharing
 

 20. 

Active Directory organizes multiple domains hierarchically in a domain ____.
a.
OU
c.
tree
b.
directory
d.
bucket
 

 21. 

Naming (or addressing) conventions in Active Directory are based on the ____ naming conventions.
a.
SMB
c.
NTFS
b.
LDAP
d.
NFS
 

 22. 

A GUID (globally unique identifier) is a 128-bit number that ensures that no two objects have ____ names.
a.
similar
c.
opposing
b.
duplicate
d.
non-standard
 

 23. 

The primary function of the UNIX ____ is to coordinate access to all your computer’s hardware, such as the disks, memory, keyboard, and monitor.
a.
kernel
c.
directory system
b.
root
d.
pipe system
 

 24. 

Every UNIX and Linux system contains full documentation of UNIX commands in the ____ pages.
a.
doc
c.
man
b.
library
d.
command
 

 25. 

____ management is the collection, storage, and assessment of information related to the versions of software installed on every network device and every device’s hardware configuration.
a.
Change
c.
Asset
b.
Performance
d.
Configuration
 

 26. 

A(n) ____ is a graphical representation of a network’s devices and connections.
a.
Multi Router Traffic Grapher
c.
wiring schematic
b.
network diagram
d.
event viewer
 

 27. 

____ management refers to monitoring how well links and devices are keeping up with the demands placed on them.
a.
Performance
c.
Network
b.
Fault
d.
Configuration
 

 28. 

____ management refers to the detection and signaling of device, link, or component faults.
a.
Performance
c.
Network
b.
Fault
d.
Configuration
 

 29. 

The process where one network management console collects data from multiple networked devices at regular intervals is known as ____.
a.
baselining
c.
polling
b.
interrogating
d.
pulsing
 

 30. 

A network management agent is a ____ that collects information about a device’s operation and provides it to the network management application.
a.
software routine
c.
GUI
b.
hardware device
d.
probe
 

 31. 

____ involves manipulating certain characteristics of packets, data streams, or connections to manage the type and amount of traffic traversing a network or interface at any moment.
a.
Traffic monitoring
c.
Traffic polling
b.
Traffic routing
d.
Traffic shaping
 

 32. 

____is the local storage of frequently needed files that would otherwise be obtained from an external source.
a.
Swapping
c.
Caching
b.
Paging
d.
Segmentation
 

 33. 

The most common type of caching is ____ caching.
a.
online
c.
Internet
b.
Web
d.
device
 

 34. 

A key component in managing networks is identifying and tracking its hardware and software through ____ management.
a.
performance
c.
configuration
b.
change
d.
asset
 

 35. 

A ____ is a correction, improvement, or enhancement to a particular piece of a software application.
a.
revision
c.
patch
b.
change
d.
software upgrade
 

 36. 

A ____ is a major change to a software package’s existing code.
a.
revision
c.
patch
b.
change
d.
software upgrade
 

 37. 

The most critical type of software upgrade you will perform is an upgrade to your ____.
a.
database
c.
NOS
b.
application
d.
backbone
 

 38. 

A networked ____ is perhaps the simplest device to add.
a.
workstation
c.
printer
b.
hub
d.
server
 

 39. 

Above all, keep ____ in mind when you upgrade or install hardware on a network.
a.
user inconvenience
c.
costs
b.
time
d.
safety
 

 40. 

Because backbone upgrades are expensive and time consuming, the first step in approaching such a project is to ____ it.
a.
research
c.
plan
b.
justify
d.
document
 

Completion
Complete each statement.
 

 1. 

A computer’s ____________________ is the circuit, or signaling pathway, used by the motherboard to transmit data to the computer’s components, including its memory, processor, hard disk, and NIC.
 

 

 2. 

A(n) ____________________ NIC is integrated into the motherboard.
 

 

 3. 

A(n) ____________________ is software that enables an attached device to communicate with the computer’s operating system.
 

 

 4. 

The ____________________ indicates, in hexadecimal notation, the area of memory that the NIC and CPU use for exchanging, or buffering, data.
 

 

 5. 

A router that directs data between nodes on an autonomous LAN (or one owned and operated by a single organization) is known as a(n) ____________________ router.
 

 

 6. 

A service on the client workstation, called the ____________________, intercepts a request to determine whether it should be handled by the client or by the server.
 

 

 7. 

The most privileged user account on an NOS is the ____________________.
 

 

 8. 

In LDAP-compatible directories, a(n) ____________________ is the set of definitions of the kinds of objects and object-related information that the directory can contain.
 

 

 9. 

____________________ is the execution of multiple tasks at one time.
 

 

 10. 

A(n) ____________________ is a group of users, servers, and other resources that share a centralized database of account and security information.
 

 

 11. 

____________________ refers to the assessment, monitoring, and maintenance of all aspects of a network.
 

 

 12. 

A(n) ____________________ is a report of the network’s current state of operation.
 

 

 13. 

The definition of managed devices and their data are collected in a(n) ________________________________________.
 

 

 14. 

On Windows-based computers an event log can be easily viewed with the GUI ____________________ application.
 

 

 15. 

Changes to ____________________ applications affect all users at once.
 

 



 
Check Your Work     Start Over