Chapter Review

[Previous] [Next]

  1. The first consideration in keeping data safe is to ensure the security of the network __________________.
  2. Another term for access permissions is __________ - _____________ _________________.
  3. Implementing password-protected shares involves assigning a password to each shared _________________.
  4. If a share is set up as ___________ - ___________, users can look at the documents or copy them to their machines, but they cannot change the original documents.
  5. Access permission security involves assigning certain ______________ on a user-by-user basis.
  6. The most efficient way to assign permissions is through the use of ______________.
  7. Through auditing, selected types of events are recorded in the _________________ __________ of a server in order to track network activities by user accounts.
  8. A data- __________________ utility scrambles data before it goes out onto the network.
  9. The Commercial COMSEC Endorsement Program (CCEP) authorizes manufacturers to incorporate classified ________________ into the communication systems they sell.
  10. Diskless computers communicate with the server and log on through the use of a special ROM boot chip installed on the computer ________________ _________________ ___________.
  11. The two most important environmental conditions to monitor are _____________________ and __________________.
  12. Proper ____________________ is required to prevent a computer from overheating.
  13. The potential for ESD increases as the humidity ______________.
  14. True or False: If network cables are installed in the walls and in the ceilings, they will be safe from all damage.
  15. A ___________ atmosphere with high __________ will most certainly destroy any computer equipment in a matter of days or months.
  16. The first line of defense against loss of data is usually a ___________ ________________ system.
  17. It is important to have a regular ______________ for backing up data.
  18. Maintaining a __________ of all backups is important for later file recovery.
  19. When backing up across a network, network traffic can be reduced by placing the backup computer on an isolated _______________.
  20. Fault-tolerant systems protect data by duplicating data or placing data in different _______________ sources.
  21. RAID level 0, called ____________ _______________, divides data into 64K blocks and spreads it equally in a fixed rate and order among all disks in an array.
  22. Level 0 disk striping does not offer data ___________________.
  23. Disk __________________ duplicates a partition and moves the duplication onto another physical disk so that there are always two copies of the data.
  24. Duplexing is intended to protect against disk ___________________ failures, as well as media failures.
  25. Writing complete blocks of data to each disk in the array is known as disk ________________.
  26. In Windows NT Server, the ___________ _____________________ program is used to configure Windows NT Server fault tolerance.
  27. In RAID level 10, data that is contained on a physical drive in one array is __________________ on a drive in the second array.
  28. "Clustering" is the term applied to a group of ___________________ systems working together as a single system.

Answers



MCSE Training Kit Networking Essentials Plus 1999
MCSE Training Kit: Networking Essentials Plus, Third Edition (IT Professional)
ISBN: 157231902X
EAN: 2147483647
Year: 2005
Pages: 106

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net