CIS 106a: Introduction to Operating System Concepts

Review for Third Test
 
  1. What is a client on a computer network? What is a server? What is a service, with respect to clients and servers?

  2. What is a port, with regard to a web server?

  3. What are well known ports?

  4. What are the services associated with these ports:
    • 20 - FTP, File Transfer Protocol, data
    • 21 - FTP, File Transfer Protocol, control
    • 23 - Telnet, remote terminal service
    • 25 - SMTP, Simple Mail Transfer Protocol
    • 53 - DNS, Domain Name Service (how web names get translated to IP addresses)
    • 443 - HTTPS, secure version of HTTP
    • 80 - HTTP, Hypertext Transfer Protocol, delivers web pages
    • 110 - POP3, Post Office Protocol 3


  5. What is a protocol? Why are protocols needed on networks?

  6. What is the difference between connectionless protocols and connection-oriented protocols? Name one of each in the TCP/IP suite.

  7. What information will each of these commands give you on a networked computer:
    • hostname
    • ipconfig
    • ping
    • tracert
    • route


  8. What are SLIP and PPP used for? Which is the more advanced protocol?

  9. What is a modem? How is an ISDN modem different from a dial-up modem?

  10. What is a crossover cable generally used for?

  11. What is the CHAP protocol used for? Why is it necessary on a VPN?

  12. What is DNS? Why is it needed on the Internet?

  13. You should be able to name and recognize several top-level domains, and several international domains.

  14. What is a URL? What is a label in a URL? How is a URL different from a domain name?

  15. What are SSL and TLS used for?

  16. Why should a network administrator have two accounts? What is each intended to be used for?

  17. What are two methods of getting updates for the Windows operating system?

  18. What is authenication? How is it different from authorization?

  19. Name three kinds of passwords that can be placed on a computer system.

  20. Why should you not use an actual word for a password? What complexity rules does Windows suggest that overcome this problem?

  21. What is an object's Access Control List? What utility might you use to control the settings for an object's ACL?

  22. In a Windows domain network, what is the typical lifespan of a password for a user? What is the lifespan of a password of an administrator?

  23. What is a computer firewall? What circumstances make it most needed?

  24. What are some security features available in Internet Explorer?

  25. What is Windows SteadyState? Why might you find it useful in some environments?

  26. What are phishing scams? How can you avoid most of them?

  27. What is an incident report? Why should they be filed?

  28. What precaution should be taken when disposing of secure documents? How can you be sure you are not exposed when disposing of media holding secure information?

  29. What is meant by two factor identification?

  30. What is the difference between a virus and a worm? What is the difference between adware and spyware? What is a keylogger?

  31. How are printers commonly connected to workstations? How was this commonly done in the past?

  32. What are three ways a printer may be made available to mutiple users on a network?

  33. What are two ways to install a local printer?

  34. Under Windows, what service must be installed on a workstation to share a local printer? What service must be installed to to use a network printer?

  35. What is a workgroup in a Windows network? What must be true for members of a workgroup to share a local printer?

  36. What are Postscript and PCL?

  37. What symptoms would indicate that a printing problem has to do with the application you are trying to print from? What would indicate a problem with the operating system instead?

  38. What is the difference between these four types of technician jobs:
    • support technician
    • service technician
    • bench technician
    • help-desk technician


  39. What does it mean to own a problem you are trying to resolve?

  40. Why is it important to collect information from a customer when troubleshooting? What is the advantage to following a plan in all cases?

  41. What is a software license? How is it different from a copyright?

  42. What is a site license? How is it an advantage to a large organization to have site licenses?

  43. What is hard-disk loading? Why is this wrong?