CIS 106a: Introduction to Operating System Concepts
Review for Third Test
- What is a client on a computer network? What is a server? What is
a service, with respect to clients and servers?
- What is a port, with regard to a web server?
- What are well known ports?
- What are the services associated with these ports:
- 20 - FTP, File Transfer Protocol, data
- 21 - FTP, File Transfer Protocol, control
- 23 - Telnet, remote terminal service
- 25 - SMTP, Simple Mail Transfer Protocol
- 53 - DNS, Domain Name Service (how web names
get translated to IP addresses)
- 443 - HTTPS, secure version of HTTP
- 80 - HTTP, Hypertext Transfer Protocol,
delivers web pages
- 110 - POP3, Post Office Protocol 3
- What is a protocol? Why are protocols needed on networks?
- What is the difference between connectionless protocols and connection-oriented
protocols? Name one of each in the TCP/IP suite.
- What information will each of these commands give you on a networked
- What are SLIP and PPP used for? Which is the more advanced protocol?
- What is a modem? How is an ISDN modem different from a dial-up modem?
- What is a crossover cable generally used for?
- What is the CHAP protocol used for? Why is it necessary on a VPN?
- What is DNS? Why is it needed on the Internet?
- You should be able to name and recognize several top-level domains,
and several international domains.
- What is a URL? What is a label in a URL? How is a URL different from
a domain name?
- What are SSL and TLS used for?
- Why should a network administrator have two accounts? What is each
intended to be used for?
- What are two methods of getting updates for the Windows operating
- What is authenication? How is it different from authorization?
- Name three kinds of passwords that can be placed on a computer system.
- Why should you not use an actual word for a password? What complexity
rules does Windows suggest that overcome this problem?
- What is an object's Access Control List? What utility might you use
to control the settings for an object's ACL?
- In a Windows domain network, what is the typical lifespan of a password
for a user? What is the lifespan of a password of an administrator?
- What is a computer firewall? What circumstances make it most needed?
- What are some security features available in Internet Explorer?
- What is Windows SteadyState? Why might you find it useful in some
- What are phishing scams? How can you avoid most of them?
- What is an incident report? Why should they be filed?
- What precaution should be taken when disposing of secure documents?
How can you be sure you are not exposed when disposing of media holding
- What is meant by two factor identification?
- What is the difference between a virus and a worm? What is the difference
between adware and spyware? What is a keylogger?
- How are printers commonly connected to workstations? How was this
commonly done in the past?
- What are three ways a printer may be made available to mutiple users
on a network?
- What are two ways to install a local printer?
- Under Windows, what service must be installed on a workstation to
share a local printer? What service must be installed to to use a network
- What is a workgroup in a Windows network? What must be true for members
of a workgroup to share a local printer?
- What are Postscript and PCL?
- What symptoms would indicate that a printing problem has to do with
the application you are trying to print from? What would indicate a
problem with the operating system instead?
- What is the difference between these four types of technician jobs:
- support technician
- service technician
- bench technician
- help-desk technician
- What does it mean to own a problem you are trying to resolve?
- Why is it important to collect information from a customer when troubleshooting?
What is the advantage to following a plan in all cases?
- What is a software license? How is it different from a copyright?
- What is a site license? How is it an advantage to a large organization
to have site licenses?
- What is hard-disk loading? Why is this wrong?