Imagine how difficult communication would be if the only way to send a message to someone was to use the person’s name. If there were no street addresses, cities, towns, or country boundaries, delivering a message to a specific person across the world would be nearly impossible. On an Ethernet network, the host MAC address…
Author: examcert
Network Security – 100-150 Exam Guide
The network infrastructure, services, and the data contained on network-attached devices are crucial personal and business assets. Network administrators must address two types of network security concerns: network infrastructure security and information security. Securing the network infrastructure includes physically securing devices that provide network connectivity and preventing unauthorized access to the management software that resides…
Fault Tolerance – 100-150 Exam Guide
A fault tolerant network is one that limits the number of affected devices during a failure. It is built to allow quick recovery when such a failure occurs. These networks depend on multiple paths between the source and destination of a message. If one path fails, the messages are instantly sent over a different link….
Network Design – 100-150 Exam Guide
Objectives Upon completion of this chapter, you will be able to answer the following questions: Key Terms This chapter uses the following key terms. You can find the definitions in the Glossary.availabilityconfidentialityfault tolerant networkintegrityscalable networkQuality of Service (QoS)Introduction (18.0) Let me introduce you to my friend Bob! Bob works in the IT field in Vancouver,…
Network Testing Utilities Summary
The following is a summary of each topic in the chapter and some questions for your reflection. What Did I Learn in this Module? (17.2.1) A number of software utility programs are available that can help identify network problems. Most of these utilities are provided by the operating system as CLI commands. Some of the…
The ping Command – 100-150 Exam Guide
Probably the most commonly used network utility is ping. Most IP enabled devices support some form of the ping command in order to test whether or not network devices are reachable through the IP network. If the IP configuration appears to be correctly configured on the local host, next, test network connectivity by using ping….
Network Testing Utilities
Objectives Upon completion of this chapter, you will be able to answer the following questions: • What network utilities can you use to troubleshoot networks? Key Terms There are no key terms for this chapter. Introduction (17.0) Kishori tries to reach a website using her desktop computer at her nursing station. She gets an error…
What Did I Learn in this Module – 100-150 Exam Guide
• The Client Server Relationship—The term server refers to a host running a software application that provides information or services to other hosts that are connected to the network, such as a web server. An example of client software is a web browser, like Chrome or Firefox. A single computer can also run multiple types…
Text Messaging – 100-150 Exam Guide
Text messaging, shown in Figure 16-11, is one of the most popular communication tools in use today. In addition, text messaging software is built into many online applications, smart phone apps, and social media sites. Figure 16-11 Text Messaging Both clients can simultaneously send and receive messages. Text messages may also be called instant messages,…
Security Issues with Telnet
After a Telnet connection is established, users can perform any authorized function on the server, just as if they were using a command line session on the server itself. If authorized, they can start and stop processes, configure the device, and even shut down the system. Although the Telnet protocol can require a user to…