Term
What is centralized access control administration? |
|
Definition
One entity is responsible for overseeing access to all corporate resources. |
|
|
Term
What is Sender Policy Framework? (SPF) |
|
Definition
An email validation system designed to prevent email spam. |
|
|
Term
What is Context-Dependent Access Control? |
|
Definition
It is access decisions that are based on the context of a collection of information. |
|
|
Term
|
Definition
An SMTP server configured in such a way that it allows anyone on the internet to send email through it. |
|
|
Term
|
Definition
Network Address Translation |
|
|
Term
|
Definition
It occurs when malicious users forge an email to make it appear to be from a legitimate source. |
|
|
Term
|
Definition
Simple Authentication and Security Layer. |
|
|
Term
What is the difference between POP and IMAP? |
|
Definition
POP is used for internet based email.
IMAP is used for corporate email accounts |
|
|
Term
|
Definition
Enable users to access mail on a mail server. |
|
|
Term
|
Definition
Internet Message Access Protocol. |
|
|
Term
What is a Fraggle attack? |
|
Definition
DDoS attack using UDP Echo traffic. |
|
|
Term
|
Definition
A DDoS attack that floods a target computer with spoofed broadcast ICMP packets. |
|
|
Term
What are the two main componenets of SNMP? |
|
Definition
|
|
Term
What Protocol does Traceroute use? |
|
Definition
|
|
Term
What is Content-Dependent Access Control? |
|
Definition
Access to objects are determined by the content within the object. |
|
|
Term
What is a capability table? |
|
Definition
Specifies access rights a certain subject posseses pertaining to specific objects |
|
|
Term
What are the two types of heirarchies in RBAC? |
|
Definition
Limited-Only one level of hierarchy is allowed
General-Allows for many levels of hierarchies |
|
|
Term
|
Definition
System makes access decisions |
|
|
Term
What is the difference between a memory card and a smart card? |
|
Definition
A memory card holds information but can not process it
Smart cards hold information and have the necesdsary hardware and software to process that information |
|
|
Term
What is the difference between synchronous and asynchonous token generating devices? |
|
Definition
Asynchronous is based on challenge/response.
Synchronous is based on time or counter-driven mechanisms. |
|
|
Term
|
Definition
Mandatory Access Control. |
|
|
Term
|
Definition
The owner of a file specifies which users can access the file. |
|
|
Term
|
Definition
Discretionary Access Control. |
|
|
Term
What is the Key Distribution Center? (KDC) |
|
Definition
It is the foundation of Kerberos Security.
It holds all users and services secret keys
It is the trusted authentication for all users. |
|
|
Term
|
Definition
Two or more people working together to carry out fraudulent activity. |
|
|
Term
What is a data custodian responsible for? |
|
Definition
Maintaining and protecting data. |
|
|
Term
|
Definition
Member of management in charge of a specific business unit that is responsible for a specific subset of data. |
|
|
Term
What is a security steering commitee? |
|
Definition
Group responsible for making decision on tactical and strategic security issues within an organization. |
|
|
Term
What are the four main goals of a risk analysis? |
|
Definition
Identify assest
Identify vulnerability
Quantify probably of business impact
Provide economic balance between impact of threat and cost of cunter measure. |
|
|
Term
What is an example of misuse of data? |
|
Definition
Sharing trade secrets
Fraud
Espionage
Theft |
|
|
Term
What is a fault tree analysis? |
|
Definition
An approach that maps specific flaws to root causes in complex systems. |
|
|
Term
What are examples of physical damage? |
|
Definition
|
|
Term
What is information risk management? |
|
Definition
The process of identifying and assesing risk and reducing it to an acceptable level. |
|
|
Term
|
Definition
Availability
Integrity
Confidentiality
|
|
|
Term
|
Definition
It is a method of determining functions, identifying functional failures, and assesing causes of failure. |
|
|
Term
|
Definition
Australian risk management used to understand a companies financial capital, human safety, and business decision risks. |
|
|
Term
|
Definition
Operationally Critical Threat Asset and Vulnerability Evaluation. |
|
|
Term
|
Definition
Facilitated Risk Analysis Process. |
|
|
Term
|
Definition
Risk Management guide for information technology systems. |
|
|
Term
|
Definition
A loss that is secondary in nature and takes place well after a vulnerability is exploitated. |
|
|
Term
|
Definition
International standard for how risk management should be carried out. |
|
|
Term
|
Definition
What the company would lose if a threat was exploitated. |
|
|
Term
|
Definition
International control used to secure U.S federal systems developed by NIST. |
|
|
Term
|
Definition
Capability Maturity Model Intergration |
|
|
Term
|
Definition
Process improvent methodology
Improves operation efficency
Developed by Motorola
|
|
|
Term
|
Definition
It is the De Facto standard of best practices |
|
|
Term
What is the difference between COSO and COBIT? |
|
Definition
COSO is a model for corporate governance
COBIT is for IT governance |
|
|
Term
What is special publication 800-53? |
|
Definition
It outlines controls that need to be in place to be compliant with FISA. |
|
|
Term
|
Definition
Framework and set of control objectives developed by the ISACA
It defines goals for controls to properly manage IT and ensure it maps to business needs. |
|
|
Term
|
Definition
Control Objectives for Information and Related Technology |
|
|
Term
What is strategic alignement? |
|
Definition
Business drivers and regulatory and legal requirements are being met by the security enterprise architecture. |
|
|
Term
Describe Zachman Architecture Framework |
|
Definition
One of the first enterprise architecture framework
It is a two dimensional model
It uses six basic communication interrogatives that intersect with different viewpoints
The goal of the framework is the look at the same organization from different views. |
|
|
Term
Describe British Standard 7799 |
|
Definition
Developed in 1995 in U.K.
Outlines how information management systems should be built and maintained. |
|
|
Term
What is a tear drop attack? |
|
Definition
Involves sending managed IP fragments with-sized payload to the target machine. |
|
|
Term
|
Definition
Network attack in which an authorized person gains access to a network and stays undetected for a long period of time. |
|
|
Term
|
Definition
Advanced Persistant Threat |
|
|
Term
|
Definition
Using software to bypass normal security constraints to allow unathorized access to data. |
|
|
Term
|
Definition
Computers can process unintended data reults and it will result in unintended/erroneous ouptut information |
|
|
Term
|
Definition
|
|
Term
|
Definition
Specifies how software components should interact with each other. |
|
|
Term
|
Definition
Application Programming Interface. |
|
|
Term
What is a clipping level? |
|
Definition
An older term used to mean a threshold |
|
|
Term
What is a compensating control? |
|
Definition
A control that provides an alternative measure of control. |
|
|
Term
What is a detective control? |
|
Definition
A control that identifies incident activities and potential intruders. |
|
|
Term
What is a recovery control? |
|
Definition
A control intended to bring enviroment back to regular operations. |
|
|
Term
What is a corrective control? |
|
Definition
A control that fixes systems after an incident. |
|
|
Term
What is a preventative control? |
|
Definition
Intended to avoid an incident from occuring |
|
|
Term
|
Definition
Something intended to discourage a potential attacker. |
|
|
Term
What are physical controls? |
|
Definition
Items put into place to protect facilities/perspnel/resources |
|
|
Term
What are administrative controls? |
|
Definition
Soft Controls
Security Documentations
Risk Management
Personel Security |
|
|
Term
What are technical controls? |
|
Definition
Software/Hardware controls
Examples:Firewalls/IDS/Encryption |
|
|
Term
|
Definition
A countermeasure put into place to mitigate potential risk. |
|
|
Term
|
Definition
Instance of being exposed to loss. |
|
|
Term
|
Definition
Potential danager associated with exploitation of a vulnerability. |
|
|
Term
|
Definition
A lack of a counter-measure or weakness in a counter-measure. |
|
|
Term
What is social engineering |
|
Definition
Gaining access by tricking somoene to divulge ensitive information. |
|
|
Term
|
Definition
Actual amount of data carried over a connection. |
|
|
Term
|
Definition
Transition mechanism for migrating from IPV4 to IPV6 |
|
|
Term
What is session hijacking? |
|
Definition
Attack method that allows an attacker to overtake and control a communication session. |
|
|
Term
|
Definition
DoS attack where an attacker sends a succession of SYN packets with the goal of overwhelming a vicitms system. |
|
|
Term
|
Definition
Use of segregation in design decisions to protect software from being comprimised. |
|
|
Term
What is micro-architecture? |
|
Definition
Specific design of a microprocessor which includes physical components. |
|
|
Term
What is a logical address? |
|
Definition
Indirect addressing used by processes within an operating system. |
|
|
Term
What is an absolute address? |
|
Definition
Hardware addresses used by the CPU. |
|
|
Term
What is process isolation? |
|
Definition
Protection mechanism provided by operating systems that can be implemented as encapsulation. |
|
|
Term
What is a buffer overflow? |
|
Definition
It takes place when too much data us accepted into a specific process. |
|
|
Term
|
Definition
When the CPU has to change from processing code in user mode to kernal mode. |
|
|
Term
|
Definition
Type of memory used for highspeed writing and reading activites. |
|
|
Term
What is the goal of memory management? |
|
Definition
Provide an abstraction level for the programmer
Maximizes performance with limited amount of memory
It protects the OS and applications loaded into the memory. |
|
|
Term
What is a software deadlock? |
|
Definition
Two processes can not complete their activities because they are both waiting for ther same system resources to be released. |
|
|
Term
|
Definition
Program that is loaded in memory with an operating system. |
|
|
Term
What is a maskable interupt? |
|
Definition
Interrupt value assigned to a noncritical operating system activity. |
|
|
Term
What is a nonmaskable interupt? |
|
Definition
Interrupt value assigned to a critical operating system activity. |
|
|
Term
What is pre-emptive multitasking |
|
Definition
Used by operating systems to allow for computer resource time slicing. |
|
|
Term
What is the difference between a running state and a ready state? |
|
Definition
A running state-CPU is executing instructions and data
A ready state is waiting to send instructions to the CPU |
|
|
Term
What is cooperative Multi-tasking? |
|
Definition
Used in Windows 3.x and is required to process to voluntary release resources they are using. |
|
|
Term
What is ISO/IEC 42010:2007 |
|
Definition
International standard that provides guidlines on how to create and maintain system architectures. |
|
|
Term
What is the control unit? |
|
Definition
Part of the CPU that oversees the collection of instructions and data from memory and how they are passed to the processing components of the CPU. |
|
|
Term
What is aymmetric mode multiprocessing? |
|
Definition
When a computer has two or more CPU's and one CPU is dedicated to a specific program while the other CPU carries out general proccessing procedures. |
|
|
Term
What is symmetric mode multiprocessing? |
|
Definition
When a computer has two or more CPU's and each CPU is being used in a load balancing method. |
|
|
Term
|
Definition
Physical connections between processing components and memory segments |
|
|
Term
|
Definition
Physical connections processing components. |
|
|
Term
|
Definition
Mode a CPU works in when carrying out more trusted instructions. |
|
|
Term
Describe the user mode of a system |
|
Definition
A protection mode that CPU works within when carrying out less trusted process instructions. |
|
|
Term
What is a special register? |
|
Definition
Temporary memory loaction that holds critical processing parameters. |
|
|
Term
|
Definition
Memory segment used by processes to communicate instructions and data to each other. |
|
|
Term
What does a program counter do? |
|
Definition
It contains the memory address of the next instruction to be fetched. |
|
|
Term
What is a general register? |
|
Definition
They are used to hold variables and tempoary results as the ALU works through its execution sets. |
|
|
Term
|
Definition
It performs the mathmatical functions and logical operations of data. |
|
|
Term
What is an architecture description? |
|
Definition
Collection of document types to convey an architecture in a formal setting. |
|
|
Term
|
Definition
It is a representative of a whole system from the perspective of a related set of concerns. |
|
|
Term
|
Definition
Individual with interests in a system. |
|
|
Term
What is a single point of failure with in a Single Sign On implementation? |
|
Definition
|
|
Term
|
Definition
It identifies potential threats and attack vectors. |
|
|
Term
|
Definition
It allows for the automation of user management. |
|
|
Term
What technology allows users to remember just one password? |
|
Definition
|
|
Term
What is a type I biometric error |
|
Definition
System rejects an authorized individual. |
|
|
Term
What is a type II biometric error? |
|
Definition
An imposter was authenticated. |
|
|
Term
|
Definition
Seto f rules for encoding documents in machine readable format to allow for interoperability between various web based technologies. |
|
|
Term
What is a decentralized access control administration? |
|
Definition
It gives control of access to the people closer to the resources. |
|
|
Term
What are the main types of restricted interface measurements? |
|
Definition
Menus and shells
Database views
Physically Constrained Interfaces |
|
|
Term
What is a statistical based IDS? |
|
Definition
A behavioral based system that builds a profile of an enviroment of normal activities. |
|
|
Term
|
Definition
Reliable and timely access to data and resources. |
|
|
Term
What is an example of confidentiality? |
|
Definition
Encryption for data at rest
Encryption for data in transit
Access controls
|
|
|
Term
What are example of Integrity? |
|
Definition
Hashing
Configuration Management
Change Control
Access Control
Digital Signing |
|
|
Term
What are examples of Availability? |
|
Definition
RAID
Clustering
Load Balancing
Backups
Fail-Over Configurations |
|
|
Term
|
Definition
Internal controls audit carried out by a 3rd party. |
|
|
Term
|
Definition
Organizational
Issue-Specific
System-Specific |
|
|
Term
|
Definition
Regulatory-Ensures an organizatin is following set by industry
Advisory-Advises employees to whichbehaviors should/should not take place within the organization
Informative-Not enforceable-Teaches employees about specific issues relevant to the company. |
|
|
Term
|
Definition
Mandatory activities actions or rules. |
|
|
Term
What is the class B IP range? |
|
Definition
128.0.0.0-191.255.255.255 |
|
|
Term
What is the range for a class C address? |
|
Definition
192.0.0.0-223.255.255.255 |
|
|
Term
What is the range of class E IP addresses? |
|
Definition
240.0.0.0-255.255.255.255 |
|
|
Term
What are registered ports? |
|
Definition
Ports from 1024-49151
Can be registered with ICANN for a paticular use. |
|
|
Term
What is the port range for well known ports? |
|
Definition
|
|
Term
What is the range for class D IP addresses? |
|
Definition
224.0.0.0-239.255.255.255 |
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
What port is HTTP used on? |
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
What is the class A IP range? |
|
Definition
|
|
Term
Describe fence height requirements |
|
Definition
3-4 ft deters casual trespassers
6-7 too high to climb easily
8ft-Used for protecting critical areas |
|
|
Term
Describe preaction water system |
|
Definition
Similar to dry pipe/water is not held in pipes.
Water is realesed by using pressurized air. |
|
|
Term
Describe a drypipe system |
|
Definition
Water is not held in the pipes |
|
|
Term
Describe a wetpipe system |
|
Definition
System always contains water in the pipes and is discharged by temperature control-level sensors. |
|
|
Term
Describe the four classes of gates |
|
Definition
Class I-Residential
Class II-Commerical
Class III-Industrial
Class IV-Restricted(Prisions) |
|
|
Term
What is a perimeter intrusion detection and assestment system? (PIDAS) |
|
Definition
It is a type of fence with passive cable vibration sensors that sets of an alram if anything tries to cut or climb it. |
|
|
Term
Describe activity support |
|
Definition
Planned activities for the areas to be protected. |
|
|
Term
Describe natural surviellance |
|
Definition
Use and placement of physical enviromental features in personnel walkways. |
|
|
Term
Describe natural access control |
|
Definition
Guidance of people entering and leavign the space. |
|
|
Term
What are the three main CPTED strategies? |
|
Definition
Natural access control
Natural Surviellance
Natural Territorial Reinforcement |
|
|
Term
What is target hardening? |
|
Definition
Denying access through physical and artifical barriers. |
|
|
Term
Where should a datacenter be located in a facility? |
|
Definition
In the center of the building. |
|
|
Term
What are three factors used in authentication? |
|
Definition
Something a person knows
Something a person has
Something a person is |
|
|
Term
What is a race condition? |
|
Definition
Occurs when processes carryout tasks in an incorrect order |
|
|
Term
What are logical access controls? |
|
Definition
Technical tools used for identification authorization and accountability. |
|
|
Term
What is COSO's main objective? |
|
Definition
Prevention of a coporate environment that promotes financial fraud. |
|
|
Term
|
Definition
Standard on how to protect personal health information. |
|
|
Term
How do you calculate residual risk? |
|
Definition
(Threat*Vulernability*Asset Value)*Control Gap |
|
|
Term
|
Definition
It delivers status messages and repports errors and tests connectivity. |
|
|
Term
What is ARP table cache poisoning? |
|
Definition
Altering a systems ARP table so it contains incorrect information |
|
|
Term
|
Definition
It reports multicast group memberships to routers. |
|
|
Term
|
Definition
Internet Group Management Protocol |
|
|
Term
|
Definition
Cables that is jacketed with fire retarded plastic |
|
|
Term
|
Definition
Signal on one channel of a transmission creates an undesired effect in another channel by interacting with it. |
|
|
Term
|
Definition
Called Thinnet
Uses Coaxial cable
Max length 185 meters. |
|
|
Term
What is the difference between baseband an broadband? |
|
Definition
Baseband uses the entire communication channel for its transmission
Broadband divides communication channel into indpendent subchannels |
|
|
Term
|
Definition
Random values addes to the encryption process to add complexity and randomness |
|
|
Term
|
Definition
Authentication protocol that is the defualt authentication for Windows Server 2000/2003/2008
It is a sngle sign on system for distrbuted environments. |
|
|
Term
What are cognitive passwords? |
|
Definition
Fact or opinion based information used to verify an indiviuals information. |
|
|
Term
The information technology security evaluation criteria was developed for what countries? |
|
Definition
|
|
Term
What is the first level of the orange book that requires classifcation labeling? |
|
Definition
|
|
Term
Describe compartmented security mode |
|
Definition
All users can access some data based on their need to know. |
|
|
Term
Describe high security mode |
|
Definition
Users can access some data. |
|
|
Term
Describe dedicated security mode |
|
Definition
A user has access to all information on the system |
|
|
Term
What is the * integrity axiom |
|
Definition
A subject cannot modify an object in higher integrity level |
|
|
Term
What is the simple integrity axiom? |
|
Definition
A subject cannot read data at a lower integrity level. |
|
|
Term
|
Definition
A formal state transition model that describes a set of access control rules designed to ensure data integrity |
|
|
Term
What is the strong star property rule |
|
Definition
Subject can perform read and write functions only to the objects at its same security level. |
|
|
Term
Describe the * property rule |
|
Definition
A subject cannot write to another object a lower security level |
|
|
Term
What is the simple security rule? |
|
Definition
A subject cannot read data at a higher security level. |
|
|
Term
Describe the Bee La Padula Model |
|
Definition
It define the concept of a secure state and necessary modes of access
Ensures information only flows in a manner that does not violate system policy |
|
|
Term
What instruction governs MAC and DAC? |
|
Definition
|
|
Term
What is the maximum height a plant or hedge should be? |
|
Definition
|
|
Term
Describe a security kernel |
|
Definition
It is a reference monitor. |
|
|
Term
|
Definition
|
|
Term
|
Definition
A protocol used for serial device to device communication. |
|
|
Term
|
Definition
Synchronous Data Link Control |
|
|
Term
|
Definition
Protocol used in networks that use dedicate leased lines with permanent physical connections. |
|
|
Term
|
Definition
|
|
Term
|
Definition
Integrated Services Digital Network |
|
|
Term
|
Definition
It is a technology that enables data and voice to travel over a medium in a digital manner. |
|
|
Term
What is distance vector routing protocol |
|
Definition
A routing protocol tthat calculates paths based on distance. |
|
|
Term
What is Border Gateway Protocol? |
|
Definition
It is a protocol that carries out core routing designs on the internet. |
|
|
Term
What is a wormhole attack? |
|
Definition
An attack that takes place when an attacker captures packets at one location in the network and tunnels them into another location for a second attacker to use against a target system. |
|
|
Term
What is Spanning Tree protocol? |
|
Definition
Network Protocol ensures a loop free topology. |
|
|
Term
|
Definition
|
|
Term
|
Definition
Allows a sender of a packet to specify the route the packet takes throught the network verus having the router determine the path. |
|
|
Term
|
Definition
Multiprotocol Label Switching |
|
|
Term
|
Definition
A networking technology that directs data from one network node to the next based on short path labels. |
|
|
Term
|
Definition
An exploit that allows an attacker on a VLAN to gain unauthorized access to a network. |
|
|
Term
|
Definition
It is a highly exposed device that is most likely to be target by attackers. |
|
|
Term
|
Definition
A firewall that communicates directly with a perimeter router and the internal network. |
|
|
Term
What is a screened subnet? |
|
Definition
It is another layer of security that is used in the screened host architecture. |
|
|
Term
|
Definition
An attacker modifies a packet header to have a source address of a host inside the network that is going to be attacked. |
|
|
Term
What is an overlapping fragment attack? |
|
Definition
It is used to subvert packet filters that do not reassemble packet fragments before inspection. |
|
|
Term
|
Definition
|
|
Term
|
Definition
It uses link state algorithms to send out routing table information. |
|
|
Term
What is IP fragmentation? |
|
Definition
It is an exploitation of fragmentation and reassembly flaws within IP, which causes DoS. |
|
|
Term
Describe the silent firewall rule. |
|
Definition
It is a rule that drops "noisy" traffic without logging it. It is used to reduce log sizes. |
|
|
Term
Describe the firewall stealth rule |
|
Definition
It disallows access to firewall software from unauthorized systems. |
|
|
Term
Describe the cleanup firewall rule |
|
Definition
It is the last rule in the rule base that drops and logs any traffic that does not meet any other preceeding rules. |
|
|
Term
Describe the negate firewall rule |
|
Definition
It is used instead of using broad an premissive "any rules" and provides tighter permission rights. |
|
|
Term
|
Definition
It acts as an intermediary between clients that want to access certain services on a network. |
|
|
Term
|
Definition
Switched Multimegabit Data Service. |
|
|
Term
|
Definition
A computer that attempts to lure an attacker to it instead of actual production servers. |
|
|
Term
|
Definition
A proxy that can be used by anyone. |
|
|
Term
What is a dual-homed firewall? |
|
Definition
It is a device that has two interfaces between an untrusted network and trusted network to provide secure access. |
|
|
Term
|
Definition
It is a method of combining multiple channels of data over a single transmission path. |
|
|
Term
|
Definition
Asynchronous Transfer Mode. |
|
|
Term
What is a dedicated link? |
|
Definition
It is one single link that is pre-established for the purpose of WAN communication. |
|
|
Term
|
Definition
Time Division Multiplexing |
|
|
Term
What is electronic data interchange? (EDI) |
|
Definition
It is structured transmission of data between organizations. |
|
|
Term
What is a value added network? (VAN) |
|
Definition
It is a hosted EDI service that acts as an intermediary between business partners. |
|
|
Term
|
Definition
It is a data link technology used in MANs to connect customer networks to larger service networks or the interne. |
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
Metropolitian Area Network |
|
|
Term
|
Definition
They are dedicated lines that can carry voice and data information over trunks lines. |
|
|
Term
What is time division multiplexing? |
|
Definition
Two or more but streams or signals are transferred apparently simultaneously as subchannel in one communication channel |
|
|
Term
What is a channel service unit? |
|
Definition
A line bridging device bridging for use with T carriers and is required by PTSN providers at digital interfaces that terminate in a DSU |
|
|
Term
What is quality of service? |
|
Definition
it is a capability that allows a protocol to distinguish between different classes of messages and assign priority levels. |
|
|
Term
What is a constant bit rate? |
|
Definition
Connection-oriented channel that provides a consistent data throughput for time sensitive applications. |
|
|
Term
What is a variable bit rate? |
|
Definition
It is a connection oriented channel used for delay insensitive applications. |
|
|
Term
What is unspecified bit rate? |
|
Definition
It is a connectionless channel that does not promise a specific data throughput rate. |
|
|
Term
What is available bit rate? |
|
Definition
It is a connection-oriented channel that allows the bit rate to be adjusted. |
|
|
Term
What was the first protocol to provide true QoS? |
|
Definition
|
|
Term
How many types of ISDN implementations are there? |
|
Definition
|
|
Term
What are the types of ISDN? |
|
Definition
|
|
Term
|
Definition
THis implementation operates over exisiting copper lines and provides digitl voice and data channels. It uses 144 Kbps bandwidth. |
|
|
Term
|
Definition
This implementation has 23 B channels and 1 D channel each using 64 Kbps. The total bandwidth euals one T-1 line at 1.544 Mbps. |
|
|
Term
|
Definition
THis implentation can handle many different types of services simultaneously and is used in telecommunication backbones. |
|
|
Term
|
Definition
|
|
Term
|
Definition
High speed connection that can provide 6 to 30 times higher bandwidth than ISDN. It can provide 52-Mbps transmission speed. |
|
|
Term
How many types of DSL lines are there? |
|
Definition
|
|
Term
What are the types of DSL lines? |
|
Definition
Symmetric DSL
Asymmetric DSL
High-Bit-Rate DSL
Very High Data Rate DSL
Rate Adaptative DSL |
|
|
Term
|
Definition
Data travels upstream and downstream at the same rate. Bandwidth ranges between 192Kbps and 1.1Mbps. Used mainly for business applications. |
|
|
Term
|
Definition
Data travels faster downstream. Used in residential areas. |
|
|
Term
Describe High Bit Rate DSL |
|
Definition
Provides T-1 speed without the use of repeaters. Requires two twisted of wires. |
|
|