Term
____ is preferred over TCP for real-time applications such as telephone conversations and videoconferencing. |
|
Definition
|
|
Term
When streaming videos are supplied via the Web, they are often called ____________________. |
|
Definition
|
|
Term
____ signaling functions are more limited than those performed by the protocols in the H.323 group |
|
Definition
|
|
Term
______________________________ is a simple technique that addresses QoS issues by prioritizing traffic. |
|
Definition
DiffServ (Differentiated Service) Differentiated Service (DiffServ) Differentiated Service DiffServ |
|
|
Term
____ messaging is a service that makes several forms of communication available from a single user interface. |
|
Definition
|
|
Term
A computer programmed to act like an IP telephone is known as a(n) ____. |
|
Definition
|
|
Term
When a caller uses an IP telephone, his or her voice is immediately digitized and issued from the telephone to the network in ____ form. |
|
Definition
|
|
Term
____ describes the use of any network to carry voice signals using the TCP/IP protocol. |
|
Definition
|
|
Term
Many network engineers consider ____ to be superior to MGCP. |
|
Definition
|
|
Term
____________________ performs the same functions as MGCP, but using different commands and processes. |
|
Definition
|
|
Term
____ is the use of one network to simultaneously carry voice, video, and data communications. |
|
Definition
|
|
Term
When more than two people participate in a videoconference, for example, in a point-to-multipoint or multipoint-to-multipoint scenario, a video ____ is required. |
|
Definition
|
|
Term
Many VoIP vendors prefer ____________________ over H.323. |
|
Definition
|
|
Term
IPTV, videoconferencing, streaming video, and IP multicasting belong to the range of services known as ____. |
|
Definition
|
|
Term
Using VoIP over a WAN allows an organization to avoid paying long-distance telephone charges, a benefit known as ____. |
|
Definition
|
|
Term
Among all video-over-IP applications, ____ is perhaps the simplest. |
|
Definition
|
|
Term
When VoIP relies on the Internet, it is often called ____. |
|
Definition
|
|
Term
One drawback to ____ video is that content may not be edited before it’s distributed. |
|
Definition
|
|
Term
A(n) ____ is a computer that manages multiple media gateways. |
|
Definition
|
|
Term
In general, a(n) ____ is a private switch that accepts and interprets both analog and digital voice signals. |
|
Definition
|
|
Term
Many streaming video services - and nearly all of those issued over a public network, such as the Internet - are examples of ____ transmissions. |
|
Definition
|
|
Term
____ is a measure of how well a network service matches its expected performance. |
|
Definition
|
|
Term
The popular Internet telephony software, Skype, is a type of ____. |
|
Definition
|
|
Term
SIP and H.323 regulate ____ for VoIP or video-over-IP clients and servers. |
|
Definition
call signaling and control |
|
|
Term
When using an analog telephone, a VoIP adapter that performs analog-to-digital conversion is known as a(n) ____. |
|
Definition
ATA (analog telephone adapter) |
|
|
Term
______________________________ is a QoS technique that replaces the IP datagram header with a label at the first router a data stream encounters. |
|
Definition
MPLS (multiprotocol label switching) Multiprotocol label switching (MPLS) Multiprotocol label switching MPLS |
|
|
Term
In a ____ attack, a person redirects or captures secure transmissions as they occur. |
|
Definition
|
|
Term
A ____ main function is to examine packets and determine where to direct them based on their Network layer addressing information. |
|
Definition
|
|
Term
A ____ firewall is a router (or a computer installed with software that enables it to act as a router) that examines the header of every packet of data it receives to determine whether that type of packet is authorized to continue to its destination. |
|
Definition
|
|
Term
In ____, both computers verify the credentials of the other. |
|
Definition
|
|
Term
A(n) ____________________ is a software application on a network host that acts as an intermediary between the external and internal networks, screening all incoming and outgoing traffic. |
|
Definition
|
|
Term
____ is a method of encrypting TCP/IP transmissions. |
|
Definition
|
|
Term
In ____ , a hacker forges name server records to falsify his host’s identity. |
|
Definition
|
|
Term
A(n) ____ is a password-protected and encrypted file that holds an individual’s identification information, including a public key. |
|
Definition
|
|
Term
A VPN ____ authenticates VPN clients and establishes tunnels for VPN connections. |
|
Definition
|
|
Term
A ____ attack occurs when a system becomes unable to function because it has been deluged with data transmissions or otherwise disrupted. |
|
Definition
|
|
Term
____ software searches a node for open ports. |
|
Definition
|
|
Term
An NOS that contains a “back door”is an example of a risk associated with ____. |
|
Definition
|
|
Term
A ____ attack occurs when a hacker tries numerous possible character combinations to find the key that will decrypt encrypted data. |
|
Definition
|
|
Term
A ____ attack occurs when a hacker uses programs that try a combination of a user ID and every word in a dictionary to gain access to the network. |
|
Definition
|
|
Term
____ is a public key encryption system that can verify the authenticity of an e-mail sender and encrypt e-mail data in transmission. |
|
Definition
|
|
Term
A router that is not configured to drop packets that match certain suspicious characteristics is an example of a risk associated with ____. |
|
Definition
transmission and hardware |
|
|
Term
The use of certificate authorities to associate public keys with certain users is known as ____. |
|
Definition
|
|
Term
A(n) ____________________ identifies an organization’s security risks, levels of authority, designated security coordinator and team members, responsibilities for each team member, and responsibilities for each employee. |
|
Definition
|
|
Term
____ protocols are the rules that computers follow to accomplish authentication. |
|
Definition
|
|
Term
The combination of a public key and a private key is known as a ____. |
|
Definition
|
|
Term
____ is a social engineering practice in which a person attempts to glean access or authentication information by posing as someone who needs that information. |
|
Definition
|
|
Term
A(n) ____________________ is a thorough examination of each aspect of the network to determine how it might be compromised. |
|
Definition
|
|
Term
n general, information is ____________________ if it could be used by other parties to impair an organization’s functioning, decrease customers’ confidence, cause a financial loss, damage an organization’s status, or give a significant advantage to a competitor. |
|
Definition
|
|
Term
RADIUS and TACACS belong to a category of protocols known as AAA (____). |
|
Definition
authentication, authorization, and accounting |
|
|
Term
A ____ attack occurs when an Internet chat user sends commands to a victim’s machine that cause the screen to fill with garbage characters and requires the victim to terminate their chat sessions. |
|
Definition
|
|
Term
____________________ is the use of an algorithm to scramble data into a format that can be read only by reversing the algorithm. |
|
Definition
|
|
Term
When used on a copper-based cable, a continuity tester applies a small amount of ____ to each conductor at one end of the cable. |
|
Definition
|
|
Term
A ____ is a software-based tool that continually monitors network traffic from a server or workstation attached to the network. |
|
Definition
|
|
Term
A____ is a small electronic device that issues a signal on a wire pair. |
|
Definition
|
|
Term
A sophisticated ____________________ will include a TDR (time domain reflectometer) that issues a signal on a cable and then measures the way the signal bounces back (or reflects) to the TDR. |
|
Definition
cable performance tester performance tester |
|
|
Term
____ is the telltale factor for ascertaining where faults in a cable lie. |
|
Definition
|
|
Term
A ____ can generate traffic in an attempt to reproduce a network problem and monitor multiple network segments simultaneously. |
|
Definition
|
|
Term
Resistance is measured in ____. |
|
Definition
|
|
Term
Before using a network monitor or protocol analyzer on a network, it is important to know what ____ on your network normally looks like |
|
Definition
|
|
Term
____ are often considered first-level support. |
|
Definition
|
|
Term
A ____ is a document (preferably online) that lists every service and software package supported within an organization, plus the names of first- and second-level support contacts for those services or software packages. |
|
Definition
|
|
Term
____ are often considered third-level support. |
|
Definition
|
|
Term
Network engineers today might call any protocol analyzer tool a sniffer or ____________________. |
|
Definition
|
|
Term
To take advantage of network monitoring and analyzing tools, the network adapter installed in the machine running the software must support ____ mode. |
|
Definition
|
|
Term
Viewing the status of the wireless connection on your workstation tells you ____ about your wireless environment. |
|
Definition
|
|
Term
____ is a fundamental property of wire that depends on a wire’s molecular structure and size. |
|
Definition
|
|
Term
In a ____ cable, the transmit and receive wire pairs in one of the connectors are reversed. |
|
Definition
|
|
Term
The danger in using a ____ is that it could collect more information than you or the machine can reasonably process. |
|
Definition
|
|
Term
For documenting problems, some organizations use a software program known as a(n) ____________________ (also informally known as help desk software). |
|
Definition
|
|
Term
____ packets exceed the medium’s maximum packet size. |
|
Definition
|
|
Term
____ are frames that are not actually data frames, but aberrations caused by a device misinterpreting stray voltage on the wire. |
|
Definition
|
|
Term
An administrator should take the time to troubleshoot all network problems correctly by asking specific questions designed to identify the problem ____. |
|
Definition
|
|
Term
A ____ usually results from a bad NIC. |
|
Definition
|
|
Term
A ____ can be used to intercept a telephone conversation. |
|
Definition
|
|
Term
Rather than issue an electrical signal over the cable as twisted pair cable testers do, a(n) ________________________________________ transmits light-based signals of different wavelengths over the fiber. |
|
Definition
OTDR (optical time domain reflectometer) optical time domain reflectometer (OTDR) optical time domain reflectometer OTDR |
|
|
Term
____ is one of the most important aspects to consider when looking at how a problem solution might affect users and network functionality. |
|
Definition
|
|
Term
____ detects malware by comparing current characteristics of files and disks against an archived version of these characteristics to discover any changes. |
|
Definition
|
|
Term
A(n) ____ virus changes its characteristics every time it is transferred to a new system. |
|
Definition
|
|
Term
____________________________________________________________ refers to a collection of disks that provide fault tolerance for shared data and applications. |
|
Definition
RAID (Redundant Array of Independent [or Inexpensive] Disks) Redundant Array of Independent [or Inexpensive] Disks (RAID) Redundant Array of Independent [or Inexpensive] Disks RAID |
|
|
Term
____ is a type of media capable of storing digitized data and that uses a laser to write data to it and read data from it. |
|
Definition
|
|
Term
____ are programs that run independently and travel between computers and across networks. |
|
Definition
|
|
Term
____ is an automatic distribution of traffic over multiple links or processors to optimize response. |
|
Definition
|
|
Term
A(n) ___________________________________ is a battery-operated power source directly attached to one or more devices and to a power supply (such as a wall outlet) that prevents undesired features of the wall outlet’s A/C power from harming the device or interrupting its services. |
|
Definition
UPS Correct Answer: UPS (uninterruptible power supply) Uninterruptible power supply (UPS) Uninterruptible power supply UPS |
|
|
Term
____ scanning detects malware by comparing a file’s content with known malware signatures in a signature database. |
|
Definition
|
|
Term
A(n) ____ virus disguises itself as a legitimate program to prevent detection. |
|
Definition
|
|
Term
In ____, parity error checking occurs when data is written across the disk array. |
|
Definition
|
|
Term
A ____ is a program that runs automatically, without requiring a person to start or stop it. |
|
Definition
|
|
Term
____ provides redundancy through a process called disk mirroring. |
|
Definition
|
|
Term
An archive ____ is a file attribute that can be checked or unchecked to indicate whether the file must be archived. |
|
Definition
|
|
Term
____ are distinct networks of storage devices that communicate directly with each other and with other networks. |
|
Definition
|
|
Term
Power that is free from noise is called “____” power. |
|
Definition
|
|
Term
A program that disguises itself as something useful but actually harms your system is called a ____. |
|
Definition
|
|
Term
A(n) ____________________ is a copy of data or program files created for archiving or safekeeping. |
|
Definition
|
|
Term
____ offers the best performance. |
|
Definition
|
|
Term
A(n) ____ is a deviation from a specified level of system performance for a given period of time. |
|
Definition
|
|
Term
Many bots spread through the _________________________, a protocol that enables users running IRC client software to communicate instantly with other participants in a chat room on the Internet. |
|
Definition
IRC (Internet Relay Chat) Internet Relay Chat (IRC) Internet Relay Chat IRC |
|
|
Term
A(n) ____ UPS uses the A/C power from the wall outlet to continuously charge its battery, while providing power to a network device through its battery. |
|
Definition
|
|
Term
Mesh topologies and ____ topologies are good choices for highly available enterprise networks. |
|
Definition
|
|
Term
____ is a specialized storage device or group of storage devices that provides centralized fault-tolerant data storage for a network. |
|
Definition
|
|
Term
____ is intended to eliminate single points of failure. |
|
Definition
|
|
Term
____ scanning techniques attempt to identify malware by discovering “malware-like” behavior. |
|
Definition
|
|
Term
____________________ is the process of restoring your critical functionality and data after an enterprise-wide outage that affects more than a single system or a limited group of users. |
|
Definition
|
|