Term
The function of the _____ protocol is to allow NetBIOS services to be used over TCP/IP networks. |
|
Definition
|
|
Term
The _____ protocol is used for automated discovery of networked services on LANs. |
|
Definition
|
|
Term
|
Definition
Service Location Protocol |
|
|
Term
RIP is a file sharing protocol. |
|
Definition
|
|
Term
NNTP is a file sharing protocol. |
|
Definition
|
|
Term
AFP is a file sharing protocol. |
|
Definition
|
|
Term
SNMP is a file sharing protocol. |
|
Definition
|
|
Term
A network protocol providing an alternative solution to the manual assignment of IP addresses is called _____ |
|
Definition
|
|
Term
What does DHCP stand for? |
|
Definition
Dynamic Host Configuration Protocol |
|
|
Term
What does LDAP stand for? |
|
Definition
Lightweight Directory Access Protocol |
|
|
Term
A protocol used in network management systems for monitoring network-attached devices is known as _____. |
|
Definition
|
|
Term
What does SNMP stand for? |
|
Definition
Simple Network Management Protocol |
|
|
Term
SMB and CIFS are examples of network protocols used for providing _____. |
|
Definition
shared access to files, directories, and devices |
|
|
Term
|
Definition
|
|
Term
What does CIFS stand for? |
|
Definition
Common Internet File System |
|
|
Term
FTP is an example of a secure network protocol offering traffic encryption. |
|
Definition
|
|
Term
HTTPS is an example of a secure network protocol offering traffic encryption. |
|
Definition
|
|
Term
Telnet is an example of a secure network protocol offering traffic encryption. |
|
Definition
|
|
Term
HTTP is an example of a secure network protocol offering traffic encryption. |
|
Definition
|
|
Term
IPsec is an example of a secure network protocol offering traffic encryption. |
|
Definition
|
|
Term
SSH is an example of a secure network protocol offering traffic encryption. |
|
Definition
|
|
Term
SSH is a _____ network protocol. |
|
Definition
|
|
Term
_____ was designed as a secure replacement for Telnet. |
|
Definition
|
|
Term
|
Definition
Transmission Control Protocol |
|
|
Term
TCP is a _____ protocol that requires a set of initial steps in order to establish connection (three-way handshake). |
|
Definition
|
|
Term
UDP is an example of a _____ protocol, and doesn't support three-way handshake |
|
Definition
|
|
Term
TCP is referred to as unreliable or best-effort protocol. |
|
Definition
|
|
Term
UDP is referred to as unreliable or best-effort protocol. |
|
Definition
|
|
Term
TCP supports retransmission of lost packets, flow control (managing the amount of data that is being sent), and sequencing (rearranging packets that arrived out of order). |
|
Definition
|
|
Term
UDP supports retransmission of lost packets, flow control (managing the amount of data that is being sent), and sequencing (rearranging packets that arrived out of order). |
|
Definition
|
|
Term
IEEE 802.11a has a maximum data signaling rate of _____. |
|
Definition
|
|
Term
IEEE 802.11a has a _____ frequency band. |
|
Definition
|
|
Term
What does CSMA stand for? |
|
Definition
Carrier Sense Multiple Access |
|
|
Term
IEEE 802.11b has a _____ frequency band. |
|
Definition
|
|
Term
IEEE 802.11b has a maximum data signaling rate of _____. |
|
Definition
|
|
Term
IEEE 802.11g has a maximum data signaling rate of _____. |
|
Definition
|
|
Term
IEEE 802.11g has a _____ frequency band. |
|
Definition
|
|
Term
IEEE 802.11n has a _____ frequency band. |
|
Definition
|
|
Term
IEEE 802.11n has a maximum data signaling rate of _____. |
|
Definition
|
|
Term
IEEE 802.11ac has a _____ frequency band. |
|
Definition
|
|
Term
IEEE 802.11ac has a maximum data signaling rate of _____. |
|
Definition
|
|
Term
IEEE _____ wireless standard uses MIMO. |
|
Definition
|
|
Term
_____ wireless standard uses MU-MIMO. |
|
Definition
|
|
Term
What does MIMO stand for? |
|
Definition
Multiple Input / Multiple Output |
|
|
Term
What does MU-MIMO stand for? |
|
Definition
|
|
Term
IEEE 802.11a, -b, -g, -n, and -ac all use CSMA/_____. |
|
Definition
|
|
Term
_____ is a wireless security standard that has been deprecated in favor of newer standards due to known vulnerabilities resulting from implementation flaws. |
|
Definition
|
|
Term
_____ is the wireless security standard that offers the highest level of protection. |
|
Definition
|
|
Term
A security protocol introduced in order to strengthen existing WEP implementations without requiring the replacement of legacy hardware is known as _____. |
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
What does TKIP stand for? |
|
Definition
Temporal Key Integrity Protocol |
|
|
Term
_____ features AES-based encryption mode. |
|
Definition
|
|
Term
|
Definition
Advanced Encryption Standard |
|
|
Term
A portion of the available RF band allocated for wireless communication is known as (a) _____. |
|
Definition
|
|
Term
A situation in which multiple channels share the frequency band causing interference and performance degradation for devices operating on channels that are too close to each other is known as _____. |
|
Definition
|
|
Term
Setting up a wireless network to operate on a non-overlapping channel allows multiple networks to coexist in the same area without causing interference. |
|
Definition
|
|
Term
_____ must be enabled to allow requests to a server with a private IP address from an outside network |
|
Definition
|
|
Term
|
Definition
|
|
Term
What does NNTP stand for? |
|
Definition
Network News Transfer Protocol |
|
|
Term
|
Definition
Routing Information Protocol |
|
|
Term
LDAP is an example of a _____. |
|
Definition
directory access protocol |
|
|