Term
|
Definition
What notifies the network administrator if a security breach occurs? |
|
|
Term
|
Definition
Voice, video, and data over a single network. |
|
|
Term
The number of people attaining them. |
|
Definition
What is the draw back of some certifications? |
|
|
Term
|
Definition
What certification programs require candidates to pass lab exams? |
|
|
Term
|
Definition
ISOC oversees groups with specific missions such as? |
|
|
Term
|
Definition
What is the theoretical process of two nodes communicating on a network? |
|
|
Term
TCP(transmission control protocol) |
|
Definition
What takes care of reliably transmitting the http protocol request from client to server and vice versa? |
|
|
Term
|
Definition
What does not establish a connection before transmitting and makes no effort to ensure that data is delivered free of errors? |
|
|
Term
LLC (logical link control) |
|
Definition
What is the upper sublayer of the data link layer called? |
|
|
Term
MAC (medial access control) |
|
Definition
What is the lower sublayer of the data link layer that manages access to the physical medium called? |
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
802.16 broadband wireless metropolitan area networks |
|
Definition
Wireless MAN standard also known as WiMax. |
|
|
Term
|
Definition
What is the most frequently discussed and analyzed transmission characteristic by networking professionals? |
|
|
Term
|
Definition
What is the most common transmission flaws affecting data signals? |
|
|
Term
|
Definition
What benefit is more twists per foot in twisted pair cable? |
|
|
Term
|
Definition
What uses cat 5 or higher wiring? |
|
|
Term
|
Definition
How many fields does a UDP header have? |
|
|
Term
|
Definition
What is the sub protocol that enables tcp/ip to a internetwork? That is to traverse more that one LAN segment and more that one type of network through a router? |
|
|
Term
|
Definition
What operates at the Network layer and manages multicasting? |
|
|
Term
|
Definition
IP address in the range of 128-192 is what class? |
|
|
Term
CSMA/CD(carrier sense mulitiple access with collision detection) |
|
Definition
What access method do all ethenet networks independent of their speed or frame type use? |
|
|
Term
It is receiving frames from the network. |
|
Definition
What does it mean when the RX LED light on the NIC is blinking? |
|
|
Term
|
Definition
What is a simple set of instructions that enables a computer to initially recognize its hardware? |
|
|
Term
|
Definition
What typically sends data over publicly available communications networks which are owned by local and long distance telecommunications carriers? |
|
|
Term
|
Definition
Modern ring topology WANs rely on what to carry data? |
|
|
Term
|
Definition
What is a problem for a wireless communication because the atmosphere is saturated with electromagnetic waves? |
|
|
Term
|
Definition
Which wireless standard is the least popular? |
|
|
Term
|
Definition
What is a logical representation of the printer's input and output? |
|
|
Term
|
Definition
What is carved out space on the hard drive combined with RAM? |
|
|
Term
|
Definition
Which two network classes are reserved for special purposes? |
|
|
Term
|
Definition
When using classful IPv4 addressing what does the network id end with? |
|
|
Term
|
Definition
What two IP Addresses are reserved? |
|
|
Term
|
Definition
What numbers can be used for the host addresses? |
|
|
Term
Sendmail and Microsoft Exchange Server |
|
Definition
What is the most popular mail server software? |
|
|
Term
|
Definition
What utility can you use the find the host name that has been assigned to a client? |
|
|
Term
|
Definition
What is a popular internet telephony software the is a type of softphone? |
|
|
Term
Streaming video, IPTV, and video conferencing |
|
Definition
Video over IP services are divided into what three sections? |
|
|
Term
|
Definition
What is called when a public key and a private key are combined? |
|
|
Term
PGP (pretty good privacy ) |
|
Definition
What is a public key encryption system that can verify the authenticity of an e-mail sender and encrypt e-mail data in transmission |
|
|
Term
|
Definition
What is it called when the transmit and receive pairs are reversed in one of the connectors of an ethernet cable? |
|
|
Term
|
Definition
What is a fundamental property of wire that depends on a wires molecular structure and it size? |
|
|
Term
|
Definition
What tool continuously monitors network traffic from a server or a workstation? |
|
|
Term
|
Definition
What is it called when frames are not actually data frames but devices misinterpreting stray voltage? |
|
|
Term
|
Definition
What utilities offer a great deal of versatility in the type and depth of information that can be revealed, but can be more than you or the machine can reasonably process? |
|
|
Term
|
Definition
How much information will you get from viewing a wireless connection status? |
|
|
Term
|
Definition
What is a method of detecting malware by comparing current characteristics of files and disks against an archive version? |
|
|
Term
|
Definition
What is a scanning technique that attempts to identify malware that are the most fallible and most likely to emit false alarms? |
|
|
Term
|
Definition
What are distinct networks of storage devices that communicate directly with each other and with other networks? |
|
|
Term
|
Definition
What file attribute can be checked or unchecked to indicate whether a file must be archived? |
|
|
Term
|
Definition
What is the detection and signaling of device link or component faults? |
|
|
Term
|
Definition
What software routine collects information about the device operation and provides it to the network management application running on the console? |
|
|
Term
|
Definition
What is the most comprehensive and complex upgrade involving network hardware? |
|
|
Term
|
Definition
Because backbone upgrades are expensive and time consuming the first step in the project is to what? |
|
|