Term
Throughput, the actual speed of data transfer that is achieved in a network, is usually |
|
Definition
less than (or equal to) the data transfer rate |
|
|
Term
The ________ is the maximum speed at which data can be transmitted between two nodes on a network. |
|
Definition
data transfer rate (or bandwidth) |
|
|
Term
A(n) ________ keeps track of data packets and, in conjunction with network interface cards, helps the data packets find their destination without running into each other on an Ethernet network. |
|
Definition
|
|
Term
The "s" in https stands for ________. |
|
Definition
|
|
Term
In the URL http://www.prenhall.com, the portion labeled .com is the ________. |
|
Definition
|
|
Term
The application layer of the TCP/IP protocol architecture ________. |
|
Definition
contains all protocols and methods that fall into the realm of process to process communications across a TP network |
|
|
Term
The ________ layer of the TCP/IP protocol architecture is said to provide reliable internet transport. |
|
Definition
|
|
Term
A ________ is a special-purpose computer that moves packet traffic according to the rules of the IP protocol. |
|
Definition
|
|
Term
Private IP addresses ________. |
|
Definition
Identify a particular device on a private network usually on a LAN. Their assignment is controlled with the LAN. Example: coffee shop gives you a private IP address on the LAN device. |
|
|
Term
Which OSI layer combines messages or segments into packets? |
|
Definition
|
|
Term
A key parameter that characterizes any electromagnetic signal is ________, which is the width of the range of frequencies that comprises the signal. |
|
Definition
|
|
Term
The ________ time is the time it takes for a bit to traverse the link between source and destination. |
|
Definition
|
|
Term
The time it takes for a station to emit all of the bits of a frame onto the medium is the ________ time. |
|
Definition
|
|
Term
Dynamic use of bandwidth is utilized with ________. |
|
Definition
virtual circuit packet switching |
|
|
Term
In the ________ approach in packet switching each packet is treated independently with no reference to packets that have gone before. |
|
Definition
|
|
Term
A ________ is a collection of interconnected access points with a software protocol structure that enables communication. |
|
Definition
|
|
Term
A function performed by a receiving entity to limit the amount or rate of data that is sent by a transmitting entity is ________. |
|
Definition
|
|
Term
A dictionary attack is being used by an attacker to break into a network. What does this mean? |
|
Definition
systematically entering every word in a dictionary as a password. A dictionary attack can also be used in an attempt to find the key necessary to decrypt an encrypted message or document. |
|
|
Term
A cellular network uses multiple low power ________. |
|
Definition
Base transceiver station(tower)/Transmitters(phone) |
|
|
Term
First generation cellular networks ________. |
|
Definition
were analog FDMA systems and designed exclusively for voice only communication |
|
|
Term
________ are used to exchange information having to do with setting up and maintaining calls and with establishing a relationship between a mobile unit and the nearest base station. |
|
Definition
Control channels or mobile switching center(MCS) |
|
|
Term
Affecting not only mobile phones in automobiles, but even a mobile phone user walking down an urban street, ________ occurs when there are rapid variations in signal strength. |
|
Definition
|
|
Term
Third generation wireless communication supports ________. |
|
Definition
data/multimedia and voice |
|
|
Term
As the mobile units move they pass from cell to cell, which requires transferring of the call from one base transceiver to another. This process is called ________. |
|
Definition
|
|
Term
________ are useful in city streets in congested areas, along highways, and inside large public buildings. |
|
Definition
|
|
Term
Each base station is connected to a ________, which serves multiple base stations. |
|
Definition
|
|
Term
________ occurs when an electromagnetic signal encounters a surface that is large relative to the wavelength of the signal. |
|
Definition
|
|
Term
Nonselective, or ________, is the type of fading in which all frequency components of the received signal fluctuate in the same proportions simultaneously. |
|
Definition
|
|
Term
The dominant technology for third generation systems is ________. |
|
Definition
|
|
Term
A ________ is used to identify the user and register its location. |
|
Definition
|
|
Term
The ________ standard defines a set of services and physical layer options for wireless LANs. |
|
Definition
|
|
Term
A wireless LAN linked into a wired LAN on the same premises is referred to as a LAN ________. |
|
Definition
|
|
Term
Employees linking their computers into a temporary network in a conference room for a meeting would be an example of ________ networking. |
|
Definition
adhoc network (aka multi-hop, infrastructureless) |
|
|
Term
A typical coverage area for a wireless LAN has a diameter of ________. |
|
Definition
|
|
Term
A number of changes are made in 802.11n in the radio transmission scheme to increase capacity. The most significant of these techniques is ________. |
|
Definition
|
|
Term
"Recommended practice for the evaluation of 802.11 wireless performance" is the scope of the ________ standard. |
|
Definition
"IEEE (issuing organization) WLAN (standard name)" |
|
|
Term
A ________ is a system used to interconnect a set of basic service sets and integrated LANs to create an extended service set. |
|
Definition
|
|
Term
IEEE 802.11 defines three services that provide a wireless LAN with secure access and privacy services: authentication, privacy, and ________. |
|
Definition
encryption/ deauthentication |
|
|
Term
Three physical media are defined in the original 802.11 standard: DSSS, FHSS, and ________. |
|
Definition
|
|
Term
The ________ is a set of one or more interconnected BSSs and integrated LANs that appear as a single BSS to the LLC layer at any station associated with one of these BSSs. |
|
Definition
Extended Service Set (ESS) |
|
|
Term
________ is a set of protocols that provides a variety of security services for IEEE 802.11 wireless LANs. |
|
Definition
|
|
Term
________ detection is effective against masqueraders. |
|
Definition
|
|
Term
A security service that monitors and analyzes system events for the purpose of finding and providing real-time or near-real-time warning of attempts to access system resources in an unauthorized manner is a(n) ________. |
|
Definition
Intrusion detection system (ids) |
|
|
Term
Transport and tunnel mode are supported by ________. |
|
Definition
|
|
Term
A ________ is an association between a client and a server created by the Handshake Protocol that defines a set of cryptographic security parameters which can be shared among multiple connections. |
|
Definition
|
|
Term
The ________ function enforces the use of the authentication function, routes the messages properly, and facilitates key exchange. |
|
Definition
access control/has function |
|
|
Term
One of the most widely used security services is the ________. |
|
Definition
|
|
Term
The ________ component of IDS is responsible for determining if an intrusion has occurred. |
|
Definition
|
|
Term
________ detection involves an attempt to define a set of rules or attack patterns that can be used to decide that a given behavior is that of an intruder. |
|
Definition
|
|
Term
A ________ firewall applies a set of rules to each incoming and outgoing IP packet and then forwards or discards the packet. |
|
Definition
traditional packet filter |
|
|
Term
A ________ firewall reviews packet information and also records information about TCP connections. They can also inspect limited amounts of application data for protocols such as FTP, IM, and SIPS commands in order to identify and track related connections. |
|
Definition
|
|
Term
________ determines the types of Internet services that can be accessed, inbound or outbound, and may filter traffic on the basis of IP address, protocol, or port number. |
|
Definition
|
|