Term
|
Definition
Social engineering practice in which a person attempts to glean or authentication information by posing as someone who needs that information |
|
|
Term
|
Definition
In an attack a person redirects or captures secure transmissions as they occur |
|
|
Term
|
Definition
Software searches a node for open ports |
|
|
Term
Transmission and Hardware |
|
Definition
A router that is not configured to drop packets that match certain or suspicious characteristics is an example of a risk associated with_____ |
|
|
Term
|
Definition
A NOS that contains a back door is an example of a risk associated with____ |
|
|
Term
|
Definition
An attack occurs when an internet chat user sends commands to a victims machine that causes the screen to fill with garbage characters and requires the victim to terminate their chat sessions. |
|
|
Term
|
Definition
An attack occurs when a system becomes unable to function becasue it has inundated with requests for services and cannot respond to any of them. |
|
|
Term
|
Definition
A ____main function is to examine packets and determine where to direct them based on their network layer addressing information. |
|
|
Term
|
Definition
A___firewall is a router (or computer installed with software that enables it to act as a router) that examines the header of every packet of data it receives to determine whether that type of packet is authorized to continue to its destination. |
|
|
Term
|
Definition
An attack occurs when a hacker uses programs that try a combination of a user ID and every word in a dictionary to gain access to the network. |
|
|
Term
|
Definition
The combination of a public key and a private key is known as a ____ |
|
|
Term
|
Definition
An ____is a password protected and encrypted file that holds an individual identification information, including a public key. |
|
|
Term
|
Definition
The use of certificate authorities to associate public keys with certain users in known as __ |
|
|
Term
|
Definition
Public key encryption system that can verify the authenticity of an email sender and encrypt email data in transmission. |
|
|
Term
|
Definition
Method of encrypting TCP/IP transmissions above the network layer. |
|
|
Term
|
Definition
In ___a hacker forges name server records to falsify his host's identity. |
|
|
Term
|
Definition
A VPN authenticates VPN clients and establishes tunnels for VPN connections. |
|
|
Term
|
Definition
__Protocols are the rules that computers follow to accomplish authentication. |
|
|
Term
|
Definition
In___both computers verify the credentials of the other. |
|
|
Term
|
Definition
The use of one network to simultaneously carry voice, video, and data communications. |
|
|
Term
|
Definition
Describes the use of any network to carry voice signals using the TCP/IP protocol. |
|
|
Term
|
Definition
When VoIP relies on the internet |
|
|
Term
|
Definition
IPTV, videoconferencing, streaming video, and IP multicasting belong to the range of services |
|
|
Term
|
Definition
Messaging is a service that makes several forms of communications available from a single user interface. |
|
|
Term
|
Definition
Using VoIP over a WAN allows an organization to avoid paying long distance telephone charges. |
|
|
Term
|
Definition
When using an analog telephone a VoIP adapter that performs analog-to-digital conversion is known as ____ |
|
|
Term
|
Definition
In general a ___is a private switch that accepts and interprets both analog and digital voice signals. |
|
|
Term
|
Definition
When a caller uses an IP telephone, his or her voice is immediately digitized and issued from the telephone to the network in ___form. |
|
|
Term
|
Definition
A computer programmed to act like an IP telephone |
|
|
Term
|
Definition
The popular internet telephony software |
|
|
Term
|
Definition
Among all video over IP applications this is the most simplest |
|
|
Term
|
Definition
One drawback to __video is that content may not be edited before it's distributed. |
|
|
Term
|
Definition
Many streaming video services-and nearly all of those issued over a public network such as the internet are examples of ____transmissions |
|
|
Term
|
Definition
When more than two people participate in a video conference, for example in a point -to multipoint or multipoint to multipoint scenario, a video ___is required. |
|
|
Term
|
Definition
Signaling function are more limited than those performed by the protocols in the H.323 group. |
|
|
Term
|
Definition
SIP and H.323 regulate___for VoIP or video over IP clients and servers |
|
|
Term
|
Definition
A __is a computer that manages multiple media gateways |
|
|
Term
|
Definition
Many network engineers consider__to be superior to MGCP |
|
|
Term
|
Definition
is preferred over TCP for real-time applications such as telephone conversations and videoconferencing |
|
|
Term
|
Definition
is a measure of how well a network service matches its expected performance. |
|
|
Term
|
Definition
An administrator should take the time to troubleshoot all network problems correctly by asking specific questions designed to identify the problem____ |
|
|
Term
|
Definition
Are often considered first level support |
|
|
Term
|
Definition
are often considered third level support |
|
|
Term
|
Definition
is one of the most important aspects to consider when looking at how a problem solution might affect users and network functionality |
|
|
Term
|
Definition
A __system is a process or program that provides support personnel with a centralized means of documenting changes to the network. |
|
|
Term
|
Definition
A ___is a small electronic device that issues a signal on a wire pair |
|
|
Term
|
Definition
is a fundamental property of wire that depends molecular structure and size. |
|
|
Term
|
Definition
Resistance is measured in Ohms |
|
|
Term
|
Definition
is the tell tale factor for ascertaining where faults in a cable lie. |
|
|
Term
|
Definition
When used on a copper based cable a continuity tester applies a small amount of ___to each conductor at one end of the cable. |
|
|
Term
|
Definition
A ___can be used to intercept a telephone conversation |
|
|
Term
|
Definition
A ___is a software based tool that continually monitors network traffic from a server or workstation attached to the network. |
|
|
Term
|
Definition
To take advantage of network monitoring and analyzing tools, the network adapter installed in the machine running the software must support ___mode. |
|
|
Term
|
Definition
Packets exceed the mediums maximum packet size |
|
|
Term
|
Definition
Frames that are not actually data frames, but aberrations caused by a device misinterpreting stray voltage on the wire. |
|
|
Term
|
Definition
Usually results from a bad NIC |
|
|
Term
|
Definition
Can generate traffic in an attempt to reproduce a network problem and monitor multiple network segments simultaneously. |
|
|
Term
Protocol Analyzer/Type of tool |
|
Definition
The danger in using a ___is that it could collect more information than you or the machine can reasonably process. |
|
|
Term
|
Definition
Before using a network monitor or protocol analyzer on a network, it is important to know ___on your network normally looks like. |
|
|
Term
|
Definition
A __tool that can assess the quality of the wireless signal |
|
|
Term
|
Definition
intended to eliminate single points of failure |
|
|
Term
|
Definition
A program that disguises itself as something useful but actually harms your system |
|
|
Term
|
Definition
Programs that run independently and travel between computers and across networks. |
|
|
Term
|
Definition
A program that runs automatically without requiring a person to start or stop it. |
|
|
Term
|
Definition
A virus disguises itself as a legitimate program to detect detection |
|
|
Term
|
Definition
A virus changes its characteristics every time it is transferred to a new system |
|
|
Term
|
Definition
Scanning detects malware by comparing a file content with known malware signatures in a signature database. |
|
|
Term
|
Definition
Scanning techniques attempt to identify malware by discovering malware like behavior |
|
|
Term
|
Definition
Deviation from a specific level of system for a given period of time. |
|
|
Term
|
Definition
Power that is free from noise |
|
|
Term
|
Definition
An __UPS uses the A/C power from the wall outlet to continuously charge its battery while providing power to a network device through its battery |
|
|
Term
|
Definition
Mesh topologies and ___topologies are good choices for highly available enterprise networks |
|
|
Term
|
Definition
Automatic distribution of traffic over multiple links or processors is used to optimize response. |
|
|
Term
|
Definition
Fault tolerance technique that links multiple servers together to act as a single server. |
|
|
Term
|
Definition
Web sites are locations on the internet that dynamically duplicate other locations on the internet to ensure their continual availability |
|
|
Term
|
Definition
|
|
Term
|
Definition
Specialized storage device or group of storage devices that provides centralized fault tolerance data storage for a network |
|
|
Term
|
Definition
Distinct networks of storage devices that communicate directly with each other and with other networks. |
|
|
Term
|
Definition
Type of media capable of storing digitized data and that uses a laser to write data to it and read data from it. |
|
|
Term
|
Definition
An archive__is a file attribute that can be checked or to indicate whether the file must be archived. |
|
|
Term
|
Definition
Collection storage, and assessment of information related to the versions of software installed on every network device and every device's hardware configuration. |
|
|
Term
|
Definition
A graphical representation of a network's wired infrastructure |
|
|
Term
|
Definition
Management refers to monitoring how well links and devices are keeping up with the demands placed on them. |
|
|
Term
|
Definition
Management refers to the detection and signaling of device , link, or component faults. |
|
|
Term
|
Definition
The process where one network management console collects data from multiple networked devices at regular intervals |
|
|
Term
|
Definition
A network management agent is a ___that collects information about a device's operation and provides it to the network management application |
|
|
Term
|
Definition
Involves manipulating certain characteristics of packets , data streams, or connections to manage the type and amount of traffic traversing a network or interface at any moment. |
|
|
Term
|
Definition
Local storage of frequently needed files that would otherwise be obtained from an external source. |
|
|
Term
|
Definition
The most common type of caching |
|
|
Term
|
Definition
A network device devoted to storage and delivery of frequently requested files. |
|
|
Term
|
Definition
A key component in managing networks is identifying and tracking its hardware and software through___management |
|
|
Term
|
Definition
Correction , improvement, or enhancement to a software application |
|
|
Term
|
Definition
Major change to a software package existing code |
|
|
Term
|
Definition
Typically overwrite some system files on the workstation so their installation may affect other applications adversely |
|
|
Term
|
Definition
The most critical type of software upgrade you will perform |
|
|
Term
|
Definition
The process of reverting to a previous version of software after attempting to upgrade |
|
|
Term
|
Definition
keep in mind__when you upgrade or install on a network |
|
|
Term
|
Definition
The most important comprehensive and complex upgrade involving network hardware |
|
|
Term
|
Definition
Because backbone upgrades are expensive and time consuming the first step in approaching such a project |
|
|