Shared Flashcard Set

Details

Networking Final Exam Garfield
Networking final
99
Computer Networking
Undergraduate 4
12/01/2012

Additional Computer Networking Flashcards

 


 

Cards

Term
Phishing
Definition
Social engineering practice in which a person attempts to glean or authentication information by posing as someone who needs that information
Term
Man in the middle
Definition
In an attack a person redirects or captures secure transmissions as they occur
Term
Port Scanner
Definition
Software searches a node for open ports
Term
Transmission and Hardware
Definition
A router that is not configured to drop packets that match certain or suspicious characteristics is an example of a risk associated with_____
Term
Protocols and Software
Definition
A NOS that contains a back door is an example of a risk associated with____
Term
Flashing
Definition
An attack occurs when an internet chat user sends commands to a victims machine that causes the screen to fill with garbage characters and requires the victim to terminate their chat sessions.
Term
Denial of Service
Definition
An attack occurs when a system becomes unable to function becasue it has inundated with requests for services and cannot respond to any of them.
Term
Routers
Definition
A ____main function is to examine packets and determine where to direct them based on their network layer addressing information.
Term
Packet Filtering
Definition
A___firewall is a router (or computer installed with software that enables it to act as a router) that examines the header of every packet of data it receives to determine whether that type of packet is authorized to continue to its destination.
Term
Dictionary
Definition
An attack occurs when a hacker uses programs that try a combination of a user ID and every word in a dictionary to gain access to the network.
Term
Key Pair
Definition
The combination of a public key and a private key is known as a ____
Term
Digital certificate
Definition
An ____is a password protected and encrypted file that holds an individual identification information, including a public key.
Term
PKI
Definition
The use of certificate authorities to associate public keys with certain users in known as __
Term
PGP
Definition
Public key encryption system that can verify the authenticity of an email sender and encrypt email data in transmission.
Term
SSI
Definition
Method of encrypting TCP/IP transmissions above the network layer.
Term
DNS Spoofing
Definition
In ___a hacker forges name server records to falsify his host's identity.
Term
Concentrator
Definition
A VPN authenticates VPN clients and establishes tunnels for VPN connections.
Term
Authentication
Definition
__Protocols are the rules that computers follow to accomplish authentication.
Term
Mutual Authentication
Definition
In___both computers verify the credentials of the other.
Term
Convergence
Definition
The use of one network to simultaneously carry voice, video, and data communications.
Term
IP Telphony
Definition
Describes the use of any network to carry voice signals using the TCP/IP protocol.
Term
Internet Topology
Definition
When VoIP relies on the internet
Term
Video over IP
Definition
IPTV, videoconferencing, streaming video, and IP multicasting belong to the range of services
Term
Unified
Definition
Messaging is a service that makes several forms of communications available from a single user interface.
Term
Toll by Pass
Definition
Using VoIP over a WAN allows an organization to avoid paying long distance telephone charges.
Term
ATA analog
Definition
When using an analog telephone a VoIP adapter that performs analog-to-digital conversion is known as ____
Term
IP PBX
Definition
In general a ___is a private switch that accepts and interprets both analog and digital voice signals.
Term
Packet
Definition
When a caller uses an IP telephone, his or her voice is immediately digitized and issued from the telephone to the network in ___form.
Term
Softphone
Definition
A computer programmed to act like an IP telephone
Term
Softphone Skype
Definition
The popular internet telephony software
Term
Streaming Video
Definition
Among all video over IP applications this is the most simplest
Term
Live Streaming
Definition
One drawback to __video is that content may not be edited before it's distributed.
Term
Unicast
Definition
Many streaming video services-and nearly all of those issued over a public network such as the internet are examples of ____transmissions
Term
Bridge
Definition
When more than two people participate in a video conference, for example in a point -to multipoint or multipoint to multipoint scenario, a video ___is required.
Term
SIP
Definition
Signaling function are more limited than those performed by the protocols in the H.323 group.
Term
Call Signaling Control
Definition
SIP and H.323 regulate___for VoIP or video over IP clients and servers
Term
MGC
Definition
A __is a computer that manages multiple media gateways
Term
MEGACO
Definition
Many network engineers consider__to be superior to MGCP
Term
UDP
Definition
is preferred over TCP for real-time applications such as telephone conversations and videoconferencing
Term
Quality of Service
Definition
is a measure of how well a network service matches its expected performance.
Term
Scope
Definition
An administrator should take the time to troubleshoot all network problems correctly by asking specific questions designed to identify the problem____
Term
Help desk analyst
Definition
Are often considered first level support
Term
Administrators
Definition
are often considered third level support
Term
Scope
Definition
is one of the most important aspects to consider when looking at how a problem solution might affect users and network functionality
Term
Change Management
Definition
A __system is a process or program that provides support personnel with a centralized means of documenting changes to the network.
Term
Tone Generator
Definition
A ___is a small electronic device that issues a signal on a wire pair
Term
RESISTANCE
Definition
is a fundamental property of wire that depends molecular structure and size.
Term
Ohms
Definition
Resistance is measured in Ohms
Term
Impedance
Definition
is the tell tale factor for ascertaining where faults in a cable lie.
Term
Voltage
Definition
When used on a copper based cable a continuity tester applies a small amount of ___to each conductor at one end of the cable.
Term
Butt Set
Definition
A ___can be used to intercept a telephone conversation
Term
Network Monitor
Definition
A ___is a software based tool that continually monitors network traffic from a server or workstation attached to the network.
Term
Promiscuous
Definition
To take advantage of network monitoring and analyzing tools, the network adapter installed in the machine running the software must support ___mode.
Term
Giant
Definition
Packets exceed the mediums maximum packet size
Term
Ghost
Definition
Frames that are not actually data frames, but aberrations caused by a device misinterpreting stray voltage on the wire.
Term
Jabber
Definition
Usually results from a bad NIC
Term
Protocol Analyzer
Definition
Can generate traffic in an attempt to reproduce a network problem and monitor multiple network segments simultaneously.
Term
Protocol Analyzer/Type of tool
Definition
The danger in using a ___is that it could collect more information than you or the machine can reasonably process.
Term
Traffic
Definition
Before using a network monitor or protocol analyzer on a network, it is important to know ___on your network normally looks like.
Term
Spectrum Analyzer
Definition
A __tool that can assess the quality of the wireless signal
Term
Redundancy
Definition
intended to eliminate single points of failure
Term
Trojan Horse
Definition
A program that disguises itself as something useful but actually harms your system
Term
Worms
Definition
Programs that run independently and travel between computers and across networks.
Term
BOT
Definition
A program that runs automatically without requiring a person to start or stop it.
Term
Stealth
Definition
A virus disguises itself as a legitimate program to detect detection
Term
Ploymorphic
Definition
A virus changes its characteristics every time it is transferred to a new system
Term
Signature
Definition
Scanning detects malware by comparing a file content with known malware signatures in a signature database.
Term
Integrity Check
Definition
Scanning techniques attempt to identify malware by discovering malware like behavior
Term
Failure
Definition
Deviation from a specific level of system for a given period of time.
Term
Clean
Definition
Power that is free from noise
Term
Online
Definition
An __UPS uses the A/C power from the wall outlet to continuously charge its battery while providing power to a network device through its battery
Term
Sonet Rings
Definition
Mesh topologies and ___topologies are good choices for highly available enterprise networks
Term
Load Balancing
Definition
Automatic distribution of traffic over multiple links or processors is used to optimize response.
Term
Clustering
Definition
Fault tolerance technique that links multiple servers together to act as a single server.
Term
Mirrored
Definition
Web sites are locations on the internet that dynamically duplicate other locations on the internet to ensure their continual availability
Term
Disk Array
Definition
A group of hard disks
Term
Network Area Storage
Definition
Specialized storage device or group of storage devices that provides centralized fault tolerance data storage for a network
Term
Storage Area Network
Definition
Distinct networks of storage devices that communicate directly with each other and with other networks.
Term
Optical Media
Definition
Type of media capable of storing digitized data and that uses a laser to write data to it and read data from it.
Term
Bit
Definition
An archive__is a file attribute that can be checked or to indicate whether the file must be archived.
Term
Network Management
Definition
Collection storage, and assessment of information related to the versions of software installed on every network device and every device's hardware configuration.
Term
Wiring Schematic
Definition
A graphical representation of a network's wired infrastructure
Term
Performance
Definition
Management refers to monitoring how well links and devices are keeping up with the demands placed on them.
Term
Fault
Definition
Management refers to the detection and signaling of device , link, or component faults.
Term
Polling
Definition
The process where one network management console collects data from multiple networked devices at regular intervals
Term
Software routine
Definition
A network management agent is a ___that collects information about a device's operation and provides it to the network management application
Term
Traffic Shaping
Definition
Involves manipulating certain characteristics of packets , data streams, or connections to manage the type and amount of traffic traversing a network or interface at any moment.
Term
Caching
Definition
Local storage of frequently needed files that would otherwise be obtained from an external source.
Term
Web
Definition
The most common type of caching
Term
Cache Engine
Definition
A network device devoted to storage and delivery of frequently requested files.
Term
Asset
Definition
A key component in managing networks is identifying and tracking its hardware and software through___management
Term
Patch
Definition
Correction , improvement, or enhancement to a software application
Term
Upgrade
Definition
Major change to a software package existing code
Term
Software Upgrade
Definition
Typically overwrite some system files on the workstation so their installation may affect other applications adversely
Term
NOS
Definition
The most critical type of software upgrade you will perform
Term
Backleveling
Definition
The process of reverting to a previous version of software after attempting to upgrade
Term
Safety
Definition
keep in mind__when you upgrade or install on a network
Term
Backbone
Definition
The most important comprehensive and complex upgrade involving network hardware
Term
Justify
Definition
Because backbone upgrades are expensive and time consuming the first step in approaching such a project
Supporting users have an ad free experience!