Term
|
Definition
what commonly used version relies on tcp and operates over port 110? |
|
|
Term
|
Definition
voice video and data communication is ? |
|
|
Term
|
Definition
VoIP relies on the internet is called? |
|
|
Term
|
Definition
what my contain back doors security flaws that allow unauthorized user to gain access to the systems ? |
|
|
Term
|
Definition
what send commands the cause the screen to fill with garbage characters? |
|
|
Term
|
Definition
a password protected and encrypted file hold individual info including a public key ? |
|
|
Term
AAA (authnetication autherization and accounts ) |
|
Definition
RADIUS and TACACS are categories |
|
|
Term
|
Definition
the telltale factor for a ascertaining where flaws in a cable lie |
|
|
Term
|
Definition
software based tool,monitors network traffic sever or workstation is ? |
|
|
Term
|
Definition
what generates traffic in an attempt to reproduce a network problem and monitor multiple network segments simulations |
|
|
Term
info applies on to one workstation |
|
Definition
viewing the status of the wireless connections tells a lil about wireless environment cause what ? |
|
|
Term
|
Definition
wht type of virus legitimate programs to replace apart of legitimate program'codes |
|
|
Term
|
Definition
what makes it harder to identify every time they are transferred to a new system? |
|
|
Term
|
Definition
what uses a/c from the wall and provides power to a network device through its battery |
|
|
Term
|
Definition
What allows load balancing or an automatic distribution of traffic over processors to optimize response? |
|
|
Term
|
Definition
|
|
Term
|
Definition
what specialized storage device or groups of storage devices for a network |
|
|
Term
tracking,hardware, and software |
|
Definition
what other key component in managing networks are ? |
|
|
Term
|
Definition
what is correction,improvement, or enhancements to a particular of a software applications |
|
|
Term
|
Definition
what r major change to a software packages exciting code |
|
|
Term
|
Definition
wht tcp/ ip devices interpret inbound and outbound request with other sub nets |
|
|
Term
|
Definition
what range of numbers r available in a ipv4 |
|
|
Term
|
Definition
what to number r reserved on a ipv4 |
|
|
Term
|
Definition
what is a popular telephony software and is one type of soft phone |
|
|
Term
|
Definition
wht is when a person gleans access or authentications info by posing as some who needs that info |
|
|