Shared Flashcard Set

Details

Network+ Ch 11 - 14
Network+ Guide to Networks - Ch 11 - 14
103
Computer Networking
Undergraduate 1
05/09/2012

Additional Computer Networking Flashcards

 


 

Cards

Term
____ is preferred over TCP for real-time applications such as telephone conversations and videoconferencing.
Definition
UDP
Term
When streaming videos are supplied via the Web, they are often called ____________________.
Definition
Webcasts
Term
____ signaling functions are more limited than those performed by the protocols in the H.323 group
Definition
SIP
Term
______________________________ is a simple technique that addresses QoS issues by prioritizing traffic.
Definition
DiffServ (Differentiated Service)
Differentiated Service (DiffServ)
Differentiated Service
DiffServ
Term
____ messaging is a service that makes several forms of communication available from a single user interface.
Definition
Unified
Term
A computer programmed to act like an IP telephone is known as a(n) ____.
Definition
softphone
Term
When a caller uses an IP telephone, his or her voice is immediately digitized and issued from the telephone to the network in ____ form.
Definition
packet
Term
____ describes the use of any network to carry voice signals using the TCP/IP protocol.
Definition
IP telephony
Term
Many network engineers consider ____ to be superior to MGCP.
Definition
MEGACO
Term
____________________ performs the same functions as MGCP, but using different commands and processes.
Definition
MEGACO
Term
____ is the use of one network to simultaneously carry voice, video, and data communications.
Definition
Convergence
Term
When more than two people participate in a videoconference, for example, in a point-to-multipoint or multipoint-to-multipoint scenario, a video ____ is required.
Definition
bridge
Term
Many VoIP vendors prefer ____________________ over H.323.
Definition
SIP
Term
IPTV, videoconferencing, streaming video, and IP multicasting belong to the range of services known as ____.
Definition
video over IP
Term
Using VoIP over a WAN allows an organization to avoid paying long-distance telephone charges, a benefit known as ____.
Definition
toll bypass
Term
Among all video-over-IP applications, ____ is perhaps the simplest.
Definition
streaming video
Term
When VoIP relies on the Internet, it is often called ____.
Definition
Internet telephony
Term
One drawback to ____ video is that content may not be edited before it’s distributed.
Definition
live streaming
Term
A(n) ____ is a computer that manages multiple media gateways.
Definition
MGC
Term
In general, a(n) ____ is a private switch that accepts and interprets both analog and digital voice signals.
Definition
IP-PBX
Term
Many streaming video services - and nearly all of those issued over a public network, such as the Internet - are examples of ____ transmissions.
Definition
unicast
Term
____ is a measure of how well a network service matches its expected performance.
Definition
QoS
Term
The popular Internet telephony software, Skype, is a type of ____.
Definition
softphone
Term
SIP and H.323 regulate ____ for VoIP or video-over-IP clients and servers.
Definition
call signaling and control
Term
When using an analog telephone, a VoIP adapter that performs analog-to-digital conversion is known as a(n) ____.
Definition
ATA (analog telephone adapter)
Term
______________________________ is a QoS technique that replaces the IP datagram header with a label at the first router a data stream encounters.
Definition
MPLS (multiprotocol label switching)
Multiprotocol label switching (MPLS)
Multiprotocol label switching
MPLS
Term
In a ____ attack, a person redirects or captures secure transmissions as they occur.
Definition
man-in-the-middle
Term
A ____ main function is to examine packets and determine where to direct them based on their Network layer addressing information.
Definition
router’s
Term
A ____ firewall is a router (or a computer installed with software that enables it to act as a router) that examines the header of every packet of data it receives to determine whether that type of packet is authorized to continue to its destination.
Definition
packet-filtering
Term
In ____, both computers verify the credentials of the other.
Definition
mutual authentication
Term
A(n) ____________________ is a software application on a network host that acts as an intermediary between the external and internal networks, screening all incoming and outgoing traffic.
Definition
proxy service
Term
____ is a method of encrypting TCP/IP transmissions.
Definition
SSL
Term
In ____ , a hacker forges name server records to falsify his host’s identity.
Definition
DNS spoofing
Term
A(n) ____ is a password-protected and encrypted file that holds an individual’s identification information, including a public key.
Definition
digital certificate
Term
A VPN ____ authenticates VPN clients and establishes tunnels for VPN connections.
Definition
concentrator
Term
A ____ attack occurs when a system becomes unable to function because it has been deluged with data transmissions or otherwise disrupted.
Definition
denial-of-service
Term
____ software searches a node for open ports.
Definition
Port scanner
Term
An NOS that contains a “back door”is an example of a risk associated with ____.
Definition
protocols and software
Term
A ____ attack occurs when a hacker tries numerous possible character combinations to find the key that will decrypt encrypted data.
Definition
brute force
Term
A ____ attack occurs when a hacker uses programs that try a combination of a user ID and every word in a dictionary to gain access to the network.
Definition
dictionary
Term
____ is a public key encryption system that can verify the authenticity of an e-mail sender and encrypt e-mail data in transmission.
Definition
PGP
Term
A router that is not configured to drop packets that match certain suspicious characteristics is an example of a risk associated with ____.
Definition
transmission and hardware
Term
The use of certificate authorities to associate public keys with certain users is known as ____.
Definition
PKI
Term
A(n) ____________________ identifies an organization’s security risks, levels of authority, designated security coordinator and team members, responsibilities for each team member, and responsibilities for each employee.
Definition
security policy
Term
____ protocols are the rules that computers follow to accomplish authentication.
Definition
Authentication
Term
The combination of a public key and a private key is known as a ____.
Definition
key pair
Term
____ is a social engineering practice in which a person attempts to glean access or authentication information by posing as someone who needs that information.
Definition
Phishing
Term
A(n) ____________________ is a thorough examination of each aspect of the network to determine how it might be compromised.
Definition
security audit
Term
n general, information is ____________________ if it could be used by other parties to impair an organization’s functioning, decrease customers’ confidence, cause a financial loss, damage an organization’s status, or give a significant advantage to a competitor.
Definition
confidential
Term
RADIUS and TACACS belong to a category of protocols known as AAA (____).
Definition
authentication, authorization, and accounting
Term
A ____ attack occurs when an Internet chat user sends commands to a victim’s machine that cause the screen to fill with garbage characters and requires the victim to terminate their chat sessions.
Definition
flashing
Term
____________________ is the use of an algorithm to scramble data into a format that can be read only by reversing the algorithm.
Definition
Encryption
Term
When used on a copper-based cable, a continuity tester applies a small amount of ____ to each conductor at one end of the cable.
Definition
voltage
Term
A ____ is a software-based tool that continually monitors network traffic from a server or workstation attached to the network.
Definition
network monitor
Term
A____ is a small electronic device that issues a signal on a wire pair.
Definition
tone generator
Term
A sophisticated ____________________ will include a TDR (time domain reflectometer) that issues a signal on a cable and then measures the way the signal bounces back (or reflects) to the TDR.
Definition
cable performance tester
performance tester
Term
____ is the telltale factor for ascertaining where faults in a cable lie.
Definition
Impedance
Term
A ____ can generate traffic in an attempt to reproduce a network problem and monitor multiple network segments simultaneously.
Definition
protocol analyzer
Term
Resistance is measured in ____.
Definition
ohms
Term
Before using a network monitor or protocol analyzer on a network, it is important to know what ____ on your network normally looks like
Definition
traffic
Term
____ are often considered first-level support.
Definition
Help desk analysts
Term
A ____ is a document (preferably online) that lists every service and software package supported within an organization, plus the names of first- and second-level support contacts for those services or software packages.
Definition
supported services list
Term
____ are often considered third-level support.
Definition
Help desk coordinators
Term
Network engineers today might call any protocol analyzer tool a sniffer or ____________________.
Definition
packet sniffer
Term
To take advantage of network monitoring and analyzing tools, the network adapter installed in the machine running the software must support ____ mode.
Definition
promiscuous
Term
Viewing the status of the wireless connection on your workstation tells you ____ about your wireless environment.
Definition
a little
Term
____ is a fundamental property of wire that depends on a wire’s molecular structure and size.
Definition
Resistance
Term
In a ____ cable, the transmit and receive wire pairs in one of the connectors are reversed.
Definition
crossover
Term
The danger in using a ____ is that it could collect more information than you or the machine can reasonably process.
Definition
protocol analyzer
Term
For documenting problems, some organizations use a software program known as a(n) ____________________ (also informally known as help desk software).
Definition
call tracking system
Term
____ packets exceed the medium’s maximum packet size.
Definition
Giant
Term
____ are frames that are not actually data frames, but aberrations caused by a device misinterpreting stray voltage on the wire.
Definition
Ghosts
Term
An administrator should take the time to troubleshoot all network problems correctly by asking specific questions designed to identify the problem ____.
Definition
scope
Term
A ____ usually results from a bad NIC.
Definition
jabber
Term
A ____ can be used to intercept a telephone conversation.
Definition
butt set
Term
Rather than issue an electrical signal over the cable as twisted pair cable testers do, a(n) ________________________________________ transmits light-based signals of different wavelengths over the fiber.
Definition
OTDR (optical time domain reflectometer)
optical time domain reflectometer (OTDR)
optical time domain reflectometer
OTDR
Term
____ is one of the most important aspects to consider when looking at how a problem solution might affect users and network functionality.
Definition
Scope
Term
____ detects malware by comparing current characteristics of files and disks against an archived version of these characteristics to discover any changes.
Definition
Integrity checking
Term
A(n) ____ virus changes its characteristics every time it is transferred to a new system.
Definition
polymorphic
Term
____________________________________________________________ refers to a collection of disks that provide fault tolerance for shared data and applications.
Definition
RAID (Redundant Array of Independent [or Inexpensive] Disks)
Redundant Array of Independent [or Inexpensive] Disks (RAID)
Redundant Array of Independent [or Inexpensive] Disks
RAID
Term
____ is a type of media capable of storing digitized data and that uses a laser to write data to it and read data from it.
Definition
Optical media
Term
____ are programs that run independently and travel between computers and across networks.
Definition
Worms
Term
____ is an automatic distribution of traffic over multiple links or processors to optimize response.
Definition
Load balancing
Term
A(n) ___________________________________ is a battery-operated power source directly attached to one or more devices and to a power supply (such as a wall outlet) that prevents undesired features of the wall outlet’s A/C power from harming the device or interrupting its services.
Definition
UPS
Correct Answer: UPS (uninterruptible power supply)
Uninterruptible power supply (UPS)
Uninterruptible power supply
UPS
Term
____ scanning detects malware by comparing a file’s content with known malware signatures in a signature database.
Definition
Signature
Term
A(n) ____ virus disguises itself as a legitimate program to prevent detection.
Definition
stealth
Term
In ____, parity error checking occurs when data is written across the disk array.
Definition
RAID Level 3
Term
A ____ is a program that runs automatically, without requiring a person to start or stop it.
Definition
bot
Term
____ provides redundancy through a process called disk mirroring.
Definition
RAID Level 1
Term
An archive ____ is a file attribute that can be checked or unchecked to indicate whether the file must be archived.
Definition
bit
Term
____ are distinct networks of storage devices that communicate directly with each other and with other networks.
Definition
SANs
Term
Power that is free from noise is called “____” power.
Definition
clean
Term
A program that disguises itself as something useful but actually harms your system is called a ____.
Definition
Trojan horse
Term
A(n) ____________________ is a copy of data or program files created for archiving or safekeeping.
Definition
backup
Term
____ offers the best performance.
Definition
RAID Level 0
Term
A(n) ____ is a deviation from a specified level of system performance for a given period of time.
Definition
failure
Term
Many bots spread through the _________________________, a protocol that enables users running IRC client software to communicate instantly with other participants in a chat room on the Internet.
Definition
IRC (Internet Relay Chat)
Internet Relay Chat (IRC)
Internet Relay Chat
IRC
Term
A(n) ____ UPS uses the A/C power from the wall outlet to continuously charge its battery, while providing power to a network device through its battery.
Definition
online
Term
Mesh topologies and ____ topologies are good choices for highly available enterprise networks.
Definition
SONET rings
Term
____ is a specialized storage device or group of storage devices that provides centralized fault-tolerant data storage for a network.
Definition
NAS
Term
____ is intended to eliminate single points of failure.
Definition
Redundancy
Term
____ scanning techniques attempt to identify malware by discovering “malware-like” behavior.
Definition
Heuristic
Term
____________________ is the process of restoring your critical functionality and data after an enterprise-wide outage that affects more than a single system or a limited group of users.
Definition
Disaster recovery
Supporting users have an ad free experience!