Term
| The function of the _____ protocol is to allow NetBIOS services to be used over TCP/IP networks. |
|
Definition
|
|
Term
| The _____ protocol is used for automated discovery of networked services on LANs. |
|
Definition
|
|
Term
|
Definition
| Service Location Protocol |
|
|
Term
| RIP is a file sharing protocol. |
|
Definition
|
|
Term
| NNTP is a file sharing protocol. |
|
Definition
|
|
Term
| AFP is a file sharing protocol. |
|
Definition
|
|
Term
| SNMP is a file sharing protocol. |
|
Definition
|
|
Term
| A network protocol providing an alternative solution to the manual assignment of IP addresses is called _____ |
|
Definition
|
|
Term
| What does DHCP stand for? |
|
Definition
| Dynamic Host Configuration Protocol |
|
|
Term
| What does LDAP stand for? |
|
Definition
| Lightweight Directory Access Protocol |
|
|
Term
| A protocol used in network management systems for monitoring network-attached devices is known as _____. |
|
Definition
|
|
Term
| What does SNMP stand for? |
|
Definition
| Simple Network Management Protocol |
|
|
Term
| SMB and CIFS are examples of network protocols used for providing _____. |
|
Definition
| shared access to files, directories, and devices |
|
|
Term
|
Definition
|
|
Term
| What does CIFS stand for? |
|
Definition
| Common Internet File System |
|
|
Term
| FTP is an example of a secure network protocol offering traffic encryption. |
|
Definition
|
|
Term
| HTTPS is an example of a secure network protocol offering traffic encryption. |
|
Definition
|
|
Term
| Telnet is an example of a secure network protocol offering traffic encryption. |
|
Definition
|
|
Term
| HTTP is an example of a secure network protocol offering traffic encryption. |
|
Definition
|
|
Term
| IPsec is an example of a secure network protocol offering traffic encryption. |
|
Definition
|
|
Term
| SSH is an example of a secure network protocol offering traffic encryption. |
|
Definition
|
|
Term
| SSH is a _____ network protocol. |
|
Definition
|
|
Term
| _____ was designed as a secure replacement for Telnet. |
|
Definition
|
|
Term
|
Definition
| Transmission Control Protocol |
|
|
Term
| TCP is a _____ protocol that requires a set of initial steps in order to establish connection (three-way handshake). |
|
Definition
|
|
Term
| UDP is an example of a _____ protocol, and doesn't support three-way handshake |
|
Definition
|
|
Term
| TCP is referred to as unreliable or best-effort protocol. |
|
Definition
|
|
Term
| UDP is referred to as unreliable or best-effort protocol. |
|
Definition
|
|
Term
| TCP supports retransmission of lost packets, flow control (managing the amount of data that is being sent), and sequencing (rearranging packets that arrived out of order). |
|
Definition
|
|
Term
| UDP supports retransmission of lost packets, flow control (managing the amount of data that is being sent), and sequencing (rearranging packets that arrived out of order). |
|
Definition
|
|
Term
| IEEE 802.11a has a maximum data signaling rate of _____. |
|
Definition
|
|
Term
| IEEE 802.11a has a _____ frequency band. |
|
Definition
|
|
Term
| What does CSMA stand for? |
|
Definition
| Carrier Sense Multiple Access |
|
|
Term
| IEEE 802.11b has a _____ frequency band. |
|
Definition
|
|
Term
| IEEE 802.11b has a maximum data signaling rate of _____. |
|
Definition
|
|
Term
| IEEE 802.11g has a maximum data signaling rate of _____. |
|
Definition
|
|
Term
| IEEE 802.11g has a _____ frequency band. |
|
Definition
|
|
Term
| IEEE 802.11n has a _____ frequency band. |
|
Definition
|
|
Term
| IEEE 802.11n has a maximum data signaling rate of _____. |
|
Definition
|
|
Term
| IEEE 802.11ac has a _____ frequency band. |
|
Definition
|
|
Term
| IEEE 802.11ac has a maximum data signaling rate of _____. |
|
Definition
|
|
Term
| IEEE _____ wireless standard uses MIMO. |
|
Definition
|
|
Term
| _____ wireless standard uses MU-MIMO. |
|
Definition
|
|
Term
| What does MIMO stand for? |
|
Definition
| Multiple Input / Multiple Output |
|
|
Term
| What does MU-MIMO stand for? |
|
Definition
|
|
Term
| IEEE 802.11a, -b, -g, -n, and -ac all use CSMA/_____. |
|
Definition
|
|
Term
| _____ is a wireless security standard that has been deprecated in favor of newer standards due to known vulnerabilities resulting from implementation flaws. |
|
Definition
|
|
Term
| _____ is the wireless security standard that offers the highest level of protection. |
|
Definition
|
|
Term
| A security protocol introduced in order to strengthen existing WEP implementations without requiring the replacement of legacy hardware is known as _____. |
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
| What does TKIP stand for? |
|
Definition
| Temporal Key Integrity Protocol |
|
|
Term
| _____ features AES-based encryption mode. |
|
Definition
|
|
Term
|
Definition
| Advanced Encryption Standard |
|
|
Term
| A portion of the available RF band allocated for wireless communication is known as (a) _____. |
|
Definition
|
|
Term
| A situation in which multiple channels share the frequency band causing interference and performance degradation for devices operating on channels that are too close to each other is known as _____. |
|
Definition
|
|
Term
| Setting up a wireless network to operate on a non-overlapping channel allows multiple networks to coexist in the same area without causing interference. |
|
Definition
|
|
Term
| _____ must be enabled to allow requests to a server with a private IP address from an outside network |
|
Definition
|
|
Term
|
Definition
|
|
Term
| What does NNTP stand for? |
|
Definition
| Network News Transfer Protocol |
|
|
Term
|
Definition
| Routing Information Protocol |
|
|
Term
| LDAP is an example of a _____. |
|
Definition
| directory access protocol |
|
|