Term
| Throughput, the actual speed of data transfer that is achieved in a network, is usually |
|
Definition
| less than (or equal to) the data transfer rate |
|
|
Term
| The ________ is the maximum speed at which data can be transmitted between two nodes on a network. |
|
Definition
| data transfer rate (or bandwidth) |
|
|
Term
| A(n) ________ keeps track of data packets and, in conjunction with network interface cards, helps the data packets find their destination without running into each other on an Ethernet network. |
|
Definition
|
|
Term
| The "s" in https stands for ________. |
|
Definition
|
|
Term
| In the URL http://www.prenhall.com, the portion labeled .com is the ________. |
|
Definition
|
|
Term
| The application layer of the TCP/IP protocol architecture ________. |
|
Definition
| contains all protocols and methods that fall into the realm of process to process communications across a TP network |
|
|
Term
| The ________ layer of the TCP/IP protocol architecture is said to provide reliable internet transport. |
|
Definition
|
|
Term
| A ________ is a special-purpose computer that moves packet traffic according to the rules of the IP protocol. |
|
Definition
|
|
Term
| Private IP addresses ________. |
|
Definition
| Identify a particular device on a private network usually on a LAN. Their assignment is controlled with the LAN. Example: coffee shop gives you a private IP address on the LAN device. |
|
|
Term
| Which OSI layer combines messages or segments into packets? |
|
Definition
|
|
Term
| A key parameter that characterizes any electromagnetic signal is ________, which is the width of the range of frequencies that comprises the signal. |
|
Definition
|
|
Term
| The ________ time is the time it takes for a bit to traverse the link between source and destination. |
|
Definition
|
|
Term
| The time it takes for a station to emit all of the bits of a frame onto the medium is the ________ time. |
|
Definition
|
|
Term
| Dynamic use of bandwidth is utilized with ________. |
|
Definition
| virtual circuit packet switching |
|
|
Term
| In the ________ approach in packet switching each packet is treated independently with no reference to packets that have gone before. |
|
Definition
|
|
Term
| A ________ is a collection of interconnected access points with a software protocol structure that enables communication. |
|
Definition
|
|
Term
| A function performed by a receiving entity to limit the amount or rate of data that is sent by a transmitting entity is ________. |
|
Definition
|
|
Term
| A dictionary attack is being used by an attacker to break into a network. What does this mean? |
|
Definition
| systematically entering every word in a dictionary as a password. A dictionary attack can also be used in an attempt to find the key necessary to decrypt an encrypted message or document. |
|
|
Term
| A cellular network uses multiple low power ________. |
|
Definition
| Base transceiver station(tower)/Transmitters(phone) |
|
|
Term
| First generation cellular networks ________. |
|
Definition
| were analog FDMA systems and designed exclusively for voice only communication |
|
|
Term
| ________ are used to exchange information having to do with setting up and maintaining calls and with establishing a relationship between a mobile unit and the nearest base station. |
|
Definition
| Control channels or mobile switching center(MCS) |
|
|
Term
| Affecting not only mobile phones in automobiles, but even a mobile phone user walking down an urban street, ________ occurs when there are rapid variations in signal strength. |
|
Definition
|
|
Term
| Third generation wireless communication supports ________. |
|
Definition
| data/multimedia and voice |
|
|
Term
| As the mobile units move they pass from cell to cell, which requires transferring of the call from one base transceiver to another. This process is called ________. |
|
Definition
|
|
Term
| ________ are useful in city streets in congested areas, along highways, and inside large public buildings. |
|
Definition
|
|
Term
| Each base station is connected to a ________, which serves multiple base stations. |
|
Definition
|
|
Term
| ________ occurs when an electromagnetic signal encounters a surface that is large relative to the wavelength of the signal. |
|
Definition
|
|
Term
| Nonselective, or ________, is the type of fading in which all frequency components of the received signal fluctuate in the same proportions simultaneously. |
|
Definition
|
|
Term
| The dominant technology for third generation systems is ________. |
|
Definition
|
|
Term
| A ________ is used to identify the user and register its location. |
|
Definition
|
|
Term
| The ________ standard defines a set of services and physical layer options for wireless LANs. |
|
Definition
|
|
Term
| A wireless LAN linked into a wired LAN on the same premises is referred to as a LAN ________. |
|
Definition
|
|
Term
| Employees linking their computers into a temporary network in a conference room for a meeting would be an example of ________ networking. |
|
Definition
| adhoc network (aka multi-hop, infrastructureless) |
|
|
Term
| A typical coverage area for a wireless LAN has a diameter of ________. |
|
Definition
|
|
Term
| A number of changes are made in 802.11n in the radio transmission scheme to increase capacity. The most significant of these techniques is ________. |
|
Definition
|
|
Term
| "Recommended practice for the evaluation of 802.11 wireless performance" is the scope of the ________ standard. |
|
Definition
"IEEE (issuing organization) WLAN (standard name)" |
|
|
Term
| A ________ is a system used to interconnect a set of basic service sets and integrated LANs to create an extended service set. |
|
Definition
|
|
Term
| IEEE 802.11 defines three services that provide a wireless LAN with secure access and privacy services: authentication, privacy, and ________. |
|
Definition
| encryption/ deauthentication |
|
|
Term
| Three physical media are defined in the original 802.11 standard: DSSS, FHSS, and ________. |
|
Definition
|
|
Term
| The ________ is a set of one or more interconnected BSSs and integrated LANs that appear as a single BSS to the LLC layer at any station associated with one of these BSSs. |
|
Definition
| Extended Service Set (ESS) |
|
|
Term
| ________ is a set of protocols that provides a variety of security services for IEEE 802.11 wireless LANs. |
|
Definition
|
|
Term
| ________ detection is effective against masqueraders. |
|
Definition
|
|
Term
| A security service that monitors and analyzes system events for the purpose of finding and providing real-time or near-real-time warning of attempts to access system resources in an unauthorized manner is a(n) ________. |
|
Definition
| Intrusion detection system (ids) |
|
|
Term
| Transport and tunnel mode are supported by ________. |
|
Definition
|
|
Term
| A ________ is an association between a client and a server created by the Handshake Protocol that defines a set of cryptographic security parameters which can be shared among multiple connections. |
|
Definition
|
|
Term
| The ________ function enforces the use of the authentication function, routes the messages properly, and facilitates key exchange. |
|
Definition
| access control/has function |
|
|
Term
| One of the most widely used security services is the ________. |
|
Definition
|
|
Term
| The ________ component of IDS is responsible for determining if an intrusion has occurred. |
|
Definition
|
|
Term
| ________ detection involves an attempt to define a set of rules or attack patterns that can be used to decide that a given behavior is that of an intruder. |
|
Definition
|
|
Term
| A ________ firewall applies a set of rules to each incoming and outgoing IP packet and then forwards or discards the packet. |
|
Definition
| traditional packet filter |
|
|
Term
| A ________ firewall reviews packet information and also records information about TCP connections. They can also inspect limited amounts of application data for protocols such as FTP, IM, and SIPS commands in order to identify and track related connections. |
|
Definition
|
|
Term
| ________ determines the types of Internet services that can be accessed, inbound or outbound, and may filter traffic on the basis of IP address, protocol, or port number. |
|
Definition
|
|