• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/106

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

106 Cards in this Set

  • Front
  • Back
____ signaling functions are more limited than those performed by the protocols in the H.323 group.

RTCP
MGC
MEGACO
SIP
SIP
____ is preferred over TCP for real-time applications such as telephone conversations and videoconferencing.

RTP
UDP
RTCP
SIP
UDP
Among all video-over-IP applications, ____ is perhaps the simplest.

VoIP
videoconferencing
IPTV
streaming video
streaming video
______________________________ is a QoS technique that replaces the IP datagram header with a label at the first router a data stream encounters.
Multiprotocol label switching (MPLS)
Using VoIP over a WAN allows an organization to avoid paying long-distance telephone charges, a benefit known as ____.

charge bypass
distance bypass
toll bypass
easypass
toll bypass
The popular Internet telephony software, Skype, is a type of ____.

IP telephone
softphone
teleapplication
compu-phone
softphone
____________________ performs the same functions as MGCP, but using different commands and processes.
MEGACO
______________________________ is a simple technique that addresses QoS issues by prioritizing traffic.
Differentiated Service (DiffServ)
In general, a(n) ____ is a private switch that accepts and interprets both analog and digital voice signals.

IP-PBX
analog PBX
Data PBX
IT-PBX
IP-PBX
When VoIP relies on the Internet, it is often called ____.

telephony
Internet telephony
IP telephony
voice telephony
Internet telephony
One drawback to ____ video is that content may not be edited before it’s distributed.

on demand
live streaming
streaming server
VoIP
live streaming
When a caller uses an IP telephone, his or her voice is immediately digitized and issued from the telephone to the network in ____ form.

segment
frame
circuit
packet
packet
A computer programmed to act like an IP telephone is known as a(n) ____.

video phone
softphone
streaming server
compu-phone
softphone
____ is the use of one network to simultaneously carry voice, video, and data communications.

Multicasting
Unicasting
Divergence
Convergence
Convergence
SIP and H.323 regulate ____ for VoIP or video-over-IP clients and servers.

call signaling only
control only
call signaling and control
communication between media gateways
call signaling and control
Many streaming video services - and nearly all of those issued over a public network, such as the Internet - are examples of ____ transmissions.

multicast
broadcast
unicast
telecast
unicast
____ messaging is a service that makes several forms of communication available from a single user interface.

Unified
Instant
Diversified
Open
Unified
When more than two people participate in a videoconference, for example, in a point-to-multipoint or multipoint-to-multipoint scenario, a video ____ is required.

bridge
switch
gateway
router
bridge
When using an analog telephone, a VoIP adapter that performs analog-to-digital conversion is known as a(n) ____.

VTA (voice telephone adapter)
ATA (analog telephone adapter)
DTA (digital telephone adapter)
DTA (data telephone adapter)
ATA (analog telephone adapter)
____ is a measure of how well a network service matches its expected performance.

QoS
RSVP
DiffServ
MPLS
QoS
Many network engineers consider ____ to be superior to MGCP.

SIP
RTCP
MEGACO
MGC
MEGACO
When streaming videos are supplied via the Web, they are often called ____________________.
Webcasts
IPTV, videoconferencing, streaming video, and IP multicasting belong to the range of services known as ____.

voice over IP
data over IP
video over IP
Web over IP
video over IP
____ describes the use of any network to carry voice signals using the TCP/IP protocol.

Telephony
Internet telephony
IP telephony
Voice telephony
IP telephony
Many VoIP vendors prefer ____________________ over H.323.
SIP
A(n) ____ is a computer that manages multiple media gateways.

MPLS
MGCP
MEGACO
MGC
MGC
A(n) ____________________ identifies an organization’s security risks, levels of authority, designated security coordinator and team members, responsibilities for each team member, and responsibilities for each employee.
security policy
RADIUS and TACACS belong to a category of protocols known as AAA (____).

access, authorization, and accounting
authentication, authorization, and accounting
authentication, authorization, and authority
authentication, authorization, and access
authentication, authorization, and accounting
A ____ firewall is a router (or a computer installed with software that enables it to act as a router) that examines the header of every packet of data it receives to determine whether that type of packet is authorized to continue to its destination.

packet-filtering
gateway
proxy
selective
packet-filtering
A(n) ____________________ is a software application on a network host that acts as an intermediary between the external and internal networks, screening all incoming and outgoing traffic.
proxy service
____ is a public key encryption system that can verify the authenticity of an e-mail sender and encrypt e-mail data in transmission.

PGP
SSH
IPSec
SSL
PGP
A router that is not configured to drop packets that match certain suspicious characteristics is an example of a risk associated with ____.

people
transmission and hardware
protocols and software
Internet access
transmission and hardware
In ____, both computers verify the credentials of the other.

mutual authorization
mutual access
mutual authentication
mutual verification
mutual authentication
In ____ , a hacker forges name server records to falsify his host’s identity.

IP spoofing
DNS spoofing
ID spoofing
DHCP spoofing
DNS spoofing
A VPN ____ authenticates VPN clients and establishes tunnels for VPN connections.

router
service
concentrator
certificate authority
concentrator
A ____ attack occurs when a hacker uses programs that try a combination of a user ID and every word in a dictionary to gain access to the network.

flashing
denial-of-service
dictionary
brute force
dictionary
A ____ attack occurs when a system becomes unable to function because it has been deluged with data transmissions or otherwise disrupted.

flashing
denial-of-service
war driving
phishing
denial-of-service
____________________ is the use of an algorithm to scramble data into a format that can be read only by reversing the algorithm.
Encryption
____ protocols are the rules that computers follow to accomplish authentication.

Access
Availability
Authority
Authentication
Authentication
A ____ attack occurs when an Internet chat user sends commands to a victim’s machine that cause the screen to fill with garbage characters and requires the victim to terminate their chat sessions.

flashing
denial-of-service
war driving
phishing
flashing
A ____ attack occurs when a hacker tries numerous possible character combinations to find the key that will decrypt encrypted data.

flashing
denial-of-service
dictionary
brute force
brute force
____ is a social engineering practice in which a person attempts to glean access or authentication information by posing as someone who needs that information.

Cracking
Hacking
War driving
Phishing
Phishing
An NOS that contains a “back door”is an example of a risk associated with ____.

people
transmission and hardware
protocols and software
Internet access
protocols and software
A ____ main function is to examine packets and determine where to direct them based on their Network layer addressing information.

switch’s
gateway’s
router’s
proxy server’s
router’s
____ software searches a node for open ports.

Phishing
Sniffing
Authentication
Port scanner
Port scanner
____ is a method of encrypting TCP/IP transmissions.

PGP
IPSec
PAP
SSL
SSL
A(n) ____________________ is a thorough examination of each aspect of the network to determine how it might be compromised.
security audit
A(n) ____ is a password-protected and encrypted file that holds an individual’s identification information, including a public key.

digital certificate
authentication file
access control list
authentication certificate
digital certificate
In a ____ attack, a person redirects or captures secure transmissions as they occur.

denial-of service
man-in-the-middle
war driving
phishing
man-in-the-middle
In general, information is ____________________ if it could be used by other parties to impair an organization’s functioning, decrease customers’ confidence, cause a financial loss, damage an organization’s status, or give a significant advantage to a competitor.
confidential
The use of certificate authorities to associate public keys with certain users is known as ____.

PGP
PKI
IPSec
SSL
PKI
The combination of a public key and a private key is known as a ____.

key lock
key frame
key pair
key set
key pair

OK
A____ is a small electronic device that issues a signal on a wire pair.

tone locator
probe kit
tone generator
probe
tone generator
When used on a copper-based cable, a continuity tester applies a small amount of ____ to each conductor at one end of the cable.

resistance
impedance
voltage
current
voltage
To take advantage of network monitoring and analyzing tools, the network adapter installed in the machine running the software must support ____ mode.

open
static
promiscuous
continuous
promiscuous
A ____ can generate traffic in an attempt to reproduce a network problem and monitor multiple network segments simultaneously.

multimeter
cable performance tester
network monitor
protocol analyzer
protocol analyzer
____ is the telltale factor for ascertaining where faults in a cable lie.

Resistance
Impedance
Voltage
Current
Impedance
A sophisticated ____________________ will include a TDR (time domain reflectometer) that issues a signal on a cable and then measures the way the signal bounces back (or reflects) to the TDR.
cable performance tester
A ____ is a software-based tool that continually monitors network traffic from a server or workstation attached to the network.

network monitor
sniffer
protocol analyzer
multimeter
network monitor
____ is one of the most important aspects to consider when looking at how a problem solution might affect users and network functionality.

Cost
Scope
Scalability
Security
Scope
____ are often considered first-level support.

Help desk coordinators
Help desk analysts
Administrators
Network specialists
Help desk analysts
____ are often considered third-level support.

Help desk coordinators
Help desk analysts
Administrators
Technical specialists
Help desk coordinators
A help desk is typically staffed with ____________________ - people proficient in workstation and network troubleshooting.
help desk analysts
In a ____ cable, the transmit and receive wire pairs in one of the connectors are reversed.

switched
probe
twisted pair
crossover
crossover
____ are frames that are not actually data frames, but aberrations caused by a device misinterpreting stray voltage on the wire.

Jabbers
Ghosts
Giants
Runts
Ghosts
____ packets exceed the medium’s maximum packet size.

Jabber
Ghost
Giant
Runt
Giant
Resistance is measured in ____.

ohms
hertz
centimeters
volts
ohms
Rather than issue an electrical signal over the cable as twisted pair cable testers do, a(n) ________________________________________ transmits light-based signals of different wavelengths over the fiber.
optical time domain reflectometer (OTDR)
A ____ can be used to intercept a telephone conversation.

sniffer
protocol analyzer
network monitor
butt set
butt set
A ____ usually results from a bad NIC.

jabber
ghost
giant
runt
jabber
For documenting problems, some organizations use a software program known as a(n) ____________________ (also informally known as help desk software).
call tracking system
A ____ is a document (preferably online) that lists every service and software package supported within an organization, plus the names of first- and second-level support contacts for those services or software packages.

call tracking list
help desk program list
supported services list
change management list
supported services list
____ is a fundamental property of wire that depends on a wire’s molecular structure and size.

Voltage
Current
Resistance
Impedance
Resistance
Network engineers today might call any protocol analyzer tool a sniffer or ____________________.
packet sniffer
Before using a network monitor or protocol analyzer on a network, it is important to know what ____ on your network normally looks like.

jabber
runts
current
traffic
traffic
An administrator should take the time to troubleshoot all network problems correctly by asking specific questions designed to identify the problem ____.

intensity
background
scope
focus
scope
Viewing the status of the wireless connection on your workstation tells you ____ about your wireless environment.

everything
nothing
a lot
a little
a little
The danger in using a ____ is that it could collect more information than you or the machine can reasonably process.

cable continuity tester
multimeter
protocol analyzer
wireless network tester
protocol analyzer
____ scanning techniques attempt to identify malware by discovering “malware-like” behavior.

Integrity checking
Polymorphic
Signature
Heuristic
Heuristic
____ provides redundancy through a process called disk mirroring.

RAID Level 0
RAID Level 1
RAID Level 3
RAID Level 5
RAID Level 1
____ is a specialized storage device or group of storage devices that provides centralized fault-tolerant data storage for a network.

NAS
RAID
SANs
Optical media
NAS
A(n) ____ virus disguises itself as a legitimate program to prevent detection.

stealth
encrypted
time dependent
polymorphic
stealth
____ offers the best performance.

RAID Level 0
RAID Level 1
RAID Level 3
RAID Level 5
RAID Level 0
A(n) ___________________________________ is a battery-operated power source directly attached to one or more devices and to a power supply (such as a wall outlet) that prevents undesired features of the wall outlet’s A/C power from harming the device or interrupting its services.
Uninterruptible power supply (UPS)
____________________________________________________________ refers to a collection of disks that provide fault tolerance for shared data and applications.
Redundant Array of Independent [or Inexpensive] Disks (RAID)
Many bots spread through the _________________________, a protocol that enables users running IRC client software to communicate instantly with other participants in a chat room on the Internet.
Internet Relay Chat (IRC)
A(n) ____ is a deviation from a specified level of system performance for a given period of time.

fault
failure
error
hoax
failure
____ scanning detects malware by comparing a file’s content with known malware signatures in a signature database.

Integrity checking
Polymorphic
Signature
Heuristic
Signature
____ are programs that run independently and travel between computers and across networks.

Viruses
Worms
Bots
Trojan horses
Worms
A program that disguises itself as something useful but actually harms your system is called a ____.

virus
worm
bot
Trojan horse
Trojan horse
____ is a type of media capable of storing digitized data and that uses a laser to write data to it and read data from it.

Tape backup media
Optical media
Fiber optic media
USB
Optical media
Power that is free from noise is called “____” power.

clear
clean
filtered
white
clean
A(n) ____ virus changes its characteristics every time it is transferred to a new system.

stealth
encrypted
time dependent
polymorphic
polymorphic
A(n) ____________________ is a copy of data or program files created for archiving or safekeeping.
backup
In ____, parity error checking occurs when data is written across the disk array.

RAID Level 0
RAID Level 1
RAID Level 3
RAID Level 5
RAID Level 3
____ are distinct networks of storage devices that communicate directly with each other and with other networks.

NAS
RAID
SANs
Optical media
SANs
An archive ____ is a file attribute that can be checked or unchecked to indicate whether the file must be archived.

bit
byte
word
field
bit
Mesh topologies and ____ topologies are good choices for highly available enterprise networks.

star
SONET rings
bus
ring
SONET rings
____ detects malware by comparing current characteristics of files and disks against an archived version of these characteristics to discover any changes.

Integrity checking
Polymorphic
Signature
Heuristic
Integrity checking
A ____ is a program that runs automatically, without requiring a person to start or stop it.

virus
worm
bot
Trojan horse
bot
____________________ is the process of restoring your critical functionality and data after an enterprise-wide outage that affects more than a single system or a limited group of users.
Disaster recovery
A(n) ____ UPS uses the A/C power from the wall outlet to continuously charge its battery, while providing power to a network device through its battery.

standby
offline
offsite
online
online
____ is intended to eliminate single points of failure.

Availability
Redundancy
Contingency
Integrity
Redundancy
____ is an automatic distribution of traffic over multiple links or processors to optimize response.

Redundancy
Failover
RAID
Load balancing
Load balancing
MGCP =
Media Gateway Control Protocol
SIP =
Session Initiation Protocol