Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
106 Cards in this Set
- Front
- Back
____ signaling functions are more limited than those performed by the protocols in the H.323 group.
RTCP MGC MEGACO SIP |
SIP
|
|
____ is preferred over TCP for real-time applications such as telephone conversations and videoconferencing.
RTP UDP RTCP SIP |
UDP
|
|
Among all video-over-IP applications, ____ is perhaps the simplest.
VoIP videoconferencing IPTV streaming video |
streaming video
|
|
______________________________ is a QoS technique that replaces the IP datagram header with a label at the first router a data stream encounters.
|
Multiprotocol label switching (MPLS)
|
|
Using VoIP over a WAN allows an organization to avoid paying long-distance telephone charges, a benefit known as ____.
charge bypass distance bypass toll bypass easypass |
toll bypass
|
|
The popular Internet telephony software, Skype, is a type of ____.
IP telephone softphone teleapplication compu-phone |
softphone
|
|
____________________ performs the same functions as MGCP, but using different commands and processes.
|
MEGACO
|
|
______________________________ is a simple technique that addresses QoS issues by prioritizing traffic.
|
Differentiated Service (DiffServ)
|
|
In general, a(n) ____ is a private switch that accepts and interprets both analog and digital voice signals.
IP-PBX analog PBX Data PBX IT-PBX |
IP-PBX
|
|
When VoIP relies on the Internet, it is often called ____.
telephony Internet telephony IP telephony voice telephony |
Internet telephony
|
|
One drawback to ____ video is that content may not be edited before it’s distributed.
on demand live streaming streaming server VoIP |
live streaming
|
|
When a caller uses an IP telephone, his or her voice is immediately digitized and issued from the telephone to the network in ____ form.
segment frame circuit packet |
packet
|
|
A computer programmed to act like an IP telephone is known as a(n) ____.
video phone softphone streaming server compu-phone |
softphone
|
|
____ is the use of one network to simultaneously carry voice, video, and data communications.
Multicasting Unicasting Divergence Convergence |
Convergence
|
|
SIP and H.323 regulate ____ for VoIP or video-over-IP clients and servers.
call signaling only control only call signaling and control communication between media gateways |
call signaling and control
|
|
Many streaming video services - and nearly all of those issued over a public network, such as the Internet - are examples of ____ transmissions.
multicast broadcast unicast telecast |
unicast
|
|
____ messaging is a service that makes several forms of communication available from a single user interface.
Unified Instant Diversified Open |
Unified
|
|
When more than two people participate in a videoconference, for example, in a point-to-multipoint or multipoint-to-multipoint scenario, a video ____ is required.
bridge switch gateway router |
bridge
|
|
When using an analog telephone, a VoIP adapter that performs analog-to-digital conversion is known as a(n) ____.
VTA (voice telephone adapter) ATA (analog telephone adapter) DTA (digital telephone adapter) DTA (data telephone adapter) |
ATA (analog telephone adapter)
|
|
____ is a measure of how well a network service matches its expected performance.
QoS RSVP DiffServ MPLS |
QoS
|
|
Many network engineers consider ____ to be superior to MGCP.
SIP RTCP MEGACO MGC |
MEGACO
|
|
When streaming videos are supplied via the Web, they are often called ____________________.
|
Webcasts
|
|
IPTV, videoconferencing, streaming video, and IP multicasting belong to the range of services known as ____.
voice over IP data over IP video over IP Web over IP |
video over IP
|
|
____ describes the use of any network to carry voice signals using the TCP/IP protocol.
Telephony Internet telephony IP telephony Voice telephony |
IP telephony
|
|
Many VoIP vendors prefer ____________________ over H.323.
|
SIP
|
|
A(n) ____ is a computer that manages multiple media gateways.
MPLS MGCP MEGACO MGC |
MGC
|
|
A(n) ____________________ identifies an organization’s security risks, levels of authority, designated security coordinator and team members, responsibilities for each team member, and responsibilities for each employee.
|
security policy
|
|
RADIUS and TACACS belong to a category of protocols known as AAA (____).
access, authorization, and accounting authentication, authorization, and accounting authentication, authorization, and authority authentication, authorization, and access |
authentication, authorization, and accounting
|
|
A ____ firewall is a router (or a computer installed with software that enables it to act as a router) that examines the header of every packet of data it receives to determine whether that type of packet is authorized to continue to its destination.
packet-filtering gateway proxy selective |
packet-filtering
|
|
A(n) ____________________ is a software application on a network host that acts as an intermediary between the external and internal networks, screening all incoming and outgoing traffic.
|
proxy service
|
|
____ is a public key encryption system that can verify the authenticity of an e-mail sender and encrypt e-mail data in transmission.
PGP SSH IPSec SSL |
PGP
|
|
A router that is not configured to drop packets that match certain suspicious characteristics is an example of a risk associated with ____.
people transmission and hardware protocols and software Internet access |
transmission and hardware
|
|
In ____, both computers verify the credentials of the other.
mutual authorization mutual access mutual authentication mutual verification |
mutual authentication
|
|
In ____ , a hacker forges name server records to falsify his host’s identity.
IP spoofing DNS spoofing ID spoofing DHCP spoofing |
DNS spoofing
|
|
A VPN ____ authenticates VPN clients and establishes tunnels for VPN connections.
router service concentrator certificate authority |
concentrator
|
|
A ____ attack occurs when a hacker uses programs that try a combination of a user ID and every word in a dictionary to gain access to the network.
flashing denial-of-service dictionary brute force |
dictionary
|
|
A ____ attack occurs when a system becomes unable to function because it has been deluged with data transmissions or otherwise disrupted.
flashing denial-of-service war driving phishing |
denial-of-service
|
|
____________________ is the use of an algorithm to scramble data into a format that can be read only by reversing the algorithm.
|
Encryption
|
|
____ protocols are the rules that computers follow to accomplish authentication.
Access Availability Authority Authentication |
Authentication
|
|
A ____ attack occurs when an Internet chat user sends commands to a victim’s machine that cause the screen to fill with garbage characters and requires the victim to terminate their chat sessions.
flashing denial-of-service war driving phishing |
flashing
|
|
A ____ attack occurs when a hacker tries numerous possible character combinations to find the key that will decrypt encrypted data.
flashing denial-of-service dictionary brute force |
brute force
|
|
____ is a social engineering practice in which a person attempts to glean access or authentication information by posing as someone who needs that information.
Cracking Hacking War driving Phishing |
Phishing
|
|
An NOS that contains a “back door”is an example of a risk associated with ____.
people transmission and hardware protocols and software Internet access |
protocols and software
|
|
A ____ main function is to examine packets and determine where to direct them based on their Network layer addressing information.
switch’s gateway’s router’s proxy server’s |
router’s
|
|
____ software searches a node for open ports.
Phishing Sniffing Authentication Port scanner |
Port scanner
|
|
____ is a method of encrypting TCP/IP transmissions.
PGP IPSec PAP SSL |
SSL
|
|
A(n) ____________________ is a thorough examination of each aspect of the network to determine how it might be compromised.
|
security audit
|
|
A(n) ____ is a password-protected and encrypted file that holds an individual’s identification information, including a public key.
digital certificate authentication file access control list authentication certificate |
digital certificate
|
|
In a ____ attack, a person redirects or captures secure transmissions as they occur.
denial-of service man-in-the-middle war driving phishing |
man-in-the-middle
|
|
In general, information is ____________________ if it could be used by other parties to impair an organization’s functioning, decrease customers’ confidence, cause a financial loss, damage an organization’s status, or give a significant advantage to a competitor.
|
confidential
|
|
The use of certificate authorities to associate public keys with certain users is known as ____.
PGP PKI IPSec SSL |
PKI
|
|
The combination of a public key and a private key is known as a ____.
key lock key frame key pair key set |
key pair
OK |
|
A____ is a small electronic device that issues a signal on a wire pair.
tone locator probe kit tone generator probe |
tone generator
|
|
When used on a copper-based cable, a continuity tester applies a small amount of ____ to each conductor at one end of the cable.
resistance impedance voltage current |
voltage
|
|
To take advantage of network monitoring and analyzing tools, the network adapter installed in the machine running the software must support ____ mode.
open static promiscuous continuous |
promiscuous
|
|
A ____ can generate traffic in an attempt to reproduce a network problem and monitor multiple network segments simultaneously.
multimeter cable performance tester network monitor protocol analyzer |
protocol analyzer
|
|
____ is the telltale factor for ascertaining where faults in a cable lie.
Resistance Impedance Voltage Current |
Impedance
|
|
A sophisticated ____________________ will include a TDR (time domain reflectometer) that issues a signal on a cable and then measures the way the signal bounces back (or reflects) to the TDR.
|
cable performance tester
|
|
A ____ is a software-based tool that continually monitors network traffic from a server or workstation attached to the network.
network monitor sniffer protocol analyzer multimeter |
network monitor
|
|
____ is one of the most important aspects to consider when looking at how a problem solution might affect users and network functionality.
Cost Scope Scalability Security |
Scope
|
|
____ are often considered first-level support.
Help desk coordinators Help desk analysts Administrators Network specialists |
Help desk analysts
|
|
____ are often considered third-level support.
Help desk coordinators Help desk analysts Administrators Technical specialists |
Help desk coordinators
|
|
A help desk is typically staffed with ____________________ - people proficient in workstation and network troubleshooting.
|
help desk analysts
|
|
In a ____ cable, the transmit and receive wire pairs in one of the connectors are reversed.
switched probe twisted pair crossover |
crossover
|
|
____ are frames that are not actually data frames, but aberrations caused by a device misinterpreting stray voltage on the wire.
Jabbers Ghosts Giants Runts |
Ghosts
|
|
____ packets exceed the medium’s maximum packet size.
Jabber Ghost Giant Runt |
Giant
|
|
Resistance is measured in ____.
ohms hertz centimeters volts |
ohms
|
|
Rather than issue an electrical signal over the cable as twisted pair cable testers do, a(n) ________________________________________ transmits light-based signals of different wavelengths over the fiber.
|
optical time domain reflectometer (OTDR)
|
|
A ____ can be used to intercept a telephone conversation.
sniffer protocol analyzer network monitor butt set |
butt set
|
|
A ____ usually results from a bad NIC.
jabber ghost giant runt |
jabber
|
|
For documenting problems, some organizations use a software program known as a(n) ____________________ (also informally known as help desk software).
|
call tracking system
|
|
A ____ is a document (preferably online) that lists every service and software package supported within an organization, plus the names of first- and second-level support contacts for those services or software packages.
call tracking list help desk program list supported services list change management list |
supported services list
|
|
____ is a fundamental property of wire that depends on a wire’s molecular structure and size.
Voltage Current Resistance Impedance |
Resistance
|
|
Network engineers today might call any protocol analyzer tool a sniffer or ____________________.
|
packet sniffer
|
|
Before using a network monitor or protocol analyzer on a network, it is important to know what ____ on your network normally looks like.
jabber runts current traffic |
traffic
|
|
An administrator should take the time to troubleshoot all network problems correctly by asking specific questions designed to identify the problem ____.
intensity background scope focus |
scope
|
|
Viewing the status of the wireless connection on your workstation tells you ____ about your wireless environment.
everything nothing a lot a little |
a little
|
|
The danger in using a ____ is that it could collect more information than you or the machine can reasonably process.
cable continuity tester multimeter protocol analyzer wireless network tester |
protocol analyzer
|
|
____ scanning techniques attempt to identify malware by discovering “malware-like” behavior.
Integrity checking Polymorphic Signature Heuristic |
Heuristic
|
|
____ provides redundancy through a process called disk mirroring.
RAID Level 0 RAID Level 1 RAID Level 3 RAID Level 5 |
RAID Level 1
|
|
____ is a specialized storage device or group of storage devices that provides centralized fault-tolerant data storage for a network.
NAS RAID SANs Optical media |
NAS
|
|
A(n) ____ virus disguises itself as a legitimate program to prevent detection.
stealth encrypted time dependent polymorphic |
stealth
|
|
____ offers the best performance.
RAID Level 0 RAID Level 1 RAID Level 3 RAID Level 5 |
RAID Level 0
|
|
A(n) ___________________________________ is a battery-operated power source directly attached to one or more devices and to a power supply (such as a wall outlet) that prevents undesired features of the wall outlet’s A/C power from harming the device or interrupting its services.
|
Uninterruptible power supply (UPS)
|
|
____________________________________________________________ refers to a collection of disks that provide fault tolerance for shared data and applications.
|
Redundant Array of Independent [or Inexpensive] Disks (RAID)
|
|
Many bots spread through the _________________________, a protocol that enables users running IRC client software to communicate instantly with other participants in a chat room on the Internet.
|
Internet Relay Chat (IRC)
|
|
A(n) ____ is a deviation from a specified level of system performance for a given period of time.
fault failure error hoax |
failure
|
|
____ scanning detects malware by comparing a file’s content with known malware signatures in a signature database.
Integrity checking Polymorphic Signature Heuristic |
Signature
|
|
____ are programs that run independently and travel between computers and across networks.
Viruses Worms Bots Trojan horses |
Worms
|
|
A program that disguises itself as something useful but actually harms your system is called a ____.
virus worm bot Trojan horse |
Trojan horse
|
|
____ is a type of media capable of storing digitized data and that uses a laser to write data to it and read data from it.
Tape backup media Optical media Fiber optic media USB |
Optical media
|
|
Power that is free from noise is called “____” power.
clear clean filtered white |
clean
|
|
A(n) ____ virus changes its characteristics every time it is transferred to a new system.
stealth encrypted time dependent polymorphic |
polymorphic
|
|
A(n) ____________________ is a copy of data or program files created for archiving or safekeeping.
|
backup
|
|
In ____, parity error checking occurs when data is written across the disk array.
RAID Level 0 RAID Level 1 RAID Level 3 RAID Level 5 |
RAID Level 3
|
|
____ are distinct networks of storage devices that communicate directly with each other and with other networks.
NAS RAID SANs Optical media |
SANs
|
|
An archive ____ is a file attribute that can be checked or unchecked to indicate whether the file must be archived.
bit byte word field |
bit
|
|
Mesh topologies and ____ topologies are good choices for highly available enterprise networks.
star SONET rings bus ring |
SONET rings
|
|
____ detects malware by comparing current characteristics of files and disks against an archived version of these characteristics to discover any changes.
Integrity checking Polymorphic Signature Heuristic |
Integrity checking
|
|
A ____ is a program that runs automatically, without requiring a person to start or stop it.
virus worm bot Trojan horse |
bot
|
|
____________________ is the process of restoring your critical functionality and data after an enterprise-wide outage that affects more than a single system or a limited group of users.
|
Disaster recovery
|
|
A(n) ____ UPS uses the A/C power from the wall outlet to continuously charge its battery, while providing power to a network device through its battery.
standby offline offsite online |
online
|
|
____ is intended to eliminate single points of failure.
Availability Redundancy Contingency Integrity |
Redundancy
|
|
____ is an automatic distribution of traffic over multiple links or processors to optimize response.
Redundancy Failover RAID Load balancing |
Load balancing
|
|
MGCP =
|
Media Gateway Control Protocol
|
|
SIP =
|
Session Initiation Protocol
|