• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/166

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

166 Cards in this Set

  • Front
  • Back
In____addressing, only Class A, Class B, and Class C addresses are recognized.
a. classful c. stateful
b. subnet d. limited
classful
Within a classful addressing,____is the default subnet mask for a Class C address.
a. 255.255.255.255 c. 255.255.0.0
b. 255.255.255.0 d. 255.0.0.0
255.255.255.0
The result from ANDing 11001111 with 10010001 is____.
a. 11001111 c. 10000001
b. 10010001 d. 00000001
10000001
An example of a popular mail server is____.
a. Eudora c. AOL mail
b. Microsoft Outlook d. Microsoft Exchange Server
Microsoft Exchange Server
An example of a popular client email software is____.
a. MIME c. Sendmail
b. Microsoft Outlook d. Microsoft Exchange Server
Microsoft Outlook
SMTP operates from port____.
a. 25 c. 110
b. 11 d. 250
25
The standard message format specified by SMTP allows for lines that contain no more than____ASCII
characters.
a. 100 c. 10,000
b. 1000 d. 1,000,000
1000
POPS (Post Office Protocol, version 3) relies on TCP and operates over port____.
a. 25 c. 110
b. 11 d. 250
110
A program similar to mtr,____, is available as a command-line utility in Windows XP, Vista, Server 2003,
and Server 2008.
a. nbstat c. dig
b. pathping d. route
pathping
The____utility allows you to view a host's routing table.
a. nbstat c. dig
b. pathping d. route
route
____________________separates a network into multiple logically defined segments, or subnets.
subnetting
The gateways that make up the Internet backbone are called____________________.
core gateways
The combination of additional bits used for subnet information plus the existing network ID is known as the
_________________
extended network prefix
________________________________________is the protocol responsible for moving messages from one
mail server to another over TCP/IP-based networks.
SMTP
_____________________________________________is a standard for encoding and interpreting binary
files, images, video, and non-ASCII character sets within an e-mail message.
MIME
Displays TCP/IP statistics and details about TCP/IP components and connections on a host.

Match each item with a statement below:
a. ipconfig utility f. dig utility
b. ifconfig utility g. nslookup utility
c. netstat utility h. whois utility
d. nbstat utility i. traceroute utility
e. host utility
netstat utility
Allows an administrator to query the DNS database from any computer on the network and find the host
name of a device by specifying its IP address, or vice versa.

Match each item with a statement below:
a. ipconfig utility f. dig utility
b. ifconfig utility g. nslookup utility
c. netstat utility h. whois utility
d. nbstat utility i. traceroute utility
e. host utility
nslookup utility
Allows an administrator to query a DNS database and find the host name associated with a specific IP
address or vice versa.

Match each item with a statement below:
a. ipconfig utility f. dig utility
b. ifconfig utility g. nslookup utility
c. netstat utility h. whois utility
d. nbstat utility i. traceroute utility
e. host utility
dig utility
The TCP/IP administration utility for use with Windows NT, 2000, XP, Vista, Server 2003, and Server 2008
operating systems.

Match each item with a statement below:
a. ipconfig utility f. dig utility
b. ifconfig utility g. nslookup utility
c. netstat utility h. whois utility
d. nbstat utility i. traceroute utility
e. host utility
ipconfig utility
Used if an administrator already know a host's name and wants to learn its IP address.

Match each item with a statement below:
a. ipconfig utility f. dig utility
b. ifconfig utility g. nslookup utility
c. netstat utility h. whois utility
d. nbstat utility i. traceroute utility
e. host utility
host utility
The TCP/IP configuration and management utility used on UNIX and Linux systems.


Match each item with a statement below:
a. ipconfig utility f. dig utility
b. ifconfig utility g. nslookup utility
c. netstat utility h. whois utility
d. nbstat utility i. traceroute utility
e. host utility
ifconfig utility
When VoIP relies on the Internet, it is often called____.
a. telephony c. IP telephony
b. Internet telephony d. voice telephony
Internet telephony
Using VoIP over a WAN allows an organization to avoid paying long-distance telephone charges, a benefit
known as____.
a. charge bypass c. toll bypass
b. distance bypass d. easypass
toll bypass
The popular Internet telephony software, Skype, is a type of____.
a. IP telephone c. teleapplication
b. softphone d. compu-phone
softphone
One drawback to____video is that content may not be edited before it's distributed.
a. on demand c. streaming server
b. live streaming d. VoIP
live streaming
Many streaming video services - and nearly all of those issued over a public network, such as the Internet -
are examples of____transmissions.
a. multicast c. unicast
b. broadcast d. telecast
unicast
When more than two people participate in a videoconference, for example, in a point-to-multipoint or
multipoint-to-multipoint scenario, a video____is required.
a. bridge c. gateway
b. switch d. router
bridge
SIP and H.323 regulate____for VoIP or video-over-IP clients and servers.
a. call signaling only
b. control only
c. call signaling and control
d. communication between media gateways
call signaling and control
Many network engineers consider____to be superior to MGCP.
a. SIP c. MEGACO
b. RTCP d. MGC
MEGACO
____is preferred over TCP for real-time applications such as telephone conversations and
videoconferencing.
a. RTP c. RTCP
b. UDP d. SIP
UDP
____is a measure of how well a network service matches its expected performance.
a. QoS c. DiffServ
b. RSVP d. MPLS
QoS
When streaming videos are supplied via the Web, they are often called____________________
Webcasts
Many VoIP vendors prefer____________________over H.323.
SIP
____________________performs the same functions as MGCP, but using different commands and
processes.
MEGACO
______________________________is a simple technique that addresses QoS issues by prioritizing traffic
DiffServ
______________________________is a QoS technique that replaces the IP datagram header with a label at
the first router a data stream encounters.
MPLS
A device providing translation between network devices running H.323 signaling protocols and devices
running other types of signaling protocols.

Match each item with a statement below:
a. H.323 terminal f. H.225
b. H.323 gateway g. H.245
c. H.323 gatekeeper h. RTP
d. MCU (multipoint control unit) i. RSVP
e. H.323 zone
H.323 gateway
The H.323 protocol that handles call or videoconference signaling.

Match each item with a statement below:
a. H.323 terminal f. H.225
b. H.323 gateway g. H.245
c. H.323 gatekeeper h. RTP
d. MCU (multipoint control unit) i. RSVP
e. H.323 zone
H.225
Any node that provides audio, visual, or data information to another node.

Match each item with a statement below:
a. H.323 terminal f. H.225
b. H.323 gateway g. H.245
c. H.323 gatekeeper h. RTP
d. MCU (multipoint control unit) i. RSVP
e. H.323 zone
H.323 terminal
A computer that provides support for multiple H.323 terminals and manages communication between them.

Match each item with a statement below:
a. H.323 terminal f. H.225
b. H.323 gateway g. H.245
c. H.323 gatekeeper h. RTP
d. MCU (multipoint control unit) i. RSVP
e. H.323 zone
MCU (multipoint control unit)
The nerve center for networks that adhere to H.323.

Match each item with a statement below:
a. H.323 terminal f. H.225
b. H.323 gateway g. H.245
c. H.323 gatekeeper h. RTP
d. MCU (multipoint control unit) i. RSVP
e. H.323 zone
H.323 gatekeeper
Ensures that the type of information issued to an H.323 terminal is formatted in a way that the H.323 terminal
can interpret.

Match each item with a statement below:
a. H.323 terminal f. H.225
b. H.323 gateway g. H.245
c. H.323 gatekeeper h. RTP
d. MCU (multipoint control unit) i. RSVP
e. H.323 zone
H.245
____is a social engineering practice in which a person attempts to glean access or authentication information
by posing as someone who needs that information.
a. Cracking c. War driving
b. Hacking d. Phishing
Phishing
In a____attack, a person redirects or captures secure transmissions as they occur.
a. denial-of service c. war driving
b. man-in-the-middle d. phishing
man-in-the-middle
A____attack occurs when an Internet chat user sends commands to a victim's machine that cause the screen
to fill with garbage characters and requires the victim to terminate their chat sessions.
a. flashing c. war driving
b. denial-of-service d. phishing
flashing
A____attack occurs when a system becomes unable to function because it has been deluged with data
transmissions or otherwise disrupted.
a. flashing c. war driving
b. denial-of-service d. phishing
denial-of-service
A____attack occurs when a hacker uses programs that try a combination of a user ID and every word in a
dictionary to gain access to the network.
a. flashing c. dictionary
b. denial-of-service d. brute force
dictionary
A____attack occurs when a hacker tries numerous possible character combinations to find the key that will
decrypt encrypted data.
a. flashing c. dictionary
b. denial-of-service d. brute force
brute force
____is a public key encryption system that can verify the authenticity of an e-mail sender and encrypt e-mail
data in transmission.
a. PGP c. IPSec
b. SSH d. SSL
PGP
In____, a hacker forges name server records to falsify his host's identity.
a. IP spoofing c. ID spoofing
b. DNS spoofing d. DHCP spoofing
DNS spoofing
A VPN____authenticates VPN clients and establishes tunnels for VPN connections.
a. router c. concentrator
b. service d. certificate authority
concentrator
RADIUS and TACACS belong to a category of protocols known as AAA (____).
a. access, authorization, and accounting
b. authentication, authorization, and accounting
c. authentication, authorization, and authority
d. authentication, authorization, and access
uthentication, authorization, and accounting
A(n)____________________is a thorough examination of each aspect of the network to determine how it
might be compromised.
security audit
A(n)____________________identifies an organization's security risks, levels of authority, designated
security coordinator and team members, responsibilities for each team member, and responsibilities for each employee.
security policy
In general, information is____________________if it could be used by other parties to impair an
organization's functioning, decrease customers' confidence, cause a financial loss, damage an organization's status, or give a significant advantage to a competitor.
confidential
A(n)____________________is a software application on a network host that acts as an intermediary
between the external and internal networks, screening all incoming and outgoing traffic.
proxy service
____________________is the use of an algorithm to scramble data into a format that can be read only by
reversing the algorithm.
encryption
A firewall that can view a data stream.

Match each item with a statement below:
a. IPS f. proxy server
b. IDS g. proxy service
c. content filtering h. public key encryption
d. host-based i. private key encryption
e. stateful
stateful
A software application on a network host that acts as an intermediary between the external and internal networks, screening all incoming and outgoing traffic.

Match each item with a statement below:
a. IPS f. proxy server
b. IDS g. proxy service
c. content filtering h. public key encryption
d. host-based i. private key encryption
e. stateful
proxy service
Software that can only detect and log suspicious activity.


Match each item with a statement below:
a. IPS f. proxy server
b. IDS g. proxy service
c. content filtering h. public key encryption
d. host-based i. private key encryption
e. stateful
IDS
A firewall that protects only the computer on which it is installed.


Match each item with a statement below:
a. IPS f. proxy server
b. IDS g. proxy service
c. content filtering h. public key encryption
d. host-based i. private key encryption
e. stateful
host-based
Data is encrypted using two keys.

Match each item with a statement below:
a. IPS f. proxy server
b. IDS g. proxy service
c. content filtering h. public key encryption
d. host-based i. private key encryption
e. stateful
public key encryption
Software that can react to suspicious activity.


Match each item with a statement below:
a. IPS f. proxy server
b. IDS g. proxy service
c. content filtering h. public key encryption
d. host-based i. private key encryption
e. stateful
IPS
Protection against harmful code involves more than just installing anti-malware software.
T
When implementing anti-malware software on a network, one of your most important decisions is where to
install the software.
T
An anti-malware policy is meant to protect the network from damage and downtime.
T
The goal of fault-tolerant systems is to prevent failures from progressing to faults.
F
Generators provide surge protection.
F
____is intended to eliminate single points of failure.
a. Availability c. Contingency
b. Redundancy d. Integrity
Redundancy
____are programs that run independently and travel between computers and across networks.
a. Viruses c. Bots
b. Worms d. Trojan horses
Worms
A(n)____virus disguises itself as a legitimate program to prevent detection.
a. stealth c. time dependent
b. encrypted d. polymorphic
stealth
____scanning detects malware by comparing a file's content with known malware signatures in a signature
database.
a. Integrity checking c. Signature
b. Polymorphic d. Heuristic
Signature
A(n)____is a deviation from a specified level of system performance for a given period of time.
a. fault c. error
b. failure d. hoax
failure
Power that is free from noise is called "____" power.
a. clear c. filtered
b. clean d. white
clean
Mesh topologies and____topologies are good choices for highly available enterprise networks.
a. star c. bus
b. SONET rings d. ring
SONET rings
In____, parity error checking occurs when data is written across the disk array.
a. RAID Level 0 c. RAID Level 3
b. RAID Level 1 d. RAID Level 5
RAID Level 3
____is a type of media capable of storing digitized data and that uses a laser to write data to it and read data
from it.
a. Tape backup media c. Fiber optic media
b. Optical media d. USB
Optical media
An archive____is a file attribute that can be checked or unchecked to indicate whether the file must be
archived.
a. bit c. word
b. byte d. field
bit
Many bots spread through the_________________________, a protocol that enables users running IRC client
software to communicate instantly with other participants in a chat room on the Internet.
IRC
A(n)___________________________________is a battery-operated power source directly attached to one
or more devices and to a power supply (such as a wall outlet) that prevents undesired features of the wall outlet's A/C power from harming the device or interrupting its services.
UPS
____________________________________________________________refers to a collection of disks that
provide fault tolerance for shared data and applications.
Raid
A(n)____________________is a copy of data or program files created for archiving or safekeeping.
Backup
____________________is the process of restoring your critical functionality and data after an
enterprise-wide outage that affects more than a single system or a limited group of users.
disaster recovery
A place where the computers, devices, and connectivity necessary to rebuild a network exist, with some
appropriately configured, updated, or connected.

Match each item with a statement below:
a. surge f. availability
b. noise g. cold site
c. brownout h. warm site
d. blackout i. hot site
e. integrity
warm site
Fluctuation in voltage levels caused by other devices on the network or electromagnetic interference.

Match each item with a statement below:
a. surge f. availability
b. noise g. cold site
c. brownout h. warm site
d. blackout i. hot site
e. integrity
noise
Refers to how consistently and reliably a file or system can be accessed by authorized personnel.

Match each item with a statement below:
a. surge f. availability
b. noise g. cold site
c. brownout h. warm site
d. blackout i. hot site
e. integrity
availability
A momentary decrease in voltage.


Match each item with a statement below:
a. surge f. availability
b. noise g. cold site
c. brownout h. warm site
d. blackout i. hot site
e. integrity
brownout
A place where the computers, devices, and connectivity necessary to rebuild a network exist, but they are not
appropriately configured, updated, or connected.

Match each item with a statement below:
a. surge f. availability
b. noise g. cold site
c. brownout h. warm site
d. blackout i. hot site
e. integrity
cold site
A complete power loss.



Match each item with a statement below:
a. surge f. availability
b. noise g. cold site
c. brownout h. warm site
d. blackout i. hot site
e. integrity
blackout
The MIME standard replaces SMTP.
F
POP3 's design makes it best suited to users who retrieve their mail from the same workstation all the time.
T
An off-the-shelf workstation can be programmed to act like an IP telephone.
T
IP telephones are directly connected to the local loop.
F
It is more difficult to transmit VoIP and video over IP signals over a packet-switched network than it is to transmit data signals.
T
Human errors, ignorance, and omissions cause more than half of all security breaches sustained by
networks.
T
A security policy should state exactly which hardware, software, architecture, or protocols will be used to ensure security
F
Encryption is the last means of defense against data theft.
T
By default, the 802.11 standard offers substantial security.
F
An anti-malware policy is meant to protect the network from damage and downtime.
T
A class____network class is reserved for special purposes.
a. A c. C
b. B d. D
d
In____addressing, only Class A, Class B, and Class C addresses are recognized.
a. classful c. stateful
b. subnet d. limited
classful
In classful addressing, the Class B IPv4 address network ID is located in the____.
a. last 8 bits c. first 8 bits
b. last 16 bits d. first 16 bits
first 16 bits
In classful addressing, Class C IPv4 address host information is located in the____.
a. last 8 bits c. first 8 bits
b. last 16 bits d. first 16 bits
last 8 bits
Within a classful addressing subnet mask, the____bits indicate that corresponding bits in an IPv4
address contain network information.
a. 0 c. first eight
b. 1 d. last eight
1
The result from ANDing 11001111 with 10010001 is____.
a. 11001111 c. 10000001
b. 10010001 d. 00000001
10000001
CIDR notation takes the form of the network ID followed by a(n)____, followed by the number of bits
that are used for the extended network prefix.
a. dash (-) c. backward slash (\)
b. underscore (_) d. forward slash (/)
forward slash (/)
The____gateway is the gateway that first interprets its outbound requests to other subnets, and then
interprets its inbound requests from other subnets.
a. proxy c. Internet
b. core d. default
default
The gateways that make up the Internet backbone are called____. gateways.
a. proxy c. Internet
b. core d. default
core
The standard message format specified by SMTP allows for lines that contain no more than____ASCII
characters.
a. 100 c. 10,000
b. 1000 d. 1,000,000
1000
An administrator can discover the host name assigned to a client by using the____utility.
a. host c. hostname
b. nbstat d. nslookup
hostname
____is the use of one network to simultaneously carry voice, video, and data communications.
a. Multicasting c. Divergence
b. Unicasting d. Convergence
convergence
When VoIP relies on the Internet, it is often called____.
a. telephony c. IP telephony
b. Internet telephony d. voice telephony
internet telephony
IPTV, videoconferencing, streaming video, and IP multicasting belong to the range of services known as
a. voice over IP c. video over IP
b. data over IP d. Web over IP
video over IP
____messaging is a service that makes several forms of communication available from a single user
interface.
a. Unified c. Diversified
b. Instant d. Open
Unified
Using VoIP over a WAN allows an organization to avoid paying long-distance telephone charges, a benefit known as____.
a. charge bypass c. toll bypass
b. distance bypass d. easypass
toll bypass
When using an analog telephone, a VoIP adapter that performs analog-to-digital conversion is known as
a(n)____.
a. VTA (voice telephone adapter) c. DTA (digital telephone adapter)
b. ATA (analog telephone adapter) d. DTA (data telephone adapter)
ATA
In general, a(n)____is a private switch that accepts and interprets both analog and digital voice signals.
a. IP-PBX c. DataPBX
b. analog PBX d. IT-PBX
IP-PBX
One drawback to____video is that content may not be edited before it's distributed.
a. on demand c. streaming server
b. live streaming d. VoIP
live streaming
When more than two people participate in a videoconference, for example, in a point-to-multipoint or multipoint-to-multipoint scenario, a video____is required.
a. bridge c. gateway
b. switch d. router
bridge
A(n)____is a computer that manages multiple media gateways.
a. MPLS c. MEGACO
b. MGCP d. MGC
MGC
Many network engineers consider____to be superior to MGCP.
a. SIP c. MEGACO
b. RTCP d. MGC
MEGACO
An NOS that contains a "back door"is an example of a risk associated with____.
a. people c. protocols and software
b. transmission and hardware d. Internet access
protocols and software
A____attack occurs when a system becomes unable to function because it has been deluged with data
transmissions or otherwise disrupted.
a. flashing c. war driving
b. denial-of-service d. phishing
denial-of-service
A____main function is to examine packets and determine where to direct them based on their Network
layer addressing information.
a. switch's c. router's
b. gateway's d. proxy server's
router's
A____firewall is a router (or a computer installed with software that enables it to act as a router) that
examines the header of every packet of data it receives to determine whether that type of packet is authorized to continue to its destination.
a. packet-filtering c. proxy
b. gateway d. selective
packet-filtering
A____attack occurs when a hacker tries numerous possible character combinations to find the key that
will decrypt encrypted data.
a. flashing c. dictionary
b. denial-of-service d. brute force
brute force
A(n)____is a password-protected and encrypted file that holds an individual's identification
information, including a public key.
a. digital certificate c. access control list
b. authentication file d. authentication certificate
digital certificate
The use of certificate authorities to associate public keys with certain users is known as____.
a. PGP c. IPSec
b. PKI d. SSL
PKI
__is a public key encryption system that can verify the authenticity of an e-mail sender and encrypt
e-mail data in transmission.
a. PGP c. IPSec
b. SSH d. SSL
PGP
____is a method of encrypting TCP/IP transmissions.
a. PGP c. PAP
b. IPSec d. SSL
SSL
In____, a hacker forges name server records to falsify his host's identity.
a. IP spoofing c. ID spoofing
b. DNS spoofing d. DHCP spoofing
DNS spoofing
____are programs that run independently and travel between computers and across networks.
a. Viruses c. Bots
b. Worms d. Trojan horses
Worms
A(n)____virus disguises itself as a legitimate program to prevent detection.
a. stealth c. time dependent
b. encrypted d. polymorphic
stealth
____scanning detects malware by comparing a file's content with known malware signatures in a
signature database.
a. Integrity checking c. Signature
b. Polymorphic d. Heuristic
Signature
____detects malware by comparing current characteristics of files and disks against an archived version
of these characteristics to discover any changes.
a. Integrity checking c. Signature
b. Polymorphic d. Heuristic
Integrity checking
Mesh topologies and____topologies are good choices for highly available enterprise networks.
a. star c. bus
b. SONET rings d. ring
SONET rings
____is an automatic distribution of traffic over multiple links or processors to optimize response.
a. Redundancy c. RAID
b. Failover d. Load balancing
Load balancing
____provides redundancy through a process called disk mirroring.
a. RAID Level 0 c. RAID Level 3
b. RAID Level 1 d. RAID Level 5
RAID Level 1
`In____, parity error checking occurs when data is written across the disk array.
a. RAID Level 0 c. RAID Level 3
b. RAID Level 1 d. RAID Level 5
RAID Level 3
____is a specialized storage device or group of storage devices that provides centralized fault-tolerant
data storage for a network.
a. NAS c. SANs
b. RAID d. Optical media
NAS
An archive____is a file attribute that can be checked or unchecked to indicate whether the file must be
archived.
a. bit c. word
b. byte d. field
bit
Displays TCP/IP statistics and details about TCP/IP components and connections on a host.


Match each item with a statement below:
a. ipconfig utility f. dig utility
b. ifconfig utility g. nslookup utility
c. netstat utility h. whois utility
d. nbstat utility i. traceroute utility
e. host utility
host utility
Allows an administrator to query the DNS database from any computer on the network and find the host name of a device by specifying its IP address, or vice versa.

Match each item with a statement below:
a. ipconfig utility f. dig utility
b. ifconfig utility g. nslookup utility
c. netstat utility h. whois utility
d. nbstat utility i. traceroute utility
e. host utility
nslookup utility
Useful only on networks that run Windows-based operating systems and NetBIOS.

Match each item with a statement below:
a. ipconfig utility f. dig utility
b. ifconfig utility g. nslookup utility
c. netstat utility h. whois utility
d. nbstat utility i. traceroute utility
e. host utility
ndstat utility
Allows an administrator to query a DNS database and find the host name associated with a specific IP address or vice versa.


Match each item with a statement below:
a. ipconfig utility f. dig utility
b. ifconfig utility g. nslookup utility
c. netstat utility h. whois utility
d. nbstat utility i. traceroute utility
e. host utility
dig utility
The TCP/IP administration utility for use with Windows NT, 2000, XP, Vista, Server 2003, and Server 2008 operating systems.


Match each item with a statement below:
a. ipconfig utility f. dig utility
b. ifconfig utility g. nslookup utility
c. netstat utility h. whois utility
d. nbstat utility i. traceroute utility
e. host utility
ipconfig utility
Queries a DNS registration database and obtain information about a domain.


Match each item with a statement below:
a. ipconfig utility f. dig utility
b. ifconfig utility g. nslookup utility
c. netstat utility h. whois utility
d. nbstat utility i. traceroute utility
e. host utility
whois utility
Used if an administrator already know a host's name and wants to learn its IP address


Match each item with a statement below:
a. ipconfig utility f. dig utility
b. ifconfig utility g. nslookup utility
c. netstat utility h. whois utility
d. nbstat utility i. traceroute utility
e. host utility
host utility
The TCP/IP configuration and management utility used on UNIX and Linux systems.

Match each item with a statement below:
a. ipconfig utility f. dig utility
b. ifconfig utility g. nslookup utility
c. netstat utility h. whois utility
d. nbstat utility i. traceroute utility
e. host utility
ifconfig utility
Uses ICMP ECHO requests to trace the path from one networked node to another, identifying all intermediate hops between the two nodes.


Match each item with a statement below:
a. ipconfig utility f. dig utility
b. ifconfig utility g. nslookup utility
c. netstat utility h. whois utility
d. nbstat utility i. traceroute utility
e. host utility
traceroute utility
A collection of H.323 terminals, gateways, and MCUs that are managed by a single H.323 gatekeeper

Match each item with a statement below:
a. H.323 terminal f. H.225
b. H.323 gateway g. H.245
c. H.323 gatekeeper h. RTF
d. MCU (multipoint control unit) i. RSVP
e. H.323 zone
H.323 zone
A device providing translation between network devices running H.323 signaling protocols and devices running other types of signaling protocols.

Match each item with a statement below:
a. H.323 terminal f. H.225
b. H.323 gateway g. H.245
c. H.323 gatekeeper h. RTF
d. MCU (multipoint control unit) i. RSVP
e. H.323 zone
H.323 gateway
Helps voice and video networks overcome UDP's shortcomings.

Match each item with a statement below:
a. H.323 terminal f. H.225
b. H.323 gateway g. H.245
c. H.323 gatekeeper h. RTF
d. MCU (multipoint control unit) i. RSVP
e. H.323 zone
RTP
The H.323 protocol that handles call or videoconference signaling.

Match each item with a statement below:
a. H.323 terminal f. H.225
b. H.323 gateway g. H.245
c. H.323 gatekeeper h. RTF
d. MCU (multipoint control unit) i. RSVP
e. H.323 zone
H.225
Any node that provides audio, visual, or data information to another node.

Match each item with a statement below:
a. H.323 terminal f. H.225
b. H.323 gateway g. H.245
c. H.323 gatekeeper h. RTF
d. MCU (multipoint control unit) i. RSVP
e. H.323 zone
H.323 terminal
Attempts to reserve a specific amount of network resources for a transmission before the transmission occurs.

Match each item with a statement below:
a. H.323 terminal f. H.225
b. H.323 gateway g. H.245
c. H.323 gatekeeper h. RTF
d. MCU (multipoint control unit) i. RSVP
e. H.323 zone
RSVP
A computer that provides support for multiple H.323 terminals and manages communication between them.

Match each item with a statement below:
a. H.323 terminal f. H.225
b. H.323 gateway g. H.245
c. H.323 gatekeeper h. RTF
d. MCU (multipoint control unit) i. RSVP
e. H.323 zone
MCU
The nerve center for networks that adhere to H.323.

Match each item with a statement below:
a. H.323 terminal f. H.225
b. H.323 gateway g. H.245
c. H.323 gatekeeper h. RTF
d. MCU (multipoint control unit) i. RSVP
e. H.323 zone
H.323 gatekeeper
Ensures that the type of information issued to an H.323 terminal is formatted in a way that the H.323 terminal can interpret.

Match each item with a statement below:
a. H.323 terminal f. H.225
b. H.323 gateway g. H.245
c. H.323 gatekeeper h. RTF
d. MCU (multipoint control unit) i. RSVP
e. H.323 zone
h.245
A firewall that can view a data stream.


Match each item with a statement below:
a. IPS f. proxy server
b. IDS g. proxy service
c. content filtering h. public key encryption
d. host-based i. private key encryption
e. stateful
stateful
A software application on a network host that acts as an intermediary between the external and internal networks, screening all incoming and outgoing traffic.


Match each item with a statement below:
a. IPS f. proxy server
b. IDS g. proxy service
c. content filtering h. public key encryption
d. host-based i. private key encryption
e. stateful
proxy service
Software that can only detect and log suspicious activity.

Match each item with a statement below:
a. IPS f. proxy server
b. IDS g. proxy service
c. content filtering h. public key encryption
d. host-based i. private key encryption
e. stateful
IDS
A firewall that protects only the computer on which it is installed.


Match each item with a statement below:
a. IPS f. proxy server
b. IDS g. proxy service
c. content filtering h. public key encryption
d. host-based i. private key encryption
e. stateful
host-based
Data is encrypted using two keys.


Match each item with a statement below:
a. IPS f. proxy server
b. IDS g. proxy service
c. content filtering h. public key encryption
d. host-based i. private key encryption
e. stateful
public key encryption
A firewall that can block designated types of traffic based on application data contained within packets.

Match each item with a statement below:
a. IPS f. proxy server
b. IDS g. proxy service
c. content filtering h. public key encryption
d. host-based i. private key encryption
e. stateful
content filtering
Data is encrypted using a single key.


Match each item with a statement below:
a. IPS f. proxy server
b. IDS g. proxy service
c. content filtering h. public key encryption
d. host-based i. private key encryption
e. stateful
private key encryption