Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
166 Cards in this Set
- Front
- Back
In____addressing, only Class A, Class B, and Class C addresses are recognized.
a. classful c. stateful b. subnet d. limited |
classful
|
|
Within a classful addressing,____is the default subnet mask for a Class C address.
a. 255.255.255.255 c. 255.255.0.0 b. 255.255.255.0 d. 255.0.0.0 |
255.255.255.0
|
|
The result from ANDing 11001111 with 10010001 is____.
a. 11001111 c. 10000001 b. 10010001 d. 00000001 |
10000001
|
|
An example of a popular mail server is____.
a. Eudora c. AOL mail b. Microsoft Outlook d. Microsoft Exchange Server |
Microsoft Exchange Server
|
|
An example of a popular client email software is____.
a. MIME c. Sendmail b. Microsoft Outlook d. Microsoft Exchange Server |
Microsoft Outlook
|
|
SMTP operates from port____.
a. 25 c. 110 b. 11 d. 250 |
25
|
|
The standard message format specified by SMTP allows for lines that contain no more than____ASCII
characters. a. 100 c. 10,000 b. 1000 d. 1,000,000 |
1000
|
|
POPS (Post Office Protocol, version 3) relies on TCP and operates over port____.
a. 25 c. 110 b. 11 d. 250 |
110
|
|
A program similar to mtr,____, is available as a command-line utility in Windows XP, Vista, Server 2003,
and Server 2008. a. nbstat c. dig b. pathping d. route |
pathping
|
|
The____utility allows you to view a host's routing table.
a. nbstat c. dig b. pathping d. route |
route
|
|
____________________separates a network into multiple logically defined segments, or subnets.
|
subnetting
|
|
The gateways that make up the Internet backbone are called____________________.
|
core gateways
|
|
The combination of additional bits used for subnet information plus the existing network ID is known as the
_________________ |
extended network prefix
|
|
________________________________________is the protocol responsible for moving messages from one
mail server to another over TCP/IP-based networks. |
SMTP
|
|
_____________________________________________is a standard for encoding and interpreting binary
files, images, video, and non-ASCII character sets within an e-mail message. |
MIME
|
|
Displays TCP/IP statistics and details about TCP/IP components and connections on a host.
Match each item with a statement below: a. ipconfig utility f. dig utility b. ifconfig utility g. nslookup utility c. netstat utility h. whois utility d. nbstat utility i. traceroute utility e. host utility |
netstat utility
|
|
Allows an administrator to query the DNS database from any computer on the network and find the host
name of a device by specifying its IP address, or vice versa. Match each item with a statement below: a. ipconfig utility f. dig utility b. ifconfig utility g. nslookup utility c. netstat utility h. whois utility d. nbstat utility i. traceroute utility e. host utility |
nslookup utility
|
|
Allows an administrator to query a DNS database and find the host name associated with a specific IP
address or vice versa. Match each item with a statement below: a. ipconfig utility f. dig utility b. ifconfig utility g. nslookup utility c. netstat utility h. whois utility d. nbstat utility i. traceroute utility e. host utility |
dig utility
|
|
The TCP/IP administration utility for use with Windows NT, 2000, XP, Vista, Server 2003, and Server 2008
operating systems. Match each item with a statement below: a. ipconfig utility f. dig utility b. ifconfig utility g. nslookup utility c. netstat utility h. whois utility d. nbstat utility i. traceroute utility e. host utility |
ipconfig utility
|
|
Used if an administrator already know a host's name and wants to learn its IP address.
Match each item with a statement below: a. ipconfig utility f. dig utility b. ifconfig utility g. nslookup utility c. netstat utility h. whois utility d. nbstat utility i. traceroute utility e. host utility |
host utility
|
|
The TCP/IP configuration and management utility used on UNIX and Linux systems.
Match each item with a statement below: a. ipconfig utility f. dig utility b. ifconfig utility g. nslookup utility c. netstat utility h. whois utility d. nbstat utility i. traceroute utility e. host utility |
ifconfig utility
|
|
When VoIP relies on the Internet, it is often called____.
a. telephony c. IP telephony b. Internet telephony d. voice telephony |
Internet telephony
|
|
Using VoIP over a WAN allows an organization to avoid paying long-distance telephone charges, a benefit
known as____. a. charge bypass c. toll bypass b. distance bypass d. easypass |
toll bypass
|
|
The popular Internet telephony software, Skype, is a type of____.
a. IP telephone c. teleapplication b. softphone d. compu-phone |
softphone
|
|
One drawback to____video is that content may not be edited before it's distributed.
a. on demand c. streaming server b. live streaming d. VoIP |
live streaming
|
|
Many streaming video services - and nearly all of those issued over a public network, such as the Internet -
are examples of____transmissions. a. multicast c. unicast b. broadcast d. telecast |
unicast
|
|
When more than two people participate in a videoconference, for example, in a point-to-multipoint or
multipoint-to-multipoint scenario, a video____is required. a. bridge c. gateway b. switch d. router |
bridge
|
|
SIP and H.323 regulate____for VoIP or video-over-IP clients and servers.
a. call signaling only b. control only c. call signaling and control d. communication between media gateways |
call signaling and control
|
|
Many network engineers consider____to be superior to MGCP.
a. SIP c. MEGACO b. RTCP d. MGC |
MEGACO
|
|
____is preferred over TCP for real-time applications such as telephone conversations and
videoconferencing. a. RTP c. RTCP b. UDP d. SIP |
UDP
|
|
____is a measure of how well a network service matches its expected performance.
a. QoS c. DiffServ b. RSVP d. MPLS |
QoS
|
|
When streaming videos are supplied via the Web, they are often called____________________
|
Webcasts
|
|
Many VoIP vendors prefer____________________over H.323.
|
SIP
|
|
____________________performs the same functions as MGCP, but using different commands and
processes. |
MEGACO
|
|
______________________________is a simple technique that addresses QoS issues by prioritizing traffic
|
DiffServ
|
|
______________________________is a QoS technique that replaces the IP datagram header with a label at
the first router a data stream encounters. |
MPLS
|
|
A device providing translation between network devices running H.323 signaling protocols and devices
running other types of signaling protocols. Match each item with a statement below: a. H.323 terminal f. H.225 b. H.323 gateway g. H.245 c. H.323 gatekeeper h. RTP d. MCU (multipoint control unit) i. RSVP e. H.323 zone |
H.323 gateway
|
|
The H.323 protocol that handles call or videoconference signaling.
Match each item with a statement below: a. H.323 terminal f. H.225 b. H.323 gateway g. H.245 c. H.323 gatekeeper h. RTP d. MCU (multipoint control unit) i. RSVP e. H.323 zone |
H.225
|
|
Any node that provides audio, visual, or data information to another node.
Match each item with a statement below: a. H.323 terminal f. H.225 b. H.323 gateway g. H.245 c. H.323 gatekeeper h. RTP d. MCU (multipoint control unit) i. RSVP e. H.323 zone |
H.323 terminal
|
|
A computer that provides support for multiple H.323 terminals and manages communication between them.
Match each item with a statement below: a. H.323 terminal f. H.225 b. H.323 gateway g. H.245 c. H.323 gatekeeper h. RTP d. MCU (multipoint control unit) i. RSVP e. H.323 zone |
MCU (multipoint control unit)
|
|
The nerve center for networks that adhere to H.323.
Match each item with a statement below: a. H.323 terminal f. H.225 b. H.323 gateway g. H.245 c. H.323 gatekeeper h. RTP d. MCU (multipoint control unit) i. RSVP e. H.323 zone |
H.323 gatekeeper
|
|
Ensures that the type of information issued to an H.323 terminal is formatted in a way that the H.323 terminal
can interpret. Match each item with a statement below: a. H.323 terminal f. H.225 b. H.323 gateway g. H.245 c. H.323 gatekeeper h. RTP d. MCU (multipoint control unit) i. RSVP e. H.323 zone |
H.245
|
|
____is a social engineering practice in which a person attempts to glean access or authentication information
by posing as someone who needs that information. a. Cracking c. War driving b. Hacking d. Phishing |
Phishing
|
|
In a____attack, a person redirects or captures secure transmissions as they occur.
a. denial-of service c. war driving b. man-in-the-middle d. phishing |
man-in-the-middle
|
|
A____attack occurs when an Internet chat user sends commands to a victim's machine that cause the screen
to fill with garbage characters and requires the victim to terminate their chat sessions. a. flashing c. war driving b. denial-of-service d. phishing |
flashing
|
|
A____attack occurs when a system becomes unable to function because it has been deluged with data
transmissions or otherwise disrupted. a. flashing c. war driving b. denial-of-service d. phishing |
denial-of-service
|
|
A____attack occurs when a hacker uses programs that try a combination of a user ID and every word in a
dictionary to gain access to the network. a. flashing c. dictionary b. denial-of-service d. brute force |
dictionary
|
|
A____attack occurs when a hacker tries numerous possible character combinations to find the key that will
decrypt encrypted data. a. flashing c. dictionary b. denial-of-service d. brute force |
brute force
|
|
____is a public key encryption system that can verify the authenticity of an e-mail sender and encrypt e-mail
data in transmission. a. PGP c. IPSec b. SSH d. SSL |
PGP
|
|
In____, a hacker forges name server records to falsify his host's identity.
a. IP spoofing c. ID spoofing b. DNS spoofing d. DHCP spoofing |
DNS spoofing
|
|
A VPN____authenticates VPN clients and establishes tunnels for VPN connections.
a. router c. concentrator b. service d. certificate authority |
concentrator
|
|
RADIUS and TACACS belong to a category of protocols known as AAA (____).
a. access, authorization, and accounting b. authentication, authorization, and accounting c. authentication, authorization, and authority d. authentication, authorization, and access |
uthentication, authorization, and accounting
|
|
A(n)____________________is a thorough examination of each aspect of the network to determine how it
might be compromised. |
security audit
|
|
A(n)____________________identifies an organization's security risks, levels of authority, designated
security coordinator and team members, responsibilities for each team member, and responsibilities for each employee. |
security policy
|
|
In general, information is____________________if it could be used by other parties to impair an
organization's functioning, decrease customers' confidence, cause a financial loss, damage an organization's status, or give a significant advantage to a competitor. |
confidential
|
|
A(n)____________________is a software application on a network host that acts as an intermediary
between the external and internal networks, screening all incoming and outgoing traffic. |
proxy service
|
|
____________________is the use of an algorithm to scramble data into a format that can be read only by
reversing the algorithm. |
encryption
|
|
A firewall that can view a data stream.
Match each item with a statement below: a. IPS f. proxy server b. IDS g. proxy service c. content filtering h. public key encryption d. host-based i. private key encryption e. stateful |
stateful
|
|
A software application on a network host that acts as an intermediary between the external and internal networks, screening all incoming and outgoing traffic.
Match each item with a statement below: a. IPS f. proxy server b. IDS g. proxy service c. content filtering h. public key encryption d. host-based i. private key encryption e. stateful |
proxy service
|
|
Software that can only detect and log suspicious activity.
Match each item with a statement below: a. IPS f. proxy server b. IDS g. proxy service c. content filtering h. public key encryption d. host-based i. private key encryption e. stateful |
IDS
|
|
A firewall that protects only the computer on which it is installed.
Match each item with a statement below: a. IPS f. proxy server b. IDS g. proxy service c. content filtering h. public key encryption d. host-based i. private key encryption e. stateful |
host-based
|
|
Data is encrypted using two keys.
Match each item with a statement below: a. IPS f. proxy server b. IDS g. proxy service c. content filtering h. public key encryption d. host-based i. private key encryption e. stateful |
public key encryption
|
|
Software that can react to suspicious activity.
Match each item with a statement below: a. IPS f. proxy server b. IDS g. proxy service c. content filtering h. public key encryption d. host-based i. private key encryption e. stateful |
IPS
|
|
Protection against harmful code involves more than just installing anti-malware software.
|
T
|
|
When implementing anti-malware software on a network, one of your most important decisions is where to
install the software. |
T
|
|
An anti-malware policy is meant to protect the network from damage and downtime.
|
T
|
|
The goal of fault-tolerant systems is to prevent failures from progressing to faults.
|
F
|
|
Generators provide surge protection.
|
F
|
|
____is intended to eliminate single points of failure.
a. Availability c. Contingency b. Redundancy d. Integrity |
Redundancy
|
|
____are programs that run independently and travel between computers and across networks.
a. Viruses c. Bots b. Worms d. Trojan horses |
Worms
|
|
A(n)____virus disguises itself as a legitimate program to prevent detection.
a. stealth c. time dependent b. encrypted d. polymorphic |
stealth
|
|
____scanning detects malware by comparing a file's content with known malware signatures in a signature
database. a. Integrity checking c. Signature b. Polymorphic d. Heuristic |
Signature
|
|
A(n)____is a deviation from a specified level of system performance for a given period of time.
a. fault c. error b. failure d. hoax |
failure
|
|
Power that is free from noise is called "____" power.
a. clear c. filtered b. clean d. white |
clean
|
|
Mesh topologies and____topologies are good choices for highly available enterprise networks.
a. star c. bus b. SONET rings d. ring |
SONET rings
|
|
In____, parity error checking occurs when data is written across the disk array.
a. RAID Level 0 c. RAID Level 3 b. RAID Level 1 d. RAID Level 5 |
RAID Level 3
|
|
____is a type of media capable of storing digitized data and that uses a laser to write data to it and read data
from it. a. Tape backup media c. Fiber optic media b. Optical media d. USB |
Optical media
|
|
An archive____is a file attribute that can be checked or unchecked to indicate whether the file must be
archived. a. bit c. word b. byte d. field |
bit
|
|
Many bots spread through the_________________________, a protocol that enables users running IRC client
software to communicate instantly with other participants in a chat room on the Internet. |
IRC
|
|
A(n)___________________________________is a battery-operated power source directly attached to one
or more devices and to a power supply (such as a wall outlet) that prevents undesired features of the wall outlet's A/C power from harming the device or interrupting its services. |
UPS
|
|
____________________________________________________________refers to a collection of disks that
provide fault tolerance for shared data and applications. |
Raid
|
|
A(n)____________________is a copy of data or program files created for archiving or safekeeping.
|
Backup
|
|
____________________is the process of restoring your critical functionality and data after an
enterprise-wide outage that affects more than a single system or a limited group of users. |
disaster recovery
|
|
A place where the computers, devices, and connectivity necessary to rebuild a network exist, with some
appropriately configured, updated, or connected. Match each item with a statement below: a. surge f. availability b. noise g. cold site c. brownout h. warm site d. blackout i. hot site e. integrity |
warm site
|
|
Fluctuation in voltage levels caused by other devices on the network or electromagnetic interference.
Match each item with a statement below: a. surge f. availability b. noise g. cold site c. brownout h. warm site d. blackout i. hot site e. integrity |
noise
|
|
Refers to how consistently and reliably a file or system can be accessed by authorized personnel.
Match each item with a statement below: a. surge f. availability b. noise g. cold site c. brownout h. warm site d. blackout i. hot site e. integrity |
availability
|
|
A momentary decrease in voltage.
Match each item with a statement below: a. surge f. availability b. noise g. cold site c. brownout h. warm site d. blackout i. hot site e. integrity |
brownout
|
|
A place where the computers, devices, and connectivity necessary to rebuild a network exist, but they are not
appropriately configured, updated, or connected. Match each item with a statement below: a. surge f. availability b. noise g. cold site c. brownout h. warm site d. blackout i. hot site e. integrity |
cold site
|
|
A complete power loss.
Match each item with a statement below: a. surge f. availability b. noise g. cold site c. brownout h. warm site d. blackout i. hot site e. integrity |
blackout
|
|
The MIME standard replaces SMTP.
|
F
|
|
POP3 's design makes it best suited to users who retrieve their mail from the same workstation all the time.
|
T
|
|
An off-the-shelf workstation can be programmed to act like an IP telephone.
|
T
|
|
IP telephones are directly connected to the local loop.
|
F
|
|
It is more difficult to transmit VoIP and video over IP signals over a packet-switched network than it is to transmit data signals.
|
T
|
|
Human errors, ignorance, and omissions cause more than half of all security breaches sustained by
networks. |
T
|
|
A security policy should state exactly which hardware, software, architecture, or protocols will be used to ensure security
|
F
|
|
Encryption is the last means of defense against data theft.
|
T
|
|
By default, the 802.11 standard offers substantial security.
|
F
|
|
An anti-malware policy is meant to protect the network from damage and downtime.
|
T
|
|
A class____network class is reserved for special purposes.
a. A c. C b. B d. D |
d
|
|
In____addressing, only Class A, Class B, and Class C addresses are recognized.
a. classful c. stateful b. subnet d. limited |
classful
|
|
In classful addressing, the Class B IPv4 address network ID is located in the____.
a. last 8 bits c. first 8 bits b. last 16 bits d. first 16 bits |
first 16 bits
|
|
In classful addressing, Class C IPv4 address host information is located in the____.
a. last 8 bits c. first 8 bits b. last 16 bits d. first 16 bits |
last 8 bits
|
|
Within a classful addressing subnet mask, the____bits indicate that corresponding bits in an IPv4
address contain network information. a. 0 c. first eight b. 1 d. last eight |
1
|
|
The result from ANDing 11001111 with 10010001 is____.
a. 11001111 c. 10000001 b. 10010001 d. 00000001 |
10000001
|
|
CIDR notation takes the form of the network ID followed by a(n)____, followed by the number of bits
that are used for the extended network prefix. a. dash (-) c. backward slash (\) b. underscore (_) d. forward slash (/) |
forward slash (/)
|
|
The____gateway is the gateway that first interprets its outbound requests to other subnets, and then
interprets its inbound requests from other subnets. a. proxy c. Internet b. core d. default |
default
|
|
The gateways that make up the Internet backbone are called____. gateways.
a. proxy c. Internet b. core d. default |
core
|
|
The standard message format specified by SMTP allows for lines that contain no more than____ASCII
characters. a. 100 c. 10,000 b. 1000 d. 1,000,000 |
1000
|
|
An administrator can discover the host name assigned to a client by using the____utility.
a. host c. hostname b. nbstat d. nslookup |
hostname
|
|
____is the use of one network to simultaneously carry voice, video, and data communications.
a. Multicasting c. Divergence b. Unicasting d. Convergence |
convergence
|
|
When VoIP relies on the Internet, it is often called____.
a. telephony c. IP telephony b. Internet telephony d. voice telephony |
internet telephony
|
|
IPTV, videoconferencing, streaming video, and IP multicasting belong to the range of services known as
a. voice over IP c. video over IP b. data over IP d. Web over IP |
video over IP
|
|
____messaging is a service that makes several forms of communication available from a single user
interface. a. Unified c. Diversified b. Instant d. Open |
Unified
|
|
Using VoIP over a WAN allows an organization to avoid paying long-distance telephone charges, a benefit known as____.
a. charge bypass c. toll bypass b. distance bypass d. easypass |
toll bypass
|
|
When using an analog telephone, a VoIP adapter that performs analog-to-digital conversion is known as
a(n)____. a. VTA (voice telephone adapter) c. DTA (digital telephone adapter) b. ATA (analog telephone adapter) d. DTA (data telephone adapter) |
ATA
|
|
In general, a(n)____is a private switch that accepts and interprets both analog and digital voice signals.
a. IP-PBX c. DataPBX b. analog PBX d. IT-PBX |
IP-PBX
|
|
One drawback to____video is that content may not be edited before it's distributed.
a. on demand c. streaming server b. live streaming d. VoIP |
live streaming
|
|
When more than two people participate in a videoconference, for example, in a point-to-multipoint or multipoint-to-multipoint scenario, a video____is required.
a. bridge c. gateway b. switch d. router |
bridge
|
|
A(n)____is a computer that manages multiple media gateways.
a. MPLS c. MEGACO b. MGCP d. MGC |
MGC
|
|
Many network engineers consider____to be superior to MGCP.
a. SIP c. MEGACO b. RTCP d. MGC |
MEGACO
|
|
An NOS that contains a "back door"is an example of a risk associated with____.
a. people c. protocols and software b. transmission and hardware d. Internet access |
protocols and software
|
|
A____attack occurs when a system becomes unable to function because it has been deluged with data
transmissions or otherwise disrupted. a. flashing c. war driving b. denial-of-service d. phishing |
denial-of-service
|
|
A____main function is to examine packets and determine where to direct them based on their Network
layer addressing information. a. switch's c. router's b. gateway's d. proxy server's |
router's
|
|
A____firewall is a router (or a computer installed with software that enables it to act as a router) that
examines the header of every packet of data it receives to determine whether that type of packet is authorized to continue to its destination. a. packet-filtering c. proxy b. gateway d. selective |
packet-filtering
|
|
A____attack occurs when a hacker tries numerous possible character combinations to find the key that
will decrypt encrypted data. a. flashing c. dictionary b. denial-of-service d. brute force |
brute force
|
|
A(n)____is a password-protected and encrypted file that holds an individual's identification
information, including a public key. a. digital certificate c. access control list b. authentication file d. authentication certificate |
digital certificate
|
|
The use of certificate authorities to associate public keys with certain users is known as____.
a. PGP c. IPSec b. PKI d. SSL |
PKI
|
|
__is a public key encryption system that can verify the authenticity of an e-mail sender and encrypt
e-mail data in transmission. a. PGP c. IPSec b. SSH d. SSL |
PGP
|
|
____is a method of encrypting TCP/IP transmissions.
a. PGP c. PAP b. IPSec d. SSL |
SSL
|
|
In____, a hacker forges name server records to falsify his host's identity.
a. IP spoofing c. ID spoofing b. DNS spoofing d. DHCP spoofing |
DNS spoofing
|
|
____are programs that run independently and travel between computers and across networks.
a. Viruses c. Bots b. Worms d. Trojan horses |
Worms
|
|
A(n)____virus disguises itself as a legitimate program to prevent detection.
a. stealth c. time dependent b. encrypted d. polymorphic |
stealth
|
|
____scanning detects malware by comparing a file's content with known malware signatures in a
signature database. a. Integrity checking c. Signature b. Polymorphic d. Heuristic |
Signature
|
|
____detects malware by comparing current characteristics of files and disks against an archived version
of these characteristics to discover any changes. a. Integrity checking c. Signature b. Polymorphic d. Heuristic |
Integrity checking
|
|
Mesh topologies and____topologies are good choices for highly available enterprise networks.
a. star c. bus b. SONET rings d. ring |
SONET rings
|
|
____is an automatic distribution of traffic over multiple links or processors to optimize response.
a. Redundancy c. RAID b. Failover d. Load balancing |
Load balancing
|
|
____provides redundancy through a process called disk mirroring.
a. RAID Level 0 c. RAID Level 3 b. RAID Level 1 d. RAID Level 5 |
RAID Level 1
|
|
`In____, parity error checking occurs when data is written across the disk array.
a. RAID Level 0 c. RAID Level 3 b. RAID Level 1 d. RAID Level 5 |
RAID Level 3
|
|
____is a specialized storage device or group of storage devices that provides centralized fault-tolerant
data storage for a network. a. NAS c. SANs b. RAID d. Optical media |
NAS
|
|
An archive____is a file attribute that can be checked or unchecked to indicate whether the file must be
archived. a. bit c. word b. byte d. field |
bit
|
|
Displays TCP/IP statistics and details about TCP/IP components and connections on a host.
Match each item with a statement below: a. ipconfig utility f. dig utility b. ifconfig utility g. nslookup utility c. netstat utility h. whois utility d. nbstat utility i. traceroute utility e. host utility |
host utility
|
|
Allows an administrator to query the DNS database from any computer on the network and find the host name of a device by specifying its IP address, or vice versa.
Match each item with a statement below: a. ipconfig utility f. dig utility b. ifconfig utility g. nslookup utility c. netstat utility h. whois utility d. nbstat utility i. traceroute utility e. host utility |
nslookup utility
|
|
Useful only on networks that run Windows-based operating systems and NetBIOS.
Match each item with a statement below: a. ipconfig utility f. dig utility b. ifconfig utility g. nslookup utility c. netstat utility h. whois utility d. nbstat utility i. traceroute utility e. host utility |
ndstat utility
|
|
Allows an administrator to query a DNS database and find the host name associated with a specific IP address or vice versa.
Match each item with a statement below: a. ipconfig utility f. dig utility b. ifconfig utility g. nslookup utility c. netstat utility h. whois utility d. nbstat utility i. traceroute utility e. host utility |
dig utility
|
|
The TCP/IP administration utility for use with Windows NT, 2000, XP, Vista, Server 2003, and Server 2008 operating systems.
Match each item with a statement below: a. ipconfig utility f. dig utility b. ifconfig utility g. nslookup utility c. netstat utility h. whois utility d. nbstat utility i. traceroute utility e. host utility |
ipconfig utility
|
|
Queries a DNS registration database and obtain information about a domain.
Match each item with a statement below: a. ipconfig utility f. dig utility b. ifconfig utility g. nslookup utility c. netstat utility h. whois utility d. nbstat utility i. traceroute utility e. host utility |
whois utility
|
|
Used if an administrator already know a host's name and wants to learn its IP address
Match each item with a statement below: a. ipconfig utility f. dig utility b. ifconfig utility g. nslookup utility c. netstat utility h. whois utility d. nbstat utility i. traceroute utility e. host utility |
host utility
|
|
The TCP/IP configuration and management utility used on UNIX and Linux systems.
Match each item with a statement below: a. ipconfig utility f. dig utility b. ifconfig utility g. nslookup utility c. netstat utility h. whois utility d. nbstat utility i. traceroute utility e. host utility |
ifconfig utility
|
|
Uses ICMP ECHO requests to trace the path from one networked node to another, identifying all intermediate hops between the two nodes.
Match each item with a statement below: a. ipconfig utility f. dig utility b. ifconfig utility g. nslookup utility c. netstat utility h. whois utility d. nbstat utility i. traceroute utility e. host utility |
traceroute utility
|
|
A collection of H.323 terminals, gateways, and MCUs that are managed by a single H.323 gatekeeper
Match each item with a statement below: a. H.323 terminal f. H.225 b. H.323 gateway g. H.245 c. H.323 gatekeeper h. RTF d. MCU (multipoint control unit) i. RSVP e. H.323 zone |
H.323 zone
|
|
A device providing translation between network devices running H.323 signaling protocols and devices running other types of signaling protocols.
Match each item with a statement below: a. H.323 terminal f. H.225 b. H.323 gateway g. H.245 c. H.323 gatekeeper h. RTF d. MCU (multipoint control unit) i. RSVP e. H.323 zone |
H.323 gateway
|
|
Helps voice and video networks overcome UDP's shortcomings.
Match each item with a statement below: a. H.323 terminal f. H.225 b. H.323 gateway g. H.245 c. H.323 gatekeeper h. RTF d. MCU (multipoint control unit) i. RSVP e. H.323 zone |
RTP
|
|
The H.323 protocol that handles call or videoconference signaling.
Match each item with a statement below: a. H.323 terminal f. H.225 b. H.323 gateway g. H.245 c. H.323 gatekeeper h. RTF d. MCU (multipoint control unit) i. RSVP e. H.323 zone |
H.225
|
|
Any node that provides audio, visual, or data information to another node.
Match each item with a statement below: a. H.323 terminal f. H.225 b. H.323 gateway g. H.245 c. H.323 gatekeeper h. RTF d. MCU (multipoint control unit) i. RSVP e. H.323 zone |
H.323 terminal
|
|
Attempts to reserve a specific amount of network resources for a transmission before the transmission occurs.
Match each item with a statement below: a. H.323 terminal f. H.225 b. H.323 gateway g. H.245 c. H.323 gatekeeper h. RTF d. MCU (multipoint control unit) i. RSVP e. H.323 zone |
RSVP
|
|
A computer that provides support for multiple H.323 terminals and manages communication between them.
Match each item with a statement below: a. H.323 terminal f. H.225 b. H.323 gateway g. H.245 c. H.323 gatekeeper h. RTF d. MCU (multipoint control unit) i. RSVP e. H.323 zone |
MCU
|
|
The nerve center for networks that adhere to H.323.
Match each item with a statement below: a. H.323 terminal f. H.225 b. H.323 gateway g. H.245 c. H.323 gatekeeper h. RTF d. MCU (multipoint control unit) i. RSVP e. H.323 zone |
H.323 gatekeeper
|
|
Ensures that the type of information issued to an H.323 terminal is formatted in a way that the H.323 terminal can interpret.
Match each item with a statement below: a. H.323 terminal f. H.225 b. H.323 gateway g. H.245 c. H.323 gatekeeper h. RTF d. MCU (multipoint control unit) i. RSVP e. H.323 zone |
h.245
|
|
A firewall that can view a data stream.
Match each item with a statement below: a. IPS f. proxy server b. IDS g. proxy service c. content filtering h. public key encryption d. host-based i. private key encryption e. stateful |
stateful
|
|
A software application on a network host that acts as an intermediary between the external and internal networks, screening all incoming and outgoing traffic.
Match each item with a statement below: a. IPS f. proxy server b. IDS g. proxy service c. content filtering h. public key encryption d. host-based i. private key encryption e. stateful |
proxy service
|
|
Software that can only detect and log suspicious activity.
Match each item with a statement below: a. IPS f. proxy server b. IDS g. proxy service c. content filtering h. public key encryption d. host-based i. private key encryption e. stateful |
IDS
|
|
A firewall that protects only the computer on which it is installed.
Match each item with a statement below: a. IPS f. proxy server b. IDS g. proxy service c. content filtering h. public key encryption d. host-based i. private key encryption e. stateful |
host-based
|
|
Data is encrypted using two keys.
Match each item with a statement below: a. IPS f. proxy server b. IDS g. proxy service c. content filtering h. public key encryption d. host-based i. private key encryption e. stateful |
public key encryption
|
|
A firewall that can block designated types of traffic based on application data contained within packets.
Match each item with a statement below: a. IPS f. proxy server b. IDS g. proxy service c. content filtering h. public key encryption d. host-based i. private key encryption e. stateful |
content filtering
|
|
Data is encrypted using a single key.
Match each item with a statement below: a. IPS f. proxy server b. IDS g. proxy service c. content filtering h. public key encryption d. host-based i. private key encryption e. stateful |
private key encryption
|