network 3

61 terms by mtc2289 

Ready to study?
Start with Flashcards

Create a new folder

Advertisement Upgrade to remove ads

The gateways that make up the Internet backbone are called ____ gateways.

core

An example of a popular mail server is ____.

Microsoft Exchange Server

An example of a popular client email software is ____.

Microsoft Outlook

SMTP operates from port ____.

25

The standard message format specified by SMTP allows for lines that contain no more than ____ ASCII characters.

1000

POP3 (Post Office Protocol, version 3) relies on TCP and operates over port ____.

110

IMAP (Internet Message Access Protocol) is a mail retrieval protocol that was developed as a more sophisticated alternative to ____.

POP3

An administrator can discover the host name assigned to a client by using the ____ utility.

hostname

A program similar to mtr, ____, is available as a command-line utility in Windows XP, Vista, Server 2003, and Server 2008.

pathping

The ____ utility allows you to view a host's routing table.

route

____________________ separates a network into multiple logically defined segments, or subnets.

Subnetting

The gateways that make up the Internet backbone are called ____________________.

core gateways

The combination of additional bits used for subnet information plus the existing network ID is known as the _________________________.

extended network prefix

____ is a social engineering practice in which a person attempts to glean access or authentication information by posing as someone who needs that information.

Phising

In a ____ attack, a person redirects or captures secure transmissions as they occur.

man-in-the-middle

____ software searches a node for open ports.

Port scanner

A router that is not configured to drop packets that match certain suspicious characteristics is an example of a risk associated with ____.

transmission and hardware

A ____ attack occurs when an Internet chat user sends commands to a victim's machine that cause the screen to fill with garbage characters and requires the victim to terminate their chat sessions.

flashing

A ____ main function is to examine packets and determine where to direct them based on their Network layer addressing information.

router's

A ____ firewall is a router (or a computer installed with software that enables it to act as a router) that examines the header of every packet of data it receives to determine whether that type of packet is authorized to continue to its destination.

packet-filtering

A ____ attack occurs when a hacker uses programs that try a combination of a user ID and every word in a dictionary to gain access to the network.

dictionary

The combination of a public key and a private key is known as a ____.

key pair

A(n) ____ is a password-protected and encrypted file that holds an individual's identification information, including a public key.

digital certificate

____ is a method of encrypting TCP/IP transmissions.

SSL

In ____ , a hacker forges name server records to falsify his host's identity.

DNS spoofing

____ is a social engineering practice in which a person attempts to glean access or authentication information by posing as someone who needs that information.

Phishing

A VPN ____ authenticates VPN clients and establishes tunnels for VPN connections.

concentrator

____ protocols are the rules that computers follow to accomplish authentication.

Authentication

RADIUS and TACACS belong to a category of protocols known as AAA (____).

authentication, authorization, and accounting

A router that is not configured to drop packets that match certain suspicious characteristics is an example of a risk associated with ____.

transmission ad hardware

In ____, both computers verify the credentials of the other.

mutual authentication

An NOS that contains a "back door"is an example of a risk associated with ____.

protocols and software

A ____ attack occurs when an Internet chat user sends commands to a victim's machine that cause the screen to fill with garbage characters and requires the victim to terminate their chat sessions.

flashing

A ____ main function is to examine packets and determine where to direct them based on their Network layer addressing information.

router's

A ____ firewall is a router (or a computer installed with software that enables it to act as a router) that examines the header of every packet of data it receives to determine whether that type of packet is authorized to continue to its destination.

packet-filtering

A ____ attack occurs when a hacker uses programs that try a combination of a user ID and every word in a dictionary to gain access to the network.

dictionary

The combination of a public key and a private key is known as a ____.

key pair

A(n) ____ is a password-protected and encrypted file that holds an individual's identification information, including a public key.

digital certificate

The use of certificate authorities to associate public keys with certain users is known as ____.

PKI

A VPN ____ authenticates VPN clients and establishes tunnels for VPN connections.

concentrator

____ protocols are the rules that computers follow to accomplish authentication.

Authentication

An administrator should take the time to troubleshoot all network problems correctly by asking specific questions designed to identify the problem ____.

scope

____ are often considered first-level support.

Help desk analysts

____ are often considered third-level support.

Help desk coordinators

____ is one of the most important aspects to consider when looking at how a problem solution might affect users and network functionality.

Scope

A ____ is a document (preferably online) that lists every service and software package supported within an organization, plus the names of first- and second-level support contacts for those services or software packages.

supported services list

In a ____ cable, the transmit and receive wire pairs in one of the connectors are reversed.

crossover

____ is a fundamental property of wire that depends on a wire's molecular structure and size.

tone generator

____ is a fundamental property of wire that depends on a wire's molecular structure and size.

Resistance

Resistance is measured in ____.

ohms

____ is the telltale factor for ascertaining where faults in a cable lie.

Impedance

When used on a copper-based cable, a continuity tester applies a small amount of ____ to each conductor at one end of the cable.

voltage

A ____ can be used to intercept a telephone conversation.

butt set

A ____ is a software-based tool that continually monitors network traffic from a server or workstation attached to the network.

network monitor

To take advantage of network monitoring and analyzing tools, the network adapter installed in the machine running the software must support ____ mode.

promiscuous

____ packets exceed the medium's maximum packet size.

Giant

A ____ usually results from a bad NIC.

jabber

A ____ can generate traffic in an attempt to reproduce a network problem and monitor multiple network segments simultaneously.

protocol analyzer

The danger in using a ____ is that it could collect more information than you or the machine can reasonably process.

protocol analyzer

Before using a network monitor or protocol analyzer on a network, it is important to know what ____ on your network normally looks like.

traffic

Viewing the status of the wireless connection on your workstation tells you ____ about your wireless environment.

a little

Please allow access to your computer’s microphone to use Voice Recording.

Having trouble? Click here for help.

We can’t access your microphone!

Click the icon above to update your browser permissions above and try again

Example:

Reload the page to try again!

Reload

Press Cmd-0 to reset your zoom

Press Ctrl-0 to reset your zoom

It looks like your browser might be zoomed in or out. Your browser needs to be zoomed to a normal size to record audio.

Please upgrade Flash or install Chrome
to use Voice Recording.

For more help, see our troubleshooting page.

Your microphone is muted

For help fixing this issue, see this FAQ.

Star this term

You can study starred terms together

NEW! Voice Recording

Create Set