Académique Documents
Professionnel Documents
Culture Documents
The process where one network management console collects data from multiple networked devices at regular
intervals is known as ____.
Polling
The most common type of caching is ____ caching.
Web
A patch is a replacement for an entire software package.
False
____ management refers to monitoring how well links and devices are keeping up with the demands placed on
them.
Performance
The first step in configuration management is to take an inventory of each node on the network.
False
____ describes the use of any network to carry voice signals using the TCP/IP protocol.
IP telephony
When using an analog telephone, a VoIP adapter that performs analog-to-digital conversion is known as a(n)
____.
ATA (analog telephone adapter)
It is more difficult to transmit VoIP and video over IP signals over a packet-switched network than it is to
transmit data signals.
True
A(n) ____ is a computer that manages multiple media gateways.
MCG
IP telephones are directly connected to the local loop.
False
____ is intended to eliminate single points of failure.
Rudundancy
The goal of fault-tolerant systems is to prevent failures from progressing to faults.
False
A(n) ____ UPS uses the A/C power from the wall outlet to continuously charge its battery, while providing
power to a network device through its battery.
Online
____ provides redundancy through a process called disk mirroring.
Raid Level 1
____ is an automatic distribution of traffic over multiple links or processors to optimize response.
Load Balancing
Human errors, ignorance, and omissions cause more than half of all security breaches sustained by networks.
True
____ is a social engineering practice in which a person attempts to glean access or authentication information
by posing as someone who needs that information.
Phishing
A ____ attack occurs when a system becomes unable to function because it has been deluged with data
transmissions or otherwise disrupted.
Denial-of-Service
A security policy should state exactly which hardware, software, architecture, or protocols will be used to ensure
security.
False
RADIUS and TACACS belong to a category of protocols known as AAA (____).
Authentication, Authorization, and Accounting
Logical connectivity problems often prove more difficult to isolate and resolve than physical connectivity
problems
True
In a ____ cable, the transmit and receive wire pairs in one of the connectors are reversed.
Crossover
When used on a copper-based cable, a continuity tester applies a small amount of ____ to each conductor at
one end of the cable.
Voltage
A ____ usually results from a bad NIC.
Jabber
Continuity testers can test only copper cable.
False