Vous êtes sur la page 1sur 2

Quiz 3 Chapters 11 15

The process where one network management console collects data from multiple networked devices at regular
intervals is known as ____.
Polling

The most common type of caching is ____ caching.
Web

A patch is a replacement for an entire software package.
False

____ management refers to monitoring how well links and devices are keeping up with the demands placed on
them.
Performance

The first step in configuration management is to take an inventory of each node on the network.
False

____ describes the use of any network to carry voice signals using the TCP/IP protocol.
IP telephony

When using an analog telephone, a VoIP adapter that performs analog-to-digital conversion is known as a(n)
____.
ATA (analog telephone adapter)

It is more difficult to transmit VoIP and video over IP signals over a packet-switched network than it is to
transmit data signals.
True

A(n) ____ is a computer that manages multiple media gateways.
MCG

IP telephones are directly connected to the local loop.
False

____ is intended to eliminate single points of failure.
Rudundancy

The goal of fault-tolerant systems is to prevent failures from progressing to faults.
False

A(n) ____ UPS uses the A/C power from the wall outlet to continuously charge its battery, while providing
power to a network device through its battery.
Online

____ provides redundancy through a process called disk mirroring.
Raid Level 1

____ is an automatic distribution of traffic over multiple links or processors to optimize response.
Load Balancing

Human errors, ignorance, and omissions cause more than half of all security breaches sustained by networks.
True

____ is a social engineering practice in which a person attempts to glean access or authentication information
by posing as someone who needs that information.
Phishing


A ____ attack occurs when a system becomes unable to function because it has been deluged with data
transmissions or otherwise disrupted.
Denial-of-Service

A security policy should state exactly which hardware, software, architecture, or protocols will be used to ensure
security.
False

RADIUS and TACACS belong to a category of protocols known as AAA (____).
Authentication, Authorization, and Accounting

Logical connectivity problems often prove more difficult to isolate and resolve than physical connectivity
problems
True

In a ____ cable, the transmit and receive wire pairs in one of the connectors are reversed.
Crossover

When used on a copper-based cable, a continuity tester applies a small amount of ____ to each conductor at
one end of the cable.
Voltage

A ____ usually results from a bad NIC.
Jabber

Continuity testers can test only copper cable.
False

Vous aimerez peut-être aussi