Front | Back |
A border ____ is a firewall that is configured with security policies to control the traffic that is permitted to cross a border in either direction.
|
Router
|
A ISDN service that provides 2 B Channels and 1 D channel is know as _________ Rate
|
Basic
|
A(n) ____ is a program that is relayed by a disk or a file and has the ability to replicate throughout a system.
|
Virus
|
A(n) ____ is information stored on a client computer, such as the client’s preferences when accessing a particular Web site, or where the client has been on the Web site.
|
Cookie
|
Attacks on wireless networks are sometimes called ____ -drives because the attacker may drive around an area in a car, using a portable computer to attempt to pick up a wireless signal.
|
War
|
Inside a building, replace old thicknet backbone cable with multimode fiber-optic cable, and replace repeaters with switches and use a ___________ for connections to a public WAN or remote location.
|
Routers
|
IPSec, encrypts ____ layer data.
|
Application
|
Network devices such as switches and NIC cards use ____, as a means to store data until it can be forwarded to the right destination or process by upper layer protocols.
|
Buffers
|
On a cabled network it is easier to accommodate growth when Category ____ or better cable has been installed.
|
5e
|
Select the item that best descripes a Permanent Virtual circuit
|
Continuously available path between nodes
|
The ____ layer reads IP address information and forwards each packet along the most expedient route for efficient network communications.
|
Network
|
Three trunked 1-Gbps links form an aggregated link with a speed of ____ Gbps.
|
3
|
Typically, ____ wiring encompasses a single floor in a building, fanning out to various rooms and office areas.
|
Horizontal
|
When deploying wireless networking one should at least change the default ______ and set a _____ key, for security purposes.
|
Ssid, wep
|
When installing a cable plant, use ____ cable between floors.
|
Multimode fiber-optic
|