Front | Back |
____ detects malware by comparing current characteristics of files and disks against an archived version of these characteristics to discover any changes.
|
Integrity checking
|
In which OSI model layer does IP operate?
|
Network
|
In ____, both computers verify the credentials of the other.
|
Mutual authentication
|
In which OSI model layer does TCP operate?
|
Transport
|
Which connector is used in RS-232 transmissions?
|
DB-25
|
A ____ network is confined to a relatively small space.
|
LAN
|
The byte 00001110 means ____ on a digital network
|
14
|
The most common logical topologies are ____ and ring
|
Bus
|
A directional antenna issues wireless signals along a(n) ____ direction
|
Single
|
___ is a method of encrypting TCP/IP transmissions.
|
SSL
|
An archive ____ is a file attribute that can be checked or unchecked to indicate whether the file must be archived
|
Bit
|
CIDR notation takes the form of the network ID followed by a(n) ____, followed by the number of bits that are used for the extended network prefix.
|
Forward slash ( / )
|
____ is a technology used with fiber-optic cable, which enables one fiber-optic connection to carry multiple light signals simultaneously.
|
WDM (wavelength division multiplexing)
|
A ____ is a simple instrument that can measure many characteristics of an electric circuit, including its resistance and voltage
|
Multimeter
|
A computer programmed to act like an IP telephone is known as a(n) ____
|
Softphone
|