Term
| What is centralized access control administration? |
|
Definition
| One entity is responsible for overseeing access to all corporate resources. |
|
|
Term
| What is Sender Policy Framework? (SPF) |
|
Definition
| An email validation system designed to prevent email spam. |
|
|
Term
| What is Context-Dependent Access Control? |
|
Definition
| It is access decisions that are based on the context of a collection of information. |
|
|
Term
|
Definition
| An SMTP server configured in such a way that it allows anyone on the internet to send email through it. |
|
|
Term
|
Definition
| Network Address Translation |
|
|
Term
|
Definition
| It occurs when malicious users forge an email to make it appear to be from a legitimate source. |
|
|
Term
|
Definition
| Simple Authentication and Security Layer. |
|
|
Term
| What is the difference between POP and IMAP? |
|
Definition
POP is used for internet based email.
IMAP is used for corporate email accounts |
|
|
Term
|
Definition
| Enable users to access mail on a mail server. |
|
|
Term
|
Definition
| Internet Message Access Protocol. |
|
|
Term
| What is a Fraggle attack? |
|
Definition
| DDoS attack using UDP Echo traffic. |
|
|
Term
|
Definition
| A DDoS attack that floods a target computer with spoofed broadcast ICMP packets. |
|
|
Term
| What are the two main componenets of SNMP? |
|
Definition
|
|
Term
| What Protocol does Traceroute use? |
|
Definition
|
|
Term
| What is Content-Dependent Access Control? |
|
Definition
| Access to objects are determined by the content within the object. |
|
|
Term
| What is a capability table? |
|
Definition
| Specifies access rights a certain subject posseses pertaining to specific objects |
|
|
Term
| What are the two types of heirarchies in RBAC? |
|
Definition
Limited-Only one level of hierarchy is allowed
General-Allows for many levels of hierarchies |
|
|
Term
|
Definition
| System makes access decisions |
|
|
Term
| What is the difference between a memory card and a smart card? |
|
Definition
A memory card holds information but can not process it
Smart cards hold information and have the necesdsary hardware and software to process that information |
|
|
Term
| What is the difference between synchronous and asynchonous token generating devices? |
|
Definition
Asynchronous is based on challenge/response.
Synchronous is based on time or counter-driven mechanisms. |
|
|
Term
|
Definition
| Mandatory Access Control. |
|
|
Term
|
Definition
| The owner of a file specifies which users can access the file. |
|
|
Term
|
Definition
| Discretionary Access Control. |
|
|
Term
| What is the Key Distribution Center? (KDC) |
|
Definition
It is the foundation of Kerberos Security.
It holds all users and services secret keys
It is the trusted authentication for all users. |
|
|
Term
|
Definition
| Two or more people working together to carry out fraudulent activity. |
|
|
Term
| What is a data custodian responsible for? |
|
Definition
| Maintaining and protecting data. |
|
|
Term
|
Definition
| Member of management in charge of a specific business unit that is responsible for a specific subset of data. |
|
|
Term
| What is a security steering commitee? |
|
Definition
| Group responsible for making decision on tactical and strategic security issues within an organization. |
|
|
Term
| What are the four main goals of a risk analysis? |
|
Definition
Identify assest
Identify vulnerability
Quantify probably of business impact
Provide economic balance between impact of threat and cost of cunter measure. |
|
|
Term
| What is an example of misuse of data? |
|
Definition
Sharing trade secrets
Fraud
Espionage
Theft |
|
|
Term
| What is a fault tree analysis? |
|
Definition
| An approach that maps specific flaws to root causes in complex systems. |
|
|
Term
| What are examples of physical damage? |
|
Definition
|
|
Term
| What is information risk management? |
|
Definition
| The process of identifying and assesing risk and reducing it to an acceptable level. |
|
|
Term
|
Definition
Availability
Integrity
Confidentiality
|
|
|
Term
|
Definition
| It is a method of determining functions, identifying functional failures, and assesing causes of failure. |
|
|
Term
|
Definition
| Australian risk management used to understand a companies financial capital, human safety, and business decision risks. |
|
|
Term
|
Definition
| Operationally Critical Threat Asset and Vulnerability Evaluation. |
|
|
Term
|
Definition
| Facilitated Risk Analysis Process. |
|
|
Term
|
Definition
| Risk Management guide for information technology systems. |
|
|
Term
|
Definition
| A loss that is secondary in nature and takes place well after a vulnerability is exploitated. |
|
|
Term
|
Definition
| International standard for how risk management should be carried out. |
|
|
Term
|
Definition
| What the company would lose if a threat was exploitated. |
|
|
Term
|
Definition
| International control used to secure U.S federal systems developed by NIST. |
|
|
Term
|
Definition
| Capability Maturity Model Intergration |
|
|
Term
|
Definition
Process improvent methodology
Improves operation efficency
Developed by Motorola
|
|
|
Term
|
Definition
| It is the De Facto standard of best practices |
|
|
Term
| What is the difference between COSO and COBIT? |
|
Definition
COSO is a model for corporate governance
COBIT is for IT governance |
|
|
Term
| What is special publication 800-53? |
|
Definition
| It outlines controls that need to be in place to be compliant with FISA. |
|
|
Term
|
Definition
Framework and set of control objectives developed by the ISACA
It defines goals for controls to properly manage IT and ensure it maps to business needs. |
|
|
Term
|
Definition
| Control Objectives for Information and Related Technology |
|
|
Term
| What is strategic alignement? |
|
Definition
| Business drivers and regulatory and legal requirements are being met by the security enterprise architecture. |
|
|
Term
| Describe Zachman Architecture Framework |
|
Definition
One of the first enterprise architecture framework
It is a two dimensional model
It uses six basic communication interrogatives that intersect with different viewpoints
The goal of the framework is the look at the same organization from different views. |
|
|
Term
| Describe British Standard 7799 |
|
Definition
Developed in 1995 in U.K.
Outlines how information management systems should be built and maintained. |
|
|
Term
| What is a tear drop attack? |
|
Definition
| Involves sending managed IP fragments with-sized payload to the target machine. |
|
|
Term
|
Definition
| Network attack in which an authorized person gains access to a network and stays undetected for a long period of time. |
|
|
Term
|
Definition
| Advanced Persistant Threat |
|
|
Term
|
Definition
| Using software to bypass normal security constraints to allow unathorized access to data. |
|
|
Term
|
Definition
| Computers can process unintended data reults and it will result in unintended/erroneous ouptut information |
|
|
Term
|
Definition
|
|
Term
|
Definition
| Specifies how software components should interact with each other. |
|
|
Term
|
Definition
| Application Programming Interface. |
|
|
Term
| What is a clipping level? |
|
Definition
| An older term used to mean a threshold |
|
|
Term
| What is a compensating control? |
|
Definition
| A control that provides an alternative measure of control. |
|
|
Term
| What is a detective control? |
|
Definition
| A control that identifies incident activities and potential intruders. |
|
|
Term
| What is a recovery control? |
|
Definition
| A control intended to bring enviroment back to regular operations. |
|
|
Term
| What is a corrective control? |
|
Definition
| A control that fixes systems after an incident. |
|
|
Term
| What is a preventative control? |
|
Definition
| Intended to avoid an incident from occuring |
|
|
Term
|
Definition
| Something intended to discourage a potential attacker. |
|
|
Term
| What are physical controls? |
|
Definition
| Items put into place to protect facilities/perspnel/resources |
|
|
Term
| What are administrative controls? |
|
Definition
Soft Controls
Security Documentations
Risk Management
Personel Security |
|
|
Term
| What are technical controls? |
|
Definition
Software/Hardware controls
Examples:Firewalls/IDS/Encryption |
|
|
Term
|
Definition
| A countermeasure put into place to mitigate potential risk. |
|
|
Term
|
Definition
| Instance of being exposed to loss. |
|
|
Term
|
Definition
| Potential danager associated with exploitation of a vulnerability. |
|
|
Term
|
Definition
| A lack of a counter-measure or weakness in a counter-measure. |
|
|
Term
| What is social engineering |
|
Definition
| Gaining access by tricking somoene to divulge ensitive information. |
|
|
Term
|
Definition
| Actual amount of data carried over a connection. |
|
|
Term
|
Definition
| Transition mechanism for migrating from IPV4 to IPV6 |
|
|
Term
| What is session hijacking? |
|
Definition
| Attack method that allows an attacker to overtake and control a communication session. |
|
|
Term
|
Definition
| DoS attack where an attacker sends a succession of SYN packets with the goal of overwhelming a vicitms system. |
|
|
Term
|
Definition
| Use of segregation in design decisions to protect software from being comprimised. |
|
|
Term
| What is micro-architecture? |
|
Definition
| Specific design of a microprocessor which includes physical components. |
|
|
Term
| What is a logical address? |
|
Definition
| Indirect addressing used by processes within an operating system. |
|
|
Term
| What is an absolute address? |
|
Definition
| Hardware addresses used by the CPU. |
|
|
Term
| What is process isolation? |
|
Definition
| Protection mechanism provided by operating systems that can be implemented as encapsulation. |
|
|
Term
| What is a buffer overflow? |
|
Definition
| It takes place when too much data us accepted into a specific process. |
|
|
Term
|
Definition
| When the CPU has to change from processing code in user mode to kernal mode. |
|
|
Term
|
Definition
| Type of memory used for highspeed writing and reading activites. |
|
|
Term
| What is the goal of memory management? |
|
Definition
Provide an abstraction level for the programmer
Maximizes performance with limited amount of memory
It protects the OS and applications loaded into the memory. |
|
|
Term
| What is a software deadlock? |
|
Definition
| Two processes can not complete their activities because they are both waiting for ther same system resources to be released. |
|
|
Term
|
Definition
| Program that is loaded in memory with an operating system. |
|
|
Term
| What is a maskable interupt? |
|
Definition
| Interrupt value assigned to a noncritical operating system activity. |
|
|
Term
| What is a nonmaskable interupt? |
|
Definition
| Interrupt value assigned to a critical operating system activity. |
|
|
Term
| What is pre-emptive multitasking |
|
Definition
| Used by operating systems to allow for computer resource time slicing. |
|
|
Term
| What is the difference between a running state and a ready state? |
|
Definition
A running state-CPU is executing instructions and data
A ready state is waiting to send instructions to the CPU |
|
|
Term
| What is cooperative Multi-tasking? |
|
Definition
| Used in Windows 3.x and is required to process to voluntary release resources they are using. |
|
|
Term
| What is ISO/IEC 42010:2007 |
|
Definition
| International standard that provides guidlines on how to create and maintain system architectures. |
|
|
Term
| What is the control unit? |
|
Definition
| Part of the CPU that oversees the collection of instructions and data from memory and how they are passed to the processing components of the CPU. |
|
|
Term
| What is aymmetric mode multiprocessing? |
|
Definition
| When a computer has two or more CPU's and one CPU is dedicated to a specific program while the other CPU carries out general proccessing procedures. |
|
|
Term
| What is symmetric mode multiprocessing? |
|
Definition
| When a computer has two or more CPU's and each CPU is being used in a load balancing method. |
|
|
Term
|
Definition
| Physical connections between processing components and memory segments |
|
|
Term
|
Definition
| Physical connections processing components. |
|
|
Term
|
Definition
| Mode a CPU works in when carrying out more trusted instructions. |
|
|
Term
| Describe the user mode of a system |
|
Definition
| A protection mode that CPU works within when carrying out less trusted process instructions. |
|
|
Term
| What is a special register? |
|
Definition
| Temporary memory loaction that holds critical processing parameters. |
|
|
Term
|
Definition
| Memory segment used by processes to communicate instructions and data to each other. |
|
|
Term
| What does a program counter do? |
|
Definition
| It contains the memory address of the next instruction to be fetched. |
|
|
Term
| What is a general register? |
|
Definition
| They are used to hold variables and tempoary results as the ALU works through its execution sets. |
|
|
Term
|
Definition
| It performs the mathmatical functions and logical operations of data. |
|
|
Term
| What is an architecture description? |
|
Definition
| Collection of document types to convey an architecture in a formal setting. |
|
|
Term
|
Definition
| It is a representative of a whole system from the perspective of a related set of concerns. |
|
|
Term
|
Definition
| Individual with interests in a system. |
|
|
Term
| What is a single point of failure with in a Single Sign On implementation? |
|
Definition
|
|
Term
|
Definition
| It identifies potential threats and attack vectors. |
|
|
Term
|
Definition
| It allows for the automation of user management. |
|
|
Term
| What technology allows users to remember just one password? |
|
Definition
|
|
Term
| What is a type I biometric error |
|
Definition
| System rejects an authorized individual. |
|
|
Term
| What is a type II biometric error? |
|
Definition
| An imposter was authenticated. |
|
|
Term
|
Definition
| Seto f rules for encoding documents in machine readable format to allow for interoperability between various web based technologies. |
|
|
Term
| What is a decentralized access control administration? |
|
Definition
| It gives control of access to the people closer to the resources. |
|
|
Term
| What are the main types of restricted interface measurements? |
|
Definition
Menus and shells
Database views
Physically Constrained Interfaces |
|
|
Term
| What is a statistical based IDS? |
|
Definition
| A behavioral based system that builds a profile of an enviroment of normal activities. |
|
|
Term
|
Definition
| Reliable and timely access to data and resources. |
|
|
Term
| What is an example of confidentiality? |
|
Definition
Encryption for data at rest
Encryption for data in transit
Access controls
|
|
|
Term
| What are example of Integrity? |
|
Definition
Hashing
Configuration Management
Change Control
Access Control
Digital Signing |
|
|
Term
| What are examples of Availability? |
|
Definition
RAID
Clustering
Load Balancing
Backups
Fail-Over Configurations |
|
|
Term
|
Definition
| Internal controls audit carried out by a 3rd party. |
|
|
Term
|
Definition
Organizational
Issue-Specific
System-Specific |
|
|
Term
|
Definition
Regulatory-Ensures an organizatin is following set by industry
Advisory-Advises employees to whichbehaviors should/should not take place within the organization
Informative-Not enforceable-Teaches employees about specific issues relevant to the company. |
|
|
Term
|
Definition
| Mandatory activities actions or rules. |
|
|
Term
| What is the class B IP range? |
|
Definition
| 128.0.0.0-191.255.255.255 |
|
|
Term
| What is the range for a class C address? |
|
Definition
| 192.0.0.0-223.255.255.255 |
|
|
Term
| What is the range of class E IP addresses? |
|
Definition
| 240.0.0.0-255.255.255.255 |
|
|
Term
| What are registered ports? |
|
Definition
Ports from 1024-49151
Can be registered with ICANN for a paticular use. |
|
|
Term
| What is the port range for well known ports? |
|
Definition
|
|
Term
| What is the range for class D IP addresses? |
|
Definition
| 224.0.0.0-239.255.255.255 |
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
| What port is HTTP used on? |
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
| What is the class A IP range? |
|
Definition
|
|
Term
| Describe fence height requirements |
|
Definition
3-4 ft deters casual trespassers
6-7 too high to climb easily
8ft-Used for protecting critical areas |
|
|
Term
| Describe preaction water system |
|
Definition
Similar to dry pipe/water is not held in pipes.
Water is realesed by using pressurized air. |
|
|
Term
| Describe a drypipe system |
|
Definition
| Water is not held in the pipes |
|
|
Term
| Describe a wetpipe system |
|
Definition
| System always contains water in the pipes and is discharged by temperature control-level sensors. |
|
|
Term
| Describe the four classes of gates |
|
Definition
Class I-Residential
Class II-Commerical
Class III-Industrial
Class IV-Restricted(Prisions) |
|
|
Term
| What is a perimeter intrusion detection and assestment system? (PIDAS) |
|
Definition
| It is a type of fence with passive cable vibration sensors that sets of an alram if anything tries to cut or climb it. |
|
|
Term
| Describe activity support |
|
Definition
| Planned activities for the areas to be protected. |
|
|
Term
| Describe natural surviellance |
|
Definition
| Use and placement of physical enviromental features in personnel walkways. |
|
|
Term
| Describe natural access control |
|
Definition
| Guidance of people entering and leavign the space. |
|
|
Term
| What are the three main CPTED strategies? |
|
Definition
Natural access control
Natural Surviellance
Natural Territorial Reinforcement |
|
|
Term
| What is target hardening? |
|
Definition
| Denying access through physical and artifical barriers. |
|
|
Term
| Where should a datacenter be located in a facility? |
|
Definition
| In the center of the building. |
|
|
Term
| What are three factors used in authentication? |
|
Definition
Something a person knows
Something a person has
Something a person is |
|
|
Term
| What is a race condition? |
|
Definition
| Occurs when processes carryout tasks in an incorrect order |
|
|
Term
| What are logical access controls? |
|
Definition
| Technical tools used for identification authorization and accountability. |
|
|
Term
| What is COSO's main objective? |
|
Definition
| Prevention of a coporate environment that promotes financial fraud. |
|
|
Term
|
Definition
| Standard on how to protect personal health information. |
|
|
Term
| How do you calculate residual risk? |
|
Definition
| (Threat*Vulernability*Asset Value)*Control Gap |
|
|
Term
|
Definition
| It delivers status messages and repports errors and tests connectivity. |
|
|
Term
| What is ARP table cache poisoning? |
|
Definition
| Altering a systems ARP table so it contains incorrect information |
|
|
Term
|
Definition
| It reports multicast group memberships to routers. |
|
|
Term
|
Definition
| Internet Group Management Protocol |
|
|
Term
|
Definition
| Cables that is jacketed with fire retarded plastic |
|
|
Term
|
Definition
| Signal on one channel of a transmission creates an undesired effect in another channel by interacting with it. |
|
|
Term
|
Definition
Called Thinnet
Uses Coaxial cable
Max length 185 meters. |
|
|
Term
| What is the difference between baseband an broadband? |
|
Definition
Baseband uses the entire communication channel for its transmission
Broadband divides communication channel into indpendent subchannels |
|
|
Term
|
Definition
| Random values addes to the encryption process to add complexity and randomness |
|
|
Term
|
Definition
Authentication protocol that is the defualt authentication for Windows Server 2000/2003/2008
It is a sngle sign on system for distrbuted environments. |
|
|
Term
| What are cognitive passwords? |
|
Definition
| Fact or opinion based information used to verify an indiviuals information. |
|
|
Term
| The information technology security evaluation criteria was developed for what countries? |
|
Definition
|
|
Term
| What is the first level of the orange book that requires classifcation labeling? |
|
Definition
|
|
Term
| Describe compartmented security mode |
|
Definition
| All users can access some data based on their need to know. |
|
|
Term
| Describe high security mode |
|
Definition
| Users can access some data. |
|
|
Term
| Describe dedicated security mode |
|
Definition
| A user has access to all information on the system |
|
|
Term
| What is the * integrity axiom |
|
Definition
| A subject cannot modify an object in higher integrity level |
|
|
Term
| What is the simple integrity axiom? |
|
Definition
| A subject cannot read data at a lower integrity level. |
|
|
Term
|
Definition
| A formal state transition model that describes a set of access control rules designed to ensure data integrity |
|
|
Term
| What is the strong star property rule |
|
Definition
| Subject can perform read and write functions only to the objects at its same security level. |
|
|
Term
| Describe the * property rule |
|
Definition
| A subject cannot write to another object a lower security level |
|
|
Term
| What is the simple security rule? |
|
Definition
| A subject cannot read data at a higher security level. |
|
|
Term
| Describe the Bee La Padula Model |
|
Definition
It define the concept of a secure state and necessary modes of access
Ensures information only flows in a manner that does not violate system policy |
|
|
Term
| What instruction governs MAC and DAC? |
|
Definition
|
|
Term
| What is the maximum height a plant or hedge should be? |
|
Definition
|
|
Term
| Describe a security kernel |
|
Definition
| It is a reference monitor. |
|
|
Term
|
Definition
|
|
Term
|
Definition
| A protocol used for serial device to device communication. |
|
|
Term
|
Definition
| Synchronous Data Link Control |
|
|
Term
|
Definition
| Protocol used in networks that use dedicate leased lines with permanent physical connections. |
|
|
Term
|
Definition
|
|
Term
|
Definition
| Integrated Services Digital Network |
|
|
Term
|
Definition
| It is a technology that enables data and voice to travel over a medium in a digital manner. |
|
|
Term
| What is distance vector routing protocol |
|
Definition
| A routing protocol tthat calculates paths based on distance. |
|
|
Term
| What is Border Gateway Protocol? |
|
Definition
| It is a protocol that carries out core routing designs on the internet. |
|
|
Term
| What is a wormhole attack? |
|
Definition
| An attack that takes place when an attacker captures packets at one location in the network and tunnels them into another location for a second attacker to use against a target system. |
|
|
Term
| What is Spanning Tree protocol? |
|
Definition
| Network Protocol ensures a loop free topology. |
|
|
Term
|
Definition
|
|
Term
|
Definition
| Allows a sender of a packet to specify the route the packet takes throught the network verus having the router determine the path. |
|
|
Term
|
Definition
| Multiprotocol Label Switching |
|
|
Term
|
Definition
| A networking technology that directs data from one network node to the next based on short path labels. |
|
|
Term
|
Definition
| An exploit that allows an attacker on a VLAN to gain unauthorized access to a network. |
|
|
Term
|
Definition
| It is a highly exposed device that is most likely to be target by attackers. |
|
|
Term
|
Definition
| A firewall that communicates directly with a perimeter router and the internal network. |
|
|
Term
| What is a screened subnet? |
|
Definition
| It is another layer of security that is used in the screened host architecture. |
|
|
Term
|
Definition
| An attacker modifies a packet header to have a source address of a host inside the network that is going to be attacked. |
|
|
Term
| What is an overlapping fragment attack? |
|
Definition
| It is used to subvert packet filters that do not reassemble packet fragments before inspection. |
|
|
Term
|
Definition
|
|
Term
|
Definition
| It uses link state algorithms to send out routing table information. |
|
|
Term
| What is IP fragmentation? |
|
Definition
| It is an exploitation of fragmentation and reassembly flaws within IP, which causes DoS. |
|
|
Term
| Describe the silent firewall rule. |
|
Definition
| It is a rule that drops "noisy" traffic without logging it. It is used to reduce log sizes. |
|
|
Term
| Describe the firewall stealth rule |
|
Definition
| It disallows access to firewall software from unauthorized systems. |
|
|
Term
| Describe the cleanup firewall rule |
|
Definition
| It is the last rule in the rule base that drops and logs any traffic that does not meet any other preceeding rules. |
|
|
Term
| Describe the negate firewall rule |
|
Definition
| It is used instead of using broad an premissive "any rules" and provides tighter permission rights. |
|
|
Term
|
Definition
| It acts as an intermediary between clients that want to access certain services on a network. |
|
|
Term
|
Definition
| Switched Multimegabit Data Service. |
|
|
Term
|
Definition
| A computer that attempts to lure an attacker to it instead of actual production servers. |
|
|
Term
|
Definition
| A proxy that can be used by anyone. |
|
|
Term
| What is a dual-homed firewall? |
|
Definition
| It is a device that has two interfaces between an untrusted network and trusted network to provide secure access. |
|
|
Term
|
Definition
| It is a method of combining multiple channels of data over a single transmission path. |
|
|
Term
|
Definition
| Asynchronous Transfer Mode. |
|
|
Term
| What is a dedicated link? |
|
Definition
| It is one single link that is pre-established for the purpose of WAN communication. |
|
|
Term
|
Definition
| Time Division Multiplexing |
|
|
Term
| What is electronic data interchange? (EDI) |
|
Definition
| It is structured transmission of data between organizations. |
|
|
Term
| What is a value added network? (VAN) |
|
Definition
| It is a hosted EDI service that acts as an intermediary between business partners. |
|
|
Term
|
Definition
| It is a data link technology used in MANs to connect customer networks to larger service networks or the interne. |
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
| Metropolitian Area Network |
|
|
Term
|
Definition
| They are dedicated lines that can carry voice and data information over trunks lines. |
|
|
Term
| What is time division multiplexing? |
|
Definition
| Two or more but streams or signals are transferred apparently simultaneously as subchannel in one communication channel |
|
|
Term
| What is a channel service unit? |
|
Definition
| A line bridging device bridging for use with T carriers and is required by PTSN providers at digital interfaces that terminate in a DSU |
|
|
Term
| What is quality of service? |
|
Definition
| it is a capability that allows a protocol to distinguish between different classes of messages and assign priority levels. |
|
|
Term
| What is a constant bit rate? |
|
Definition
| Connection-oriented channel that provides a consistent data throughput for time sensitive applications. |
|
|
Term
| What is a variable bit rate? |
|
Definition
| It is a connection oriented channel used for delay insensitive applications. |
|
|
Term
| What is unspecified bit rate? |
|
Definition
| It is a connectionless channel that does not promise a specific data throughput rate. |
|
|
Term
| What is available bit rate? |
|
Definition
| It is a connection-oriented channel that allows the bit rate to be adjusted. |
|
|
Term
| What was the first protocol to provide true QoS? |
|
Definition
|
|
Term
| How many types of ISDN implementations are there? |
|
Definition
|
|
Term
| What are the types of ISDN? |
|
Definition
|
|
Term
|
Definition
| THis implementation operates over exisiting copper lines and provides digitl voice and data channels. It uses 144 Kbps bandwidth. |
|
|
Term
|
Definition
| This implementation has 23 B channels and 1 D channel each using 64 Kbps. The total bandwidth euals one T-1 line at 1.544 Mbps. |
|
|
Term
|
Definition
| THis implentation can handle many different types of services simultaneously and is used in telecommunication backbones. |
|
|
Term
|
Definition
|
|
Term
|
Definition
| High speed connection that can provide 6 to 30 times higher bandwidth than ISDN. It can provide 52-Mbps transmission speed. |
|
|
Term
| How many types of DSL lines are there? |
|
Definition
|
|
Term
| What are the types of DSL lines? |
|
Definition
Symmetric DSL
Asymmetric DSL
High-Bit-Rate DSL
Very High Data Rate DSL
Rate Adaptative DSL |
|
|
Term
|
Definition
| Data travels upstream and downstream at the same rate. Bandwidth ranges between 192Kbps and 1.1Mbps. Used mainly for business applications. |
|
|
Term
|
Definition
| Data travels faster downstream. Used in residential areas. |
|
|
Term
| Describe High Bit Rate DSL |
|
Definition
| Provides T-1 speed without the use of repeaters. Requires two twisted of wires. |
|
|