Term
|
Definition
| what commonly used version relies on tcp and operates over port 110? |
|
|
Term
|
Definition
| voice video and data communication is ? |
|
|
Term
|
Definition
| VoIP relies on the internet is called? |
|
|
Term
|
Definition
| what my contain back doors security flaws that allow unauthorized user to gain access to the systems ? |
|
|
Term
|
Definition
| what send commands the cause the screen to fill with garbage characters? |
|
|
Term
|
Definition
| a password protected and encrypted file hold individual info including a public key ? |
|
|
Term
| AAA (authnetication autherization and accounts ) |
|
Definition
| RADIUS and TACACS are categories |
|
|
Term
|
Definition
| the telltale factor for a ascertaining where flaws in a cable lie |
|
|
Term
|
Definition
software based tool,monitors network traffic sever or workstation is ? |
|
|
Term
|
Definition
| what generates traffic in an attempt to reproduce a network problem and monitor multiple network segments simulations |
|
|
Term
| info applies on to one workstation |
|
Definition
| viewing the status of the wireless connections tells a lil about wireless environment cause what ? |
|
|
Term
|
Definition
| wht type of virus legitimate programs to replace apart of legitimate program'codes |
|
|
Term
|
Definition
| what makes it harder to identify every time they are transferred to a new system? |
|
|
Term
|
Definition
| what uses a/c from the wall and provides power to a network device through its battery |
|
|
Term
|
Definition
| What allows load balancing or an automatic distribution of traffic over processors to optimize response? |
|
|
Term
|
Definition
|
|
Term
|
Definition
| what specialized storage device or groups of storage devices for a network |
|
|
Term
| tracking,hardware, and software |
|
Definition
| what other key component in managing networks are ? |
|
|
Term
|
Definition
| what is correction,improvement, or enhancements to a particular of a software applications |
|
|
Term
|
Definition
| what r major change to a software packages exciting code |
|
|
Term
|
Definition
| wht tcp/ ip devices interpret inbound and outbound request with other sub nets |
|
|
Term
|
Definition
| what range of numbers r available in a ipv4 |
|
|
Term
|
Definition
| what to number r reserved on a ipv4 |
|
|
Term
|
Definition
| what is a popular telephony software and is one type of soft phone |
|
|
Term
|
Definition
| wht is when a person gleans access or authentications info by posing as some who needs that info |
|
|