Filters
Question type

Study Flashcards

A dropped packet is often referred to as a _____________.

Correct Answer

verifed

verified

discard

A computer that provides support for multiple H.323 terminals and manages communication between them is known as what term below?


A) H.323 gateway
B) H.323 gatekeeper
C) MCU
D) H.323 server

E) B) and C)
F) B) and D)

Correct Answer

verifed

verified

Most UNIX and Linux desktop operating systemsprovide a GUI application for easily viewing and filtering the information in system logs.

A) True
B) False

Correct Answer

verifed

verified

Packets that are smaller than a medium's minimum packet size are known by what term below?


A) jabbers
B) giants
C) ghosts
D) runts

E) B) and D)
F) B) and C)

Correct Answer

verifed

verified

D

When using SIP,what term is used to describe end-user devices,which may include workstations,tablet computers,smartphones,or IP phones?


A) user agent
B) user agent client
C) user agent proxy
D) user agent node

E) B) and D)
F) A) and B)

Correct Answer

verifed

verified

Which element of H.323 is a device that provides translation between network devices running the H.323 signaling protocols and devices running other types of signaling protocols?


A) H.323 terminal
B) H.323 gateway
C) H.323 gatekeeper
D) MCU

E) None of the above
F) A) and C)

Correct Answer

verifed

verified

__________________ is the detection and signaling of device,link,or component faults.

Correct Answer

verifed

verified

In H.323,which protocol below handles call or videoconference signaling?


A) H.225
B) H.245
C) H.200
D) H.252

E) All of the above
F) A) and C)

Correct Answer

verifed

verified

What component of SIP is a server that responds to user agent clients' requests for session initiation and termination?


A) proxy server
B) registrar server
C) user agent server
D) redirect server

E) All of the above
F) A) and D)

Correct Answer

verifed

verified

What security standard below was created to protect credit card data and transactions,requiring network segmentation as part of security controls?


A) CALEA
B) HIPAA
C) PCI DSS
D) CAARA

E) C) and D)
F) All of the above

Correct Answer

verifed

verified

The SNMP version 3 protocol introduces authentication,validation,and encryption for messages exchanged between devices and the network management console.

A) True
B) False

Correct Answer

verifed

verified

When using DiffServ,what type of forwarding utilizes a minimum departure rate from a given node,which is then assigned to each data stream?


A) assured forwarding
B) prioritized forwarding
C) scaled forwarding
D) expedited forwarding

E) A) and B)
F) B) and D)

Correct Answer

verifed

verified

D

Matching Match each correct item with the statement below. -One of two DiffServ forwardingspecifications.It assigns each data stream a minimumdeparture rate from a given node.This technique circumventsdelays that slow normal data from reaching its destinationon time and in sequence.


A) AF (Assured Forwarding)
B) CALEA (Communications Assistance for Law Enforcement Act)
C) network monitor
D) EF (Expedited Forwarding)
E) load balancing
F) NIC teaming
G) PSTN (Public Switched Telephone Network)
H) SS7 (Signaling System 7)
I) time-shifted video
J) Webcast

K) B) and H)
L) C) and E)

Correct Answer

verifed

verified

Matching Match each correct item with the statement below. -The distribution of traffic over multiplecomponents or links to optimize performance and faulttolerance.


A) AF (Assured Forwarding)
B) CALEA (Communications Assistance for Law Enforcement Act)
C) network monitor
D) EF (Expedited Forwarding)
E) load balancing
F) NIC teaming
G) PSTN (Public Switched Telephone Network)
H) SS7 (Signaling System 7)
I) time-shifted video
J) Webcast

K) G) and I)
L) E) and I)

Correct Answer

verifed

verified

Provide detail on the three different versions of SNMP.

Correct Answer

verifed

verified

Three versions of SNMP exist: SNMPv1,SNM...

View Answer

What two terms below describe a network device with three ports,two of which send and receive all traffic,and the third port mirrors the traffic?


A) network hub
B) network tap
C) network splitter
D) packet sniffer

E) All of the above
F) C) and D)

Correct Answer

verifed

verified

Matching Match each correct item with the statement below. -A software-based tool that monitors trafficon the network from a server or workstation attached to thenetwork.It can typically interpret up toLayer 3 of the OSI model.


A) AF (Assured Forwarding)
B) CALEA (Communications Assistance for Law Enforcement Act)
C) network monitor
D) EF (Expedited Forwarding)
E) load balancing
F) NIC teaming
G) PSTN (Public Switched Telephone Network)
H) SS7 (Signaling System 7)
I) time-shifted video
J) Webcast

K) C) and F)
L) C) and G)

Correct Answer

verifed

verified

Matching Match each correct item with the statement below. -A U.S.federal regulation that requires telecommunicationscarriers and equipment manufacturers to provide forsurveillance capabilities.It was passed by Congressin 1994 after pressure from the FBI,which worried thatnetworks relying solely on digital communications wouldcircumvent traditional wiretapping strategies.


A) AF (Assured Forwarding)
B) CALEA (Communications Assistance for Law Enforcement Act)
C) network monitor
D) EF (Expedited Forwarding)
E) load balancing
F) NIC teaming
G) PSTN (Public Switched Telephone Network)
H) SS7 (Signaling System 7)
I) time-shifted video
J) Webcast

K) D) and G)
L) C) and G)

Correct Answer

verifed

verified

A highly available server is available what percentage of the time?


A) 90%
B) 99%
C) 99.9%
D) 99.99%

E) A) and B)
F) C) and D)

Correct Answer

verifed

verified

What two terms below describe the process of manipulating certain characteristics of packets,data streams,or connections to manage the type and amount of traffic traversing a network or interface at any moment?


A) bandwidth policing
B) throughput shaping
C) traffic shaping
D) packet shaping

E) A) and B)
F) All of the above

Correct Answer

verifed

verified

Showing 1 - 20 of 50

Related Exams

Show Answer