1.2 Flashcards
_____________ fiber cables support data rates up to 10 Gbps or better and cable runs of many kilometers, depending on the quality of the cable and optics.
Single-mode
_____________ based surveillance is a cheaper means of monitoring than maintaining separate guards at each perimeter gateway or zone. These cameras can be easily connected to already available IP-based network.
Camera-
_____________ cabling is a type of twisted pair cable that is less susceptible to interference and crosstalk because each pair is surrounded by a braided shield.
Shielded twisted pair
Ethernet can use _____________ rated to a particular Cat standard. UTP is made of twisted pair wires that do not use shielding to prevent interference.
Unshielded Twisted Pair (UTP)
WEP’s encryption system (based on the ___________ encryption cipher) is flawed. Version 1 of WPA still uses the __________ cipher, but it adds a mechanism called the Temporal Key Integrity Protocol (TKIP) to make it stronger. AES replaced ___________
RC4
___________ensures that voice or video communications are free from problems, such as dropped packets, delays, or jitter.
Quality of Service (QoS)
_____GHz is better at propagating through solid surfaces, making it ideal for providing the longest signal range.
2.4
Port 110 is _________________________ is an early example of a mailbox access protocol. Examples of ### client applications would be Microsoft Outlook or Mozilla Thunderbird.
POP3. The Post Office Protocol (POP)
___________________ authenticate server machines when using Transport Layer Security (TLS). An administrator installs the certificates on a web or email server to validate its identity and establish a secure transmission channel.
Digital certificates
A ___________________________ overlays a floor plan with graphics showing signal strength and channel utilization at different points in the building.
wireless site survey report
The __________________ step of the CompTIA Network+ troubleshooting methodology is identifying the problem, which includes approaching multiple problems individually and determining if anything has changed.
first
____________________ and ____________________have gained some currency over the last few years. With a peer-to-peer PAN, one might establish close-range network links between a variety of devices, such as smartphones, tablets, headsets, and printers.
Personal area networks (PAN) and wireless PAN (WPAN)
The media access control (MAC) address of a wireless access point (AP) is used as the ______________.
Basic Service Set Identifier (BSSID)
At each router, the Time to Live (TTL) IP header field is decreased by at least 1. This prevents badly addressed packets from __________________ the network.
permanently circulating
The administrator is using __________________ where the active router is known as the master and all other backup routers monitor the status of the master.
Virtual Router Redundancy Protocol (VRRP)