Chapter 11 Flashcards
What are the five factors to consider when choosing a device? (11.1.1.2)
Cost Number of Ports Speed Expandable / Modular Manageable
VoIP and Video Calls are examples of ____-____ applications. (11.1.2.3)
Real-Time
Network applications are applications that? (11.1.2.1)
Communicate over the network.
Web Browser and Email Clients are examples of what type of applications? (11.1.2.1)
Network Applications.
DNS, Telnet, IMAP, SMTP, POP, DHCP, HTTP, and FTP are examples of common network ________? (11.1.2.2)
Protocols.
Real-Time Transport Protocol (RTP) and Real-Time Transport Control Protocol (RTCP) are protocols used by what type of applications? (11.2.3)
Real-Time Applications
The four types of threats after an attacker gains access to a network are? (11.2.1.1)
- Information Theft
- Data Loss or Manipulation
- Identity Theft
- Disruption of Service
The four classes of physical threats are? (11.2.1.2)
- Hardware Threats
- Environmental Threats
- Electrical Threats
- Maintenance Threats