IS3220 CHAPTER 13 Flashcards
A data communications technology that enables faster data transmission over copper telephone lines than a conventional voice band modem can provide is called ___?
ASYMMETRIC DIGITAL SUBSCRIBER LINE (ADSL)
A chipset developed and promoted by the US Government as an encryption device to be adopted by telecommunications companies for voice transmission. It was announced in 1993 and discontinued in 1996. This was called ___?
CLIPPER CHIP
This is a standard that defines how Web server software can delegate the generation of Web pages to a console application. They can be written in many programming languages, although scripting languages are often used and are called ___?
COMMON GATEWAY INTERFACE (CGI) SCRIPT
A network service that resolves fully qualified domain names (FQDNs) into their corresponding IP address. This is an essential service of most networks and their directory services and called ___?
DOMAIN NAME SYSTEM (DNS)
This is a public interest research group in Washington, D.C., to focus public attention on emerging civil liberties issues and to protect privacy, the First Amendment, and Constitutional values in the information age. It pursues a wide range of activities, i.e., privacy research, public education, conferences, litigation, publications, and advocacy. This is called ___?
ELECTRONIC PRIVACY INFORMATION CENTER (EPIC)
A set of communications standards for simultaneous digital transmission of voice, video, data, and other network services over the traditional circuits of the public switched telephone network and is called ___?
INTEGRATED SERVICES DIGITAL NETWORK (ISDN)
A computer network authentication protocol that allows nodes communication over a non-secure network to prove their identity to one another in a secure manner. It is also a suite of free software published by Massachusetts Institute of Technology (MIT) that implements this protocol. It was designed as a client-server model, and it provides mutual authentication–both the user and the server verify each other’s identity. This is called ___?
KERBEROS
The product of the High Performance Computing and communication Act of 1991. It was a telecommunications policy buzzword, which was popularized during the Clinton administration. It was a proposed advanced, seamless web of public and private communications networks, interactive services, interoperable hardware and software, computers, databases, and consumer electronics to put vast amounts of information at users’ fingertips. This is called ___?
NATIONAL INFORMATION INFRASTRUCTURE (NII)
This is a cryptologic intelligence agency of the US Government administered as part of the US DOD. It is responsible for the collection and analysis of foreign communications and roughen signals intelligence, which involves cryptanalysis. It is also responsible for protecting US government communications and information systems from similar agencies elsewhere, which involves cryptography and is called ___?
NATIONAL SECURITY AGENCY (NSA)
Aimed to handle time-series data like network bandwidth, temperatures, CPU load, and so on. The data are stored in a circular buffer database, thus the system storage footprint remains constant over time and is called ___?
ROUND-ROBIN DATABASE TOOL (RRDTOOL)
This has a synchronous interface and traditionally has an asynchronous interface, which means that it responds as quickly as possible to changes in control inputs. It has a synchronous interface, meaning that it waits for a clock signal before responding to control inputs and is therefore synchronized with the computer’s system bus. This is called ___?
SYNCHRONOUS DYNAMIC RANDOM ACCESS MEMORY (SDRAM)
A common packet analyzer that runs at the command line. It allows the user to intercept and display TCP/IP and other packets being transmitted or received over a network to which the computer is attached and is called ___?
tcpdump
A computer network tool used to show the route taken by packets across an IP network. This is called ___?
traceroute
- All the following are key features of SmoothWall. EXCEPT:
- POP 3
- Static and dynamic DNS support
- Cybercash support
- Snort IDS support
- DHCP and Network time server support
Cybercash support
- According to the ___ ___ ___, attacks to systems connected to the Internet are becoming more and more complex.
- National Systems Agency
- National Security Agency
- Central Intelligence Agency
- Navy Security Agency
- Federal Bureau of Investigation
National Security Agency