LMS QUIZ Flashcards
(30 cards)
NAS stands for _________
Network Attached Storage
What kind of switch is recommended for a growing organization?
Stackable/ modular
Who are individuals who use hacking techniques to promote political or social causes, raise awareness, or protest against perceived injustices?
Hacktivists
Who is the attacker who aims to cause fear, disruption, or damage by launching cyberattacks against critical infrastructure, government agencies, or public institutions?
Cyberterrorists
What is a term used in the military to describe the systematic process to target and engage an enemy?
Cyber Kill Chain
Cisco access layer switch recommended for large organization
Catalyst 6500
Causes all devices to stop transmitting for a random amount of time.
Backoff algorithm
PoE stands for ____________________
Power over Ethernet
CRC stands for?
Cyclic Redundancy Check
A switch that could be interconnected to expand the number of ports.
Stackable Switch
In __________ switching, the switch acts upon the data as soon as it is received, even if the transmission is not complete.
Cut-through
Catalyst Express 500 can handle up to _____ number of Employees.
250
Minimum core layer speed is ___________.
10gbps
____________ ensures that information is accessible only to those who are authorized to view or handle it
Confidentiality
Graphical representation of the network structure?
Topology
____________ ensures that information is accessible and usable by authorized users whenever needed
Availability
Minimum distribution layer speed is ________
1Gbps
There is just one sender, but the information is sent to all connected receivers.
Broadcast
A plug-and-play switch from a manufacturer
Fixed Configuration
Two ports communicate to decide the best mode of operation.
Auto Negotiation
Allows the switch to decide how many or what specific devices are allowed to connect to the switch.
Port Security
The router uses the IP address to locate the destination while the switch uses ________.
MAC Address
Who are individuals within an organization who misuse their access privileges to steal confidential information and sabotage systems?
Insiders
A 7-byte fields used for synchronization between the sending and receiving devices.
Preamble