physical security Flashcards

1
Q

when power is a sudden rise in voltage

A

surge/spike

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

when power is a reduction in voltage for a short period of time. a few seconds

A

sag/dip

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

this is a reduction in voltage that lasts longer than a few seconds

A

brownout

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

complete power failure

A

blackout

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

momentary power outage that can have a variety of sources

A

fault

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

fluctuation caused by line nose or disturbance

A

transiet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

If BYOD been infected with malware, that infection can be spread when they connect their device to your organization’s network. this is called

A

malware propagation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

_______ is the transmission of voice communication.

A

telephony

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

the process of digitally transmitting data, voice, and video over the Internet is called

A

voice over IP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

the intermingling of voice and data services on networks is called

A

convergence

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

______ defines standards for VoIP protocols used in an audio-visual session on the internet.

A

h 323

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

_________ defines the VoIP implementation of features such as phones, voice mail, conferencing, call transfer, and public switched telephone network (PSTN) interconnections.

A

internet protocol telephony (IPT)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

_______ defines the standards for streaming different types of media using VoIP

A

real time protocol (RTP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

________ is used for controlling VoIP session, it also enables features such as hold, call forwarding, and call transfer.

A

session initiation protocol (SIP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

_________ defines the components necessary to implement services for a particular implementation.

A

Service Delivery Platform

SDP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

______ is encoded audio, video, or other multimedia data in transit over VoIP transmission

A

media stream

17
Q

______ is software running on servers that manages IP phones, route calls, and implements call features

A

Softswitch

18
Q

Traditional telephone uses the ______ to make analog phone calls

A

public switched telephone network (PSTN)

19
Q

______ is a software application that enables phone calls on a computer.

A

softphone

20
Q

_______ is a VoIP interface to a traditional telephony network such as the PSTN or a PBX.

A

voice gateway

21
Q

PSTN calls are move over the

A

plain old telephone system (POTS)

22
Q

___________ is cycling through the phone numbers and Electronic Serial Numbers (ESNs) found on an analog cell phone to find a legitimate pair or setting.

A

tumbling

23
Q

______ is the act of intercepting cell phone signals.

A

sniffing

24
Q

_____ is creating an identical cell phone and using someone’s services without authorization.

A

cloning

25
Q

_______ is when an attackers dials every phone number in a certain range hoping to find a number with a backdoor modem to exploit

A

war dialing

26
Q

_________ is when unauthorized changes are made to a subscriber’s telephone service or DSL Internet service

A

slamming

27
Q

_________ charges a phone bill for services which were not authorized or ordered by the consumer

A

cramming