physical security Flashcards
when power is a sudden rise in voltage
surge/spike
when power is a reduction in voltage for a short period of time. a few seconds
sag/dip
this is a reduction in voltage that lasts longer than a few seconds
brownout
complete power failure
blackout
momentary power outage that can have a variety of sources
fault
fluctuation caused by line nose or disturbance
transiet
If BYOD been infected with malware, that infection can be spread when they connect their device to your organization’s network. this is called
malware propagation
_______ is the transmission of voice communication.
telephony
the process of digitally transmitting data, voice, and video over the Internet is called
voice over IP
the intermingling of voice and data services on networks is called
convergence
______ defines standards for VoIP protocols used in an audio-visual session on the internet.
h 323
_________ defines the VoIP implementation of features such as phones, voice mail, conferencing, call transfer, and public switched telephone network (PSTN) interconnections.
internet protocol telephony (IPT)
_______ defines the standards for streaming different types of media using VoIP
real time protocol (RTP)
________ is used for controlling VoIP session, it also enables features such as hold, call forwarding, and call transfer.
session initiation protocol (SIP)
_________ defines the components necessary to implement services for a particular implementation.
Service Delivery Platform
SDP
______ is encoded audio, video, or other multimedia data in transit over VoIP transmission
media stream
______ is software running on servers that manages IP phones, route calls, and implements call features
Softswitch
Traditional telephone uses the ______ to make analog phone calls
public switched telephone network (PSTN)
______ is a software application that enables phone calls on a computer.
softphone
_______ is a VoIP interface to a traditional telephony network such as the PSTN or a PBX.
voice gateway
PSTN calls are move over the
plain old telephone system (POTS)
___________ is cycling through the phone numbers and Electronic Serial Numbers (ESNs) found on an analog cell phone to find a legitimate pair or setting.
tumbling
______ is the act of intercepting cell phone signals.
sniffing
_____ is creating an identical cell phone and using someone’s services without authorization.
cloning
_______ is when an attackers dials every phone number in a certain range hoping to find a number with a backdoor modem to exploit
war dialing
_________ is when unauthorized changes are made to a subscriber’s telephone service or DSL Internet service
slamming
_________ charges a phone bill for services which were not authorized or ordered by the consumer
cramming