Quick Tips 4 Flashcards

1
Q

IPSec BLANK mode protects the payload and header information of a packet, while IPSec BLANK mode protects only the payload.

A

tunnel, transport

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

A BLANK lies between the perimeter router and the LAN, and a BLANK is a DMZ created by two physical firewalls.

A

screened-host firewall, screened subnet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

BLANK is used when companies do not want systems to know internal hosts’ addresses, and it enables companies to use private, nonroutable IP addresses.

A

NAT

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

The BLANK standard outlines wireless personal area network (WPAN) technologies, and BLANK addresses wireless MAN technologies.

A

802.15, 802.16

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Environments can be segmented into different WLANs by using different BLANK.

A

SSIDs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

The BLANK standard works in the 2.4GHz range at 11 Mbps, and BLANK works in the 5GHz range at 54 Mbps.

A

802.11b, 802.11a

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

IPv4 uses BLANK bits for its addresses, whereas IPv6 uses BLANK bits; thus, IPv6 provides more possible addresses with which to work.

A

32, 128

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

BLANK allows large IP ranges to be divided into smaller, logical, and easier-to-maintain network segments.

A

Subnetting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

BLANK is a signaling protocol widely used for VoIP communications sessions.

A

SIP (Session Initiation Protocol)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

A new variant to the traditional e-mail spam has emerged on VoIP networks, commonly known as BLANK.

A

SPIT (Spam over Internet Telephony).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

BLANK is an SMTP server that is configured in such a way that it can transmit e-mail messages from any source to any destination.

A

Open relay

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

IP fragmentation, teardrop, and overlapping fragments are BLANK.

A

fragment attacks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Smurf and the Ping of Death use ICMP as their attack vectors and are BLANK.

A

DoS attacks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

BLANK is a type of phishing attack that takes place over telephone communication lines, and whaling is a phishing attack that zeros in on specific “big fish” targets.

A

Vishing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

SNMP uses BLANK. BLANK collect and maintain device-oriented data, which are held in management information bases. BLANK poll the agents using community string values for authentication purposes.

A

agents and managers, Agents, Managers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Three main types of multiplexing are BLANK.

A

statistical time division, frequency division, and wave division

17
Q

BLANK provides a standardized packet format for delivering audio and video over IP networks. It works with BLANK, which provides out-of-band statistics and control information to provide feedback on QoS levels.

A

Real-time Transport Protocol (RTP), RTP Control Protocol

18
Q

BLANK provides a unique ID for a device. BLANK provides data encryption, integrity, and origin authentication functionality at the data link level. BLANK carries out key agreement functions for the session keys used for data encryption. Each of these standards provides specific parameters to work within an BLANK framework.

A

802.1 AR, 802.1 AE, 802.1 AF, 802.1X EAP-TLS