• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/40

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

40 Cards in this Set

  • Front
  • Back

​A streaming video, either on demand or live, that is delivered via the Web.

Webcast

​A type of link aggregation in which two or more NICs work in tandem to handle traffic to and from a single node.

​NIC teaming

​One of two DiffServ forwarding specifications. It assigns each data stream a minimum departure rate from a given node. This technique circumvents delays that slow normal data from reaching its destination on time and in sequence.

EF (Expedited Forwarding)​

​A software-based tool that monitors traffic on the network from a server or workstation attached to the network. It can typically interpret up to Layer 3 of the OSI model.

​network monitor

​One of two DiffServ forwarding specifications. It allows routers to assign data streams one of several prioritization levels, but it provides no guarantee that, on a busy network, messages will arrive on time or in sequence. It is specified in the DiffServ field in an IPv4 packet.

AF (Assured Forwarding)​

​A U.S. federal regulation that requires telecommunications carriers and equipment manufacturers to provide for surveillance capabilities. It was passed by Congress in 1994 after pressure from the FBI, which worried that networks relying solely on digital communications would circumvent traditional wiretapping strategies.

CALEA (Communications Assistance for Law Enforcement Act)​

​A set of standards established by the ITU for handling call signaling on circuit-switched portions of the PSTN (Public Switched Telephone Network).

​SS7 (Signaling System 7)

​The distribution of traffic over multiple components or links to optimize performance and fault tolerance.

​load balancing

​The network of lines and carrier equipment that provides telephone service to most homes and businesses.

​PSTN (Public Switched Telephone Network)

​A broadcast that is delayed by a few minutes to allow for editing processes and licensing concerns.

​time-shifted video

A computer that provides support for multiple H.323 terminals and manages communication between them is known as what term below?

​MCU

A highly available server is available what percentage of the time?​

​99.99%

A server running the SIP protocol listens on what TCP/UDP port for unsecured communications?​

​5060
​5060

​In a VoIP call, what method of transmission is used between two IP phones?

unicast

In H.323, which protocol below handles call or videoconference signaling?​

​H.225

In order for gateways to exchange and translate signaling and control information with each other so that voice and video packets are properly routed through a network, what intermediate device is needed?​

​media gateway controller

​On circuit switched portions of a PSTN, what set of standards established by the ITU is used to handle call signaling?

​SS7

​Packets that are smaller than a medium's minimum packet size are known by what term below?

​runts

Packets that exceed the medium's maximum packet size are known by what term?​

​giants

SNMP agents receive requests from an NMS on what port number?​

​161

The Priority Code Point field in a frame consists of how many bits?​

​3 bits

​What component of SIP is a server that responds to user agent clients' requests for session initiation and termination?

​user agent server

What percentage of Internet traffic, as estimated by Cisco Systems, will be devoted to video traffic by 2018?​

​79%

What protocol enables multiple types of Layer 3 protocols to travel over any one of several connection-oriented Layer 2 protocols?​

​MPLS

What security standard below was created to protect credit card data and transactions, requiring network segmentation as part of security controls?​

​PCI DSS

​What two log files are used by older versions of Unix and newer version of Linux to store log information?

​/var/log/messages, ​/var/log/syslog

​What two terms below are used to describe an analog-to-digital voice conversion device that accepts and interprets both analog and digital voice signals?

IP PBX​, ​digital PBX

What two terms below are used to describe a telephone switch that connects and manages calls within a private organization?​

​private branch exchange, ​PBX

What two terms below describe a network device with three ports, two of which send and receive all traffic, and the third port mirrors the traffic?​

​network tap, packet sniffer​

What two terms below describe the process of manipulating certain characteristics of packets, data streams, or connections to manage the type and amount of traffic traversing a network or interface at any moment?​

traffic shaping​, ​packet shaping

When a device handles electrical signals improperly, usually resulting from a bad NIC, it is referred to by what term below?​

​jabber

When using DiffServ, what type of forwarding utilizes a minimum departure rate from a given node, which is then assigned to each data stream?

expedited forwarding​

When using SIP, what term is used to describe end-user devices, which may include workstations, tablet computers, smartphones, or IP phones?​

​user agent client

​Which element of H.323 is a device that provides translation between network devices running the H.323 signaling protocols and devices running other types of signaling protocols?

​H.323 gateway

Which of the following is not a requirement in order to use a softphone?​

​A wireless carrier to handle the voice path.

CALEA requires telecommunications carriers and equipment manufacturers to provide for surveillance capabilities.​

True

Most UNIX and Linux desktop operating systems provide a GUI application for easily viewing and filtering the information in system logs.

True

TCP is preferred over UDP for real time services.​

False

The SNMP version 3 protocol introduces authentication, validation, and encryption for messages exchanged between devices and the network management console.​

True

Wireshark or any other monitoring software running on a single computer connected to a switch doesn't see all the traffic on a network, but only the traffic the switch sends to it, which includes broadcast traffic and traffic specifically addressed to the computer.​

True