Chapter 9

¡Supera tus tareas y exámenes ahora con Quizwiz!

one of two DiffServ forwarding specifications. It allows routers to assign data streams one of several prioritization levels, but it provides no guarantee that, on a busy network, messages will arrive on time or in sequence. It is specified in the DiffServ field in a IPv4 packet.

AF (Assured Forwarding)

a U.S. federal regulation that requires telecommunications carriers and equipment manufactures to provide for surveillance capabilities. It was passed by Congress in 1994 after pressure from the FBI, which worried that networks relying solely on digital communications would circumvent traditional wiretapping strategies.

CALEA (Communications Assistance for Law Enforcement Act)

One of two DiffServ forwarding specifications. It assignes each data stream a minimum departure rate from a given node. This technique circumvents delays that slow normal data from reaching its destination on time and in sequence.

EF (Expedited Forwarding)

TCP is preferred over UDP for real time services. (T/F)

False

_____ is the detection and signaling of device, link, or component faults.​

Fault management

In H.323, which protocol below handles call or video conference signaling?

H.225

Which element of H.323 is a device that provides translation between network devices running the H.323 signaling protocols and devices running other types of signaling protocols?

H.323 gateway

One aspect of the _____ regulation addresses the security and privacy of medical records, including those stored or transmitted electronically.​

HIPAA (Health Insurance Portability and Accountability Act)

A computer that provides support for multiple H.323 terminals and manages communication between them is known as what term below?

MCU

What protocol enables multiple types of Layer 3 protocols to travel over any one of several connection-oriented Layer 2 protocols?​

MPLS

A type of link aggregation in which two or more NICs work in tandem to handle traffic to and from a single node.

NIC teaming

a software-based tool that monitors traffic on the network from a server or workstation attached to the network. It can typically interpret up to Layer 3 of the OSI model.

Network monitor

What security standard below was created to protect credit card data and transactions, requiring network segmentation as part of security controls?​

PCI DSS

The network of lines and carrier equipment that provides telephone service to most homes and businesses

PSTN (Public Switched Telephone Network)

​On circuit switched portions of a PSTN, what set of standards established by the ITU is used to handle call signaling?

SS7

A set of standards established by the ITU for handling call signing on circuit-swtiched portions of the PSTN (Public Switched Telephone Network)

SS7 (Signalling System 7)

SNMP messages can be secured with _____, in which case agents receive requests on port UDP 10161, and the NMS receives responses and traps on UDP 10162.

TLS

CALEA requires telecommunications carriers and equipment manufacturers to provide for surveillance capabilities.​ (T/F)

True

Wireshark or any other monitoring software running on a single computer connected to a switch doesn't see all the traffic on a network, but only the traffic the switch sends to it, which includes broadcast traffic and traffic specifically addressed to the computer. (T/F)

True

most UNIX and Linux desktop operating systems provide a GUI application for easily vieweing and filtering the information in system logs. (T/F)

True

the SNMP version 3 protocol introduces authentication, validation, and encryption for messages exchanged between devices and the network management console. (T/F)

True

a streaming video, either on demand or live, that is delivered via the Web.

Webcast

What is NOT a requirement in order to use a softphone?

a wireless carrier to handle the voice path

A dropped packet is often referred to as a _____

discard

When using DiffServ, what type of forwarding utilizes a minimum departure rate from a given node, which is then assigned to each data stream?

expedited forwarding​

_____ are frames that are not actually data frames, but aberrations caused by a device misinterpreting stray voltage on the wire.​

ghosts

Packets that exceed the medium's maximum packet size are known by what term?​

giants

When a device handles electrical signals improperly, usually resulting from a bad NIC, it is referred to by what term?

jabber

The distribution of traffic over multiple components or links to optimize performance and fault tolerance

load balancing

in order for gateways to exchange and translate signaling and control information which each other so that voice and video packets are properly routed through a network, what intermediate device is needed?

media gateway controller

Packets that are smaller than a medium's minimum packet size are known by what term below?

runs

a broadcast that is delayed by a few minutes to allow for editing processes and licensing concerns

time-shifted video

​In a VoIP call, what method of transmission is used between two IP phones?

unicast

when using SIP, what term is used to describe end-user devices, which may include workstations, tablet computers, smartphones, or IP phones?

user agent client

What component of SIP is a server that responds to user agent clients' requests for session initiation and termination?

user agent server

A highly available server is available what percentage of the time?​

​99.99%

What two log files are used by older versions of Linux and newer versions of Linux to store log information?

- /var/log/messages - /var/log/syslog

What two terms are used to describe an analog-to-digital voice conversion device that accepts and interprets both analog and digital voice signals?

- IP PBX - digital PBX

What two terms below describe a network device with three ports, two of which send and receive all traffic, and the third port mirrors the traffic?​

- network tap - packet sniffer

What two terms below are used to describe a telephone switch that connects and manages calls within a private organization?​

- private branch exchange - PBX

What two terms describe the process of manipulating certain characteristics of packets, data streams, or connections to manage the type and amount of traffic traversing a network or interface at any moment?

- traffic shaping - packet shaping

SNMP agents receive requests from an NMS on what port number?​

161

The Priority Code Point field in a frame consists of how many bits

3 bits

A server running the SIP protocol listens on what TCP/UDP port for unsecured communications?​

5060

what percentage of Internet traffic, as estimated by Cisco Systems, will be devoted to video traffic by 2018?

79%


Conjuntos de estudio relacionados

Chapter 11: Functional Organization of nervous tissue

View Set

Databases 2 | CS 3306 | All questions: Self-Quizzes, Graded Quizzes, and Review Quizzes

View Set

Chapter 1 SmartBook - Introduction to HR

View Set

Psych Sex and Relationships mid-term

View Set

1120- Practice Questions- Exam 1

View Set

NU471 Week 5 EAQ #4 Evolve Elsevier: Disaster Planning - Mastery Level Target: Level 3

View Set

The Hound of the Baskervilles - Le Chien des Baskerville (A.C.Doyle)

View Set

Chapter 5: Business-Level Strategy: Creating and Sustaining Competitive Advantages

View Set

Cognitive Psychology Chapter 1, 2, 3, 4

View Set