An Authentication method tied to your physical body. Common methods: fingerprints, iris, or voice scanners.
What is Biometrics
A measurement of the directness of a route
What is the Metric
The speed of a T1 leased line
What is 1.544 Mbps
A site that mirrors the organization’s production network and can assume network operations at a moment’s notice.
What is a Hot Site
This proves that the owner of Public keys are who they say they are. The collection of software, standards, and policies
What is PKI (Public Key Infrastructure)
The three main parts of the AAA framework
What is Authentication,Authorization and Accounting
When routes and route information are manually entered into the routing tables
Static Routing
This device, which is actually two devices in one, makes the WAN technology useable with your LAN technology
The CSU/DSU
a measure of performance that indicates how hard the network is working and where network resources are spent. used to provide a basis of comparison
What is a Baseline
This is a protocol that provides authentication, authorization, and accounting services. However, it relies on TCP for connection-oriented delivery
What is TACACS+
This IEEE standard defines port-based security network access control.
What is 802.1X
The two Distance Vector routing protocols
RIP, EIGRP
An early high speed Internet technology that utilized the existing phone system, and required a modem and filters
DSL
This policy describes how the employees in an organization can use company systems and resources: both software and hardware.
What is the Acceptable use policy
This authentication method works by assigning a unique key, called a ticket, to each client that successfully authenticates to a server
Kerberos Authentication
This system detects intrusion based on signatures in the traffic and acts on a rule you set: block, allow, alert, etc
IPS-Intrusion Prevention System
A numerical value assigned to a route based on its perceived quality
Administrative distance
High speed cable Internet technology utilized existing coax infrastructure, and the Data Over Cable Service Interface Specification technology, also known as this.
DOCSIS
This technique increases performance by distributing the workload whilst also increasing network performance, reliability, and availability
What is Load Balancing
a digitally signed statement that associates the credentials of a public key to the identity of the person, device, or service that holds the corresponding private key
What is a Digital certificate
This is the reason a packet is dropped because it does not match any statement in an ACL.
What is the implicit deny
Instead of routing tables, this technology uses short labels to direct packets and forward them through the network.
MPLS (Multiprotocol label switching)
This data-link protocol is used to establish a connection between two nodes, and allows remote users to log on to the network and have access as though they were local users on the network. It is old.
What is PPP(Point-to-Point Protocol)
A method of balancing loads and providing fault tolerance by using multiple servers to a single website
What is Clustering
A directory based protocol that provides a mechanism to access and query directory services systems
What is LDAP