usable IP addresses that can be assigned to hosts on a /26 subnet.
What is 62
A device designed to filter and transfer data packets between different types of computer networks is called
What is Router
The typical cable segment length for a copper twisted-pair Ethernet cable.
What is 100 meters
The most common type of a DSL Internet access.
What is ADSL
Refers to a means for executing reflective DOS attack.
What is IP Spoofing
The dot-decimal representation of a /13 subnet mask
What is 255.248.0.0
A software or hardware that monitors network traffic and depending on the configuration settings applied to each data packet either blocks it or allows it to pass through.
What is A Firewall
In twisted-pair cabling wires are grouped into pairs and wires in each pair are twisted around each other in order to reduce _______.
What is Crosstalk
The term "Metropolitan Ethernet" refers to an _______.
What is a MAN (Metropolitan Area Network)
An attempt to flood the bandwidth or resources of a targeted system so that it becomes overwhelmed with false requests and in result doesn't have time or resources to handle legitimate requests is known as
What is DoS Attack
The first usable host IP address on the 172.26.56.110/27 network.
What is 172.26.56.97
An application software used to selectively block access to certain websites is an example of
What is a Content Filter
The minimum cabling requirement for a 10 Gbps connection over copper twisted-pair.
What is CAT6
The use of cable modems within a standard cable television infrastructure for Internet access is commonly referred to as
What is Cable Broadband
Malicious code activated by a specific event is known as
What is a Logic Bomb
The broadcast address for the 192.168.50.155/20 network.
What is 192.168.63.255
A network device designed for managing the optimal distribution of workloads across multiple computing resources is called.
What is Load Balancer
Cabling types that provides protection against an outside signal interference. (list 3)
What is Coaxial, Fiber-optic, STP
The solution that enables simultaneous digital transmission of voice, video, data, and other network services over a PSTN.
What is ISDN (Integrated Services Digital Network)
a rogue Wireless Access Point (WAP) set up for eavesdropping or stealing sensitive user data.
What is Evil Twin
The characteristic features of the 10.0.0.0 - 10.255.255.255 IPv4 address space? (Select 2 answers)
What is Class A range, Non-routable (private) IP address range.
A device that apart from the function of an ordinary network switch can also provide additional functions at higher levels of the OSI reference model is known as a
What is A multilayer switch
The term that refers to a loss in signal strength during transmission caused by increasing distance and obstacles encountered on the signal path.
What is Attenuation
T1 lines support data transfer rates of up to
What is 1.544 Mbps
A security solution implemented on an individual computer monitoring that specific system for malicious activities or policy violations is referred to as
What is HIDS (Host based Intrusion Detection System)