Security
Routing
Wan
Policies and Operations
Sec+
100

An Authentication method tied to your physical body. Common methods: fingerprints, iris, or voice scanners.

What is Biometrics

100

A measurement of the directness of a route

What is the Metric

100

The speed of a T1 leased line

What is 1.544 Mbps

100

A site that mirrors the organization’s production network and can assume network operations at a moment’s notice.

What is a Hot Site

100

This proves that the owner of Public keys are who they say they are. The collection of software, standards, and policies

What is PKI (Public Key Infrastructure)

200

The three main parts of the AAA framework

What is Authentication,Authorization and Accounting

200

When routes and route information are manually entered into the routing tables

Static Routing

200

This device, which is actually two devices in one, makes the WAN technology useable with your LAN technology

The CSU/DSU

200

a measure of performance that indicates how hard the network is working and where network resources are spent. used to provide a basis of comparison

What is a Baseline

200

This is a protocol that provides authentication, authorization, and accounting services. However, it relies on TCP for connection-oriented delivery

What is TACACS+

300

This IEEE standard defines port-based security network access control.

What is 802.1X

300

The two Distance Vector routing protocols

RIP, EIGRP

300

An early high speed Internet technology that utilized the existing phone system, and required a modem and filters

DSL

300

This policy describes how the employees in an organization can use company systems and resources: both software and hardware.

What is the Acceptable use policy

300

This authentication method works by assigning a unique key, called a ticket, to each client that successfully authenticates to a server

Kerberos Authentication

400

This system detects intrusion based on signatures in the traffic and acts on a rule you set: block, allow, alert, etc

IPS-Intrusion Prevention System

400

A numerical value assigned to a route based on its perceived quality

Administrative distance

400

High speed cable Internet technology utilized existing coax infrastructure, and the Data Over Cable Service Interface Specification technology, also known as this.

DOCSIS

400

This technique increases performance by distributing the workload whilst also increasing network performance, reliability, and availability

What is Load Balancing 

400

a digitally signed statement that associates the credentials of a public key to the identity of the person, device, or service that holds the corresponding private key

What is a Digital certificate

500

This is the reason a packet is dropped because it does not match any statement in an ACL.

What is the implicit deny

500

Instead of routing tables, this technology uses short labels to direct packets and forward them through the network.

MPLS (Multiprotocol label switching)

500

This data-link protocol is used to establish a connection between two nodes, and allows remote users to log on to the network and have access as though they were local users on the network. It is old.

What is PPP(Point-to-Point Protocol)

500

A method of balancing loads and providing fault tolerance by using multiple servers to a single website 

What is Clustering 

500

A directory based protocol that provides a mechanism to access and query directory services systems

What is LDAP