Audio conferencing is a software-based, real-time audio conference solution for ________ callers.
VoIP
100
A network utility program that reads from and writes to network connections.
Netcat
100
The goal of ____________ is to quantify possible outcomes of risks, determine probabilities of outcomes, identify high-impact risks, and develop plans based on risks.
Quantitative risk analysis
100
________ is the basis for unified communications and is the protocol used by real-time applications, such as IM chat, conferencing, and collaboration.
Session initiation protocol (SIP)
200
The goal and objective of a __________ is to provide a consistent definition for how an organization should handle and secure different types of data.
Data classification standard
200
Network devices can implement ___________ to better support VoIP and SIP IP packets and reduce dropped calls and delays.
Traffic prioritization
200
A __________ tries to break IT security and gain access to systems with no authorization, in order to prove technical prowess.
black-hat hacker
200
The annual probability that a stated threat will be realized.
Annual rate of occurance
200
A high-speed digital broadband service that uses copper cabling for Internet access.
Digital subscriber line (DSL)
300
____________ is the amount of time it takes to recover and make a system, application, and data available for use after an outage.
Recovery time objective (RTO)
300
To satisfy the demands of a growing number of mobile devices and users of 3G, new networks emerged. These new 4G networks use IP addressing and eliminated remaining __________.
Circuit switching
300
A _________ has a hostile intent, possesses sophisticated skills, and may be interested in financial gain. They represent the greatest threat to networks and information resources.
Cracker
300
A parallel test evaluates the effectiveness of the ________ by enabling full processing capability at an alternate data center without interrupting the primary data center.
DRP
300
The ____________ represents the fourth layer of defense for a typical IT infrastructure.
LAN-to-WAN domain
400
The director of IT security is generally in charge of ensuring that the ____________ conforms to policy.
Workstation domain
400
Voice and unified communications are ________ applications that use 64-byte IP packets.
Real-time
400
An attack that seeks to obtain personal or private financial information through domain spoofing.
Pharming
400
Information security activities directly support several common business drivers, including ________ and efforts to protect intellectual property.
Compliance
400
The physical part of the LAN Domain includes a __________, which is an interface between the computer and the LAN physical media.
Network interface card (NIC)
500
A ________ examines the network layer address and routes packets based on routing protocol path determination decisions.
Layer 3 switch
500
As users upgrade LANs to GigE or 10GigE, switches must support ________and data IP traffic.
voice
500
________ is a method that black-hat hackers use to attempt to compromise logon and password access controls, usually following a specific attack plan, including the use of social engineering to obtain user information.
Brute-force password attack
500
A___________ will help identify not only which functions are critical, but also how quickly essential business functions must return to full operation following a major interruption.
Business impact analysis
500
________ is a type of attack in which the attacker takes control of a session between two machines and masquerades as one of them.