Final Exam Review 1-07-2009

Final Exam Review 1-07-2009 - Jourdan Fletcher Final Exam...

Info iconThis preview shows pages 1–4. Sign up to view the full content.

View Full Document Right Arrow Icon

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
This is the end of the preview. Sign up to access the rest of the document.

Unformatted text preview: Jourdan Fletcher Final Exam Review I. Chap 1 I I. Three Layer model a. Functionality I I I. Traffic Flow in an enterprise a. Enterprise edge b. Service provider edge c. Enterprise Campus IV. Difference between IDS and IPS a. IDS i. Detects problem only b. IPS i. Detect and repair by signature it knows c. Placement of the device V. Intranet a. Accessible to the user of the internal network VI. Extranet a. Accessible to people with the privelleges from the company VII. Latency a. Delay between the time when a device receives the frame and the time when it is forwarded out of the destination port VII I. Jitter Jourdan Fletcher a. Unwanted variation of one or more characteristics of a periodic signal in electronics and telecommunications. IX. QoS a. Quality of Service b. Standard of monitoring and maintaing a level of transmission performance and service X. VPN a. A secure tunnel through the internet to the companies internal network XI. SSL XII. SSH XII I. TLS Chap 2 XIV. Physical Topology XV. Logical Topology XVI. Enterprise documentation a. Business continuity plan b. Business Security Plan c. Network Maintenance Plan d. Service Level Agreement XVII. Line of demarcation a. Where the responsibility of the ISP ends and the Customer Responsibility begins XVIII. POP a. Point of presence Jourdan Fletcher b. Line of demarcation XIX. IDF a. Intermediate distribution frame b. If cable run required is further than 100 meters XX. DoS a. Denial of Service b. Attack by a single machine that floods the network making resources unavailable c. The packet is designed to have the source ip and source mac and dest mac and dest. Ip d. The ip is spoofed so the router can not send it back so it holds it, and another packet is sent and the process is repeated e. The packet has to be completed but the receiving host...
View Full Document

This note was uploaded on 10/25/2010 for the course NET 101 taught by Professor Williams during the Spring '10 term at FAU.

Page1 / 9

Final Exam Review 1-07-2009 - Jourdan Fletcher Final Exam...

This preview shows document pages 1 - 4. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online