Networking Chapter 13 Terminology

Edit Answers
.TOQR00SOMETHINGYOUARE1W1 V2SETADPUREVIRDTFOSORCIMN 0HPSRBPSJUSERADDACCBE1SNO WNIO.ELATROPEVITPACVVZONI DOJMEZVSECURECONFIGUREMKT MI2ELVNRTVL8EKCIFAWVEHEAA MTRWQOA0EXEW8IBEPOFTS1TUC ZCFHX.PHNSUYMCAANFCONUH0I QEBEWESZUPTA1T.KBRKEOKIET QTIRFMEF8ONNUVUYOYK2ISNEN UOAEPRRCAYYREOGSS8UKTEGNE ARPYQNVUDLEGYMSPH.YDATYCH LPROTMEEQUSGNOET8KXWIAOET ISOUUEROPPNEVIFCCW1SDDURU TSCALUWD.IOENAHIR8ISEPDTA YEERCEAMHMRRLETTHO0AMUOIR UCSEITDTJERSTSGHEUFPERXFO PCSVEOERRTECEVCAZMWNRE1IT DAISFMBREPXRTGIFTTO1EV.CC AKNUOAO2OSUO1JQOYICSXI2AA TRGSURES1CUVR1LEL0VCDR0TF EORVRIIXE1LSEKPQSAUEZD8EI SWAAPTISQLPRJKZPSOT0LQE.T NTTNIE8VKK.GQYE8.18IAOEML LEEVUZS2SHYNAPCLIENTOEETU XNEWKERBEROSDOMRESUOJNI1M
1.
A MAC address that has been manually identified as an allowed address.
2.
A MAC address that has been dynamically learned and allowed by the switch. These addresses are only saved in the MAC address table in RAM and are not added to the configuration file.
3.
A MAC address that is manually configured or dynamically learned and saved.
4.
Occurs when the maximum number of MAC addresses has been seen on the port and an unknown MAC address is detected.
5.
A collection of components that allow administrators to regulate network access and communication based on a computer's compliance with health requirement policies.
6.
A client that has NAP-aware software, either through the operating system or through other components. Client software generates a Statement of Health (SoH) that reports the client configuration for health requirements.
7.
The server responsible for keeping track of health requirements and verifying that clients meet those requirements before gaining access. A Windows server running the Network Protection Service role is a NAP server.
8.
The connection point for clients into the network (also called an enforcement point). The ES allows or denies network access.
9.
A set of resources that a non-compliant computer can access on a limited-access network.
10.
This occurs when a person who should be allowed access is denied access. The false rejection rate (FRR) is a measure of the probability that a false negative will occur.
11.
This occurs when a person who should be denied access is allowed access.
12.
This is also called the equal error rate, is the point where the number of false positives matches the number of false negatives in a biometric system.
13.
The processing rate, or system throughput, identifies the number of subjects or authentication attempts that can be validated. An acceptable rate is ten subjects per minute or above.
14.
Kerberos is a free protocol that provides strong authentication for client/server applications using a secret-key cryptography. With Kerberos, the client can prove its identity even across an unsecure network connection.
15.
This is a port-based authentication service where the client initiates the authentication, a network device negotiates the authentication, and an authentication server is accessed after the supplicant is authenticated.
16.
This is is a web page that pops up when you access public Wi-Fi. This portal usually summarizes terms disclosing types of activities the Wi-Fi provider is not liable for during public access.
17.
This is a digital document that identifies a user or a computer. The certificate includes a subject name, which is the name of the user or the computer.
18.
Using more than one method to authenticate users.
19.
Formerly known as upgrades, they contain security and quality revisions, feature additions, and changes. They are released semi-annually in the fall and spring.
20.
Traditional OS updates, released the second Tuesday of each month. They usually include security and driver updates.
21.
Non-Microsoft driver updates that are applicable to users' devices.
22.
Updates for other Microsoft products like Office.
23.
Use this command on a linux system to change the current user's password.
24.
Use this command on a linux system to create a user account.
25.
Use this command on a linux system to modify an existing user account.
26.
Use this command on a linux system to remove the user from the system.
27.
This authentication type requires users to provide a password or some other data that they know. (Type 1)
28.
This authentication type of authentication uses something users have in their possession. (Type 2, also called token-based)
29.
This authentication type uses a biometric system. A biometric system attempts to identify a person based on metrics or a mathematical representation of the subject's biological attributes. (Type 3)
30.
This authentication type uses where you are accessing the information from. (Type 4)
31.
This authentication type uses the unique way you do something.