Netw 250 Final Exam

Submitted by: Submitted by

Views: 10

Words: 1944

Pages: 8

Category: Other Topics

Date Submitted: 12/17/2015 08:36 PM

Report This Essay

NETW 250 Final Exam

Purchase here

http://chosecourses.com/NETW%20250

Description

(TCO1) The Central Office is the place

(TCO2) Like many softPBX systems, Asterisk refers to each leg of a voice call as a ____.

(TCO3) Known as ‘connectionless networking’, this protocol employs a method where IP datagram are sent over a network using a ‘best-effort’ approach. The recipient would not know if the packets sent were received by the intended recipient

(TCO4) These are facility connections from the phone company switch to the residential analog telephones; or the term used for delivering dial-tone to a group of phones

(TCO5) Used by hackers to see vulnerabilities and gain access, it is a systematic process that attempts to identify all of the open and available services on a TCP/IP host

(TCO6) This is a call accounting software that is retrieved from a PBX, where the incoming and outgoing call information are logged. The logged information can contain data as date, time, extension, trunk, caller ID, and duration of call

(TCO7) Along with CTI and ACD, this is a PBX supported application where multiple phones, telephony processes, phone operators, IVR, complex dial-plan, and hunt groups, run in a confined space and take information from customers, then, facilitate a response over the phone

(TCO10) This was the first VoIP standard, ratified by ITU-T in 1996, that addressed having real time communications for video and voice in an unreliable packet network, and applied for PBX-styled signaling that supports packet-based networks

(TCO11) This layer organizes and synchronizes dialogues between presentation entities in the OSI 7-Layer Communications Model

(TCO12) In Ethernet transmission, this is the result when two nodes transmit at the same time, which leads to data loss, re-transmission, delay, or latency

(TCO3) Name and explain the three most important factors that you must protect when Securing a VoIP Network

(TCO4) What makes coaxial...