Written Lab
You can find the answers to the written labs in Appendix A. In this section, write the answers to the following management questions:
-
__________ are systems that are configured to be attractive to hackers and to lure them into spending time attacking them while information is gathered about the attack.
-
Which network-performance optimization technique uses a contract to determine which data can get on to the network?
-
The lowest level of QoS is called __________.
-
__________ is a type of power converter that specifically converts DC to AC.
-
Spreading network traffic across multiple connections is called __________.
-
A standard of normal network performance is called __________.
-
If you need to connect two PCs directly together using their network adapters, what type of cable do you need?
-
What is another name for using virtualization to provide services?
-
List at least three major components of virtualization.
-
The steps you should take when...