1/28
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced |
---|
No study sessions yet.
cut-through switch method
a switch forwarding method that begins the forwarding process after the destination MAC address of an incoming frame and the egress port has been determined
collision domain
network segments that share the same bandwidth between devices
distribution layer
this layer provides intelligent switching, routing, and network access policy functions to access the rest of the network
core layer
layer provide fault isolation and high-speed backbone connectivity
store-and-forward switching
a switch forwarding method that makes a forwarding decision on a frame after it has received the entire frame and then checked the frame for errors
access, distribution, and core layer
3 layers of the distribution access
false
true or false: when selecting the type of switch, rack units should always be considered. Rack units is the number ports available in the network switch
true
true or false: cut-through switching has two primary characteristics: rapid frame forwarding and invalid frame processing
daisy chain
stackable that are arranged one on top of the other with cables linking the switches in a … connection
broadcast domain
collection of interconnected switches forms a…
modular configuration
switches typically come with different sized chassis that allow for the installation of different numbers of line card
23
telnet protocol by default uses port …
brute force password attack
this attack tries to crack a password on another device. The first phase of this attack starts with the attacker using a list of common passwords and a program designed to try to establish a Telnet session using each word on the dictionary list
cisco discovery protocol
a proprietary protocol that all Cisco devices can be configured to use. This checks other Cisco devices that are directly connected, which allows the devices to auto-configure their connection
network time protocol
a protocol that is used to synchronize the clocks of computer systems over packet-switched, variable-latency data networks
dhcp snooping
a security technology that determines which devices attached to switch ports can respond to DHCP requests
speed auto
the command to configure the interface to automatically negotiate speed with the connected device
Ip domain-name mycompany.com
command to configure the IP domain name of the network (mycompany.com)
full duplex mode
this duplex mode increases effective bandwidth by allowing both ends of a connection to transmit and receive data simultaneousl
mode
an error occurs while loading the operating system because of missing or damaged system files, the load loader can be access through a console connection. What button in the switch you need to press while reconnecting the power cord?
cisco discovery protocol
a proprietary protocol that all Cisco devices can be configured to use. This checks other Cisco devices that are directly connected, which allows the devices to auto-configure their connection
there is activity and the port is sending or receiving data
in the Switch port LED status, if the LED is blinking green what is the status of switch
DHCP starvation attack
type of DHCP attack where in an attacker floods the DHCP server with DHCP requests to use all the available IP addresses that the DHCP server can issue
console cable
used to connect a PC to the console port of a switch for configuration
true
true or false: one of HCI's goals is to create specific capabilities and constraints for the software and/or hardware and platform chosen for the product
false
true or false: keeping abreast of what others do and letting others know what you do are irrelevant aspects of collaborative work and socialization
false
true or false: visibility is what operations and manipulation can be performed on a given entity
true
true or false: humans have a restricted capacity for processing information
What is the fundamental insight that underlies the evaluation process of "cognitive walk through?"