data communications and networking 2: prelim quiz

0.0(0)
studied byStudied by 0 people
GameKnowt Play
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/28

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

29 Terms

1
New cards

cut-through switch method

a switch forwarding method that begins the forwarding process after the destination MAC address of an incoming frame and the egress port has been determined

2
New cards

collision domain

network segments that share the same bandwidth between devices

3
New cards

distribution layer

this layer provides intelligent switching, routing, and network access policy functions to access the rest of the network

4
New cards

core layer

layer provide fault isolation and high-speed backbone connectivity

5
New cards

store-and-forward switching

a switch forwarding method that makes a forwarding decision on a frame after it has received the entire frame and then checked the frame for errors

6
New cards

access, distribution, and core layer

3 layers of the distribution access

7
New cards

false

true or false: when selecting the type of switch, rack units should always be considered. Rack units is the number ports available in the network switch

8
New cards

true

true or false: cut-through switching has two primary characteristics: rapid frame forwarding and invalid frame processing

9
New cards

daisy chain

stackable that are arranged one on top of the other with cables linking the switches in a … connection

10
New cards

broadcast domain

collection of interconnected switches forms a…

11
New cards

modular configuration

switches typically come with different sized chassis that allow for the installation of different numbers of line card

12
New cards

23

telnet protocol by default uses port …

13
New cards

brute force password attack

this attack tries to crack a password on another device. The first phase of this attack starts with the attacker using a list of common passwords and a program designed to try to establish a Telnet session using each word on the dictionary list

14
New cards

cisco discovery protocol

a proprietary protocol that all Cisco devices can be configured to use. This checks other Cisco devices that are directly connected, which allows the devices to auto-configure their connection

15
New cards

network time protocol

a protocol that is used to synchronize the clocks of computer systems over packet-switched, variable-latency data networks

16
New cards

dhcp snooping

a security technology that determines which devices attached to switch ports can respond to DHCP requests

17
New cards

speed auto

the command to configure the interface to automatically negotiate speed with the connected device

18
New cards

Ip domain-name mycompany.com

command to configure the IP domain name of the network (mycompany.com)

19
New cards

full duplex mode

this duplex mode increases effective bandwidth by allowing both ends of a connection to transmit and receive data simultaneousl

20
New cards

mode

an error occurs while loading the operating system because of missing or damaged system files, the load loader can be access through a console connection. What button in the switch you need to press while reconnecting the power cord?

21
New cards

cisco discovery protocol

a proprietary protocol that all Cisco devices can be configured to use. This checks other Cisco devices that are directly connected, which allows the devices to auto-configure their connection

22
New cards

there is activity and the port is sending or receiving data

in the Switch port LED status, if the LED is blinking green what is the status of switch

23
New cards

DHCP starvation attack

type of DHCP attack where in an attacker floods the DHCP server with DHCP requests to use all the available IP addresses that the DHCP server can issue

24
New cards

console cable

used to connect a PC to the console port of a switch for configuration

25
New cards

true

true or false: one of HCI's goals is to create specific capabilities and constraints for the software and/or hardware and platform chosen for the product

26
New cards

false

true or false: keeping abreast of what others do and letting others know what you do are irrelevant aspects of collaborative work and socialization

27
New cards

false

true or false: visibility is what operations and manipulation can be performed on a given entity

28
New cards

true

true or false: humans have a restricted capacity for processing information

29
New cards

What is the fundamental insight that underlies the evaluation process of "cognitive walk through?"