CompTIA Network + Ethernet Switching

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/58

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

59 Terms

1
New cards

10Base-T Ethernet

Allowed up to 10 Mbps networks to be run over a twisted pair cable known as category 3 or Cat 3

2
New cards

Deterministic

Means that the network access should be very organized and orderly

3
New cards

Contention-based

Used to determine who gets to access and communicate on the network at any given time

4
New cards

CSMA/CD

Carrier Sense Multiple Access with Collision Detection

5
New cards

Carrier

Fancy word in electronics for a signal that carries information or data

6
New cards

Random Backoff Timer

Allows the two devices to attempt to retransmit again when the timer hits zero

7
New cards

Collision Domain

Each area of the network that shares a single segment

8
New cards

Ethernet Switch

Increases scalability of a network by creating multiple collision domains (Full-duplex mode when connected to switch)

9
New cards

Hub

Known as multiport repeater, is is a Layer 1 device that connects multiple network devices and workstations

10
New cards

Passive Hub

Repeats signal with no amplification

11
New cards

Active Hub

Repeats signal with amplification

12
New cards

Smart Hub

Active hub with enhanced features like Simple Network Management Protocol (SNMP)

13
New cards

Bridge

Analyzes source MAC addresses and makes intelligent forwarding decisions based on the destination MAC in the frames

14
New cards

Switch

Known as a multiport bridge, it is a Layer 2 device that connects multiple network segments together

15
New cards

Router

Layer 3 device that connects multiple networks and makes forwarding decisions based on logical network information

16
New cards

Layer 3 Switch

Makes Layer 3 routing decisions and then interconnects entire networks, not just network segments

17
New cards

Virtual Local Area Network (VLAN)

Logical subdivision of a given network that segments into separate broadcast domains

18
New cards

Enhanced Security

Segmenting the networks into VLANs allows sensitive data to be isolated to reduce data breaches

19
New cards

Improved Performance

Reducing the size of a broadcast domain helps to decrease the amount of traffic being sent over that segment

20
New cards

Increased Management

Providing greater control over the management of networks to implement policy changes and troubleshoot issues

21
New cards

Improved Cost Efficiency

Breaking the existing network infrastructure into smaller logical segments

22
New cards

Switch Virtual Interface (SVI)`

Allows switching to route traffic between different VLANs without requiring a separate router

23
New cards

802.1Q (VLAN) Tagging

Refers to an IEEE standard that facilitates the management of multiple VLANs on a single network

24
New cards

Trunking

The transmission of traffic from different VLANs across the same physical network infrastructure, while keeping the traffic from each VLAN separate and secure

25
New cards

Native (Default) VLAN

The one VLAN on a trunk port that does not get tagged with a VLAN identifier when frames are passed over a trunk link

26
New cards

Voice VLAN

Specialized BLAN dedicated to voice traffic, particularly VoIP (or Voice traffic over IP) traffic within the network.

27
New cards

Link Aggregation

Also known as port channeling or bonding, is a method used in networks to combine multiple network connections into a single, logical link

28
New cards

Speed and Duplex Configurations

The settings that determine the rate at which data is transmitted and the mode of communication between the network devices

29
New cards

Half-Duplex Mode

Data transmission and reception cannot occur simultaneously

30
New cards

Full-Duplex Mode

Allows a device to send and receive data simultaneously

31
New cards

Auto-Negotiation

Commonly used when devices automatically select the highest performance settings in common

32
New cards

Spanning Tree Protocol (802.1d)

Permits redundant links between switches and prevents looping of network traffic

33
New cards

Broadcast Storm

Multiple copies of frames being forwarded back and forth which then consumes the network

34
New cards

Root Bridge

Switch with the lowest bridge ID (BID)

35
New cards

Root Port

Every non-root bridge has a single root port which is the closest to the root bridge in terms of cost

36
New cards

Designated Port

Every network segment has a designated port which is the closest to the root bridge in terms of cost

37
New cards

Non-Designated Port

Ports that block traffic to create loop-free topology

38
New cards

Blocking

BPDUs are received but not forwarded

39
New cards

Listening

Populates the MAC address table but does not forward frames

40
New cards

Learning

Processes BPDUs and this is where switch determines its role in the spanning tree

41
New cards

Forwarding

Forwards frames for operations

42
New cards

Link Cost

Associated with the speed of the link - the lower the link’s speed, the higher the cost

43
New cards

Network Access Control (NAC)

Method for increasing the security of a given network by inspecting devices trying to connect to a network

44
New cards

Port Security

Involves securing physical network ports to prevent unauthorized access

45
New cards

MAC Filtering

Controls access to the network by limiting which devices can gain access to the network based on the device’s unique MAC address

46
New cards

802.1x Authentication

Provides an authentication framework for networks and ensures only authenticated users can access network services

47
New cards

EAP

Extensible Authentication Protocol

48
New cards

Supplicant

User device seeking to access the network

49
New cards

Authenticator

Network device the user wants to connect to

50
New cards

Authenticator Serv er

Server on the network that will authenticate t he user’s devices

51
New cards

Time-Based Access Control

Limits a device’s network access to specified hours based on the organization’s operational schedule

52
New cards

Location-Based Access Control

Enhances network security by utilizing geolocation technologies to verify the physical location of the device requesting network access

53
New cards

Role-Based Access Control

Provides a dynamic method of regulating access based on the user’s role within an organization

54
New cards

Rule-Based Access Control

Operates on a set of predefined rules to methodically grant or deny access by assessing logical conditions and statements based on the specific user’s identity and context.

55
New cards

Maximum Transition Unit (MTU)

Refers to the largest size of a data packet or frame that can be sent over a network

56
New cards

Jumbo Frames

Refers to any frames that exceed the standard or default Ethernet MTU size of 1500 bytes

57
New cards
58
New cards
59
New cards