1/29
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced | Call with Kai |
|---|
No analytics yet
Send a link to your students to track their progress
802.11 standards
IEEE standards for wireless networking based on spread spectrum radio transmission in the 2.4 GHz and 5 GHz bands, known as Wi-Fi. Main iterations include a, b, g, Wi-Fi 4 (n), Wi-Fi 5 (ac), and Wi-Fi 6 (ax).
802.11h
Amendment to Wi-Fi standards defining a Dynamic Frequency Selection (DFS) mechanism to avoid interference with radar and cellular communications in the 5 GHz frequency band.
802.1p
IEEE standard that defines a 3-bit class of service priority field within the 802.1Q format.
802.1q
Trunking protocols enabling switches to exchange data about VLAN configurations; often used to tag frames destined for different VLANs across trunk links.
802.1x
Standard for encapsulating EAP communications over LAN (EAPoL) for port-based authentication.
802.3 ethernet standards
Standards developed as the IEEE 802.3 series that describe media types, access methods, data rates, and distance limitations at OSI layers 1 and 2.
access control list (ACL)
Collection of access control entries (ACEs) determining which subjects are allowed or denied access to an object and what privileges are given.
access point (AP)
Device that provides a connection between wireless devices and wired networks, implementing an infrastructure mode WLAN.
active-active
High availability cluster configuration where all nodes are utilized continually.
active-passive
High availability cluster configuration where one or more nodes are only utilized during failover.
ad hoc network
Type of wireless network where connected devices communicate directly with each other, also known as Independent Basic Service Set (IBSS).
address resolution protocol (ARP)
Broadcast mechanism that matches hardware MAC address of an interface to an IP address on a local network segment.
adjacent channel interference (ACI)
Troubleshooting issue where access points use overlapping channels, causing increased noise.
administrative distance (AD)
Metric determining the trustworthiness of routes derived from different routing protocols.
advanced persistent threat (APT)
Threat actors with ability to craft exploits to obtain and maintain unauthorized access to network systems.
b
General Radio PAC (GRP) standards for implementing data access over cellular networks, with 2G, 3G, 4G, and 5G standards.
bandwidth
The amount of data that can be transferred through a connection over a given period, more properly refers to the range of frequencies supported by transmission media.
broadcast domain
Network segment where all nodes receive the same broadcast frames at layer 2.
cdn
Content delivery network; a system of distributed servers that delivers web content to a user based on geographical locations.
cloud service model
Classifying the provision of cloud services; includes IaaS, PaaS, SaaS.
data link layer (Layer 2)
OSI model layer responsible for transferring data between nodes.
dynamic host configuration protocol (DHCP)
Protocol used to automatically assign IP addressing information to hosts.
encryption algorithm
Method that scrambles characters in communication for secure transmission and storage.
internet protocol security (IPSec)
Network protocol suite used to secure data through authentication and encryption.
malware
Software that serves a malicious purpose, often installed without user consent.
network adapter
Adapter card providing Ethernet ports for connecting hosts to a network.
packet loss
PDUs that do not reach their destination due to errors or congestion.
relational database management systems (RDBMS)
Software for creating and managing databases that utilize structured query language (SQL).
v
Common technology for ensuring data confidentiality, integrity, and availability.
vulnerability assessment
Evaluation of a system's security and compliance based on its configuration state.