[M1-MAIN] Networking Today and Basic Switch and End Device Configuration

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/106

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

107 Terms

1
New cards

Host

Every computer on a network is called a host or end device.

2
New cards

End Device

An end device is where a message originates from or where it is received.

3
New cards

Client

Computers that send requests to servers to retrieve information.

4
New cards

Server

Computers that provide information to end devices.

5
New cards

Email Server

Runs email server software; clients use client software to access email.

6
New cards

Web Server

Runs web server software; clients use browser software to access web pages.

7
New cards

File Server

Stores corporate and user files, accessed by client devices.

8
New cards

Peer-to-Peer Network

A network design where a device can be both a client and a server, recommended only for very small networks.

9
New cards

Intermediary Device

A device that interconnects end devices, such as switches, wireless access points, routers, and firewalls.

10
New cards

Network Media

The medium through which communication across a network is carried, allowing a message to travel from source to destination.

11
New cards

Metal Wires within Cables

Network media type that uses electrical impulses.

12
New cards

Glass or Plastic Fibers within Cables (Fiber-Optic Cable)

Network media type that uses pulses of light.

13
New cards

Wireless Transmission

Network media type that uses modulation of specific frequencies of electromagnetic waves.

14
New cards

Network Diagram

Also called a topology diagram, uses symbols to represent devices within the network.

15
New cards

Topology Diagram

Illustrates devices and connections within a network.

16
New cards

Physical Topology Diagram

Illustrates the physical location of intermediary devices and cable installation.

17
New cards

Logical Topology Diagram

Illustrates devices, ports, and the addressing scheme of the network.

18
New cards

Network Interface Card (NIC)

A component used in network representations.

19
New cards

Physical Port

A connection point on a device used in network representations.

20
New cards

Interface

Often used interchangeably with "port" in network representations.

21
New cards

Small Home Network

Connects a few computers to each other and the Internet.

22
New cards

Small Office/Home Office (SOHO) Network

Enables computers within a home or remote office to connect to a corporate network.

23
New cards

Medium to Large Network

Many locations with hundreds or thousands of interconnected computers.

24
New cards

World Wide Network

Connects hundreds of millions of computers worldwide, such as the internet.

25
New cards

Local Area Network (LAN)

A network infrastructure that spans a small geographical area.

26
New cards

Wide Area Network (WAN)

A network infrastructure that spans a wide geographical area.

27
New cards

Internet

A worldwide collection of interconnected LANs and WANs.

28
New cards

IETF

A group developed to help maintain structure on the internet.

29
New cards

ICANN

A group developed to help maintain structure on the internet.

30
New cards

IAB

A group developed to help maintain structure on the internet.

31
New cards

Intranet

A private collection of LANs and WANs internal to an organization, accessible only to authorized members.

32
New cards

Extranet

Provides secure access to an organization's network for individuals from different organizations who need data access.

33
New cards

Broadband Cable

High bandwidth, always-on internet offered by cable television service providers.

34
New cards

Broadband Digital Subscriber Line (DSL)

High bandwidth, always-on internet connection that runs over a telephone line.

35
New cards

Wireless WAN

An internet access technology for home users and small offices.

36
New cards

Mobile Services

An internet access technology for home users and small offices.

37
New cards

Business DSL

A business-class interconnection provided by service providers.

38
New cards

Leased Line

A business-class interconnection provided by service providers, reserved circuits connecting distant offices.

39
New cards

Metro Ethernet

A business-class interconnection provided by service providers, extends LAN access technology into the WAN.

40
New cards

Cellular

Uses a cell phone network to connect to the internet.

41
New cards

Satellite

Provides internet connection in rural areas without Internet Service Providers.

42
New cards

Dial-up Telephone

An inexpensive, low bandwidth internet option using a modem.

43
New cards

Converging Network

A network that carries multiple services (data, voice, video) on one link using the same infrastructure, rules, and standards.

44
New cards

Network Architecture

Refers to the technologies that support the infrastructure that moves data across the network.

45
New cards

Fault Tolerance

A characteristic of reliable networks that limits the impact of a failure by providing multiple paths.

46
New cards

Scalability

A characteristic of reliable networks that allows expansion to support new users and applications without impacting performance.

47
New cards

Quality of Service (QoS)

The primary mechanism used to ensure reliable delivery of content for all users, especially for voice and video.

48
New cards

Network Security

Addresses the physical security of network devices and preventing unauthorized access to them.

49
New cards

Information Security

Protection of the information or data transmitted over the network.

50
New cards

Confidentiality

A goal of network security, ensuring only intended recipients can read the data.

51
New cards

Integrity

A goal of network security, assuring data has not been altered during transmission.

52
New cards

Availability

A goal of network security, assuring timely and reliable access to data for authorized users.

53
New cards

Bring Your Own Device (BYOD)

Allows users to use their personal devices (laptops, tablets, smartphones) to access information and communicate.

54
New cards

Online Collaboration

Working with others over the network on joint projects using tools like Cisco WebEx.

55
New cards

Video Communication

Using video calls and conferencing for communication, regardless of location.

56
New cards

Cloud Computing

Allows storing personal files or backing up data on servers over the internet, and accessing applications.

57
New cards

Public Cloud

Cloud type available to the general public through a pay-per-use model or for free.

58
New cards

Private Cloud

Cloud type intended for a specific organization or entity.

59
New cards

Hybrid Cloud

Made up of two or more cloud types, connected using the same architecture.

60
New cards

Custom Cloud

Built to meet the needs of a specific industry.

61
New cards

Smart Home Technology

A trend integrating technology into everyday appliances, allowing them to interconnect.

62
New cards

Powerline Networking

Allows devices to connect to a LAN using electrical outlets and sending data on certain frequencies.

63
New cards

Wireless Broadband

An option to connect homes and small businesses to the internet, often found in rural environments.

64
New cards

Wireless Internet Service Provider (WISP)

An ISP that connects subscribers to designated access points or hotspots.

65
New cards

External Threats

Security threats originating from outside the network, such as viruses, worms, Trojan horses, spyware, adware, zero-day attacks, threat actor attacks, denial of service attacks, data interception and theft, and identity theft.

66
New cards

Internal Threats

Security threats originating from inside the network, such as lost or stolen devices, accidental misuse by employees, and malicious employees.

67
New cards

Antivirus Software

A security solution installed on end devices to protect against viruses.

68
New cards

Antispyware Software

A security solution installed on end devices to protect against spyware.

69
New cards

Firewall Filtering

Used to block unauthorized access to the network.

70
New cards

Dedicated Firewall System

An additional security requirement for larger networks.

71
New cards

Access Control Lists (ACL)

An additional security requirement for larger networks.

72
New cards

Intrusion Prevention Systems (IPS)

An additional security requirement for larger networks.

73
New cards

Virtual Private Networks (VPN)

An additional security requirement for larger networks.

74
New cards

Operating System (OS)

Required by all end devices and network devices.

75
New cards

User EXEC Mode

A Cisco IOS command mode allowing access to limited basic monitoring commands, identified by >.

76
New cards

Privileged EXEC Mode

A Cisco IOS command mode allowing access to all commands and features, identified by #.

77
New cards

Global Configuration Mode

Accessed before other specific configuration modes to configure options on the device.

78
New cards

Line Configuration Mode

A subconfiguration mode used to configure console, SSH, Telnet, or AUX access.

79
New cards

Interface Configuration Mode

A subconfiguration mode used to configure a switch port or router interface.

80
New cards

Console

A physical management port used to access a device for initial configurations.

81
New cards

Secure Shell (SSH)

Establishes a secure remote CLI connection to a device over a network.

82
New cards

Telnet

Establishes an insecure remote CLI connection to a device over the network, sending data in plaintext.

83
New cards

Terminal Emulation Program

Software (e.g., PuTTY, Tera Term, SecureCRT) used to connect to a network device via console, SSH, or Telnet.

84
New cards

Keyword

A specific parameter defined in the operating system within a command structure.

85
New cards

Argument

A value or variable defined by the user within a command structure.

86
New cards

Context-sensitive help

An IOS help feature that allows quick finding of available commands, arguments, and keywords.

87
New cards

Command syntax check

An IOS help feature that verifies valid command entry and provides feedback on errors.

88
New cards

Tab

A hot key that completes a partial command name entry.

89
New cards

Backspace

A hot key that erases the character to the left of the cursor.

90
New cards

Left Arrow or Ctrl+B

Hot keys that move the cursor one character to the left.

91
New cards

Right Arrow or Ctrl+F

Hot keys that move the cursor one character to the right.

92
New cards

Up Arrow or Ctrl+P

Hot keys that recall commands in the history buffer.

93
New cards

Ctrl-C

A hot key that ends any configuration mode and returns to privileged EXEC mode.

94
New cards

Ctrl-Z

A hot key that ends any configuration mode and returns to privileged EXEC mode.

95
New cards

Ctrl-Shift-6

An all-purpose break sequence used to abort DNS lookups, traceroutes, pings, etc.

96
New cards

Startup-config

The saved configuration file stored in NVRAM, containing commands used upon startup or reboot.

97
New cards

Running-config

The current configuration stored in RAM, whose modifications immediately affect device operation.

98
New cards

NVRAM

Non-volatile RAM, where the startup-config is stored and retains content when powered off.

99
New cards

RAM

Random Access Memory, where the running-config is stored and loses content when powered off or restarted.

100
New cards

IP Address

The primary means of enabling devices to locate one another and establish end-to-end communication on the internet.