ITN101 Final Exam Flashcards

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/126

flashcard set

Earn XP

Description and Tags

Flashcards for the ITN101 final exam, covering networking concepts, protocols, and technologies.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

127 Terms

1
New cards

Environmental Sensors

Sensors that monitor environmental factors, such as external temperatures, humidity levels in the server room, and issues with electrical load.

2
New cards

Mirrored Port

In the case of a switch, it is typical for packet sniffers to connect to an interface using this type of port.

3
New cards

Zombie

A single computer under the control of an operator.

4
New cards

Root

The administrative account native to Linux.

5
New cards

Posture Assessments

A tool Cisco uses to implement network access control.

6
New cards

Threat

Any form of potential attack against your network.

7
New cards

Network Access Policy

Defines who may access the network, how they may access the network, and what they can access.

8
New cards

White Hat Hacker

An individual who examines an infrastructure to find existing vulnerabilities and reports findings so that an administrator can further harden the network.

9
New cards

Aircrack-ng

An open-source tool for penetration testing pretty much every aspect of wireless networks.

10
New cards

VoIP Endpoints

Defined as the client and server machines and can be software or hardware for Voice over IP communications.

11
New cards

North-South Traffic

Traffic that involves data moving into and out of the data center.

12
New cards

Wireshark

A powerful and open source protocol analyzer.

13
New cards

Orchestration

Technology that combines automated processes into bigger, multifaceted processes called pipelines or workflows.

14
New cards

Virtual Machine

An environment that imitates a physical machine using virtualization software.

15
New cards

Subscriptions

Generally, what Software as a Service (SaaS) providers charge you for.

16
New cards

Bridge

A software connection that passes traffic from the real NIC to a virtual one.

17
New cards

MAC Address

In a Basic service set identifier (BSSID) infrastructure mode network, the BSSID is the same as this for the WAP.

18
New cards

Automation

Using code to set up (provision) and maintain systems (installing software updates, for example) in a consistent manner, with no mistyped commands.

19
New cards

Distributed coordinated function (DCF)

The 802.11 collision avoidance method that is currently implemented.

20
New cards

802.11n

Wi-Fi standard that offers speeds of up to 100 Mbps (or higher), offers a range of up to about 300 feet, and operates in the 2.4-GHz and 5.0-GHz frequencies.

21
New cards

L2F

The proprietary Cisco protocol that was combined with PPTP to create the Layer 2 Tunneling Protocol (L2TP).

22
New cards

IPsec

The protocol suite that L2TP generally uses for all of its security needs.

23
New cards

SSL Portal VPNs and SSL Tunnel VPNs

The two most common types of SSL VPNs.

24
New cards

Passive optical network (PON)

To make rollouts affordable, most fiber-to- the-home technologies employ a version of __ architecture that uses a single fiber to the neighborhood splitter and then individual fiber runs to each final destination.

25
New cards

OFDM

The latest spread-spectrum broadcasting method.

26
New cards

DHCP Server

Where does a client get an IP address from after it creates a virtual NIC on a PPTP VPN connection?

27
New cards

Virtual Local Area Network (VLAN)

A type of network that enables you to segment a physical network into multiple discreet networks without adding additional hardware.

28
New cards

IP Helper

Tool Cisco uses to implement DHCP relay.

29
New cards

Port Mirroring

The capability of a switch to copy data from any or all physical ports on a switch to a single physical port.

30
New cards

Algorithm

A cipher's underlying mathematical formula.

31
New cards

Certificate

A standardized type of file that includes a public key and the digital signature of a trusted third party.

32
New cards

88

The port that the Kerberos authentication protocol use.

33
New cards

Bad Certificates

What causes the most common problems with HTTPS connection?

34
New cards

TXT Record

A freeform type of DNS record that can be used for anything and allows any text to be added to a zone.

35
New cards

.mil

An original top-level domain name.

36
New cards

Registered Port

A type of port which has a number in the 1024 to 49151 range?

37
New cards

host.domain.root

In the DNS naming convention, what is the correct sequence for writing a fully qualified domain name (FQDN)?

38
New cards

ephermal ports

Ports in the 49152 to 65535 range.

39
New cards

Exim

An e-mail server type that has over 50 percent market share and runs on just about everything, from Unix/Linux to Windows.

40
New cards

IS-IS

A link state dynamic routing protocol.

41
New cards

Maximum Transmission Unit

Used to determine the largest frame a particular technology can handle.

42
New cards

RIPv2

A distance vector routing protocol.

43
New cards

Network Management Software (NMS)

A tool used by an administrator to manage many routers and provide an overall view of all the network.

44
New cards

TCP

A connection-oriented protocol.

45
New cards

UDP

The Transport layer protocol does Trivial File Transfer Protocol (TFTP) use?

46
New cards

2^y

The formula to calculate the number of new subnets using subnetting.

47
New cards

AppleTalk

Apple's protocol suite.

48
New cards

Device Manager

Within a Windows OS, tool used to verify that Windows recognizes a NIC and is ready to use it?

49
New cards

Class B

If the first decimal value of an IP address is between 128 and 191, to what IP class does the network belong?

50
New cards

Horizontal Cabling Run

Term that describes the cabling that goes more or less horizontally from a work area to the telecommunications room?

51
New cards

small form-factor pluggable (SFP)

Modular transceivers have replaced gigabit interface converters (GBICs) as the modular transceiver of choice?

52
New cards

Drops

The vast majority of network rollouts in offices use 1000BASE-T connections, or __, as you'll hear them called.

53
New cards

Two

How many pairs of wires in a cable did a 10BASE-T device require?

54
New cards

1310 nm

What wavelength is used on 10GBASE-LW fiber- optic cabling?

55
New cards

Root Guard

Mechanism that will move a port into a root- inconsistent state if BPDUs coming from a certain direction indicate another switch is trying to become the root bridge?

56
New cards

Bridge Protocol Data Unit (BPDU)

A special Spanning Tree Protocol (STP) frame that switches use to communicate with other switches to prevent switching loops from happening in the first place?

57
New cards

IEEE 802

Which IEEE committee defines frames, speeds, distances, and types of cabling to use in a network environment?

58
New cards

Plenum

the space between the acoustical tile ceiling in an office building and the actual concrete ceiling above.

59
New cards

Physical

A MAC address is also known as a(n) __ address.

60
New cards

1500 bytes of data

Frames in most wired networks hold at most __.

61
New cards

Route

Utility that enables you to display and edit the local system's routing table.

62
New cards

tens of kilometers

What distance can a signal travel on a fiber-optic cable?

63
New cards

Runts

Which interface statistic value increases when packets are received that are shorter than Ethernet's minimum size of 64 bytes?

64
New cards

Trap

An agent can solicit information from an NMS with the __ protocol data unit (PDU).

65
New cards

Cacti

A graphing tool that could be used show everything about specific switches?

66
New cards

Firewalls

Technology that consists of devices or software that protect an internal network from unauthorized access by acting as a filter.

67
New cards

NetFlow

Tool was developed for packet flow monitoring and was subsequently included in Cisco routers and switches?

68
New cards

DoS Attack

A deauthentication (deauth) attack is a form of __ attack.

69
New cards

Warm Site

Secondary location lacks current data and may not have functioning Internet/network links?

70
New cards

Real-time Backups

Type of backups are really just redundant servers?

71
New cards

Mean Time to Repair

Represents the amount of time it takes to fix a system after it fails?

72
New cards

HVAC

System should be optimized to recirculate and purify the hot air into cool air in a continuous flow?

73
New cards

assessment

At the end of an audit, the auditing firm produces a(n) ____ report that details all findings and recommendations for upgrades, fixes for compliance, and so on.

74
New cards

hardware underutilization

Term to describe a server (or a desktop PC, for that matter) that isn't being used anywhere near its capability?

75
New cards

virtual routers

let us dynamically reconfigure networks. Similar to how virtual machines enable us to easily reallocate computing resources when demand changes.

76
New cards

Type 2 Hypervisor

Type of hypervisor is installed on top of the operating system?

77
New cards

Link State

Term represents a wireless device's condition of being connected or not connected?

78
New cards

Signal Strength

Term represents a measurement of how well a wireless device is connecting to other devices?

79
New cards

WPA3

uses Simultaneous Authentication of Equals, a key exchange based on Diffie-Hellman that generates unique encryption keys between each client and WAP?

80
New cards

DSL Access Multiplexer (DSLAM)

DSL provider device located at a central office connects multiple customers to the Internet?

81
New cards

Host-to-Site Connection

A type of VPN connection where a single computer logs into a remote network and becomes, for all intents and purposes, a member of that network.

82
New cards

Network Based IDS(NIDS)

consists of multiple sensors placed around the network, often on one or both sides of the gateway router.

83
New cards

Bandwidth Shaping

Term is synonymous with traffic shaping?

84
New cards

MS-CHAPv2

Authentication method is the most common authentication method for dial-up connections?

85
New cards

RADIUS

Standard offers authentication, authorization, and accounting?

86
New cards

HTTP Proxy Server

The most common type of proxy server?

87
New cards

certificate Exchange

You won't get an HTTPS connection without a good __ exchange.

88
New cards

Network Access Control (NAC)

defines a newer series of protection applications that combine the features of what traditionally was done by separate applications?

89
New cards

hop

Term refers to the passage of a packet through a router?

90
New cards

Classless Inter-Domain Routing (CIDR)

The foundation of which technique involves taking a single class of IP addresses and chopping it up into multiple smaller groups?

91
New cards

143

Port is used to receive e-mail messages from e-mail servers (IMAP4)?

92
New cards

80

Port do HTTP Web servers use?

93
New cards

Four

Norm today for the number of pairs in UTP cabling?

94
New cards

Bonding

Most switches enable you to use multiple NICs for a single machine, a process called __ or link aggregation.

95
New cards

fiber-optic

What general type of cabling is a technician most likely to use today when installing Ethernet cabling in areas with high electrical interference?

96
New cards

10GBASE-SR

Which 10 GbE standard features a multimode fiber type?

97
New cards

Broadband

you can get multiple signals to flow over the same wire at the same time, modulating to higher frequencies.

98
New cards

1000BASE-X

The __ version of Gigabit Ethernet, published under the 802.3z standard, is divided into a series of standards, with names such as 1000BASE-SX and 1000BASE-LX.

99
New cards

10BASE-T

Version of Ethernet was introduced in 1990?

100
New cards

Five

How many fields does a basic Ethernet frame contain?