1/126
Flashcards for the ITN101 final exam, covering networking concepts, protocols, and technologies.
Name | Mastery | Learn | Test | Matching | Spaced |
---|
No study sessions yet.
Environmental Sensors
Sensors that monitor environmental factors, such as external temperatures, humidity levels in the server room, and issues with electrical load.
Mirrored Port
In the case of a switch, it is typical for packet sniffers to connect to an interface using this type of port.
Zombie
A single computer under the control of an operator.
Root
The administrative account native to Linux.
Posture Assessments
A tool Cisco uses to implement network access control.
Threat
Any form of potential attack against your network.
Network Access Policy
Defines who may access the network, how they may access the network, and what they can access.
White Hat Hacker
An individual who examines an infrastructure to find existing vulnerabilities and reports findings so that an administrator can further harden the network.
Aircrack-ng
An open-source tool for penetration testing pretty much every aspect of wireless networks.
VoIP Endpoints
Defined as the client and server machines and can be software or hardware for Voice over IP communications.
North-South Traffic
Traffic that involves data moving into and out of the data center.
Wireshark
A powerful and open source protocol analyzer.
Orchestration
Technology that combines automated processes into bigger, multifaceted processes called pipelines or workflows.
Virtual Machine
An environment that imitates a physical machine using virtualization software.
Subscriptions
Generally, what Software as a Service (SaaS) providers charge you for.
Bridge
A software connection that passes traffic from the real NIC to a virtual one.
MAC Address
In a Basic service set identifier (BSSID) infrastructure mode network, the BSSID is the same as this for the WAP.
Automation
Using code to set up (provision) and maintain systems (installing software updates, for example) in a consistent manner, with no mistyped commands.
Distributed coordinated function (DCF)
The 802.11 collision avoidance method that is currently implemented.
802.11n
Wi-Fi standard that offers speeds of up to 100 Mbps (or higher), offers a range of up to about 300 feet, and operates in the 2.4-GHz and 5.0-GHz frequencies.
L2F
The proprietary Cisco protocol that was combined with PPTP to create the Layer 2 Tunneling Protocol (L2TP).
IPsec
The protocol suite that L2TP generally uses for all of its security needs.
SSL Portal VPNs and SSL Tunnel VPNs
The two most common types of SSL VPNs.
Passive optical network (PON)
To make rollouts affordable, most fiber-to- the-home technologies employ a version of __ architecture that uses a single fiber to the neighborhood splitter and then individual fiber runs to each final destination.
OFDM
The latest spread-spectrum broadcasting method.
DHCP Server
Where does a client get an IP address from after it creates a virtual NIC on a PPTP VPN connection?
Virtual Local Area Network (VLAN)
A type of network that enables you to segment a physical network into multiple discreet networks without adding additional hardware.
IP Helper
Tool Cisco uses to implement DHCP relay.
Port Mirroring
The capability of a switch to copy data from any or all physical ports on a switch to a single physical port.
Algorithm
A cipher's underlying mathematical formula.
Certificate
A standardized type of file that includes a public key and the digital signature of a trusted third party.
88
The port that the Kerberos authentication protocol use.
Bad Certificates
What causes the most common problems with HTTPS connection?
TXT Record
A freeform type of DNS record that can be used for anything and allows any text to be added to a zone.
.mil
An original top-level domain name.
Registered Port
A type of port which has a number in the 1024 to 49151 range?
host.domain.root
In the DNS naming convention, what is the correct sequence for writing a fully qualified domain name (FQDN)?
ephermal ports
Ports in the 49152 to 65535 range.
Exim
An e-mail server type that has over 50 percent market share and runs on just about everything, from Unix/Linux to Windows.
IS-IS
A link state dynamic routing protocol.
Maximum Transmission Unit
Used to determine the largest frame a particular technology can handle.
RIPv2
A distance vector routing protocol.
Network Management Software (NMS)
A tool used by an administrator to manage many routers and provide an overall view of all the network.
TCP
A connection-oriented protocol.
UDP
The Transport layer protocol does Trivial File Transfer Protocol (TFTP) use?
2^y
The formula to calculate the number of new subnets using subnetting.
AppleTalk
Apple's protocol suite.
Device Manager
Within a Windows OS, tool used to verify that Windows recognizes a NIC and is ready to use it?
Class B
If the first decimal value of an IP address is between 128 and 191, to what IP class does the network belong?
Horizontal Cabling Run
Term that describes the cabling that goes more or less horizontally from a work area to the telecommunications room?
small form-factor pluggable (SFP)
Modular transceivers have replaced gigabit interface converters (GBICs) as the modular transceiver of choice?
Drops
The vast majority of network rollouts in offices use 1000BASE-T connections, or __, as you'll hear them called.
Two
How many pairs of wires in a cable did a 10BASE-T device require?
1310 nm
What wavelength is used on 10GBASE-LW fiber- optic cabling?
Root Guard
Mechanism that will move a port into a root- inconsistent state if BPDUs coming from a certain direction indicate another switch is trying to become the root bridge?
Bridge Protocol Data Unit (BPDU)
A special Spanning Tree Protocol (STP) frame that switches use to communicate with other switches to prevent switching loops from happening in the first place?
IEEE 802
Which IEEE committee defines frames, speeds, distances, and types of cabling to use in a network environment?
Plenum
the space between the acoustical tile ceiling in an office building and the actual concrete ceiling above.
Physical
A MAC address is also known as a(n) __ address.
1500 bytes of data
Frames in most wired networks hold at most __.
Route
Utility that enables you to display and edit the local system's routing table.
tens of kilometers
What distance can a signal travel on a fiber-optic cable?
Runts
Which interface statistic value increases when packets are received that are shorter than Ethernet's minimum size of 64 bytes?
Trap
An agent can solicit information from an NMS with the __ protocol data unit (PDU).
Cacti
A graphing tool that could be used show everything about specific switches?
Firewalls
Technology that consists of devices or software that protect an internal network from unauthorized access by acting as a filter.
NetFlow
Tool was developed for packet flow monitoring and was subsequently included in Cisco routers and switches?
DoS Attack
A deauthentication (deauth) attack is a form of __ attack.
Warm Site
Secondary location lacks current data and may not have functioning Internet/network links?
Real-time Backups
Type of backups are really just redundant servers?
Mean Time to Repair
Represents the amount of time it takes to fix a system after it fails?
HVAC
System should be optimized to recirculate and purify the hot air into cool air in a continuous flow?
assessment
At the end of an audit, the auditing firm produces a(n) ____ report that details all findings and recommendations for upgrades, fixes for compliance, and so on.
hardware underutilization
Term to describe a server (or a desktop PC, for that matter) that isn't being used anywhere near its capability?
virtual routers
let us dynamically reconfigure networks. Similar to how virtual machines enable us to easily reallocate computing resources when demand changes.
Type 2 Hypervisor
Type of hypervisor is installed on top of the operating system?
Link State
Term represents a wireless device's condition of being connected or not connected?
Signal Strength
Term represents a measurement of how well a wireless device is connecting to other devices?
WPA3
uses Simultaneous Authentication of Equals, a key exchange based on Diffie-Hellman that generates unique encryption keys between each client and WAP?
DSL Access Multiplexer (DSLAM)
DSL provider device located at a central office connects multiple customers to the Internet?
Host-to-Site Connection
A type of VPN connection where a single computer logs into a remote network and becomes, for all intents and purposes, a member of that network.
Network Based IDS(NIDS)
consists of multiple sensors placed around the network, often on one or both sides of the gateway router.
Bandwidth Shaping
Term is synonymous with traffic shaping?
MS-CHAPv2
Authentication method is the most common authentication method for dial-up connections?
RADIUS
Standard offers authentication, authorization, and accounting?
HTTP Proxy Server
The most common type of proxy server?
certificate Exchange
You won't get an HTTPS connection without a good __ exchange.
Network Access Control (NAC)
defines a newer series of protection applications that combine the features of what traditionally was done by separate applications?
hop
Term refers to the passage of a packet through a router?
Classless Inter-Domain Routing (CIDR)
The foundation of which technique involves taking a single class of IP addresses and chopping it up into multiple smaller groups?
143
Port is used to receive e-mail messages from e-mail servers (IMAP4)?
80
Port do HTTP Web servers use?
Four
Norm today for the number of pairs in UTP cabling?
Bonding
Most switches enable you to use multiple NICs for a single machine, a process called __ or link aggregation.
fiber-optic
What general type of cabling is a technician most likely to use today when installing Ethernet cabling in areas with high electrical interference?
10GBASE-SR
Which 10 GbE standard features a multimode fiber type?
Broadband
you can get multiple signals to flow over the same wire at the same time, modulating to higher frequencies.
1000BASE-X
The __ version of Gigabit Ethernet, published under the 802.3z standard, is divided into a series of standards, with names such as 1000BASE-SX and 1000BASE-LX.
10BASE-T
Version of Ethernet was introduced in 1990?
Five
How many fields does a basic Ethernet frame contain?