Hardware/Software/VOCAB

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/30

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

31 Terms

1
New cards

Layer 3 switch

Able to operate like a router by using a routing table implemented into the switch

2
New cards

Remote Procedure Call (RPC)

Used by the session layer, allows a program to execute code on a remote system as if it were local.

used to manage communication sessions between networked devices

3
New cards

Round robin

A load balancing algorithm

Distributes traffic equally among all available servers (regardless of their current load)

4
New cards

Alternate Port

Typical state is set to block

Provides a backup path to the root bridge and transitions to the to the forwarding state ONLY if the primary path fails

5
New cards

Round Trip Time (RTT)

MOST CRUCIAL for identifying latency issues in a network

Measures the time it takes for a packet to travel from the sources to the destination and back

6
New cards

Dynamic Frequency Selection (DFS)

part of 802.1h

has longer connection times due to channel scanning

requires the network to scan for radar signals before selecting a channel (delaying connection process)

7
New cards

Raised Floor systems

enables better airflow control by isolating hot and cold air zones

reduces likelihood of hot spots and improves temperature management

8
New cards

Network Monitoring Dashboard

best suited for providing a continuous, real time view of network performance metrics

allows admins to visualize and monitor various metrics (bandwidth utilization, latency, packet loss) in real time

9
New cards

Out of band management

provides a way to access network devices even if the primary network is down (using a separate connection like a serial or cellular link)

Ex: connecting to a remote server that has lost its primary network connection

10
New cards

In band management

Relies on the same network used for data traffic, which wouldn’t be accessible if the primary connection is lost

11
New cards

Hardware Security Module (HSM)

most appropriate method for secure key storage

provides high level of physical and logical security

ensures keys are protected from unauthorized access and tampering

12
New cards

Network Security Groups (NSGs)

Enhance the security of cloud resources by defining rules that restrict access based on IP addresses and ports

allows for granular control over the traffic that is allowed to reach network resources

13
New cards

Routing Information Protocol (RIP)

Distance vector routing protocol, typically used in smaller networks

uses HOP COUNT as its metric

each hop represents a router the data must pass through to reach its destination

14
New cards

Session Initiation Protocol (SIP)

Supports VoIP communications by setting up and managing VoIP call sessions

handles initiation, modification, and termination of these sessions

15
New cards

Ethernet Bridge

Designed to connect separate network segments

allows them to communicate as if they were part of the same network

does not affect performance

creates separate collision domains

16
New cards

Shadow IT

unauthorized devices that are connected to the corporate network and are used to access corporate resources

represents a vulnerability as they are not managed by the IT department

17
New cards

802.11k and 802.11v standards

encourages clients to connect to AP with the strongest signal

a way to deal with “sticky clients” that dont move to the AP with the strongest signal

provide better information to clients about the network environment

18
New cards

NetFlow collector and NetFlow analyzer

system that analyzes traffic flows in real time, generates alerts for unusual patterns

Collector aggregates flows from multiple exporters

Analyzer interprets the information and generates alerts and detailed reports

19
New cards

False Rejection Rate (FRR)

the amount of times an authorized user is being denied access

20
New cards

False Acceptance Rate (FAR)

the amount of times an unauthorized access occurs

21
New cards

Netflow data

an effective way for detecting traffic anomalies caused by DDOS attacks

provides detailed information about the flow of traffic across the network

allows admins to spot unusual spikes in traffic and identify patterns that indicate a DDOS attack

22
New cards

Packet Scheduling

a QoS technique used to ensure that high priority traffic is sent before lower priority traffic

determines order in which packets are transmitted based on their priority levels

23
New cards

Network Intrusion Detection System (NIDS)

designed to monitor and analyze network traffic for signs of malicious activity or policy violations. It operates passively, capturing packets as they traverse the network without altering them

24
New cards

OSPF

link state routing protocol

calculates best path by building a complete map of the network

uses algorithms like Dijkstras algorithm

25
New cards

BGP

path vector protocl

used for inter domain routing on the internet (other routing protocols are not used for internet traffic)

26
New cards

Data Loss Prevention (DLP)

effective way to detect and block transmission of sensitive data

can be used for email as well

27
New cards

Feasible Successor

used in EIGRP

the backup route that is immediately available if the primary route (successor) fails

ensures fast convergence and minimal downtime in the network

28
New cards

Dynamic Trunking Protocol (DTP)

developed by Cisco Systems to automate the negotiation of trunk links between VLAN-aware switches

It simplifies the configuration by allowing switches to dynamically establish trunk links.

Can also allow attackers to perform VLAN hopping attacks by allowing them to perform trunk links where not authorized

29
New cards

Extensible Authentication Protocol (EAP)

specifically designed to support multiple authentication mechanisms

Passwords, digital certificates, smart cards, and token based authentication

30
New cards

BNC connector

twist on beyonet-style coupling mechanism

31
New cards

VLAN trunking protocol (VTP)

allows VLAN assignments to be dynamically managed in a network

automates the distribution and management of VLAN configurations across multiple switches