Network Design State test 2023

0.0(0)
Studied by 0 people
call kaiCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/65

encourage image

There's no tags or description

Looks like no tags are added yet.

Last updated 6:01 AM on 6/28/24
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No analytics yet

Send a link to your students to track their progress

66 Terms

1
New cards

EAP

Authentication protocol supporting smart cards

2
New cards

RJ45

Network cable end often confused with a telephone plug

3
New cards

Cross-site scripting

Computer security vulnerability in web applications

4
New cards

Unicast

Single packet sent from a source to a destination on a network

5
New cards

Impact of outsourcing on network design

Meeting with the outsourcing company to determine impact

6
New cards

SMB

Client/server file-sharing protocol establishing long-term connections

7
New cards

Spanning tree protocol

Eliminates switching loops

8
New cards

SOAP

Protocol for exchanging structured information in Web Services

9
New cards

Reliability

Network measurement area monitoring health of links using end-to-end probes

10
New cards

Domain

Network model recommended for more than ten workstations

11
New cards

Cladding

Reflective material around the core of a fiber optic cable

12
New cards

Subnet

Subnet where an IP address resides based on given IP and subnet mask

13
New cards

OSPF DR election

Router with the highest OSPF priority setting wins as DR

14
New cards

VLAN

Partitioned layer-2 network creating distinct broadcast domains

15
New cards

SMTP

TCP/IP protocol for message exchange between email systems

16
New cards

Debugging

Process to monitor connection establishment on a serial link using PPP

17
New cards

HTTP port

TCP port for HTTP communication traffic

18
New cards

EULA

Typical software agreement

19
New cards

Hub in OSI model

Specified in the Physical layer

20
New cards

Debugging

Process to monitor connection establishment on a serial link using PPP

21
New cards

Physical layer

Layer of OSI model where an unplugged network cable issue occurs

22
New cards

Firmware

Essential for keeping hardware running effectively

23
New cards

Traceroute

Linux or UNIX specific command-line tool

24
New cards

Firewall design

Recommended approach for opening and closing ports

25
New cards

Cat 5 cable length

Maximum recommended length for a single run

26
New cards

Router installation

Inexpensive way to reduce network traffic for the short term

27
New cards

MPLS

Technology reducing latency and useful for voice and video services

28
New cards

Ether Channel

Feature to increase bandwidth by combining multiple physical links

29
New cards

Promiscuous mode

Feature to configure for packet sniffing on a hub

30
New cards

BwPing

Tool to measure bandwidth and response times between hosts using ICMP

31
New cards

Five-9s availability

Goal for a network to be available 99.999% of the time

32
New cards

IIS

Web server application by Microsoft for Microsoft Windows

33
New cards

CIRT tasks

Tasks performed by a Computer Incident Response Team

34
New cards

Subnet mask for two equal subnets

255.255.255.128

35
New cards

SMTP

TCP/IP protocol governing e-mail message delivery

36
New cards

cPanel

Unix-based web hosting control panel simplifying website hosting

37
New cards

WEP

Older wireless encryption strategy susceptible to brute force attacks

38
New cards

Dry-run

Initial test of a plan by conducting a structured walk-through

39
New cards

VA

Rating used to specify the size of a UPS

40
New cards

RAID 5

Stripe sets with parity RAID level

41
New cards

Cron

Time-based job scheduler in Unix-like operating systems

42
New cards

Business continuity planning scope

Primary focus on business processes

43
New cards

PPTP incorrect statement

PPTP is derived from L2TP

44
New cards

Wireless network configuration

WPA2, SSID visible, and 802.11n for temporary setup

45
New cards

Access control

System enabling control of access to areas and resources

46
New cards

Linus Torvalds

Individual after whom Linux is named

47
New cards

MAC

Unspecified term in the context provided

48
New cards

Application gateway

A type of firewall that applies security mechanisms to specific applications like FTP and Telnet servers, effective but can degrade performance.

49
New cards

Loopback address

Used in OSPF routing protocol to ensure a consistent router ID for the OSPF process.

50
New cards

DHCP scope

Client information and settings configured once a DHCP server is activated.

51
New cards

Peer-to-peer network

Characterized by decentralized administration, shared resources, and easy setup, lacking centralized authentication.

52
New cards

TCP/IP

Set of rules governing data transmission over the Internet.

53
New cards

RAID

Stands for Redundant Array of Independent Disks, used for data storage.

54
New cards

SSL

Protocol for secure data communication, especially over insecure networks like the Internet.

55
New cards

Crossover cable

Used to connect similar devices in a network, such as a computer to a switch.

56
New cards

NAT

Stands for Network Address Translation, a technique used in networking.

57
New cards

VPN

Technology for establishing secure connections between remote users and internal networks.

58
New cards

POP3

Protocol used to retrieve email from a remote server to a local client.

59
New cards

DMZ

Demilitarized Zone used in network security to isolate external-facing servers and services.

60
New cards

VPN

Protocol used for securely connecting to a remote network using a tunneling protocol.

61
New cards

Network layer

OSI layer responsible for logical addressing in networking.

62
New cards

WPA

Wireless encryption protocol providing strong security for wireless networks.

63
New cards

Switch

Device that connects multiple network segments and makes forwarding decisions based on MAC addresses.

64
New cards

IPv6

Internet Protocol version 6 with features like larger address space, improved security, and automatic configuration.

65
New cards

Private IP address ranges

Include 10.0.0.0 - 10.255.255.255, 172.16.0.0 - 172.31.255.255, and 192.168.0.0 - 192.168.255.255.

66
New cards

Ping

Command used to test connectivity between two devices in a network.